WorldWideScience

Sample records for security complex inventories

  1. Designing Intelligent Secure Android Application for Effective Chemical Inventory

    Science.gov (United States)

    Shukran, Mohd Afizi Mohd; Naim Abdullah, Muhammad; Nazri Ismail, Mohd; Maskat, Kamaruzaman; Isa, Mohd Rizal Mohd; Shahfee Ishak, Muhammad; Adib Khairuddin, Muhamad

    2017-08-01

    Mobile services support various situations in everyday life and with the increasing sophistication of phone functions, the daily life is much more easier and better especially in term of managing tools and apparatus. Since chemical inventory management system has been experiencing a new revolution from antiquated to an automated inventory management system, some additional features should be added in current chemical inventory system. Parallel with the modern technologies, chemical inventory application using smart phone has been developed. Several studies about current related chemical inventory management using smart phone application has been done in this paper in order to obtain an overview on recent studies in smartphone application for chemical inventory system which are needed in schools, universities or other education institutions. This paper also discuss about designing the proposed secure mobile chemical inventory system. The study of this paper can provide forceful review analysis support for the chemical inventory management system related research.

  2. Complex networks: Dynamics and security

    Science.gov (United States)

    Lai, Ying-Cheng; Motter, Adilson; Nishikawa, Takashi; Park, Kwangho; Zhao, Liang

    2005-04-01

    This paper presents a perspective in the study of complex networks by focusing on how dynamics may affect network security under attacks. In particular, we review two related problems: attack-induced cascading breakdown and range-based attacks on links. A cascade in a network means the failure of a substantial fraction of the entire network in a cascading manner, which can be induced by the failure of or attacks on only a few nodes. These have been reported for the internet and for the power grid (e.g., the August 10, 1996 failure of the western United States power grid). We study a mechanism for cascades in complex networks by constructing a model incorporating the flows of information and physical quantities in the network. Using this model we can also show that the cascading phenomenon can be understood as a phase transition in terms of the key parameter characterizing the node capacity. For a parameter value below the phase-transition point, cascading failures can cause the network to disintegrate almost entirely. We will show how to obtain a theoretical estimate for the phase-transition point. The second problem is motivated by the fact that most existing works on the security of complex networks consider attacks on nodes rather than on links. We address attacks on links. Our investigation leads to the finding that many scale-free networks are more sensitive to attacks on short-range than on long-range links. Considering that the small-world phenomenon in complex networks has been identified as being due to the presence of long-range links, i.e., links connecting nodes that would otherwise be separated by a long node-to-node distance, our result, besides its importance concerning network efficiency and security, has the striking implication that the small-world property of scale-free networks is mainly due to short-range links.

  3. Complex networks: Dynamics and security

    Indian Academy of Sciences (India)

    cusing on how dynamics may affect network security under attacks. In particular, we review two related ... portation network etc., are an essential part of a modern society. The security of such a network under ... communication (or information flow) within the network, is changed under random or intentional attacks [7–10].

  4. Study of Intelligent Secure Chemical Inventory Management System

    Science.gov (United States)

    Shukran, Mohd Afizi Mohd; Naim Abdullah, Muhammad; Nazri Ismail, Mohd; Maskat, Kamaruzaman; Isa, Mohd Rizal Mohd; Shahfee Ishak, Muhammad; Adib Khairuddin, Muhamad

    2017-08-01

    Chemical inventory management system has been experiencing a new revolution from traditional inventory system which is manual to an automated inventory management system. In this paper, some review of the classic and modern approaches to chemical inventory management system has been discussed. This paper also describe about both type of inventory management. After a comparative analysis of the traditional method and automated method, it can be said that both methods have some distinctive characteristics. Moreover, the automated inventory management method has higher accuracy of calculation because the calculations are handled by software, eliminating possible errors and saving time. The automated inventory system also allows users and administrators to track the availability, location and consumption of chemicals. The study of this paper can provide forceful review analysis support for the chemical inventory management related research.

  5. Complex networks: Dynamics and security

    Indian Academy of Sciences (India)

    and nonlinear physics, applied mathematics, and social science has emerged, which brings novel concepts and approaches to the study of complex networks. Issues such as the characterization of the network architecture, dynamics on complex net- works, and the effect of attacks on network operation have begun to be ...

  6. 76 FR 9382 - Public Availability of the Securities and Exchange Commission FY 2010 Service Contract Inventory

    Science.gov (United States)

    2011-02-17

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION Public Availability of the Securities and Exchange Commission FY 2010 Service Contract Inventory AGENCY: Securities and Exchange Commission. ACTION: Notice of public availability of FY 2010 Service...

  7. 77 FR 50542 - Public Availability of the Securities and Exchange Commission's FY 2011 Service Contract Inventory

    Science.gov (United States)

    2012-08-21

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION Public Availability of the Securities and Exchange Commission's FY 2011 Service Contract Inventory AGENCY: U.S. Securities and Exchange Commission. ACTION: Notice. SUMMARY: In accordance with Section 743...

  8. 78 FR 14141 - Public Availability of the Securities and Exchange Commission's FY 2012 Service Contract Inventory

    Science.gov (United States)

    2013-03-04

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION Public Availability of the Securities and Exchange Commission's FY 2012 Service Contract Inventory AGENCY: U.S. Securities and Exchange Commission. ACTION: Notice. SUMMARY: In accordance with Section 743...

  9. Security Inequalities in North America: Reassessing Regional Security Complex Theory

    Directory of Open Access Journals (Sweden)

    Richard Kilroy

    2017-12-01

    Full Text Available This article re-evaluates earlier work done by the authors on Regional Security Complex Theory (RSCT in North America, using sectoral analysis initially developed by Buzan and Waever, but also adding the variables of institutions, identity, and interests. These variables are assessed qualitatively in the contemporary context on how they currently impress upon the process of securitization within sectoral relations between Canada, Mexico, and the United States. The article reviews the movement from bilateral security relations between these states to the development of a trilateral response to regional security challenges post- 9/11. It further addresses the present period and what appears to be a security process derailed by recent political changes and security inequalities, heightened by the election of Donald Trump in 2016. The article argues that while these three states initially evinced a convergence of regional security interests after 9/11, which did create new institutional responses, under the current conditions, divergence in political interests and security inequalities have reduced the explanatory power of RSCT in North America. Relations between states in North American are becoming less characterized by the role of institutions and interests and more by identity politics in the region.

  10. Complex networks: Dynamics and security

    Indian Academy of Sciences (India)

    We study a mechanism for cascades in complex networks by constructing a model incorporating the flows of information and physical quantities in the network. Using this model we can also show that the cascading phenomenon can be understood as a phase transition in terms of the key parameter characterizing the node ...

  11. Complex networks: Dynamics and security

    Indian Academy of Sciences (India)

    1996-08-10

    These have been reported for the internet and for the power grid (e.g., the August 10, 1996 failure of the western United States power grid). We study a mechanism for cascades in complex networks by constructing a model incorporating the flows of information and physical quantities in the network. Using this model we can ...

  12. Design tools for complex dynamic security systems.

    Energy Technology Data Exchange (ETDEWEB)

    Byrne, Raymond Harry; Rigdon, James Brian; Rohrer, Brandon Robinson; Laguna, Glenn A.; Robinett, Rush D. III (.; ); Groom, Kenneth Neal; Wilson, David Gerald; Bickerstaff, Robert J.; Harrington, John J.

    2007-01-01

    The development of tools for complex dynamic security systems is not a straight forward engineering task but, rather, a scientific task where discovery of new scientific principles and math is necessary. For years, scientists have observed complex behavior but have had difficulty understanding it. Prominent examples include: insect colony organization, the stock market, molecular interactions, fractals, and emergent behavior. Engineering such systems will be an even greater challenge. This report explores four tools for engineered complex dynamic security systems: Partially Observable Markov Decision Process, Percolation Theory, Graph Theory, and Exergy/Entropy Theory. Additionally, enabling hardware technology for next generation security systems are described: a 100 node wireless sensor network, unmanned ground vehicle and unmanned aerial vehicle.

  13. Reducing food wastage, improving food security? An inventory study on stakeholders’ perspectives and the current state

    NARCIS (Netherlands)

    Tielens, J.; Candel, J.J.L.

    2014-01-01

    This study is concerned with the relation between food wastage reduction and the improvement of food security. The central question of this inventory study is to what extent interventions to reduce food wastage are effective contributions for food security, in particular for local access in

  14. Securing Digital Audio using Complex Quadratic Map

    Science.gov (United States)

    Suryadi, MT; Satria Gunawan, Tjandra; Satria, Yudi

    2018-03-01

    In This digital era, exchanging data are common and easy to do, therefore it is vulnerable to be attacked and manipulated from unauthorized parties. One data type that is vulnerable to attack is digital audio. So, we need data securing method that is not vulnerable and fast. One of the methods that match all of those criteria is securing the data using chaos function. Chaos function that is used in this research is complex quadratic map (CQM). There are some parameter value that causing the key stream that is generated by CQM function to pass all 15 NIST test, this means that the key stream that is generated using this CQM is proven to be random. In addition, samples of encrypted digital sound when tested using goodness of fit test are proven to be uniform, so securing digital audio using this method is not vulnerable to frequency analysis attack. The key space is very huge about 8.1×l031 possible keys and the key sensitivity is very small about 10-10, therefore this method is also not vulnerable against brute-force attack. And finally, the processing speed for both encryption and decryption process on average about 450 times faster that its digital audio duration.

  15. Monte Carlo isotopic inventory analysis for complex nuclear systems

    Science.gov (United States)

    Phruksarojanakun, Phiphat

    Monte Carlo Inventory Simulation Engine (MCise) is a newly developed method for calculating isotopic inventory of materials. It offers the promise of modeling materials with complex processes and irradiation histories, which pose challenges for current, deterministic tools, and has strong analogies to Monte Carlo (MC) neutral particle transport. The analog method, including considerations for simple, complex and loop flows, is fully developed. In addition, six variance reduction tools provide unique capabilities of MCise to improve statistical precision of MC simulations. Forced Reaction forces an atom to undergo a desired number of reactions in a given irradiation environment. Biased Reaction Branching primarily focuses on improving statistical results of the isotopes that are produced from rare reaction pathways. Biased Source Sampling aims at increasing frequencies of sampling rare initial isotopes as the starting particles. Reaction Path Splitting increases the population by splitting the atom at each reaction point, creating one new atom for each decay or transmutation product. Delta Tracking is recommended for high-frequency pulsing to reduce the computing time. Lastly, Weight Window is introduced as a strategy to decrease large deviations of weight due to the uses of variance reduction techniques. A figure of merit is necessary to compare the efficiency of different variance reduction techniques. A number of possibilities for figure of merit are explored, two of which are robust and subsequently used. One is based on the relative error of a known target isotope (1/R 2T) and the other on the overall detection limit corrected by the relative error (1/DkR 2T). An automated Adaptive Variance-reduction Adjustment (AVA) tool is developed to iteratively define parameters for some variance reduction techniques in a problem with a target isotope. Sample problems demonstrate that AVA improves both precision and accuracy of a target result in an efficient manner

  16. Y-12 National Security Complex Water Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Elam, Shana E.; Bassett, P.; McMordie Stoughton, Kate

    2010-11-01

    The Department of Energy's Federal Energy Management Program (FEMP) sponsored a water assessment at the Y 12 National Security Complex (Y 12) located in Oak Ridge, Tennessee. Driven by mandated water reduction goals of Executive Orders 13423 and 13514, the objective of the water assessment is to develop a comprehensive understanding of the current water-consuming applications and equipment at Y 12 and to identify key areas for water efficiency improvements that could be applied not only at Y-12 but at other Federal facilities as well. FEMP selected Pacific Northwest National Laboratory to coordinate and manage the water assessment. PNNL contracted Water Savers, LLC to lead the technical aspects of the water assessment. Water Savers provided key technical expertise in water auditing, metering, and cooling systems. This is the report of that effort, which concluded that the Y-12 facility could realize considerable water savings by implementing the recommended water efficiency opportunities.

  17. A Retrospective Study of Phonetic Inventory Complexity in Acquisition of Spanish: Implications for Phonological Universals

    Science.gov (United States)

    Catano, Lorena; Barlow, Jessica A.; Moyna, Maria Irene

    2009-01-01

    This study evaluates 39 different phonetic inventories of 16 Spanish-speaking children (ages 0;11 to 5;1) in terms of hierarchical complexity. Phonetic featural differences are considered in order to evaluate the proposed implicational hierarchy of Dinnsen et al.'s phonetic inventory typology for English. The children's phonetic inventories are…

  18. Assessment of private security guards by Suicide Probability Scale and Brief Symptom Inventory.

    Science.gov (United States)

    Dogan, Bulent; Canturk, Gurol; Canturk, Nergis; Guney, Sevgi; Özcan, Ebru

    2016-01-01

    The aim of the present study was to investigate the influence of suicide probability and relevant sociodemographic features and to provide information for preventing suicide in private security guards working under the stressful conditions and continuous exposure to the negative and traumatic life events. 200 private security guards and 200 personnels of Ankara University participated in the study. A sociodemographic information questionnaire, the Suicide Probability Scale (SPS) and the Brief Symptom Inventory (BSI) were used to collect the data. Gender, marital status, income, religious beliefs, experiencing a life-threatening situation, history of a suicide attempt, smoking and not having a chronic disease caused statistically significant differences in the scores for SPS between the private security guards group and the controls. Moreover there was a statistically significant positive correlation between the total scores of the subscales of SPS and the total scores of BSI. Like police officers and gendarmes, private security guards are at high risk of committing and attempting suicide because of being at stressful work settings and also suffering from secondary trauma. It is required that they should be aware of their tendency to commit suicide and have regular psychiatric screenings.

  19. Material Inventory Optimization in Bakery Supply Chain: Implications for Food Security in Nigeria

    Directory of Open Access Journals (Sweden)

    Stephen C. Nwanya

    2015-08-01

    Full Text Available The study determined optimum inventory levels for various bakery resources using the bread supply chain network in Onitsha City. Structured questionnaires were administered among bakery factories. The optimum design achieved through the optimization model was compared with the existing systems. Analysis of 90 bakeries with a combined capacity of 3960 revealed that total money N 564,408,477.28 is spent on energy annually. Of this amount, 66.75% is expended annually to meet diesel requirements, while firewood and petrol account for 22.57% and 10.66%, respectively. The results of the ABC analysis show that flour ranks as class A with over 78%, followed by sugar at 13%, whilst the remainder of the ingredients constitutes 9%. High operating costs was identified as a major factor militating against the growth of the sector. Consequently, baked bread is expensive and remuneration is very poor, making the industry less attractive. The implementation of optimization practice adds value leading to savings amounting to N 6,957.51, thus enhancing the supply chain competiveness. The annual supply chain performance measured by inventory turnover shows a frequency of 73 inventory turns. Since the bakeries contribute to ensuring food security, these findings, if implemented, will assuage the rising food insecurity in the nation.

  20. Anarchy in the Streets: Restoring Public Security in Complex Contingencies

    National Research Council Canada - National Science Library

    Castle, James

    1998-01-01

    When US military forces are performing public security functions during complex contingency operations, what conditions must they establish in order to transfer those functions successfully back to the host nation...

  1. Y‑12 National Security Complex

    Data.gov (United States)

    Federal Laboratory Consortium — The Y‑12 National Security Complex is a premier manufacturing facility dedicated to making our nation and the world a safer place and plays a vital role in the...

  2. Physical security technologies for weapons complex reconfiguration facilities

    International Nuclear Information System (INIS)

    Jaeger, C.D.

    1994-01-01

    Sandia National Laboratories was a member of the Weapons Complex Reconfiguration (WCR) Safeguards and Security (S ampersand S) team providing assistance to the Department of Energy's (DOE) Office of Weapons Complex Reconfiguration. The physical security systems in the new and upgraded facilities being considered for the WCR had to meet DOE orders and other requirements set forth in the WCR Programmatic Design Criteria (PDC), incorporate the latest physical security technologies using proven state-of-the-art systems and meet fundamental security principles. The outcome was to avoid costly retrofits and provide effective and comprehensive protection against current and projected threats with minimal impact on operations, costs and schedule. Physical security requirements for WCR facilities include: (1) reducing S ampersand S life-cycle costs, (2) where feasible automating S ampersand S functions to minimize operational costs, access to critical assets and exposure of people to hazardous environments, (3) increasing the amount of delay to outsider adversary attack, (4) compartmentalizing the facility to minimize the number of personnel requiring access to critical areas and (5) having reliable and maintainable systems. To be most effective against threats physical security must be integrated with facility operations, safety and other S ampersand S activities, such as material control and accountability, nuclear measurements and computer and information security. This paper will discuss the S ampersand S issues, requirements, technology opportunities and needs. Physical security technologies and systems considered in the design effort of the Weapons Complex Reconfiguration facilities will be reviewed

  3. Competing policy packages and the complexity of energy security

    International Nuclear Information System (INIS)

    Sovacool, Benjamin K.; Saunders, Harry

    2014-01-01

    To underscore both the diversity and severity of energy security tradeoffs, this study examines five different energy security policy packages—five distinct strategies aimed at reducing oil dependence, enhancing energy affordability, expanding access to modern energy services, responding to climate change, and minimizing the water intensity of energy production. It identifies both compelling synergies and conflicts between each of the five strategies. The central value of the study is that it turns on its head the widely accepted notion of a “portfolio approach” or “all of the above” strategy to energy policymaking. To make this case, the article begins by elucidating the complexity and multidimensionality of energy security as a concept. It then introduces our five energy security policy packages to illustrate how some energy security objectives complement each other whereas others counteract each other. It concludes by noting that energy security is not an absolute state, and that achieving it only “works” by prioritizing some dimensions, or policy goals and packages, more than others. - Highlights: • Energy security is a complex, multidimensional concept. • Policy packages aimed at achieving energy security often conflict with each other. • Energy security only “works” by prioritizing some dimensions more than others

  4. Complexity, Global Politics, and National Security

    Science.gov (United States)

    1997-01-01

    branching tree, with probabilities at all the branchings. In a short story by the great Argentine writer Jorge Luis Borges , a character creates a model...Qwerty," for thoughts on the economics of W. Brian Arthur. Lam, Lui and Vladimir Naroditsky, eds. Modeling Complex Phenomena. New York: Springer

  5. Complexity, Security and Civil Society in East Asia

    OpenAIRE

    Cavazos, Roger; Diamond, Joan; Hayes, Peter; Hippel, David von; Lee, Sanghun; Minato, Takayuki; Tanter, Richard; Yi, Kiho

    2016-01-01

    Complexity, Security and Civil Society in East Asia off ers the latest understanding of complex global problems in the region, including nuclear weapons, urban insecurity, energy, and climate change. Detailed case studies of China, North and South Korea, and Japan demonstrate the importance of civil society and ‘civic diplomacy' in reaching shared solutions to these problems in East Asia and beyond. Each chapter describes regional civil society initiatives that tackle complex challenges to E...

  6. Evolutionary Search for Globally Optimal Stable Multicycles in Complex Systems with Inventory Couplings

    Directory of Open Access Journals (Sweden)

    M. Skowron

    2009-01-01

    Full Text Available This note is devoted to multiperiodically operated complex system with inventory couplings transferring waste products from some subsystems as useful components to other subsystems. The flexibility of the inventory couplings is used to force each of the subsystems with its own period and to exploit its particular dynamic properties. This enhances the performance of the complex system endowed with many recycling loops, which reduce the amount of waste products endangering the natural environment. The subsystems are characterized by generalized populations composed of the individuals (the cycles, each of them encompasses its period, its initial state, its local control, and its inventory interaction. An evolutionary optimization algorithm employing such generalized populations coordinated on the basis of the inventory interaction constraints is developed. It includes the stability requirements imposed on the cyclic control processes connected with particular subsystems. The algorithm proposed is applied to the global multiperiodic optimization of some interconnected chemical production processes.

  7. Nevada National Security Site Underground Radionuclide Inventory, 1951-1992: Accounting for Radionuclide Decay through September 30, 2012

    Energy Technology Data Exchange (ETDEWEB)

    Finnegan, David Lawrence [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Bowen, Scott Michael [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Thompson, Joseph L. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Miller, Charles M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Baca, Phyllis L. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Olivas, Loretta F. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Geoffrion, Carmen G. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Smith, David K. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Goishi, Wataru [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Esser, Bradley K. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Meadows, Jesse W. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Namboodiri, Neil [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Wild, John F. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-03-16

    This report is an update of report LA-13859-MS (Bowen et al., 2001). In that original report, the underground radionuclide inventory at the Nevada National Security Site (NNSS) was decay corrected to September 23, 1992, the date of the last underground nuclear test at the NNSS. In this report, the inventory is updated to account for the decay of radionuclides over two additional decades (1992-2012) and revised tritium, fission product and actinide inventory figures and tables are presented. The maximum contaminant levels for radionuclides were also updated to Safe Drinking Water Act Maximum Contaminant Levels (MCLs) (CFR, 2013). Also, a number of minor errata found in the original publication were corrected. An inventory of radionuclides produced by 828 underground nuclear tests conducted at the NNSS by the Lawrence Livermore National Laboratory, the Los Alamos National Laboratory, and the Department of the Defense from 1951 to 1992 includes tritium, fission products, actinides, and activation products. The inventory presented in this report provides an estimate of radioactivity remaining underground at the NNSS after nuclear testing. The original test inventory is decayed to September 30, 2012, and predictions of inventory decay over the subsequent 1000 years are presented. For the purposes of summary and publication, the Los Alamos National Laboratory and Lawrence Livermore National Laboratory authors of this report subdivided the inventory into five areas corresponding to the principal geographic test centers at the NNSS. The five areas roughly correspond to Underground Test Area “Corrective Action Units” (CAUs) for remediation of groundwater. In addition, the inventory is further subdivided for the Yucca Flat region by tests where the working point depth is more than 328 feet (100 meters) above the water table and tests that were detonated below that level. Water levels used were those from the U. S. Department of Energy, Nevada Operations Office (1997

  8. MULTILEVEL RECURRENT MODEL FOR HIERARCHICAL CONTROL OF COMPLEX REGIONAL SECURITY

    Directory of Open Access Journals (Sweden)

    Andrey V. Masloboev

    2014-11-01

    Full Text Available Subject of research. The research goal and scope are development of methods and software for mathematical and computer modeling of the regional security information support systems as multilevel hierarchical systems. Such systems are characterized by loosely formalization, multiple-aspect of descendent system processes and their interconnectivity, high level dynamics and uncertainty. The research methodology is based on functional-target approach and principles of multilevel hierarchical system theory. The work considers analysis and structural-algorithmic synthesis problem-solving of the multilevel computer-aided systems intended for management and decision-making information support in the field of regional security. Main results. A hierarchical control multilevel model of regional socio-economic system complex security has been developed. The model is based on functional-target approach and provides both formal statement and solving, and practical implementation of the automated information system structure and control algorithms synthesis problems of regional security management optimal in terms of specified criteria. An approach for intralevel and interlevel coordination problem-solving in the multilevel hierarchical systems has been proposed on the basis of model application. The coordination is provided at the expense of interconnection requirements satisfaction between the functioning quality indexes (objective functions, which are optimized by the different elements of multilevel systems. That gives the possibility for sufficient coherence reaching of the local decisions, being made on the different control levels, under decentralized decision-making and external environment high dynamics. Recurrent model application provides security control mathematical models formation of regional socioeconomic systems, functioning under uncertainty. Practical relevance. The model implementation makes it possible to automate synthesis realization of

  9. Effective software-oriented cryptosystem in complex PC security software

    Directory of Open Access Journals (Sweden)

    A. Moldovyan

    1995-02-01

    Full Text Available To ensure high encryption rate and good data security, an organization of an encipherement program in the form of two modules was proposed. The first module is used for customizing the second one, the latter being the resident of the program, which maintains all application calls about encryption procedures. This approach is shown to be perspective for the elaboration of the cryptosystems with indefinite cryptalgorithm. Several typical software-oriented cryptoschemes are considered. The developed cryptomodules have high encipherement rate (2-10 Mbps for Intel 386 and secure high information protection level Organization of a new computer security software complex COBRA is considered. High enciphering rate and good data protection are provided by the resident cryptomodule using less than 1 kbyte of the main memory and working in dynamic encryption mode.

  10. [The Mexican Institute of Social Security Institute (IMSS) in Numbers. Functional inventory of imaging medical equipment, 2003].

    Science.gov (United States)

    2005-01-01

    Medical technology is a fundamental instrument for the provision of health services in the Mexican Institute of Social Security (IMSS) and as a support for diagnostic and therapeutic interventions. The inventory of relevant medical equipment describes the needs for upgrading the technological infrastructure, organize its distribution and plan its renovation in order to guarantee the quality of health services. In this report we describe the type of equipment used in radiology and other imaging services, its geographical distribution, median age in operation and its productivity. The inventory reported 2091 pieces of equipment, ultrasonography and radiology were the most common types (31%) followed by fluoroscopic equipment (20%). Follow-up in the inventory should help in planning the acquisition and maintenance of sophisticated technology used for medical purposes.

  11. Complexity Studies and Security in the Complex World: An Epistemological Framework of Analysis

    Science.gov (United States)

    Mesjasz, Czeslaw

    The impact of systems thinking can be found in numerous security-oriented research, beginning from the early works on international system: Pitrim Sorokin, Quincy Wright, first models of military conflict and war: Frederick Lanchester, Lewis F. Richardson, national and military security (origins of RAND Corporation), through development of game theory-based conflict studies, International Relations, classical security studies of Morton A. Kaplan, Karl W. Deutsch [Mesjasz 1988], and ending with contemporary ideas of broadened concepts of security proposed by the Copenhagen School [Buzan et al 1998]. At present it may be even stated that the new military and non-military threats to contemporary complex society, such as low-intensity conflicts, regional conflicts, terrorism, environmental disturbances, etc. cannot be embraced without ideas taken from modern complex systems studies.

  12. Building Partner Capacity: Inventory of Department of Defense Security Cooperation and Department of State Security Assistance Efforts

    Science.gov (United States)

    2017-03-24

    through them as well as through unsynchronized processes, resources, programs, and organizations to execute individual initiatives with partner nations ...Programs Committee on Appropriations United States Senate The Honorable Mac Thornberry Chairman The Honorable Adam Smith Ranking Member...security-related threats—an objective that has become increasingly prominent in U.S. national security strategy and foreign policy in recent years

  13. The Role Of Commercially Provided Security in Africa's Patrimonial Security Complexes

    OpenAIRE

    Kinsey, Christopher; Krieg, Andreas

    2014-01-01

    With the concept of public security generally absent in Africa and a factionalized security sector of both state and non-state actors delivering security exclusively to certain groups affiliated with patrimonial elites, this paper examines the role of commercial providers of security within African security sectors. In factionalized security sectors with limited territorial reach, the state unable or unwilling to provide security as a public good within its boundaries has long lost its monopo...

  14. Analysis of costs-benefits tradeoffs of complex security systems

    Energy Technology Data Exchange (ETDEWEB)

    Hicks, M.J. [Sandia National Labs., Albuquerque, NM (United States). Security Systems Analysis and Development Dept.

    1996-12-31

    Essential to a systems approach to design of security systems is an analysis of the cost effectiveness of alternative designs. While the concept of analysis of costs and benefits is straightforward, implementation can be at the least tedious and, for complex designs and alternatives, can become nearly intractable without the help of structured analysis tools. PACAIT--Performance and Cost Analysis Integrated Tools--is a prototype tool. The performance side of the analysis collates and reduces data from ASSESS, and existing DOE PC-based security systems performance analysis tool. The costs side of the analysis uses ACE, an existing DOD PC-based costs analysis tool. Costs are reported over the full life-cycle of the system, that is, the costs to procure, operate, maintain and retire the system and all of its components. Results are collected in Microsoft{reg_sign} Excel workbooks and are readily available to analysts and decision makers in both tabular and graphical formats and at both the system and path-element levels.

  15. Analysis of costs-benefits tradeoffs of complex security systems

    International Nuclear Information System (INIS)

    Hicks, M.J.

    1996-01-01

    Essential to a systems approach to design of security systems is an analysis of the cost effectiveness of alternative designs. While the concept of analysis of costs and benefits is straightforward, implementation can be at the least tedious and, for complex designs and alternatives, can become nearly intractable without the help of structured analysis tools. PACAIT--Performance and Cost Analysis Integrated Tools--is a prototype tool. The performance side of the analysis collates and reduces data from ASSESS, and existing DOE PC-based security systems performance analysis tool. The costs side of the analysis uses ACE, an existing DOD PC-based costs analysis tool. Costs are reported over the full life-cycle of the system, that is, the costs to procure, operate, maintain and retire the system and all of its components. Results are collected in Microsoft reg-sign Excel workbooks and are readily available to analysts and decision makers in both tabular and graphical formats and at both the system and path-element levels

  16. Convergent validity of the aberrant behavior checklist and behavior problems inventory with people with complex needs.

    Science.gov (United States)

    Hill, Jennie; Powlitch, Stephanie; Furniss, Frederick

    2008-01-01

    The current study aimed to replicate and extend Rojahn et al. [Rojahn, J., Aman, M. G., Matson, J. L., & Mayville, E. (2003). The aberrant behavior checklist and the behavior problems inventory: Convergent and divergent validity. Research in Developmental Disabilities, 24, 391-404] by examining the convergent validity of the behavior problems inventory (BPI) and the aberrant behavior checklist (ABC) for individuals presenting with multiple complex behavior problems. Data were collected from 69 children and adults with severe intellectual disabilities and challenging behavior living in residential establishments. MANCOVA analyses showed that individuals with elevated BPI stereotyped behavior subscale scores had higher scores on ABC lethargy and stereotypy subscales, while those with elevated BPI aggressive/destructive behavior subscale scores obtained higher scores on ABC irritability, stereotypy and hyperactivity subscales. Multiple regression analyses showed a corresponding pattern of results in the prediction of ABC subscale scores by BPI subscale scores. Exploratory factor analysis of the BPI data suggested a six-factor solution with an aggressive/destructive behavior factor, four factors relating to stereotypy, and one related to stereotypy and self-injury. These results, discussed with reference to Rojahn et al. [Rojahn, J., Aman, M. G., Matson, J. L., & Mayville, E. (2003). The aberrant behavior checklist and the behavior problems inventory: Convergent and divergent validity. Research in Developmental Disabilities, 24, 391-404], support the existence of relationships between specific subscales of the two instruments in addition to an overall association between total scores related to general severity of behavioral disturbance.

  17. [Towards 'complex PTSD': German translation of the Trauma Symptom Inventory (TSI) for the assessment of complex trauma Sequelae].

    Science.gov (United States)

    Krammer, Sandy; Simmen-Janevska, Keti; Maercker, Andreas

    2013-08-01

    This study tested the German translation of the Trauma Symptom Inventory (TSI) by Briere [1]. The TSI aims at assessing complex posttraumatic symptoms. TSI was part of a large test battery, among which the Childhood Trauma Questionnaire, Short Screening Scale, Short Form Health Survey, Geriatric Depression Scale and Mini International Neuropsychiatric Interview were part of. A sample of N=116 elderly people (range of age: 59-98 years; 40.5% women) with childhood traumatization were studied. The German version of the TSI presents with adequate internal consistency, mainly good discriminability and facility indices, and good criterion and construct validity. With reference to factorial validity, a European validation model [2] replicated the data more accurate than the original American model. TSI proved to be a reliable, economic and--to some extent--valid instrument for the assessment of complex posttraumatic stress symptoms. © Georg Thieme Verlag KG Stuttgart · New York.

  18. Analysis of the low-level waste radionuclide inventory for the Radioactive Waste Management Complex performance assessment

    Energy Technology Data Exchange (ETDEWEB)

    Plansky, L.E.; Hoiland, S.A.

    1992-02-01

    This report summarizes the results of a study to improve the estimates of the radionuclides in the low-level radioactive waste (LLW) inventory which is buried in the Idaho National Engineering Laboratory (INEL) Radioactive Waste Management Complex (RWMC) Subsurface Disposal Area (SDA). The work is done to support the RWMC draft performance assessment (PA). Improved radionuclide inventory estimates are provided for the INEL LLW generators. Engineering, environmental assessment or other research areas may find use for the information in this report. It may also serve as a LLW inventory baseline for data quality assurance. The individual INEL LLW generators, their history and their activities are also described in detail.

  19. Analysis of the low-level waste radionuclide inventory for the Radioactive Waste Management Complex performance assessment

    International Nuclear Information System (INIS)

    Plansky, L.E.; Hoiland, S.A.

    1992-02-01

    This report summarizes the results of a study to improve the estimates of the radionuclides in the low-level radioactive waste (LLW) inventory which is buried in the Idaho National Engineering Laboratory (INEL) Radioactive Waste Management Complex (RWMC) Subsurface Disposal Area (SDA). The work is done to support the RWMC draft performance assessment (PA). Improved radionuclide inventory estimates are provided for the INEL LLW generators. Engineering, environmental assessment or other research areas may find use for the information in this report. It may also serve as a LLW inventory baseline for data quality assurance. The individual INEL LLW generators, their history and their activities are also described in detail

  20. Modernization at the Y-12 National Security Complex: A Case for Additional Experimental Benchmarks

    Energy Technology Data Exchange (ETDEWEB)

    Thornbury, M. L. [Y-12 National Security Complex, Oak Ridge, TN (United States); Juarez, C. [Y-12 National Security Complex, Oak Ridge, TN (United States); Krass, A. W. [Y-12 National Security Complex, Oak Ridge, TN (United States)

    2017-08-14

    Efforts are underway at the Y-12 National Security Complex (Y-12) to modernize the recovery, purification, and consolidation of un-irradiated, highly enriched uranium metal. Successful integration of advanced technology such as Electrorefining (ER) eliminates many of the intermediate chemistry systems and processes that are the current and historical basis of the nuclear fuel cycle at Y-12. The cost of operations, the inventory of hazardous chemicals, and the volume of waste are significantly reduced by ER. It also introduces unique material forms and compositions related to the chemistry of chloride salts for further consideration in safety analysis and engineering. The work herein briefly describes recent investigations of nuclear criticality for 235UO2Cl2 (uranyl chloride) and 6LiCl (lithium chloride) in aqueous solution. Of particular interest is the minimum critical mass of highly enriched uranium as a function of the molar ratio of 6Li to 235U. The work herein also briefly describes recent investigations of nuclear criticality for 235U metal reflected by salt mixtures of 6LiCl or 7LiCl (lithium chloride), KCl (potassium chloride), and 235UCl3 or 238UCl3 (uranium tri-chloride). Computational methods for analysis of nuclear criticality safety and published nuclear data are employed in the absence of directly relevant experimental criticality benchmarks.

  1. Isotopes, Inventories and Seasonality: Unraveling Methane Source Distribution in the Complex Landscapes of the United Kingdom.

    Science.gov (United States)

    Lowry, D.; Fisher, R. E.; Zazzeri, G.; Lanoisellé, M.; France, J.; Allen, G.; Nisbet, E. G.

    2017-12-01

    Unlike the big open landscapes of many continents with large area sources dominated by one particular methane emission type that can be isotopically characterized by flight measurements and sampling, the complex patchwork of urban, fossil and agricultural methane sources across NW Europe require detailed ground surveys for characterization (Zazzeri et al., 2017). Here we outline the findings from multiple seasonal urban and rural measurement campaigns in the United Kingdom. These surveys aim to: 1) Assess source distribution and baseline in regions of planned fracking, and relate to on-site continuous baseline climatology. 2) Characterize spatial and seasonal differences in the isotopic signatures of the UNFCCC source categories, and 3) Assess the spatial validity of the 1 x 1 km UK inventory for large continuous emitters, proposed point sources, and seasonal / ephemeral emissions. The UK inventory suggests that 90% of methane emissions are from 3 source categories, ruminants, landfill and gas distribution. Bag sampling and GC-IRMS delta13C analysis shows that landfill gives a constant signature of -57 ±3 ‰ throughout the year. Fugitive gas emissions are consistent regionally depending on the North Sea supply regions feeding the network (-41 ± 2 ‰ in N England, -37 ± 2 ‰ in SE England). Ruminant, mostly cattle, emissions are far more complex as these spend winters in barns and summers in fields, but are essentially a mix of 2 end members, breath at -68 ±3 ‰ and manure at -51 ±3 ‰, resulting in broad summer field emission plumes of -64 ‰ and point winter barn emission plumes of -58 ‰. The inventory correctly locates emission hotspots from landfill, larger sewage treatment plants and gas compressor stations, giving a broad overview of emission distribution for regional model validation. Mobile surveys are adding an extra layer of detail to this which, combined with isotopic characterization, has identified spatial distribution of gas pipe leaks

  2. Recycled Uranium Mass Balance Project Y-12 National Security Complex Site Report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-12-01

    This report has been prepared to summarize the findings of the Y-12 National Security Complex (Y-12 Complex) Mass Balance Project and to support preparation of associated U. S. Department of Energy (DOE) site reports. The project was conducted in support of DOE efforts to assess the potential for health and environmental issues resulting from the presence of transuranic (TRU) elements and fission products in recycled uranium (RU) processed by DOE and its predecessor agencies. The United States government used uranium in fission reactors to produce plutonium and tritium for nuclear weapons production. Because uranium was considered scarce relative to demand when these operations began almost 50 years ago, the spent fuel from U.S. fission reactors was processed to recover uranium for recycling. The estimated mass balance for highly enriched RU, which is of most concern for worker exposure and is the primary focus of this project, is summarized in a table. A discrepancy in the mass balance between receipts and shipments (plus inventory and waste) reflects an inability to precisely distinguish between RU and non-RU shipments and receipts involving the Y-12 Complex and Savannah River. Shipments of fresh fuel (non-RU) and sweetener (also non-RU) were made from the Y-12 Complex to Savannah River along with RU shipments. The only way to distinguish between these RU and non-RU streams using available records is by enrichment level. Shipments of {le}90% enrichment were assumed to be RU. Shipments of >90% enrichment were assumed to be non-RU fresh fuel or sweetener. This methodology using enrichment level to distinguish between RU and non-RU results in good estimates of RU flows that are reasonably consistent with Savannah River estimates. Although this is the best available means of distinguishing RU streams, this method does leave a difference of approximately 17.3 MTU between receipts and shipments. Slightly depleted RU streams received by the Y-12 Complex from ORGDP and

  3. Complex Challenges, Comprehensive Responses - Linking Security and Development : 11th International Summer School 2007

    OpenAIRE

    Brockmann, Kathrin; Hauck, Hans Bastian

    2007-01-01

    "The link between international security and development constitutes a nexus that is only beginning to be understood and addressed by the international community and by regional security and development actors. During the International Summer School, participants and renowned speakers examine the complexity of contemporary development and security challenges, such as transnational warfare, terrorism, poor governance and state failure, migration and resource conflicts, as well as the transform...

  4. The Politics of International Terrorism in the Security Complexes in ...

    African Journals Online (AJOL)

    sulaiman.adebowale

    2006-06-13

    Jun 13, 2006 ... able definition continues to pre-occupy politicians, lawyers, adminis- trators and academia. National .... emphasis on power, power relations, security and actors, the article at- tempts to unveil a new outlook ..... ment was determined to hit hard at Uganda's new administration. The situation only cooled after ...

  5. Joining inventory by parataxonomists with DNA barcoding of a large complex tropical conserved wildland in northwestern Costa Rica.

    Science.gov (United States)

    Janzen, Daniel H; Hallwachs, Winnie

    2011-01-01

    The many components of conservation through biodiversity development of a large complex tropical wildland, Area de Conservacion Guanacaste (ACG), thrive on knowing what is its biodiversity and natural history. For 32 years a growing team of Costa Rican parataxonomists has conducted biodiversity inventory of ACG caterpillars, their food plants, and their parasitoids. In 2003, DNA barcoding was added to the inventory process. We describe some of the salient consequences for the parataxonomists of barcoding becoming part of a field biodiversity inventory process that has centuries of tradition. From the barcoding results, the parataxonomists, as well as other downstream users, gain a more fine-scale and greater understanding of the specimens they find, rear, photograph, database and deliver. The parataxonomists also need to adjust to collecting more specimens of what appear to be the "same species"--cryptic species that cannot be distinguished by eye or even food plant alone--while having to work with the name changes and taxonomic uncertainty that comes with discovering that what looked like one species may be many. These career parataxonomists, despite their lack of formal higher education, have proven very capable of absorbing and working around the additional complexity and requirements for accuracy and detail that are generated by adding barcoding to the field base of the ACG inventory. In the process, they have also gained a greater understanding of the fine details of phylogeny, relatedness, evolution, and species-packing in their own tropical complex ecosytems. There is no reason to view DNA barcoding as incompatible in any way with tropical biodiversity inventory as conducted by parataxonomists. Their year-round on-site inventory effort lends itself well to the sampling patterns and sample sizes needed to build a thorough barcode library. Furthermore, the biological understanding that comes with barcoding increases the scientific penetrance of biodiversity

  6. DNA barcoding the Lepidoptera inventory of a large complex tropical conserved wildland, Area de Conservacion Guanacaste, northwestern Costa Rica.

    Science.gov (United States)

    Janzen, Daniel H; Hallwachs, Winnie

    2016-09-01

    The 37-year ongoing inventory of the estimated 15 000 species of Lepidoptera living in the 125 000 terrestrial hectares of Area de Conservacion Guanacaste, northwestern Costa Rica, has DNA barcode documented 11 000+ species, and the simultaneous inventory of at least 6000+ species of wild-caught caterpillars, plus 2700+ species of parasitoids. The inventory began with Victorian methodologies and species-level perceptions, but it was transformed in 2004 by the full application of DNA barcoding for specimen identification and species discovery. This tropical inventory of an extraordinarily species-rich and complex multidimensional trophic web has relied upon the sequencing services provided by the Canadian Centre for DNA Barcoding, and the informatics support from BOLD, the Barcode of Life Data Systems, major tools developed by the Centre for Biodiversity Genomics at the Biodiversity Institute of Ontario, and available to all through couriers and the internet. As biodiversity information flows from these many thousands of undescribed and often look-alike species through their transformations to usable product, we see that DNA barcoding, firmly married to our centuries-old morphology-, ecology-, microgeography-, and behavior-based ways of taxonomizing the wild world, has made possible what was impossible before 2004. We can now work with all the species that we find, as recognizable species-level units of biology. In this essay, we touch on some of the details of the mechanics of actually using DNA barcoding in an inventory.

  7. US Department of Energy`s weapons complex scrap metal inventory. Research report

    Energy Technology Data Exchange (ETDEWEB)

    Duda, J.R.

    1993-07-01

    Two tasks comprise the thrust of this contracted effort. Task 1 is the development of a Source List and is based on determining a list of public documents pertaining to contaminated/uncontaminated scrap metals, equipment, and other materials of value, were they not contaminated or could they be decontaminated. Task 2 is to develop an inventory of such materials from the Task 1 list of public documentation. In more detail, the Task 2 Inventory Report is based upon fulfillment of the following requirement to prepare and submit an Inventory Report based on the information obtained in the Source List. The Inventory Report shall define the type, quantity, and location of used equipment, scrap metal, and other materials existing within DOE`s system. The Inventory Report shall list: the site where the equipment, scrap metal, or other material resides; the type and size of equipment; the type and volume and/or weight of scrap metal or other material; its source; the type and level of contamination; its accessibility; the current annual rate of generation; and the projected annual rate of generation of the material.

  8. Joining inventory by parataxonomists with DNA barcoding of a large complex tropical conserved wildland in northwestern Costa Rica.

    Directory of Open Access Journals (Sweden)

    Daniel H Janzen

    Full Text Available BACKGROUND: The many components of conservation through biodiversity development of a large complex tropical wildland, Area de Conservacion Guanacaste (ACG, thrive on knowing what is its biodiversity and natural history. For 32 years a growing team of Costa Rican parataxonomists has conducted biodiversity inventory of ACG caterpillars, their food plants, and their parasitoids. In 2003, DNA barcoding was added to the inventory process. METHODOLOGY/PRINCIPAL FINDINGS: We describe some of the salient consequences for the parataxonomists of barcoding becoming part of a field biodiversity inventory process that has centuries of tradition. From the barcoding results, the parataxonomists, as well as other downstream users, gain a more fine-scale and greater understanding of the specimens they find, rear, photograph, database and deliver. The parataxonomists also need to adjust to collecting more specimens of what appear to be the "same species"--cryptic species that cannot be distinguished by eye or even food plant alone--while having to work with the name changes and taxonomic uncertainty that comes with discovering that what looked like one species may be many. CONCLUSIONS/SIGNIFICANCE: These career parataxonomists, despite their lack of formal higher education, have proven very capable of absorbing and working around the additional complexity and requirements for accuracy and detail that are generated by adding barcoding to the field base of the ACG inventory. In the process, they have also gained a greater understanding of the fine details of phylogeny, relatedness, evolution, and species-packing in their own tropical complex ecosytems. There is no reason to view DNA barcoding as incompatible in any way with tropical biodiversity inventory as conducted by parataxonomists. Their year-round on-site inventory effort lends itself well to the sampling patterns and sample sizes needed to build a thorough barcode library. Furthermore, the biological

  9. Inventories of organic materials and complexing agents in intermediate-level long-lived parcels (Report PNGMDR 2013-2015)

    International Nuclear Information System (INIS)

    2014-01-01

    This report presents an inventory of organic materials and of complexing agents they may produce within parcels of alpha wastes which are to be produced or are being currently produced. The report proposes the results of campaigns of measurements of degassing, and comparison with results of modelling studies. The assessment of degassing rates of parcels of alpha wastes is completed by an assessment of hydrogen produced by radiolysis of interstitial water within the concrete container. Thus, after a presentation of the main parcels used by the CEA for intermediate-level long-lived wastes, and of an inventory of wastes containing organic materials, this report describes the consequences of radiolysis on polymers, and describes the objectives of R and D studies. It reports measurements and presents simulation tools for heterogeneous wastes, homogeneous wastes, production of water-soluble degradation products, and transfer and adsorption of these products in the storage site argillite

  10. How the Office of Safeguards and Security Technology development program facilitates safeguarding and securing the DOE complex

    International Nuclear Information System (INIS)

    Smoot, W.

    1995-01-01

    The technology development program's (TDP's) mission is to provide technologies or methodologies that address safeguards and security requirements throughout the U.S. DOE complex as well as to meet headquarters' policy needs. This includes developing state-of-the-art technologies or modifying existing technologies in physical security, material control and accountability, information security, and integrated safeguards systems. The TDP has an annual process during which it solicits user requirements from the field. These requirements are analyzed by DOE headquarters and laboratory personnel for technical merit. The requirements are then prioritized at headquarters, and the highest priorities are incorporated into our budget. Although this user-needs process occurs formally once a year, user requirements are accepted at any time. The status of funded technologies is communicated through briefings, programs reviews, and various documents that are available to all interested parties. Participants in several interagency groups allows our program to benefit from what others are doing and to prevent duplications of efforts throughout the federal community. Many technologies are transferred to private industry

  11. Problems of Ensuring Complex Business Security in the Conditions of Modern Globalization

    Directory of Open Access Journals (Sweden)

    Anatoliy Petrovich Sterkhov

    2015-12-01

    Full Text Available From the viewpoint of ensuring complex business security, the relevance of the present work is associated with the rationale of multilevel hierarchical approach to the classification of security threats in the age of globalization. The specificity of the threats specific to one or another level of the economy, helps to better understand and consequently to build an effective system of ensuring complex business security. For each of the nine hierarchical levels of the economy the author identifies the main threats to the business, as well as the objects and subjects of this study. It is noted that the performance of the business in the form of a complex hierarchical system depends on the principle of specification. The author gives examples of the use of the basic principles of specification. It is noted that the decomposition of the economic system from the viewpoint of its hierarchical nature is of great importance not only to the distribution of the goals and objectives of security of business levels of the system, but their subordination corresponding to each level. The result is the development of specific recommendations and elaboration of the main directions to ensure complex business security for mega-, macro-, micro-, mini-, nano - and mesoeconomic levels. Although the priority of action in multi-level hierarchical system is directed from the upper to the lower levels, the success of the system as a whole depends on the behavior of all system components. It is stated that the interaction with the environment in business occurs mainly in the lower levels of the hierarchy. The quality system of ensuring complex business security which deals with hierarchical positions, will depend not so much on top-level elements, but on response to intervention on the part of lower level, more precisely from their total effect. In other words, the quality of the system of integrated safety management business provides organized feedbacks in the system.

  12. A Complex Systems Approach to More Resilient Multi-Layered Security Systems

    Energy Technology Data Exchange (ETDEWEB)

    Brown, Nathanael J. K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Katherine A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Bandlow, Alisa [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nozick, Linda Karen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Waddell, Lucas [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Levin, Drew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Whetzel, Jonathan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-09-01

    In July 2012, protestors cut through security fences and gained access to the Y-12 National Security Complex. This was believed to be a highly reliable, multi-layered security system. This report documents the results of a Laboratory Directed Research and Development (LDRD) project that created a consistent, robust mathematical framework using complex systems analysis algorithms and techniques to better understand the emergent behavior, vulnerabilities and resiliency of multi-layered security systems subject to budget constraints and competing security priorities. Because there are several dimensions to security system performance and a range of attacks that might occur, the framework is multi-objective for a performance frontier to be estimated. This research explicitly uses probability of intruder interruption given detection (PI) as the primary resilience metric. We demonstrate the utility of this framework with both notional as well as real-world examples of Physical Protection Systems (PPSs) and validate using a well-established force-on-force simulation tool, Umbra.

  13. On the Communication Complexity of Secure Function Evaluation with Long Output

    DEFF Research Database (Denmark)

    Hubacek, Pavel; Wichs, Daniel

    2015-01-01

    We study the communication complexity of secure function evaluation (SFE). Consider a setting where Alice has a short input χA, Bob has an input χB and we want Bob to learn some function y = f(χA, χB) with large output size. For example, Alice has a small secret decryption key, Bob has a large en...

  14. One-time pad, complexity of verification of keys, and practical security of quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Molotkov, S. N., E-mail: sergei.molotkov@gmail.com [Russian Academy of Sciences, Institute of Solid State Physics (Russian Federation)

    2016-11-15

    A direct relation between the complexity of the complete verification of keys, which is one of the main criteria of security in classical systems, and a trace distance used in quantum cryptography is demonstrated. Bounds for the minimum and maximum numbers of verification steps required to determine the actual key are obtained.

  15. Modernization at the Y-12 National Security Complex: A Case for Additional Experimental Benchmarks

    Energy Technology Data Exchange (ETDEWEB)

    Thornbury, Matthew [Y-12 National Security Complex, Oak Ridge, TN (United States)

    2017-10-25

    Electrorefining (ER) is a major part of efforts at the Y-12 National Security Complex to revolutionize the reprocessing and purification of enriched uranium (EU). Successful implementation of ER could drastically reduce the operational costs and footprint, hazardous materials use, and waste generation.

  16. The Effectiveness of an Electronic Security Management System in a Privately Owned Apartment Complex

    Science.gov (United States)

    Greenberg, David F.; Roush, Jeffrey B.

    2009-01-01

    Poisson and negative binomial regression methods are used to analyze the monthly time series data to determine the effects of introducing an integrated security management system including closed-circuit television (CCTV), door alarm monitoring, proximity card access, and emergency call boxes to a large privately-owned complex of apartment…

  17. Defining "The Weakest Link" Comparative Security in Complex Systems of Systems

    NARCIS (Netherlands)

    Pieters, Wolter

    2013-01-01

    Cloud architectures are complex socio-technical systems of systems, consisting not only of technological components and their connections, but also of physical premises and employees. When analysing security of such systems and considering countermeasures, the notion of "weakest link" often appears.

  18. Reductionist and integrative research approaches to complex water security policy challenges

    NARCIS (Netherlands)

    Zeitoun, Mark; Lankford, Bruce; Krueger, Tobias; Forsyth, Tim; Carter, Richard; Hoekstra, Arjen Y.; Taylor, Richard; Varis, Olli; Cleaver, Frances; Boelens, Rutgerd; Swatuk, Larry; Tickner, David; Scott, Christopher A.; Mirumachi, Naho; Matthews, Nathanial

    2016-01-01

    This article reviews and contrasts two approaches that water security researchers employ to advance understanding of the complexity of water-society policy challenges. A prevailing reductionist approach seeks to represent uncertainty through calculable risk, links national GDP tightly to

  19. Brazilian Policy and the Creation of a Regional Security Complex in the South Atlantic: Pax Brasiliana?

    Directory of Open Access Journals (Sweden)

    Beatriz Rodrigues Bessa Mattos

    Full Text Available Abstract Over the past five years, the South Atlantic region has become a central element of Brazilian security policy, with Brazil actively supporting the notion of a trans-oceanic security consciousness involving African littoral states. It has invested in diplomatic initiatives such as the Zone of Peace and Cooperation of the South Atlantic (ZPCSA, or ZOPACAS, and extensive military co-operation with West African states such as São Tomé e Príncipe, Namibia and Cape Verde. Its internal security and defence policy documents have repeatedly been updated to reflect this dimension, and now provide the foundation for advancing these initiatives. This policy thrust is directed at securing Brazil’s offshore oil assets, and limiting the influence of what it has termed ‘extra-regional powers’ such as the P-5. This article highlights these initiatives and reviews the prospects for this policy by examining the plausibility of the South Atlantic region as a regional security complex in the sense coined by Buzan and Wæver. The analysis is based on the role of geographical and linguistic proximity in international relations, and the impact of multilateral bodies on building support for a regional approach to security governance.

  20. Construct validity of the pediatric evaluation of disability inventory computer adaptive test (PEDI-CAT) in children with medical complexity.

    Science.gov (United States)

    Dumas, Helene M; Fragala-Pinkham, Maria A; Rosen, Elaine L; O'Brien, Jane E

    2017-11-01

    To assess construct (convergent and divergent) validity of the Pediatric Evaluation of Disability Inventory Computer Adaptive Test (PEDI-CAT) in a sample of children with complex medical conditions. Demographics, clinical information, PEDI-CAT normative score, and the Post-Acute Acuity Rating for Children (PAARC) level were collected for all post-acute hospital admissions (n = 110) from 1 April 2015 to 1 March 2016. Correlations between the PEDI-CAT Daily Activities, Mobility, and Social/Cognitive domain scores for the total sample and across three age groups (infant, preschool, and school-age) were calculated. Differences in mean PEDI-CAT scores for each domain across two groups, children with "Less Complexity," or "More Complexity" based on PAARC level were examined. All correlations for the total sample and age subgroups were statistically significant and trends across age groups were evident with the stronger associations between domains for the infant group. Significant differences were found between mean PEDI-CAT Daily Activities, Mobility, and Social/Cognitive normative scores across the two complexity groups with children in the "Less Complex" group having higher PEDI-CAT scores for all domains. This study provides evidence indicating the PEDI-CAT can be used with confidence in capturing and differentiating children's level of function in a post-acute care setting. Implications for Rehabilitation The PEDI-CAT is measure of function for children with a variety of conditions and can be used in any clinical setting. Convergent validity of the PEDI-CAT's Daily Activities, Mobility, and Social/Cognitive domains was significant and particularly strong for infants and young children with medical complexity. The PEDI-CAT was able to discriminate groups of children with differing levels of medical complexity admitted to a pediatric post-acute care hospital.

  1. Geographic/conceptual delimitation of the «Southern Mediterranean». A Regional Security Complex?

    Directory of Open Access Journals (Sweden)

    Alberto Priego Moreno

    2016-07-01

    Full Text Available This article seeks to analyse how the Mediterranean Area has evolved after the changes occurred with the so-called Arab Springs. The main idea is to focus on the Southern Mediterranean as a dynamic space that expands itself as a result of its internal transformations and subsequent external changes caused by the Arab Spring. We will use the IR theory of the Regional Security Complex as it is considered as the most adaptable to this changing reality.

  2. Annual Storm Water Report for the Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Clean Water Compliance Section of the Environment Compliance Department

    2012-01-01

    The storm water pollution prevention program at the Y-12 National Security Complex (Y-12 Complex) intends to protect the quality of storm water runoff through: (1) reducing the exposure of metal accumulation areas to precipitation, (2) implementation of Best Management Practices, (3) sampling during rain events and subsequent analysis, and (4) routine surveillances. When prescribed, the analytical data is compared to a set of cut-off concentration values to determine how the Y-12 Complex relates to other metal fabrication industries in the state of Tennessee. The quality of the storm water exiting the Y-12 Complex via East Fork Poplar Creek indicated some improvement in 2011. This improvement is attributable to the completion of several construction, demolition and remediation projects which occurred in 2010 and 2011. Emphasis will continue to be placed on site inspections and the timely implementation of improved storm water control measures as deemed necessary.

  3. Annual Storm Water Report for the Y-12 National Security Complex Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Environment Compliance Department

    2012-01-01

    The storm water pollution prevention program at the Y-12 National Security Complex (Y-12 Complex) intends to protect the quality of storm water runoff through: (1) reducing the exposure of metal accumulation areas to precipitation, (2) implementation of Best Management Practices, (3) sampling during rain events and subsequent analysis, and (4) routine surveillances. When prescribed, the analytical data is compared to a set of cut-off concentration values to determine how the Y-12 Complex relates to other metal fabrication industries in the state of Tennessee. The quality of the storm water exiting the Y-12 Complex via East Fork Poplar Creek indicated some improvement in 2011. This improvement is attributable to the completion of several construction, demolition and remediation projects which occurred in 2010 and 2011. Emphasis will continue to be placed on site inspections and the timely implementation of improved storm water control measures as deemed necessary.

  4. Security

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  5. DEVELOPMENT AND TESTING OF PROCEDURES FOR CARRYING OUT EMERGENCY PHYSICAL INVENTORY TAKING AFTER DETECTING ANOMALY EVENTS CONCERNING NM SECURITY

    International Nuclear Information System (INIS)

    VALENTE, J.; FISHBONE, L.

    2003-01-01

    In the State Scientific Center of Russian Federation - Institute of Physics and Power Engineering (SSC RF-IPPE, Obninsk), which is under Minatom jurisdiction, the procedures for carrying out emergency physical inventory taking (EPIT) were developed and tested in cooperation with the Brookhaven National Laboratory (USA). Here the emergency physical inventory taking means the PIT, which is carried out in case of symptoms indicating a possibility of NM loss (theft). Such PIT often requires a verification of attributes and quantitative characteristics for all the NM items located in a specific Material Balance Area (MBA). In order to carry out the exercise, an MBA was selected where many thousands of NM items containing highly enriched uranium are used. Three clients of the computerized material accounting system (CMAS) are installed in this MBA. Labels with unique (within IPPE site) identification numbers in the form of digit combinations and an appropriate bar code have been applied on the NM items, containers and authorized locations. All the data to be checked during the EPIT are stored in the CMAS database. Five variants of anomalies initiating EPIT and requiring different types of activities on EPIT organization are considered. Automatic working places (AWP) were created on the basis of the client computers in order to carry out a large number of measurements within a reasonable time. In addition to a CMAS client computer, the main components of an AWP include a bar-code reader, an electronic scale and an enrichment meter with NaI--detector--the lMCA Inspector (manufactured by the Canberra Company). All these devices work together with a client computer in the on-line mode. Special computer code (Emergency Inventory Software-EIS) was developed. All the algorithms of interaction between the operator and the system, as well as algorithms of data exchange during the measurements and data comparison, are implemented in this software. Registration of detected

  6. Mathematical model and coordination algorithms for ensuring complex security of an organization

    Science.gov (United States)

    Novoseltsev, V. I.; Orlova, D. E.; Dubrovin, A. S.; Irkhin, V. P.

    2018-03-01

    The mathematical model of coordination when ensuring complex security of the organization is considered. On the basis of use of a method of casual search three types of algorithms of effective coordination adequate to mismatch level concerning security are developed: a coordination algorithm at domination of instructions of the coordinator; a coordination algorithm at domination of decisions of performers; a coordination algorithm at parity of interests of the coordinator and performers. Assessment of convergence of the algorithms considered above it was made by carrying out a computing experiment. The described algorithms of coordination have property of convergence in the sense stated above. And, the following regularity is revealed: than more simply in the structural relation the algorithm, for the smaller number of iterations is provided to those its convergence.

  7. Security

    OpenAIRE

    Leander, Anna

    2009-01-01

    This paper argues that security belongs to a specific category of commodities: “contested commodities” around which there is an ongoing and unsettled symbolic struggle over whether or not they can and should be though of as commodities (section 1). The contested nature of commodification has implications for how markets function; market practices tend to be defined and organized in ways that minimize their contentiousness and obfuscate their expansion. The paper looks at the implications of t...

  8. [Validation of the German Translation of the Revised Trauma Symptom Inventory (TSI-2) to Assess Complex Posttraumatic Stress Symptoms].

    Science.gov (United States)

    Krammer, Sandy; Grossenbacher, Heidi; Goldstein, Nathalie; Kaufmann, Carole; Schwenzel, Alesia; Soyka, Michael

    2017-05-01

    The study aimed to validate the German version of the revised Trauma Symptom Inventory (TSI-2) by John Briere. TSI-2 assesses complex posttraumatic stress symptoms. In order to validate it, further instruments were applied, namely the Adverse Childhood Experience Scale, the CIDI list, the revised Impact of Event-Scale, the interview for complex posttraumatic stress disorder, the revised symptom checklist 90, the dissociative experiences scale, the inventory for interpersonal problems, and the self-efficacy questionnaire. The participants were N=100 traumatized psychiatric in-patients of a psychiatric hospital localized in the German-speaking part of Switzerland. The sample consisted of N=42 women. The study design was longitudinal with 2 assessments. The second assessment took place 4 weeks after the first, in order to investigate retest reliability. Here, N=17 patients participated, of whom N=8 were women. Regarding the results, on average, 3.5 aversive or traumatic experiences during childhood were reported, and 2,1 during adulthood. The diagnosis of (classical) PTSD was estimated at 33%. The results indicate that TSI-2 is both reliable and valid with respect to different criteria: Most scales and subscales of the TSI-2 showed acceptable to very good internal consistencies (α from 0.73 to 0.95) as well as good discriminatory power, and an acceptable retest reliability. Results also indicate good divergent and convergent construct validity as well as good criterion validity. It was not possible to replicate the 4-factor-model presented by the original author of the TSI-2. Instead, in line with the study that validated the German translation of the first version of the TSI-1, a 2-factor-model was found. There were gender differences regarding the TSI-2 scales with higher posttraumatic stress symptoms in women. In conclusion, there is evidence that indicates that the German translation of the TSI-2 is a reliable and valid instrument for the assessment of complex

  9. Enabling Others to Win in a Complex World: Maximizing Security Force Assistance Potential in the Regionally Aligned Brigade Combat Team

    Science.gov (United States)

    2015-12-01

    security policy formulation. iii v Strategic Studies Institute and U.S. Army War College Press ENABLING OTHERS TO WIN IN A COMPLEX WORLD: MAXIMIZING...while also getting the best soldiers suited for advisor duty into those roles. 1 ENABLING OTHERS TO WIN IN A COMPLEX WORLD: MAXIMIZING SECURITY...of Defense Robert Gates noted: “strategic reality de- mands that the U.S. government get better at what is called ‘building partner capacity.’”1

  10. Development of a symptoms questionnaire for complex regional pain syndrome and potentially related illnesses: the Trauma Related Neuronal Dysfunction Symptoms Inventory

    NARCIS (Netherlands)

    Collins, S.; van Hilten, J.J.; Marinus, J.J.; Zuurmond, W.W.A.; de Lange, J.J.; Perez, R.S.G.M.

    2008-01-01

    Collins S, van Hilten JJ, Marinus J, Zuurmond WW, de Lange JJ, Perez RS. Development of a symptoms questionnaire for complex regional pain syndrome and potentially related illnesses: the Trauma Related Neuronal Dysfunction Symptoms Inventory. Objective: To develop a questionnaire to evaluate

  11. Understanding complexities in coupled dynamics of human-water and food security

    Science.gov (United States)

    Usmani, M.; Kondal, A.; Lin, L.; Colwell, R. R.; Jutla, A.

    2017-12-01

    Traditional premise of food security is associated with satisfying human hunger by providing sufficient calories to population. Water is the key variable associated with the growth of crops, which is then used as a metric of success for abundance of food across globe. The current framework often negates complex coupled interaction between availability of food nutrients and human well-being (such as productivity, work efficiency, low birth weight, physical and mental growth). Our analysis suggests that 1 in 3 humans suffer from malnutrition across the globe. In last five decades, most of the countries have a decreasing availability trend in at least one of the twenty-three essential food nutrients required for human well-being. We argue that food security can only be achieved if information on use of water for crops and consumption of food must include availability of nutrients for humans. Here, we propose a new concept of "consumptive nutrients" that include constant feedback mechanism between water-human and societal processes- essential for growth, distribution and consumption of food nutrients. Using Ethiopia as a signature rain-fed agricultural region, we will show how decreasing precipitation has led to an increase in crop productivity, but decreased availability of nutrients for humans. This in turn has destabilizing impact on overall regional economy. We will demonstrate why inclusion of nutrients must be a part of discussion for ensuring food security to human population.

  12. Ultra-fast secure communication with complex systems in classical channels (Conference Presentation)

    KAUST Repository

    Mazzone, Valerio

    2017-04-28

    Developing secure communications is a research area of growing interest. During the past years, several cryptographic schemes have been developed, with Quantum cryptography being a promising scheme due to the use of quantum effects, which make very difficult for an eavesdropper to intercept the communication. However, practical quantum key distribution methods have encountered several limitations; current experimental realizations, in fact, fail to scale up on long distances, as well as in providing unconditional security and speed comparable to classical optical communications channels. Here we propose a new, low cost and ultra-fast cryptographic system based on a fully classical optical channel. Our cryptographic scheme exploits the complex synchronization of two different random systems (one on the side of the sender and another on the side of the receiver) to realize a “physical” one paid system. The random medium is created by an optical chip fabricated through electron beam lithography on a Silicon On Insulator (SOI) substrate. We present experiments with ps lasers and commercial fibers, showing the ultrafast distribution of a random key between two users (Alice and Bob), with absolute no possibility for a passive/active eavesdropper to intercept the communication. Remarkably, this system enables the same security of quantum cryptography, but with the use of a classical communication channel. Our system exploits a unique synchronization that exists between two different random systems, and at such is extremely versatile and can enable safe communications among different users in standards telecommunications channels.

  13. Development of an industrial complex for ensuring national competitiveness and economic security

    Directory of Open Access Journals (Sweden)

    A. V. Kalach

    2016-01-01

    Full Text Available Living standards depends on the state of the country’s industrial complex. In a message to Russian President Vladimir Putin's Federal Assembly was asked to implement in 2015 a national technological initiative, the development of industries of the new technological order. As a result of the predominance of the industry of the sixth technological order should occur major changes in the structure of production factors and significance. It follows the inevitability of structural changes in the system of economic institutions and mechanisms of economic security and competitiveness of the state achieve the main goal of the state program “The development of industry and increase its competitiveness” is carried out through the following the directions of sub-programs: investment goods (chemical complex development composite materials, industrial biotechnology, power engineering, machine tool industry, agricultural machinery, machinery specialized production, transport engineering; goods (light industry, children;s products industry, the automotive industry; military-industrial complex; infrastructure (development of engineering activities, industrial parks; semi-finished goods and materials (timber industry, metallurgy, industrial development of rare-earth metals. At the current pace of technological and economic development, the 6 th technological structure will come into proliferation phase in 2010–2020, and in the phase of maturity – 40-ies of XXI century. At the same time in 2020–2025 there will be a new scientific-technical and technological revolution, which will become the basis for developing, synthesizing advances in the above basic technologies. In this paper, we proposed as a tool to ensure the economic security of the state to use the acceleration system of technical development of the industrial complex.

  14. Y-12 National Security Complex National Historic Preservation Act Historic Preservation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2003-09-30

    The Historic Preservation Plan (HPP) recognizes that the Y-12 National Security Complex is a vital and long-term component of DOE and NNSA. In addition to NNSA missions, the Office of Science and Energy, the Office of Nuclear Energy, and the Office of Environmental Management have properties located at Y-12 that must be taken into consideration. The HPP also recognizes that the challenge for cultural resource management is incorporating the requirements of NNSA, SC, NE, and EM missions while preserving and protecting its historic resources. The HPP seeks to find an effective way to meet the obligations at Y-12 for historic and archeological protection while at the same time facilitating effective completion of ongoing site mission activities, including removal of obsolete or contaminated facilities, adaptive reuse of existing facilities whenever feasible, and construction of new facilities in order to meet site mission needs. The Y-12 Historic Preservation Plan (HPP) defines the preservation strategy for the Y-12 National Security Complex and will direct efficient compliance with the NHPA and federal archaeological protection legislation at Y-12 as DOE and NNSA continues mission activities of the site.

  15. Hydro-hegemony or water security community? Collective action, cooperation and conflict in the SADC transboundary security complex

    CSIR Research Space (South Africa)

    Meissner, Richard

    2017-09-01

    Full Text Available In an anarchical global environment, the conflict potential of shared water resources has made rivers subject to high politics (i.e. security). While researchers and diplomats consider regional treaties as cooperation indicators (Wold 1995), unequal...

  16. A novel sort of adaptive complex synchronizations of two indistinguishable chaotic complex nonlinear models with uncertain parameters and its applications in secure communications

    Science.gov (United States)

    Mahmoud, Emad E.; Abood, Fatimah S.

    In this paper, we will demonstrate the adaptive complex anti-lag synchronization (CALS) of two indistinguishable complex chaotic nonlinear systems with the parameters which are uncertain. The significance of CALS is not advised well in the literature yet. The CALS contains or consolidate two sorts of synchronizations (anti-lag synchronization ALS and lag synchronization LS). The state variable of the master system synchronizes with an alternate state variable of the slave system. Depending on the function of Lyapunov, a plan is orchestrated to achieve CALS of chaotic attractors of complex systems with unverifiable parameters. CALS of two indistinguishable complexes of Lü systems is viewed as, for example, an occasion for affirming the likelihood of the plan exhibited. In physics, we can see complex chaotic systems in numerous different applications, for example, applied sciences or engineering. With a specific end goal to affirm the proposed synchronization plan viability and demonstrate the hypothetical outcomes, we can compute the numerical simulation. The above outcomes will give the hypothetical establishment to the secure communication applications. CALS of complex chaotic systems in which a state variable of the master system synchronizes with an alternate state variable of the slave system is an encouraging sort of synchronization as it contributes excellent security in secure communication. Amid this secure communication, the synchronization between transmitter and collector is shut and message signals are recouped. The encryption and restoration of the signals are simulated numerically.

  17. A framework for modelling the complexities of food and water security under globalisation

    Science.gov (United States)

    Dermody, Brian J.; Sivapalan, Murugesu; Stehfest, Elke; van Vuuren, Detlef P.; Wassen, Martin J.; Bierkens, Marc F. P.; Dekker, Stefan C.

    2018-01-01

    We present a new framework for modelling the complexities of food and water security under globalisation. The framework sets out a method to capture regional and sectoral interdependencies and cross-scale feedbacks within the global food system that contribute to emergent water use patterns. The framework integrates aspects of existing models and approaches in the fields of hydrology and integrated assessment modelling. The core of the framework is a multi-agent network of city agents connected by infrastructural trade networks. Agents receive socio-economic and environmental constraint information from integrated assessment models and hydrological models respectively and simulate complex, socio-environmental dynamics that operate within those constraints. The emergent changes in food and water resources are aggregated and fed back to the original models with minimal modification of the structure of those models. It is our conviction that the framework presented can form the basis for a new wave of decision tools that capture complex socio-environmental change within our globalised world. In doing so they will contribute to illuminating pathways towards a sustainable future for humans, ecosystems and the water they share.

  18. Adaptative synchronization in multi-output fractional-order complex dynamical networks and secure communications

    Science.gov (United States)

    Mata-Machuca, Juan L.; Aguilar-López, Ricardo

    2018-01-01

    This work deals with the adaptative synchronization of complex dynamical networks with fractional-order nodes and its application in secure communications employing chaotic parameter modulation. The complex network is composed of multiple fractional-order systems with mismatch parameters and the coupling functions are given to realize the network synchronization. We introduce a fractional algebraic synchronizability condition (FASC) and a fractional algebraic identifiability condition (FAIC) which are used to know if the synchronization and parameters estimation problems can be solved. To overcome these problems, an adaptative synchronization methodology is designed; the strategy consists in proposing multiple receiver systems which tend to follow asymptotically the uncertain transmitters systems. The coupling functions and parameters of the receiver systems are adjusted continually according to a convenient sigmoid-like adaptative controller (SLAC), until the measurable output errors converge to zero, hence, synchronization between transmitter and receivers is achieved and message signals are recovered. Indeed, the stability analysis of the synchronization error is based on the fractional Lyapunov direct method. Finally, numerical results corroborate the satisfactory performance of the proposed scheme by means of the synchronization of a complex network consisting of several fractional-order unified chaotic systems.

  19. A framework for modelling the complexities of food and water security under globalisation

    Directory of Open Access Journals (Sweden)

    B. J. Dermody

    2018-01-01

    Full Text Available We present a new framework for modelling the complexities of food and water security under globalisation. The framework sets out a method to capture regional and sectoral interdependencies and cross-scale feedbacks within the global food system that contribute to emergent water use patterns. The framework integrates aspects of existing models and approaches in the fields of hydrology and integrated assessment modelling. The core of the framework is a multi-agent network of city agents connected by infrastructural trade networks. Agents receive socio-economic and environmental constraint information from integrated assessment models and hydrological models respectively and simulate complex, socio-environmental dynamics that operate within those constraints. The emergent changes in food and water resources are aggregated and fed back to the original models with minimal modification of the structure of those models. It is our conviction that the framework presented can form the basis for a new wave of decision tools that capture complex socio-environmental change within our globalised world. In doing so they will contribute to illuminating pathways towards a sustainable future for humans, ecosystems and the water they share.

  20. A Historical Evaluation of the U15 Complex, Nevada National Security Site, Nye County, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Drollinger, Harold [Desert Research Inst., Nevada University, Reno, NV (United States); Holz, Barbara A. [Desert Research Inst., Nevada University, Reno, NV (United States); Bullard, Thomas F. [Desert Research Inst., Nevada University, Reno, NV (United States); Goldenberg, Nancy G. [Desert Research Inst., Nevada University, Reno, NV (United States); Ashbaugh, Laurence J. [Desert Research Inst., Nevada University, Reno, NV (United States); Griffin, Wayne R. [Desert Research Inst., Nevada University, Reno, NV (United States)

    2014-01-01

    This report presents a historical evaluation of the U15 Complex on the Nevada National Security Site (NNSS) in southern Nevada. The work was conducted by the Desert Research Institute at the request of the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office and the U.S. Department of Defense, Defense Threat Reduction Agency. Three underground nuclear tests and two underground nuclear fuel storage experiments were conducted at the complex. The nuclear tests were Hard Hat in 1962, Tiny Tot in 1965, and Pile Driver in 1966. The Hard Hat and Pile Driver nuclear tests involved different types of experiment sections in test drifts at various distances from the explosion in order to determine which sections could best survive in order to design underground command centers. The Tiny Tot nuclear test involved an underground cavity in which the nuclear test was executed. It also provided data in designing underground structures and facilities to withstand a nuclear attack. The underground nuclear fuel storage experiments were Heater Test 1 from 1977 to 1978 and Spent Fuel Test - Climax from 1978 to 1985. Heater Test 1 was used to design the later Spent Fuel Test - Climax experiment. The latter experiment was a model of a larger underground storage facility and primarily involved recording the conditions of the spent fuel and the surrounding granite medium. Fieldwork was performed intermittently in the summers of 2011 and 2013, totaling 17 days. Access to the underground tunnel complex is sealed and unavailable. Restricted to the surface, four buildings, four structures, and 92 features associated with nuclear testing and fuel storage experiment activities at the U15 Complex have been recorded. Most of these are along the west side of the complex and next to the primary access road and are characteristic of an industrial mining site, albeit one with scientific interests. The geomorphological fieldwork was conducted over three days in the

  1. A Historical Evaluation of the U15 Complex, Nevada National Security Site, Nye County, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Drollinger, Harold [Desert Research Inst., Nevada University, Reno, NV (United States); Holz, Barbara A. [Desert Research Inst., Nevada University, Reno, NV (United States); Bullard, Thomas F. [Desert Research Inst., Nevada University, Reno, NV (United States); Goldenberg, Nancy G. [Desert Research Inst., Nevada University, Reno, NV (United States); Ashbaough, Laurence J. [Desert Research Inst., Nevada University, Reno, NV (United States); Griffin, Wayne R. [Desert Research Inst., Nevada University, Reno, NV (United States)

    2014-01-09

    This report presents a historical evaluation of the U15 Complex on the Nevada National Security Site (NNSS) in southern Nevada. The work was conducted by the Desert Research Institute at the request of the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office and the U.S. Department of Defense, Defense Threat Reduction Agency. Three underground nuclear tests and two underground nuclear fuel storage experiments were conducted at the complex. The nuclear tests were Hard Hat in 1962, Tiny Tot in 1965, and Pile Driver in 1966. The Hard Hat and Pile Driver nuclear tests involved different types of experiment sections in test drifts at various distances from the explosion in order to determine which sections could best survive in order to design underground command centers. The Tiny Tot nuclear test involved an underground cavity in which the nuclear test was executed. It also provided data in designing underground structures and facilities to withstand a nuclear attack. The underground nuclear fuel storage experiments were Heater Test 1 from 1977 to 1978 and Spent Fuel Test - Climax from 1978 to 1985. Heater Test 1 was used to design the later Spent Fuel Test - Climax experiment. The latter experiment was a model of a larger underground storage facility and primarily involved recording the conditions of the spent fuel and the surrounding granite medium. Fieldwork was performed intermittently in the summers of 2011 and 2013, totaling 17 days. Access to the underground tunnel complex is sealed and unavailable. Restricted to the surface, four buildings, four structures, and 92 features associated with nuclear testing and fuel storage experiment activities at the U15 Complex have been recorded. Most of these are along the west side of the complex and next to the primary access road and are characteristic of an industrial mining site, albeit one with scientific interests. The geomorphological fieldwork was conducted over three days in the

  2. A Cultural Resources Inventory and Historical Evaluation of the Smoky Atmospheric Nuclear Test, Areas 8, 9, and 10, Nevada National Security Site, Nye County, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Jones, Robert C. [Desert Research Inst. (DRI), Reno, NV (United States); King, Maureen L. [Desert Research Inst. (DRI), Reno, NV (United States); Beck, Colleen M. [Desert Research Inst. (DRI), Reno, NV (United States); Falvey, Lauren W. [Desert Research Inst. (DRI), Reno, NV (United States); Menocal, Tatianna M. [Desert Research Inst. (DRI), Reno, NV (United States)

    2014-09-01

    This report presents the results of a National Historic Preservation Act Section 106 cultural resources inventory and historical evaluation of the 1957 Smoky atmospheric test location on the Nevada National Security Site (NNSS). The Desert Research Institute (DRI) was tasked to conduct a cultural resources study of the Smoky test area as a result of a proposed undertaking by the Department of Energy Environmental Management. This undertaking involves investigating Corrective Action Unit (CAU) 550 for potential contaminants of concern as delineated in a Corrective Action Investigation Plan. CAU 550 is an area that spatially overlaps portions of the Smoky test location. Smoky, T-2c, was a 44 kt atmospheric nuclear test detonated at 5:30 am on August 31, 1957, on top of a 213.4 m (700 ft) 200 ton tower (T-2c) in Area 8 of the NNSS. Smoky was a weapons related test of the Plumbbob series (number 19) and part of the Department of Defense Exercise Desert Rock VII and VIII. The cultural resources effort involved the development of a historic context based on archival documents and engineering records, the inventory of the cultural resources in the Smoky test area and an associated military trench location in Areas 9 and 10, and an evaluation of the National Register eligibility of the cultural resources. The inventory of the Smoky test area resulted in the identification of structures, features, and artifacts related to the physical development of the test location and the post-test remains. The Smoky test area was designated historic district D104 and coincides with a historic archaeological site recorded as 26NY14794 and the military trenches designed for troop observation, site 26NY14795. Sites 26NY14794 and 26NY14795 are spatially discrete with the trenches located 4.3 km (2.7 mi) southeast of the Smoky ground zero. As a result, historic district D104 is discontiguous and in total it covers 151.4 hectares (374 acres). The Smoky test location, recorded as historic

  3. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network.

    Directory of Open Access Journals (Sweden)

    Sumithra Alagarsamy

    Full Text Available Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff Equation using an Integration Factor (DiffEIF, minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network.

  4. Quantifying the Correctness, Computational Complexity, and Security of Privacy-Preserving String Comparators for Record Linkage

    Science.gov (United States)

    Durham, Elizabeth; Xue, Yuan; Kantarcioglu, Murat; Malin, Bradley

    2011-01-01

    Record linkage is the task of identifying records from disparate data sources that refer to the same entity. It is an integral component of data processing in distributed settings, where the integration of information from multiple sources can prevent duplication and enrich overall data quality, thus enabling more detailed and correct analysis. Privacy-preserving record linkage (PPRL) is a variant of the task in which data owners wish to perform linkage without revealing identifiers associated with the records. This task is desirable in various domains, including healthcare, where it may not be possible to reveal patient identity due to confidentiality requirements, and in business, where it could be disadvantageous to divulge customers' identities. To perform PPRL, it is necessary to apply string comparators that function in the privacy-preserving space. A number of privacy-preserving string comparators (PPSCs) have been proposed, but little research has compared them in the context of a real record linkage application. This paper performs a principled and comprehensive evaluation of six PPSCs in terms of three key properties: 1) correctness of record linkage predictions, 2) computational complexity, and 3) security. We utilize a real publicly-available dataset, derived from the North Carolina voter registration database, to evaluate the tradeoffs between the aforementioned properties. Among our results, we find that PPSCs that partition, encode, and compare strings yield highly accurate record linkage results. However, as a tradeoff, we observe that such PPSCs are less secure than those that map and compare strings in a reduced dimensional space. PMID:22904698

  5. Foreign research reactor uranium supply program: The Y-12 national security complex process

    International Nuclear Information System (INIS)

    Nelson, T.; Eddy, B.G.

    2010-01-01

    The Foreign Research Reactor (FRR) Uranium Supply Program at the Y-12 National Security Complex supports the nonproliferation objectives of the HEU Disposition Program, the Reduced Enrichment Research and Test Reactors (RERTR) Program, and the United States FRR Spent Nuclear Fuel (SNF) Acceptance Program. The Y-12 National Nuclear Security Administration (NNSA) Y-12 Site Office maintains the prime contracts with foreign governments for the supply of Low-Enriched Uranium (LEU) for their research reactors. The LEU is produced by down blending Highly Enriched Uranium (HEU) that has been declared surplus to the U.S. national defense needs. The down blending and sale of the LEU supports the Surplus HEU Disposition Program Record of Decision to make the HEU non-weapons usable and to recover the economic value of the uranium to the extent feasible. This program supports the important U.S. government and nuclear nonproliferation commitment to serve as a reliable and cost-effective uranium supplier for those foreign research reactors that are converting or have converted to LEU fuel under the guidance of the NNSA RERTR Program. In conjunction with the FRR SNF Acceptance Program which supports the global nonproliferation efforts to disposition U.S.-origin HEU, the Y-12 FRR Uranium Supply Program can provide the LEU for the replacement fuel fabrication. In addition to feedstock for fuel fabrication, Y-12 supplies LEU for target fabrication for medical isotope production. The Y-12 process uses supply forecasting tools, production improvements and efficient delivery preparations to successfully support the global research reactor community

  6. Improving food security on the basis of integration processes in the agroindustrial complex of the region

    Directory of Open Access Journals (Sweden)

    O. G. Stukalo

    2016-01-01

    Full Text Available The article considers ways of improving food security in the region. Food production, necessary for the existence of mankind, and the level and quality of nutrition characterize the degree of socio-economic development, health and life expectancy of the person. Extreme importance and many unresolved issues related to ensuring food security in the meat subcomplex are doing highly relevant research questions related to the development of integration formations. In regions where integrated economic entities it is necessary to state financial and material (starting help them operate more efficiently. It is important that controls were not carried out functions of economic management and promoted it within its own competence. In the Voronezh region with the aim of providing stable meat raw material has been implemented the investment project creation of the tribal enterprise for the breeding and fattening of beef cattle at the production sites of Zarechnoe, OOO, with a capacity of 30,000 heads of cattle. Commissioning which made it possible to complete creation in the Voronezh region meat cluster. Existing integration ties in the meat sub-complex are formed is not yet on a mutually advantageous basis and, in practice, infringe on economic interests of agricultural producers. In order to ensure further development and improve the efficiency of specialized and cooperative groups, namely in production, processing and realization of meat products it is expedient to establish at the regional level, the formation of agricultural holding type in the Voronezh region. The particular relevance of the project becomes due to the current shortage of animal protein, growth in the import of raw materials and products and is aimed at the development of domestic production by maximizing the use of reserves local resources to importsubstituting technologies.

  7. The complexity of an investment competition dynamical model with imperfect information in a security market

    International Nuclear Information System (INIS)

    Xin Baogui; Ma Junhai; Gao Qin

    2009-01-01

    We present a nonlinear discrete dynamical model of investment competition with imperfect information for N heterogeneous oligopolists in a security market. In this paper, our focus is on a given three-dimensional model which exhibits highly rich dynamical behaviors. Based on Wen's Hopf bifurcation criterion [Wen GL. Criterion to identify Hopf bifurcations in maps of arbitrary dimension. Phys Rev E 2005;72:026201-3; Wen GL, Xu DL, Han X. On creation of Hopf bifurcations in discrete-time nonlinear systems. Chaos 2002;12(2):350-5] and Kuznetsov's normal form theory [Kuznetsov YA. Elements of applied bifurcation theory. New York: Springer-Verlag; 1998. p. 125-37], we study the model's stability, criterion and direction of Neimark-Sacker bifurcation. Moreover, we numerically simulate a complexity evolution route: fixed point, closed invariant curve, double closed invariant curves, fourfold closed invariant curves, strange attractor, period-3 closed invariant curve, period-3 2-tours, period-4 closed invariant curve, period-4 2-tours.

  8. Soil Management Plan for the Oak Ridge Y-12 National Security Complex Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2005-03-02

    This Soil Management Plan applies to all activities conducted under the auspices of the National Nuclear Security Administration (NNSA) Oak Ridge Y-12 National Security Complex (Y-12) that involve soil disturbance and potential management of waste soil. The plan was prepared under the direction of the Y-12 Environmental Compliance Department of the Environment, Safety, and Health Division. Soil disturbances related to maintenance activities, utility and building construction projects, or demolition projects fall within the purview of the plan. This Soil Management Plan represents an integrated, visually oriented, planning and information resource tool for decision making involving excavation or disturbance of soil at Y-12. This Soil Management Plan addresses three primary elements. (1) Regulatory and programmatic requirements for management of soil based on the location of a soil disturbance project and/or the regulatory classification of any contaminants that may be present (Chap. 2). Five general regulatory or programmatic classifications of soil are recognized to be potentially present at Y-12; soil may fall under one or more these classifications: (a) Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) pursuant to the Oak Ridge Reservation (ORR) Federal Facilities Agreement; (b) Resource Conservation and Recovery Act (RCRA); (c) RCRA 3004(u) solid waste managements units pursuant to the RCRA Hazardous and Solid Waste Amendments Act of 1984 permit for the ORR; (d) Toxic Substances and Control Act-regulated soil containing polychlorinated biphenyls; and (e) Radiologically contaminated soil regulated under the Atomic Energy Act review process. (2) Information for project planners on current and future planned remedial actions (RAs), as prescribed by CERCLA decision documents (including the scope of the actions and remedial goals), land use controls implemented to support or maintain RAs, RCRA post-closure regulatory requirements for

  9. Y-12 National Security Complex Biological Monitoring And Abatement Program 2008 Calendar Year Report

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, M. J.; Greeley Jr., M. S.; Mathews, T. J.; Morris, G. W.; Roy, W. K.; Ryon, M. G.; Smith, J. G.; Southworth, G. R.

    2009-07-01

    The National Pollutant Discharge Elimination System (NPDES) permit issued for the Oak Ridge Y-12 National Security Complex (Y-12 Complex) which became effective May 1, 2006, continued a requirement for a Biological Monitoring and Abatement Program (BMAP). The BMAP was originally developed in 1985 to demonstrate that the effluent limitations established for the Y-12 Complex protected the classified uses of the receiving stream (East Fork Poplar Creek: EFPC), in particular, the growth and propagation of aquatic life (Loar et al. 1989). The objectives of the current BMAP are similar, specifically to assess stream ecological conditions relative to regulatory limits and criteria, to assess ecological impacts as well as recovery in response to Y-12 operations, and to investigate the causes of continuing impacts. The BMAP consists of three tasks that reflect complementary approaches to evaluating the effects of the Y-12 Complex discharges on the biotic integrity of EFPC. These tasks include: (1) bioaccumulation monitoring, (2) benthic macroinvertebrate community monitoring, and (3) fish community monitoring. As required by the NPDES permit, the BMAP benthic macroinvertebrate community monitoring task includes studies to annually evaluate the receiving stream's biological integrity in comparison to TN Water Quality Criteria. BMAP monitoring is currently being conducted at five primary EFPC sites, although sites may be excluded or added depending upon the specific objectives of the various tasks. Criteria used in selecting the sites include: (1) location of sampling sites used in other studies, (2) known or suspected sources of downstream impacts, (3) proximity to U.S. Department of Energy (DOE) Oak Ridge Reservation (ORR) boundaries, (4) appropriate habitat distribution, and (5) access. The primary sampling sites include upper EFPC at kilometers (EFKs) 24.4 and 23.4 [upstream and downstream of Lake Reality (LR) respectively]; EFK 18.7 (also EFK 18.2 and 19), located off

  10. Y-12 National Security Complex Biological Monitoring and Abatement Program 2007 Calendar Yeare Report

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, M.J.; Greeley, M. S. Jr.; Morris, G. W.; Roy, W. K.; Ryan, M. G.; Smith, J. G.; Southworth, G. R.

    2008-07-01

    The National Pollutant Discharge Elimination System (NPDES) permit issued for the Oak Ridge Y-12 National Security Complex (Y-12 Complex) which became effective May 1, 2006, continued a requirement for a Biological Monitoring and Abatement Program (BMAP). The BMAP was originally developed in 1985 to demonstrate that the effluent limitations established for the Y-12 Complex protected the classified uses of the receiving stream (East Fork Poplar Creek: EFPC), in particular, the growth and propagation of aquatic life (Loar et al. 1989). The objectives of the current BMAP are similar, specifically to assess stream ecological conditions relative to regulatory limits and criteria, to assess ecological impacts as well as recovery in response to Y-12 operations, and to investigate the causes of continuing impacts. The BMAP consists of three tasks that reflect complementary approaches to evaluating the effects of the Y-12 Complex discharges on the biotic integrity of EFPC. These tasks include: (1) bioaccumulation monitoring, (2) benthic macroinvertebrate community monitoring, and (3) fish community monitoring. As required by the NPDES permit, the BMAP benthic macroinvertebrate community monitoring task includes studies to annually evaluate the receiving stream's biological integrity in comparison to TN Water Quality Criteria. BMAP monitoring is currently being conducted at five primary EFPC sites, although sites may be excluded or added depending upon the specific objectives of the various tasks. Criteria used in selecting the sites include: (1) location of sampling sites used in other studies, (2) known or suspected sources of downstream impacts, (3) proximity to U.S. Department of Energy (DOE) Oak Ridge Reservation (ORR) boundaries, (4) appropriate habitat distribution, and (5) access. The primary sampling sites include upper EFPC at kilometers (EFKs) 24.4 and 23.4 [upstream and downstream of Lake Reality (LR) respectively]; EFK 18.7 (also EFK 18.2 and 19), located

  11. Assessment of the Groundwater Protection Program Y-12 National Security Complex, Oak Ridge, Tennessee

    International Nuclear Information System (INIS)

    2005-01-01

    The following report contains an assessment of the Y-12 Groundwater Protection Program (GWPP) for the Y-12 National Security Complex at the Oak Ridge Reservation, Tennessee. The GWPP is administered by BWXT Y-12, L.L.C. for the purpose of groundwater surveillance monitoring. After over 20 years of extensive site characterization and delineation efforts, groundwater in the three hydrogeologic areas that comprise the Y-12 Complex requires a long-term monitoring network strategy that will efficiently satisfy surveillance monitoring objectives set forth in DOE Order 450.1. The GWPP assessment consisted of two phases, a qualitative review of the program and a quantitative evaluation of the groundwater monitoring network using the Monitoring and Remediation Optimization System (MAROS) software methodology. The specific objective of the qualitative section of the review of the GWPP was to evaluate the methods of data collection, management, and reporting and the function of the monitoring network for the Y-12 facility using guidance from regulatory and academic sources. The results of the qualitative review are used to suggest modifications to the overall program that would be consistent with achieving objectives for long-term groundwater monitoring. While cost minimization is a consideration in the development of the monitoring program, the primary goal is to provide a comprehensive strategy to provide quality data to support site decision making during facility operations, long-term resource restoration, and property redevelopment. The MAROS software is designed to recommend an improved groundwater monitoring network by applying statistical techniques to existing historic and current site analytical data. The MAROS methodology also considers hydrogeologic factors, regulatory framework, and the location of potential receptors. The software identifies trends and suggests components for an improved monitoring plan by analyzing individual monitoring wells in the current

  12. INVESTMENT ACTIVITY OF AGRIBUSINESS IN THE AGROINDUSTRIAL COMPLEX REGION, AS ONE OF THE ELEMENTS OF THE FINANCIAL SECURITY OF THE AGRO-INDUSTRIAL COMPLEX OF THE STATE

    Directory of Open Access Journals (Sweden)

    Olga Nikolaevna Uglitskikh

    2015-09-01

    Full Text Available The developed economic-political situation around of Russia, specifies an indispensability of support of agricultural commodity producers as from their financial well-being, investment activity the financial security of agrarian and industrial complex of the state depends. Limitation of own financial resources at agrarians does not allow them to realize independently conceived projects. Studying of questions of formation and functioning of investment activity in agriculture of Stavropol Territory and an assessment of investment projects offered to reali-zation, have allowed to analyse investment activity of agrarian and industrial complex of region up to the introduction of Russia into WTO and in conditions of its membership. By results of the lead assessment the administrative areas of region showing the greatest investment activity, threats of a financial security of agrarian and industrial complex of region not putting by the activity have been revealed. It is drawn a conclusion on influence West-American sanctions on financial without-danger agra-rian and industrial complex of the state and the responsibility сельхозтоваропроизводителей about delivery of agricultural production in necessary volume and import substitution.

  13. Data Exchange Inventory System for Telecommunications and Systems Operations (DEXI-OTSO)

    Data.gov (United States)

    Social Security Administration — This Data Exchange Inventory (DEXI) for the Office of Telecommunications and System Operations, (OTSO) Network Troubleshooting is a browser-based inventory database...

  14. The emerging architecture of a regional security complex in the Lake ...

    African Journals Online (AJOL)

    This article explores the emerging regional security architecture to fight terrorism and insurgency in the Lake Chad Basin (LCB). It diagnoses the evolution of the Lake Chad Basin Commission (LCBC) as a sub-regional organization that unites Chad, Cameroon, Niger and Nigeria. In particular, the article critically investigates ...

  15. Inventory parameters

    CERN Document Server

    Sharma, Sanjay

    2017-01-01

    This book provides a detailed overview of various parameters/factors involved in inventory analysis. It especially focuses on the assessment and modeling of basic inventory parameters, namely demand, procurement cost, cycle time, ordering cost, inventory carrying cost, inventory stock, stock out level, and stock out cost. In the context of economic lot size, it provides equations related to the optimum values. It also discusses why the optimum lot size and optimum total relevant cost are considered to be key decision variables, and uses numerous examples to explain each of these inventory parameters separately. Lastly, it provides detailed information on parameter estimation for different sectors/products. Written in a simple and lucid style, it offers a valuable resource for a broad readership, especially Master of Business Administration (MBA) students.

  16. Complexity Science: A Mechanism for Strategic Foresight and Resiliency in National Security Decision-Making.

    Energy Technology Data Exchange (ETDEWEB)

    Ackermann, Mark R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hayden, Nancy Kay [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Backus, George A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Most national policy decisions are complex with a variety of stakeholders, disparate interests and the potential for unintended consequences. While a number of analytical tools exist to help decision makers sort through the mountains of data and myriad of options, decision support teams are increasingly turning to complexity science for improved analysis and better insight into the potential impact of policy decisions. While complexity science has great potential, it has only proven useful in limited case s and when properly applied. In advance of more widespread use, a national - level effort to refine complexity science and more rigorously establish its technical underpinnings is recommended.

  17. Y-12 Groundwater Protection Program Extent Of The Primary Groundwater Contaminants At The Y-12 National Security Complex

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2013-12-01

    This report presents data summary tables and maps used to define and illustrate the approximate lateral extent of groundwater contamination at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee. The data tables and maps address the primary (i.e., most widespread and mobile) organic, inorganic, and radiological contaminants in the groundwater. The sampling locations, calculated contaminant concentrations, plume boundary values, and paired map format used to define, quantify, delineate, and illustrate the approximate extent of the primary organic, inorganic, and radiological contaminants in groundwater at Y-12 are described.

  18. A Complex Systems Approach to the Design and Evaluation of Holistic Security Ecosystems

    Science.gov (United States)

    Ulieru, Mihaela

    A conceptual model for the design and evaluation of Holistic Security Ecosystems is introduced together with a proof of concept test bed for exploring the social, cognitive, geographic and informational dynamics in the emergence of such large scale interdependent meta-organizations. The model is based on recent developments of the holonic paradigm of cross-organizational workflow coordination and decision making. Focused on the dynamic, on-the-fly creation of targeted, short-lived meta-organizations that work towards achieving a common goal (crisis resolution) the model guarantees optimal coordination and decision making at various levels of resolution across the holarchic levels of the organization.

  19. Soil Degradation, Land Scarcity and Food Security: Reviewing a Complex Challenge

    Directory of Open Access Journals (Sweden)

    Tiziano Gomiero

    2016-03-01

    Full Text Available Soil health, along with water supply, is the most valuable resource for humans, as human life depends on the soil’s generosity. Soil degradation, therefore, poses a threat to food security, as it reduces yield, forces farmers to use more inputs, and may eventually lead to soil abandonment. Unfortunately, the importance of preserving soil health appears to be overlooked by policy makers. In this paper, I first briefly introduce the present situation concerning agricultural production, natural resources, soil degradation, land use and the challenge ahead, to show how these issues are strictly interwoven. Then, I define soil degradation and present a review of its typologies and estimates at a global level. I discuss the importance of preserving soil capital, and its relationship to human civilization and food security. Trends concerning the availability of arable agricultural land, different scenarios, and their limitations, are analyzed and discussed. The possible relation between an increase in a country’s GNP, population and future availability of arable land is also analyzed, using the World Bank’s database. I argue that because of the many sources of uncertainty in the data, and the high risks at stake, a precautionary approach should be adopted when drawing scenarios. The paper ends with a discussion on the key role of preserving soil organic matter, and the need to adopt more sustainable agricultural practices. I also argue that both our relation with nature and natural resources and our lifestyle need to be reconsidered.

  20. Riparian Inventory

    Data.gov (United States)

    Kansas Data Access and Support Center — This dataset is a digital representation of the 1:24,000 Land Use Riparian Areas Inventory for the state of Kansas. The dataset includes a 100 foot buffer around all...

  1. Secure equality and greater-than tests with sublinear online complexity

    DEFF Research Database (Denmark)

    Lipmaa, Helger; Toft, Tomas

    2013-01-01

    communication that require O(ℓ) respectively O(κ) total work, where κ is a correctness parameter. Combining these with ideas of Toft [16], we obtain (i) a greater-than protocol with sublinear online complexity in the arithmetic black-box model (O(c) rounds and O(c·ℓ1/c ) work online, with c = logℓ resulting...

  2. Comparing ALS and Image-Based Point Cloud Metrics and Modelled Forest Inventory Attributes in a Complex Coastal Forest Environment

    Directory of Open Access Journals (Sweden)

    Joanne C. White

    2015-10-01

    Full Text Available Digital aerial photogrammetry (DAP is emerging as an alternate data source to airborne laser scanning (ALS data for three-dimensional characterization of forest structure. In this study we compare point cloud metrics and plot-level model estimates derived from ALS data and an image-based point cloud generated using semi-global matching (SGM for a complex, coastal forest in western Canada. Plot-level estimates of Lorey’s mean height (H, basal area (G, and gross volume (V were modelled using an area-based approach. Metrics and model outcomes were evaluated across a series of strata defined by slope and canopy cover, as well as by image acquisition date. We found statistically significant differences between ALS and SGM metrics for all strata for five of the eight metrics we used for model development. We also found that the similarity between metrics from the two data sources generally increased with increasing canopy cover, particularly for upper canopy metrics, whereas trends across slope classes were less consistent. Model outcomes from ALS and SGM were comparable. We found the greatest difference in model outcomes was for H (ΔRMSE% = 5.04%. By comparison, ΔRMSE% was 2.33% for G and 3.63% for V. We did not discern any corresponding trends in model outcomes across slope and canopy cover strata, or associated with different image acquisition dates.

  3. Transforming Homeland Security [video

    OpenAIRE

    McIntyre, David; Center for Homeland Defense and Security Naval Postgraduate School

    2011-01-01

    A pioneer in homeland security, and homeland security education, David McIntyre discusses the complexities in transforming homeland security from a national program in its inception, to also include state and local agencies and other public and private parties.

  4. Methods for Calculating Frequency of Maintenance of Complex Information Security System Based on Dynamics of Its Reliability

    Science.gov (United States)

    Varlataya, S. K.; Evdokimov, V. E.; Urzov, A. Y.

    2017-11-01

    This article describes a process of calculating a certain complex information security system (CISS) reliability using the example of the technospheric security management model as well as ability to determine the frequency of its maintenance using the system reliability parameter which allows one to assess man-made risks and to forecast natural and man-made emergencies. The relevance of this article is explained by the fact the CISS reliability is closely related to information security (IS) risks. Since reliability (or resiliency) is a probabilistic characteristic of the system showing the possibility of its failure (and as a consequence - threats to the protected information assets emergence), it is seen as a component of the overall IS risk in the system. As it is known, there is a certain acceptable level of IS risk assigned by experts for a particular information system; in case of reliability being a risk-forming factor maintaining an acceptable risk level should be carried out by the routine analysis of the condition of CISS and its elements and their timely service. The article presents a reliability parameter calculation for the CISS with a mixed type of element connection, a formula of the dynamics of such system reliability is written. The chart of CISS reliability change is a S-shaped curve which can be divided into 3 periods: almost invariable high level of reliability, uniform reliability reduction, almost invariable low level of reliability. Setting the minimum acceptable level of reliability, the graph (or formula) can be used to determine the period of time during which the system would meet requirements. Ideally, this period should not be longer than the first period of the graph. Thus, the proposed method of calculating the CISS maintenance frequency helps to solve a voluminous and critical task of the information assets risk management.

  5. Skills Inventory

    Data.gov (United States)

    Social Security Administration — Application to assist in 1) determining effects of retirement on IT workforce, 2) resource planning, and 3) understanding training needs. Also attempts to satisfy...

  6. Very Low Food Security in US Households Is Predicted by Complex Patterns of Health, Economics, and Service Participation.

    Science.gov (United States)

    Choi, Seul Ki; Fram, Maryah S; Frongillo, Edward A

    2017-10-01

    Background: Very low food security (VLFS) happens at the intersection of nuanced and complex patterns of risk characteristics across multiple domains. Little is known about the idiosyncratic situations that lead households to experience VLFS. Objective: We used classification and regression tree (CART) analysis, which can handle complex combinations of predictors, to identify patterns of characteristics that distinguish VLFS households in the United States from other households. Methods: Data came from 3 surveys, the 2011-2014 National Health Interview Survey (NHIS), the 2005-2012 NHANES, and the 2002-2012 Current Population Survey (CPS), with sample participants aged ≥18 y and households with income poor health, disability, limitation, depressive symptoms, low income, and food assistance program participation. These predictors built complex trees with various combinations in different types of households. Conclusions: This study showed that multiple characteristics across multiple domains distinguished VLFS households. Flexible and nonlinear methods focusing on a wide range of risk characteristics should be used to identify VLFS households and to inform policies and programs that can address VLFS households' various needs. © 2017 American Society for Nutrition.

  7. Safety Analysis Report for Packaging, Y-12 National Security Complex, Model ES-3100 Package with Bulk HEU Contents

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, James [Y-12 National Security Complex, Oak Ridge, TN (United States); Goins, Monty [Y-12 National Security Complex, Oak Ridge, TN (United States); Paul, Pran [Y-12 National Security Complex, Oak Ridge, TN (United States); Wilkinson, Alan [Y-12 National Security Complex, Oak Ridge, TN (United States); Wilson, David [Y-12 National Security Complex, Oak Ridge, TN (United States)

    2015-09-03

    This safety analysis report for packaging (SARP) presents the results of the safety analysis prepared in support of the Consolidated Nuclear Security, LLC (CNS) request for licensing of the Model ES-3100 package with bulk highly enriched uranium (HEU) contents and issuance of a Type B(U) Fissile Material Certificate of Compliance. This SARP, published in the format specified in the Nuclear Regulatory Commission (NRC) Regulatory Guide 7.9 and using information provided in UCID-21218 and NRC Regulatory Guide 7.10, demonstrates that the Y-12 National Security Complex (Y-12) ES-3100 package with bulk HEU contents meets the established NRC regulations for packaging, preparation for shipment, and transportation of radioactive materials given in Title 10, Part 71, of the Code of Federal Regulations (CFR) [10 CFR 71] as well as U.S. Department of Transportation (DOT) regulations for packaging and shipment of hazardous materials given in Title 49 CFR. To protect the health and safety of the public, shipments of adioactive materials are made in packaging that is designed, fabricated, assembled, tested, procured, used, maintained, and repaired in accordance with the provisions cited above. Safety requirements addressed by the regulations that must be met when transporting radioactive materials are containment of radioactive materials, radiation shielding, and assurance of nuclear subcriticality.

  8. Complex Relationships Among Masculine Norms and Health/Well-Being Outcomes: Correlation Patterns of the Conformity to Masculine Norms Inventory Subscales.

    Science.gov (United States)

    Gerdes, Zachary T; Levant, Ronald F

    2018-03-01

    The Conformity to Masculine Norms Inventory (CMNI) is a widely used multidimensional scale. Studies using the CMNI most often report only total scale scores, which are predominantly associated with negative outcomes. Various studies since the CMNI's inception in 2003 using subscales have reported both positive and negative outcomes. The current content analysis examined studies ( N = 17) correlating the 11 subscales with 63 criterion variables across 7 categories. Most findings were consistent with past research using total scale scores that reported negative outcomes. For example, conformity to masculine norms has been inversely related to help-seeking and positively correlated with concerning health variables, such as substance use. Nonetheless, past reliance on total scores has obscured the complexity of associations with the CMNI in that 30% of the findings in the present study reflected positive outcomes, particularly for health promotion. Subscales differed in their relationships with various outcomes: for one subscale they were predominantly positive, but six others were mostly negative. The situational and contextual implications of conformity to masculine norms and their relationships to positive and negative outcomes are discussed.

  9. Technology Evaluation for the Big Spring Water Treatment System at the Y-12 National Security Complex, Oak Ridge, Tennessee

    International Nuclear Information System (INIS)

    Bechtel Jacobs Company LLC

    2002-01-01

    The Y-12 National Security Complex (Y-12 Complex) is an active manufacturing and developmental engineering facility that is located on the U.S. Department of Energy (DOE) Oak Ridge Reservation. Building 9201-2 was one of the first process buildings constructed at the Y-12 Complex. Construction involved relocating and straightening of the Upper East Fork Poplar Creek (UEFPC) channel, adding large quantities of fill material to level areas along the creek, and pumping of concrete into sinkholes and solution cavities present within the limestone bedrock. Flow from a large natural spring designated as ''Big Spring'' on the original 1943 Stone and Webster Building 9201-2 Field Sketch FS6003 was captured and directed to UEFPC through a drainpipe designated Outfall 51. The building was used from 1953 to 1955 for pilot plant operations for an industrial process that involved the use of large quantities of elemental mercury. Past operations at the Y-12 Complex led to the release of mercury to the environment. Significant environmental media at the site were contaminated by accidental releases of mercury from the building process facilities piping and sumps associated with Y-12 Complex mercury handling facilities. Releases to the soil surrounding the buildings have resulted in significant levels of mercury in these areas of contamination, which is ultimately transported to UEFPC, its streambed, and off-site. Bechtel Jacobs Company LLC (BJC) is the DOE-Oak Ridge Operations prime contractor responsible for conducting environmental restoration activities at the Y-12 Complex. In order to mitigate the mercury being released to UEFPC, the Big Spring Water Treatment System will be designed and constructed as a Comprehensive Environmental Response, Compensation, and Liability Act action. This facility will treat the combined flow from Big Spring feeding Outfall 51 and the inflow now being processed at the East End Mercury Treatment System (EEMTS). Both discharge to UEFPC adjacent to

  10. Optimization of Inventory

    OpenAIRE

    PROKOPOVÁ, Nikola

    2017-01-01

    The subject of this thesis is optimization of inventory in selected organization. Inventory optimization is a very important topic in each organization because it reduces storage costs. At the beginning the inventory theory is presented. It shows the meaning and types of inventory, inventory control and also different methods and models of inventory control. Inventory optimization in the enterprise can be reached by using models of inventory control. In the second part the company on which is...

  11. Experimental inventory verification system

    International Nuclear Information System (INIS)

    Steverson, C.A.; Angerman, M.I.

    1991-01-01

    As Low As Reasonably Achievable (ALARA) goals and Department of Energy (DOE) inventory requirements are frequently in conflict at facilities across the DOE complex. The authors wish, on one hand, to verify the presence of correct amounts of nuclear materials that are in storage or in process; yet on the other hand, we wish to achieve ALARA goals by keeping individual and collective exposures as low as social, technical, economic, practical, and public policy considerations permit. The Experimental Inventory Verification System (EIVSystem) is a computer-based, camera-driven system that utilizes image processing technology to detect change in vault areas. Currently in the test and evaluation phase at Idaho National Engineering Laboratory, this system guards personnel. The EIVSystem continually monitors the vault, providing proof of changed status for objects sorted within the vault. This paper reports that these data could provide the basis for reducing inventory requirements when no change has occurred, thus helping implement ALARA policy; the data will also help describe there target area of an inventory when change has been shown to occur

  12. 1st Quarter Transportation Report FY2017: Waste Shipments To and From the Nevada National Security Site (NNSS), Radioactive Waste Management Complex

    Energy Technology Data Exchange (ETDEWEB)

    Gregory, Louis [National Security Technologies, LLC. (NSTec), Las Vegas, NV (United States)

    2017-01-31

    This report satisfies the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) commitment to prepare a quarterly summary report of waste shipments to the Nevada National Security Site (NNSS) Radioactive Waste Management Complex (RWMC) at Area 5. This report summarizes the 1st quarter of fiscal year (FY) 2017 low-level radioactive waste (LLW), mixed low-level radioactive waste (MLLW) and classified non-radioactive (CNR) shipments. There were no shipments sent for offsite treatment from a NNSS facility and returned to the NNSS this quarter of FY2017.

  13. Security Data Warehouse Application

    Science.gov (United States)

    Vernon, Lynn R.; Hennan, Robert; Ortiz, Chris; Gonzalez, Steve; Roane, John

    2012-01-01

    The Security Data Warehouse (SDW) is used to aggregate and correlate all JSC IT security data. This includes IT asset inventory such as operating systems and patch levels, users, user logins, remote access dial-in and VPN, and vulnerability tracking and reporting. The correlation of this data allows for an integrated understanding of current security issues and systems by providing this data in a format that associates it to an individual host. The cornerstone of the SDW is its unique host-mapping algorithm that has undergone extensive field tests, and provides a high degree of accuracy. The algorithm comprises two parts. The first part employs fuzzy logic to derive a best-guess host assignment using incomplete sensor data. The second part is logic to identify and correct errors in the database, based on subsequent, more complete data. Host records are automatically split or merged, as appropriate. The process had to be refined and thoroughly tested before the SDW deployment was feasible. Complexity was increased by adding the dimension of time. The SDW correlates all data with its relationship to time. This lends support to forensic investigations, audits, and overall situational awareness. Another important feature of the SDW architecture is that all of the underlying complexities of the data model and host-mapping algorithm are encapsulated in an easy-to-use and understandable Perl language Application Programming Interface (API). This allows the SDW to be quickly augmented with additional sensors using minimal coding and testing. It also supports rapid generation of ad hoc reports and integration with other information systems.

  14. Inventory differences: An evaluation methodology

    International Nuclear Information System (INIS)

    Heinberg, C.L.; Roberts, N.J.

    1987-01-01

    This paper discusses an evaluation methodology which is used for inventory differences at the Los Alamos National Laboratory. It is recognized that there are various methods which can be, and are being, used to evaluate process inventory differences at DOE facilities. The purpose of this paper is to share our thoughts on the subject and our techniques with those who are responsible for the evaluation of inventory differences at their facility. One of the most dangerous aspects of any evaluation technique, especially one as complex as most inventory difference evaluations tend to be, is to fail to look at the tools being used as indicators. There is a tendency to look at the results of an evaluation by one technique as an absolute. At the Los Alamos National Laboratory, several tools are used and the final evaluation is based on a combination of the observed results of a many-faceted evaluation. The tools used and some examples are presented

  15. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  16. Calendar Year 2008 Groundwater Monitoring Report, U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental LLC

    2009-12-01

    This report contains the groundwater and surface water monitoring data that were obtained during calendar year (CY) 2008 at the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) on the DOE Oak Ridge Reservation (ORR) in Oak Ridge, Tennessee. The CY 2008 monitoring data were obtained from wells, springs, and surface water sampling locations in three hydrogeologic regimes at Y-12 (Figure A.1). The Bear Creek Hydrogeologic Regime (Bear Creek Regime) encompasses a section of Bear Creek Valley (BCV) between the west end of Y-12 and the west end of the Bear Creek Watershed (directions are in reference to the Y-12 grid system). The Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime) encompasses the Y-12 industrial facilities and support structures in BCV. The Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime) encompasses a section of Chestnut Ridge directly south of Y-12. Section 2 of this report provides background information pertinent to groundwater and surface water quality monitoring in each hydrogeologic regime, including the topography and bedrock geology, surface water drainage, groundwater system, and extent of groundwater contamination. The CY 2008 groundwater and surface water monitoring data in this report were obtained from sampling and analysis activities implemented under the Y-12 Groundwater Protection Program (GWPP) managed by Babcock & Wilcox Technical Services Y-12, LLC (B&W Y-12) and from sampling and analysis activities implemented under several monitoring programs managed by Bechtel Jacobs Company LLC (BJC). Cooperative implementation of the monitoring programs directed by the Y-12 GWPP and BJC (i.e., coordinating sample collection and sharing data) ensures that the CY 2008 monitoring results fulfill requirements of all the applicable monitoring drivers with no duplication of sampling and analysis efforts. Section 3 of this report contains a summary of information regarding the

  17. Cost Comparisons of Selected Inventory Policies.

    Science.gov (United States)

    1979-06-01

    REQUIREMENTS for the degree MASTER OF SCIENCE in TRANSP0ORTAT ION Lu Evanston, Illinois __ -loi44 󈨔 07 14 10 UNC LAS S SECURITY CLASSIFICATION OF THIS...through receipts and issues invoices. A centralized inventory replenishment section reviews every warehouse location’s inventory status once each week... 6380 39160 B15 .4304 -- -- 37200 B16 .2490 .35 5290 30330 B17 .2204 .43 1100 4850 B18 .4634 -- -- 77 C1 .4154 --- 72350 C2 .4544 --- 71350 C3 .6870

  18. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  19. DYNAMICS OF DEVELOPMENT OF FINANCIAL SAFETY OF THE ENTERPRISE AS A COMPLEX ECONOMIC SECURITY OF THE STATE

    Directory of Open Access Journals (Sweden)

    Tetiana Ganushchak

    2017-09-01

    Full Text Available The purpose of the paper is to the performance of the evaluation of the financial safety of the enterprise. To achieve the stated aim it has been necessary to solve the following tasks: to use the approaches as to the evaluation of the financial safety of the enterprise, to introduce the analysis system of the financial safety of the enterprise, to consider the structural logical scheme of the analysis procedure of the financial safety of the enterprise, to give the description of the integral indicator of the financial safety of the enterprise; to evaluate and compare companies in the paltry industry according to the level of their financial safety. Methodology. Methodologial basis of the research are the scientific methods, such as : method of logical generalization, dialectical method of recognition of the economic phenomena – to give the definitions of «economic security of the enterprise», «financial security of the enterprise», grouping method, analysis which were used to estimate indicator position of the financial security of the poultry company, graph method which was applied to compare integral estimation of the enterprise;methods of synthesis, deduction, induction, method of the expert estimation to calculate and implement integral marker of the financial security of the poultry company;method of the correlation analysis which was used to identify weight coefficients of the all sided figures of the solvency , business activity, profitability, financial steadiness, pay ability. The priority in methods using was defined by the particular tasks and goals. Results of the research showned into a wide set of the ways of financial enterprise safety as a component of economic security of the state. There is an evaluation of enterprise financial safety on the basis of calculations of integral indicator, including combined indices of profitability (unprofitability, pay ability or the lack of that, business activity (fading, financial

  20. Calendar Year 2005 Groundwater Monitoring Report, U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2006-09-01

    This report contains the groundwater and surface water monitoring data that were obtained during calendar year (CY) 2005 at the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) on the DOE Oak Ridge Reservation (ORR) in Oak Ridge, Tennessee. The CY 2005 monitoring data were obtained from groundwater and surface water sampling locations in three hydrogeologic regimes at Y-12 (Figure A.1). The Bear Creek Hydrogeologic Regime (Bear Creek Regime) encompasses a section of Bear Creek Valley (BCV) between the west end of Y-12 and the west end of the Bear Creek Watershed (directions are in reference to the Y-12 grid system). The Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime) encompasses the Y-12 industrial facilities and support structures in BCV. The Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime) encompasses a section of Chestnut Ridge south of Y-12. The CY 2005 monitoring data were obtained under the Y-12 Groundwater Protection Program (GWPP) managed by BWXT Y-12, L.L.C. (BWXT) and several monitoring programs managed by Bechtel Jacobs Company LLC (BJC). Data contained in this report meet applicable requirements of DOE Order 450.1 (Environmental Protection Program) regarding evaluation of groundwater and surface water quality in areas: (1) which are, or could be, affected by operations at Y-12 (surveillance monitoring); and (2) where contaminants from Y-12 are most likely to migrate beyond the boundaries of the ORR (exit pathway/perimeter monitoring). However, detailed analysis, evaluation, and interpretation of the CY 2005 monitoring data is deferred to the ''Y-12 Groundwater Protection Program Groundwater Monitoring Data Compendium'' (BWXT 2006). For each monitoring well, spring, and surface water sampling station included in this report, the GWPP Compendium provides: (1) pertinent well installation and construction information; (2) a complete sampling history, including

  1. Calendar Year 2010 Groundwater Monitoring Report, U.S. Department Of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental LLC

    2011-12-01

    This report contains the groundwater and surface water monitoring data that were obtained during calendar year (CY) 2010 at the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) on the DOE Oak Ridge Reservation (ORR) in Oak Ridge, Tennessee. The CY 2010 monitoring data were obtained from wells, springs, and surface water sampling locations in three hydrogeologic regimes at Y-12 (Figure A.1). The Bear Creek Hydrogeologic Regime (Bear Creek Regime) encompasses a section of Bear Creek Valley (BCV) between the west end of Y-12 and the west end of the Bear Creek Watershed (directions are in reference to the Y-12 grid system). The Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime) encompasses the Y-12 industrial facilities and support structures in BCV. The Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime) encompasses a section of Chestnut Ridge directly south of Y-12. Section 2 of this report provides background information pertinent to groundwater and surface water quality monitoring in each hydrogeologic regime, including the topography and bedrock geology, surface water drainage, groundwater system, and extent of groundwater contamination. The CY 2010 groundwater and surface water monitoring data in this report were obtained from sampling and analysis activities implemented under the Y-12 Groundwater Protection Program (GWPP) managed by Babcock & Wilcox Technical Services Y-12, LLC (B&W Y-12) and from sampling and analysis activities implemented under several monitoring programs managed by Bechtel Jacobs Company LLC (BJC). Cooperative implementation of the monitoring programs directed by the Y-12 GWPP and BJC (i.e., coordinating sample collection and sharing data) ensures that the CY 2010 monitoring results fulfill requirements of all the applicable monitoring drivers with no duplication of sampling and analysis efforts. Section 3 of this report contains a summary of information regarding the

  2. Calendar Year 2011 Groundwater Monitoring Report, U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental LLC,

    2012-12-01

    This report contains the groundwater and surface water monitoring data that were obtained during calendar year (CY) 2011 at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) on the DOE Oak Ridge Reservation (ORR) in Oak Ridge, Tennessee. The CY 2011 monitoring data were obtained from wells, springs, and surface water sampling locations in three hydrogeologic regimes at Y-12. The Bear Creek Hydrogeologic Regime (Bear Creek Regime) encompasses a section of Bear Creek Valley (BCV) between the west end of Y-12 and the west end of the Bear Creek Watershed (directions are in reference to the Y-12 grid system). The Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime) encompasses the Y-12 industrial facilities and support structures in BCV. The Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime) encompasses a section of Chestnut Ridge directly south of Y-12. This report provides background information pertinent to groundwater and surface water quality monitoring in each hydrogeologic regime, including the topography and bedrock geology, surface water drainage, groundwater system, and known extent of groundwater contamination. The CY 2011 groundwater and surface water monitoring data in this report were obtained from sampling and analysis activities implemented under the Y-12 Groundwater Protection Program (GWPP) managed by Babcock & Wilcox Technical Services Y-12, LLC (B&W Y-12) and from sampling and analysis activities implemented under several monitoring programs managed by the DOE Environmental Management (EM) contractor responsible for environmental cleanup on the ORR. In August 2011, URS | CH2M Oak Ridge LLC (UCOR) replaced Bechtel Jacobs Company LLC (BJC) as the DOE EM contractor. For this report, BJC/UCOR will be referenced as the managing contractor for CY 2011. Cooperative implementation of the monitoring programs directed by the Y-12 GWPP and BJC/UCOR (i.e., coordinating sample collection and sharing data) ensures

  3. Calendar Year 2007 Groundwater Monitoring Report, U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental LLC

    2008-12-01

    This report contains the groundwater and surface water monitoring data that were obtained during calendar year (CY) 2007 at the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) on the DOE Oak Ridge Reservation (ORR) in Oak Ridge, Tennessee. The CY 2007 monitoring data were obtained from wells, springs, and surface water sampling locations in three hydrogeologic regimes at Y-12 (Figure A.1). The Bear Creek Hydrogeologic Regime (Bear Creek Regime) encompasses a section of Bear Creek Valley (BCV) between the west end of Y-12 and the west end of the Bear Creek Watershed (directions are in reference to the Y-12 grid system). The Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime) encompasses the Y-12 industrial facilities and support structures in BCV. The Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime) encompasses a section of Chestnut Ridge directly south of Y-12. Section 2 of this report provides background information pertinent to groundwater and surface water quality monitoring in each hydrogeologic regime, including the topography and bedrock geology, surface water drainage, groundwater system, and extent of groundwater contamination. The CY 2007 groundwater and surface water monitoring data in this report were obtained from sampling and analysis activities implemented under the Y-12 Groundwater Protection Program (GWPP) managed by BWXT Y-12, L.L.C. (BWXT), and from sampling and analysis activities implemented under several monitoring programs managed by Bechtel Jacobs Company LLC (BJC). In December 2007, the BWXT corporate name was changed to Babcock & Wilcox Technical Services Y-12, LLC (B&W Y-12), which is applied to personnel and organizations throughout CY 2007 for this report. Cooperative implementation of the monitoring programs directed by the Y-12 GWPP and BJC (i.e., coordinating sample collection and sharing data) ensures that the CY 2007 monitoring results fulfill requirements of

  4. Calendar Year 2004 Groundwater Monitoring Report, U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    N/A

    2005-09-01

    This report contains the groundwater and surface water monitoring data that were obtained during calendar year (CY) 2004 at the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) on the DOE Oak Ridge Reservation (ORR) in Oak Ridge, Tennessee. The CY 2004 monitoring data were obtained from groundwater and surface water sampling locations in three hydrogeologic regimes at Y-12 (Figure A.1). The Bear Creek Hydrogeologic Regime (Bear Creek Regime) encompasses a section of Bear Creek Valley (BCV) between the west end of Y-12 and the west end of the Bear Creek Watershed (directions are in reference to the Y-12 grid system). The Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime) encompasses the Y-12 industrial facilities and support structures in BCV. The Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime) encompasses a section of Chestnut Ridge south of Y-12. The CY 2004 monitoring data were obtained under the Y-12 Groundwater Protection Program (GWPP) managed by BWXT Y-12, L.L.C. (BWXT) and several monitoring programs managed by Bechtel Jacobs Company LLC (BJC). Data contained in this report meet applicable requirements of DOE Order 450.1 (Environmental Protection Program) regarding evaluation of groundwater and surface water quality in areas: (1) which are, or could be, affected by operations at Y-12 (surveillance monitoring); and (2) where contaminants from Y-12 are most likely to migrate beyond the boundaries of the ORR (exit pathway/perimeter monitoring). However, detailed analysis, evaluation, and interpretation of the CY 2004 monitoring data is deferred to the Y-12 Groundwater Protection Program Groundwater Monitoring Data Compendium (BWXT 2005). For each monitoring well, spring, and surface water sampling station included in this report, the GWPP Compendium provides: (1) pertinent well installation and construction information; (2) a complete sampling history, including sampling methods and

  5. A Genetic Algorithm on Inventory Routing Problem

    Directory of Open Access Journals (Sweden)

    Nevin Aydın

    2014-03-01

    Full Text Available Inventory routing problem can be defined as forming the routes to serve to the retailers from the manufacturer, deciding on the quantity of the shipment to the retailers and deciding on the timing of the replenishments. The difference of inventory routing problems from vehicle routing problems is the consideration of the inventory positions of retailers and supplier, and making the decision accordingly. Inventory routing problems are complex in nature and they can be solved either theoretically or using a heuristics method. Metaheuristics is an emerging class of heuristics that can be applied to combinatorial optimization problems. In this paper, we provide the relationship between vendor-managed inventory and inventory routing problem. The proposed genetic for solving vehicle routing problem is described in detail.

  6. Model of a Nuclear Security Naval Agency for radiation control of the Industrial Complex of of Submarine Construction and Maintenance Ship with Nuclear Propulsion

    International Nuclear Information System (INIS)

    Lins Junior, Amilton de Sousa

    2017-01-01

    Due to the construction, by Brazilian Navy, of a Submarine Construction and Maintenance Ship with Nuclear Propulsion, where, among other activities, the commissioning and exchange of the fuel elements of the reactor in the future Nuclear Submarine, and of a Naval Base where the Nuclear Submarine and the Conventional Submarines, it is necessary the establishment of a Nuclear Security Naval Agency to monitor activities involving ionizing radiation sources and nuclear materials aimed at the radiological protection of exposed occupationally individuals (IOE), the general public and the environment. It should be noted that nuclear and radioactive material will be present only in a part of the yard called Radiological Complex. Therefore, the development of a structure for the control of the Radiological Complex is fundamental, considering that the future licensing process will be unprecedented in Brazil and will face several difficulties. This work presents a model of a structure for the radiological control of the industrial complex for the construction and maintenance of the submarine with nuclear propulsion, as well as the fundamental concepts of the activities, such as inspection, regulations and authorizations, to be carried out by the various component sectors of the Nuclear Security Naval Agency. (author)

  7. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  8. Y-12 Groundwater Protection Program CY 2009 Triennial Report Of The Monitoring Well Inspection And Maintenance Program, Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2013-06-01

    This document is the triennial report for the Well Inspection and Maintenance Program of the Y- 12 Groundwater Protection Program (GWPP), at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12). This report formally documents well inspection events conducted on active and inactive wells at Y-12 during calendar years (CY) 2007 through 2009; it documents well maintenance and plugging and abandonment activities completed since the last triennial inspection event (CY 2006); and provides summary tables of well inspection events, well maintenance events, and well plugging and abandonment events during the reference time period.

  9. Calendar Year 2009 Groundwater Monitoring Report, U.S. Department of Energy, Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental LLC

    2010-12-01

    This report contains the groundwater and surface water monitoring data that were obtained during calendar year (CY) 2009 at the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) on the DOE Oak Ridge Reservation (ORR) in Oak Ridge, Tennessee. The CY 2009 monitoring data were obtained from wells, springs, and surface water sampling locations in three hydrogeologic regimes at Y-12. The Bear Creek Hydrogeologic Regime (Bear Creek Regime) encompasses a section of Bear Creek Valley (BCV) between the west end of Y-12 and the west end of the Bear Creek Watershed (directions are in reference to the Y-12 grid system). The Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime) encompasses the Y-12 industrial facilities and support structures in BCV. The Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime) encompasses a section of Chestnut Ridge directly south of Y-12. Section 2 of this report provides background information pertinent to groundwater and surface water quality monitoring in each hydrogeologic regime, including the topography and bedrock geology, surface water drainage, groundwater system, and extent of groundwater contamination. The CY 2009 groundwater and surface water monitoring data in this report were obtained from sampling and analysis activities implemented under the Y-12 Groundwater Protection Program (GWPP) managed by Babcock & Wilcox Technical Services Y-12, LLC (B&W Y-12) and from sampling and analysis activities implemented under several monitoring programs managed by Bechtel Jacobs Company LLC (BJC). Cooperative implementation of the monitoring programs directed by the Y-12 GWPP and BJC (i.e., coordinating sample collection and sharing data) ensures that the CY 2009 monitoring results fulfill requirements of all the applicable monitoring drivers with no duplication of sampling and analysis efforts. Section 3 of this report contains a summary of information regarding the groundwater and

  10. Calendar Year 2009 Groundwater Monitoring Report, U.S. Department of Energy, Y-12 National Security Complex, Oak Ridge, Tennessee

    International Nuclear Information System (INIS)

    2010-01-01

    This report contains the groundwater and surface water monitoring data that were obtained during calendar year (CY) 2009 at the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) on the DOE Oak Ridge Reservation (ORR) in Oak Ridge, Tennessee. The CY 2009 monitoring data were obtained from wells, springs, and surface water sampling locations in three hydrogeologic regimes at Y-12. The Bear Creek Hydrogeologic Regime (Bear Creek Regime) encompasses a section of Bear Creek Valley (BCV) between the west end of Y-12 and the west end of the Bear Creek Watershed (directions are in reference to the Y-12 grid system). The Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime) encompasses the Y-12 industrial facilities and support structures in BCV. The Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime) encompasses a section of Chestnut Ridge directly south of Y-12. Section 2 of this report provides background information pertinent to groundwater and surface water quality monitoring in each hydrogeologic regime, including the topography and bedrock geology, surface water drainage, groundwater system, and extent of groundwater contamination. The CY 2009 groundwater and surface water monitoring data in this report were obtained from sampling and analysis activities implemented under the Y-12 Groundwater Protection Program (GWPP) managed by Babcock and Wilcox Technical Services Y-12, LLC (B and W Y-12) and from sampling and analysis activities implemented under several monitoring programs managed by Bechtel Jacobs Company LLC (BJC). Cooperative implementation of the monitoring programs directed by the Y-12 GWPP and BJC (i.e., coordinating sample collection and sharing data) ensures that the CY 2009 monitoring results fulfill requirements of all the applicable monitoring drivers with no duplication of sampling and analysis efforts. Section 3 of this report contains a summary of information regarding the

  11. Calendar Year 2006 Groundwater Monitoring Report, U.S Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    N/A

    2007-09-01

    This report contains the groundwater and surface water monitoring data that were obtained during calendar year (CY) 2006 at the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) on the DOE Oak Ridge Reservation (ORR) in Oak Ridge, Tennessee. The CY 2006 monitoring data were obtained from wells, springs, and surface water sampling locations in three hydrogeologic regimes at Y-12 (Figure A.1). The Bear Creek Hydrogeologic Regime (Bear Creek Regime) encompasses a section of Bear Creek Valley (BCV) between the west end of Y-12 and the west end of the Bear Creek Watershed (directions are in reference to the Y-12 grid system). The Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime) encompasses the Y-12 industrial facilities and support structures in BCV. The Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime) encompasses a section of Chestnut Ridge directly south of Y-12. Section 2 of this report provides background information pertinent to groundwater and surface water quality monitoring in each hydrogeologic regime, including the topography and bedrock geology, surface water drainage, groundwater system, and extent of groundwater contamination. The CY 2006 groundwater and surface water monitoring data in this report were obtained from sampling and analysis activities implemented under the Y-12 Groundwater Protection Program (GWPP) managed by BWXT Y-12, L.L.C. (BWXT), and from sampling and analysis activities implemented under several monitoring programs managed by Bechtel Jacobs Company LLC (BJC). Cooperative implementation of the monitoring programs directed by the Y-12 GWPP and BJC (i.e., preparing SAPs, coordinating sample collection, and sharing data) ensures that the CY 2006 monitoring results fulfill requirements of all the applicable monitoring drivers with no duplication of sampling and analysis efforts. Section 3 of this report contains a summary of information regarding the groundwater and

  12. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  13. Electronic healthcare information security

    CERN Document Server

    Dube, Kudakwashe; Shoniregun, Charles A

    2010-01-01

    The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

  14. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  15. Materials and Security Consolidation Complex Facilities Radioactive Waste Management Basis and DOE Manual 435.1-1 Compliance Tables

    International Nuclear Information System (INIS)

    2011-01-01

    Department of Energy Order 435.1, 'Radioactive Waste Management,' along with its associated manual and guidance, requires development and maintenance of a radioactive waste management basis for each radioactive waste management facility, operation, and activity. This document presents a radioactive waste management basis for Idaho National Laboratory's Materials and Security Consolidation Center facilities that manage radioactive waste. The radioactive waste management basis for a facility comprises existing laboratory-wide and facility-specific documents. Department of Energy Manual 435.1-1, 'Radioactive Waste Management Manual,' facility compliance tables also are presented for the facilities. The tables serve as a tool for developing the radioactive waste management basis.

  16. Combining security risk assessment and security testing

    OpenAIRE

    Großmann, Jürgen; Seehusen, Fredrik

    2014-01-01

    Complex networked systems have become an integral part of our supply infrastructure. Mobile devices, home automation, smart grids and even vehicles are connected via the Internet and becoming accessible and thus vulnerable to hacker attacks. While the number of security incidents drastically increases, we are more than ever dependent on a secure and mature ICT infrastructure. One of the keys to maintain such a secure and dependable infrastructure are mature, systematic and capable proactive m...

  17. Blood inventory management: hospital best practice.

    Science.gov (United States)

    Stanger, Sebastian H W; Yates, Nicola; Wilding, Richard; Cotton, Sue

    2012-04-01

    Blood is a perishable product, and hence good management of inventories is crucial. Blood inventory management is a trade-off between shortage and wastage. The challenge is to keep enough stock to ensure a 100% supply of blood while keeping time expiry losses at a minimum. This article focuses on inventory management of red blood cells in hospital transfusion laboratories to derive principles of best practice and makes recommendations that will ensure losses due to time expiry are kept to a minimum. The literature was reviewed to identify available models for perishable inventory management. Historical data from the UK blood supply chain was analyzed to identify hospitals with good inventory management practice and low wastage levels. Transfusion laboratory managers in the selected hospitals were interviewed in 7 case studies with the aim of identifying drivers for low wastage and good inventory management practice. The findings from the case studies were compared with the literature. The extant literature asserts that the drivers for good inventory performance are the use of complex inventory models and algorithms. This study has found this not to be the case. Instead, good performance is driven by the quality of transfusion laboratory staff, who must be skilled, regularly trained, and experienced. Electronic crossmatching, transparency of the inventory, and simple management procedures also facilitate good performance. Copyright © 2012 Elsevier Inc. All rights reserved.

  18. World Glacier Inventory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The World Glacier Inventory (WGI) contains information for over 130,000 glaciers. Inventory parameters include geographic location, area, length, orientation,...

  19. Housing Inventory Count

    Data.gov (United States)

    Department of Housing and Urban Development — This report displays the data communities reported to HUD about the nature of their dedicated homeless inventory, referred to as their Housing Inventory Count (HIC)....

  20. HHS Enterprise Data Inventory

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Enterprise Data Inventory (EDI) is the comprehensive inventory listing of agency data resources including public, restricted public, and non-public datasets.

  1. Integrated inventory information system

    Digital Repository Service at National Institute of Oceanography (India)

    Sarupria, J.S.; Kunte, P.D.

    The nature of oceanographic data and the management of inventory level information are described in Integrated Inventory Information System (IIIS). It is shown how a ROSCOPO (report on observations/samples collected during oceanographic programme...

  2. National Wetlands Inventory Polygons

    Data.gov (United States)

    Minnesota Department of Natural Resources — Wetland area features mapped as part of the National Wetlands Inventory (NWI). The National Wetlands Inventory is a national program sponsored by the US Fish and...

  3. Science Inventory | US EPA

    Science.gov (United States)

    The Science Inventory is a searchable database of research products primarily from EPA's Office of Research and Development. Science Inventory records provide descriptions of the product, contact information, and links to available printed material or websites.

  4. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  5. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  6. Inventory - Dollars and sense

    International Nuclear Information System (INIS)

    Samson, J.R.

    1992-01-01

    Nuclear utilities are becoming more aware of the importance of having an inventory investment that supports two opposing philosophies. The business philosophy wants a minimal inventory investment to support a better return on invested dollars. This increase in return comes from having the dollars available to invest versus having the money tied up in inventory sitting on the shelf. The opposing viewpoint is taken by maintenance/operations organizations, which desire the maximum inventory available on-site to repair any component at any time to keep the units on-line at all times. Financial managers also want to maintain cash flow throughout operations so that plants run without interruptions. Inventory management is therefore a mixture of financial logistics with an operation perspective in mind. A small amount of common sense and accurate perception also help. The challenge to the materials/inventory manager is to optimize effectiveness of the inventory by having high material availability at the lowest possible cost

  7. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  8. Y-12 Groundwater Protection Program CY2012 Triennial Report Of The Monitoring Well Inspection And Maintenance Program Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2013-09-01

    This document is the triennial report for the Well Inspection and Maintenance Program of the Y- 12 Groundwater Protection Program (GWPP), at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12). This report formally documents well inspections completed by the GWPP on active and inactive wells at Y-12 during calendar years (CY) 2010 through 2012. In addition, this report also documents well inspections performed under the Y-12 Water Resources Restoration Program, which is administered by URS|CH2M Oak Ridge (UCOR). This report documents well maintenance activities completed since the last triennial inspection event (CY 2009); and provides summary tables of well inspections and well maintenance activities during the reference time period.

  9. Survey Report For The Characterization Of The Five Tanks Located Near The Old Salvage Yard At The Y-12 National Security Complex, Oak Ridge, Tennessee

    International Nuclear Information System (INIS)

    Rollow, Kathy

    2012-01-01

    This summary report presents analytical results, radiological survey data, and other data/information for disposition planning of the five tanks located west of the Old Salvage Yard (OSY) at the Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee. Field personnel from Oak Ridge Associated Universities (ORAU) and URS-CH2M Oak Ridge LLC completed data collection in May 2012 per the project-specific plan (PSP) (ORAU 2012). Deviations from the PSP are addressed in the body of this report. Characterization activities included three data collection modes: visual inspection, radiological survey, and volumetric sampling/analysis. This report includes the final validated dataset and updates associated with the Tank 2 residues originally thought to be a biological bloom (e.g., slime mold) but ultimately identified as iron sulfate crystals

  10. A Continuous Automated Vault Inventory System (CAVIS) for accountability monitoring of stored nuclear materials

    Energy Technology Data Exchange (ETDEWEB)

    Pickett, C.A.; Barham, M.A.; Gafford, T.A.; Hutchinson, D.P.; Jordan, J.K.; Maxey, L.C.; Moran, B.W.; Muhs, J.; Nodine, R.; Simpson, M.L. [and others

    1994-12-08

    Nearly all facilities that store hazardous (radioactive or non-radioactive) materials must comply with prevailing federal, state, and local laws. These laws usually have components that require periodic physical inspections to insure that all materials remain safely and securely stored. The inspections are generally labor intensive, slow, put personnel at risk, and only find anomalies after they have occurred. The system described in this paper was developed for monitoring stored nuclear materials resulting from weapons dismantlement, but its applications extend to any storage facility that meets the above criteria. The traditional special nuclear material (SNM) accountability programs, that are currently used within most of the Department of Energy (DOE) complex, require the physical entry of highly trained personnel into SNM storage vaults. This imposes the need for additional security measures, which typically mandate that extra security personnel be present while SNM inventories are performed. These requirements increase labor costs and put additional personnel at risk to radiation exposure. In some cases, individuals have received radiation exposure equivalent to the annual maximum during just one inventory verification. With increasing overhead costs, the current system is rapidly becoming too expensive to operate, the need for an automated method of inventory verification is evident. The Continuous Automated Vault Inventory System (CAVIS) described in this paper was designed and prototyped as a low cost, highly reliable, and user friendly system that is capable of providing, real-time weight, gamma. and neutron energy confirmation from each item stored in a SNM vault. This paper describes the sensor technologies, the CAVIS prototype system (built at Y- 12 for highly enriched uranium storage), the technical requirements that must be achieved to assure successful implementation, and descriptions of sensor technologies needed for a plutonium facility.

  11. Network Paradigm of Information Security

    Directory of Open Access Journals (Sweden)

    Alexandr Diomidovich Afanasyev

    2016-03-01

    Full Text Available An issue of topological analysis has been claimed as a key one while creating robust and secure network systems. Some examples of complex network applications in information security domain have been cited.

  12. New possibilities of greenhouse gases emission inventory

    OpenAIRE

    Radkevich Maria Viktorovna; Salokhiddinov Abdulkhakim Temirhuzhaevich

    2015-01-01

    A method of inventory of greenhouse gas emissions from “road-car” complex depending on road cover evenness is offered. Calculations by IPCC methodology and offered methods give similar results, therefore worked out methods may serve as an alternative to IPCC methods and be used in stating the reasons of excess emissions by car-road complex.

  13. Vendor-managed inventory

    DEFF Research Database (Denmark)

    Govindan, Kannan

    2013-01-01

    Vendor-managed inventory (VMI) represents the methodology through which the upstream stage of a supply chain (vendor) takes responsibility for managing the inventories at the downstream stage (customer) based on previously agreed limits. VMI is another method by which supply chains can be managed...... review, we have identified six dimensions of VMI: namely, inventory, transportation, manufacturing, general benefits, coordination/collaboration, and information sharing. In addition, there are, three methodological classifications: modelling, simulation, and case studies. Finally, we will consider...

  14. National Wetlands Inventory Lines

    Data.gov (United States)

    Minnesota Department of Natural Resources — Linear wetland features (including selected streams, ditches, and narrow wetland bodies) mapped as part of the National Wetlands Inventory (NWI). The National...

  15. Historic American engineering record. Nevada national security site, Bren Tower Complex. Written historical and descriptive data and field records

    Energy Technology Data Exchange (ETDEWEB)

    Edwards, Susan R. [Desert Research Institute, Las Vegas, NV (United States); Goldenberg, Nancy [Carey & Co Inc., San Francisco, CA (United States)

    2013-08-01

    The BREN (Bare Reactor Experiment, Nevada) Tower Complex is significant for its role in the history of nuclear testing, radiation dosimetry studies, and early field testing of the Strategic Missile Defense System designs. At the time it was built in 1962, the 1,527 ft (465 m) BREN Tower was the tallest structure west of the Mississippi River and exceeded the height of the Empire State Building by 55 ft (17 m). It remains the tallest ever erected specifically for scientific purposes and was designed and built to facilitate the experimental dosimetry studies necessary for the development of accurate radiation dose rates for the survivors of Hiroshima and Nagasaki. The tower was a key component of the Atomic Bomb Casualty Commission’s (ABCC) mission to predict the health effects of radiation exposure. Moved to its current location in 1966, the crucial dosimetry studies continued with Operation HENRE (High Energy Neutron Reactions Experiment). These experiments and the data they generated became the basis for a dosimetry system called the Tentative 1965 Dose or more commonly the T65D model. Used to estimate radiation doses received by individuals, the T65D model was applied until the mid-1980s when it was replaced by a new dosimetry system known as DS86 based on the Monte Carlo method of dose rate calculation. However, the BREN Tower data are still used for verification of the validity of the DS86 model. In addition to its importance in radiation heath effects research, the BREN Tower Complex is also significant for its role in the Brilliant Pebbles research project, a major component of the Strategic Defense Initiative popularly known as the “Star Wars” Initiative. Instigated under the Reagan Administration, the program’s purpose was to develop a system to shield the United States and allies from a ballistic missile attack. The centerpiece of the Strategic Defense System was space-based, kinetic-kill vehicles. In 1991, BREN Tower was used for the tether tests

  16. Assessing the Feasibility of Low-Density LiDAR for Stand Inventory Attribute Predictions in Complex and Managed Forests of Northern Maine, USA

    Directory of Open Access Journals (Sweden)

    Rei Hayashi

    2014-02-01

    Full Text Available The objective of this study was to evaluate the applicability of using a low-density (1–3 points m−2 discrete-return LiDAR (Light Detection and Ranging for predicting maximum tree height, stem density, basal area, quadratic mean diameter and total volume. The research was conducted at the Penobscot Experimental Forest in central Maine, where a range of stand structures and species composition is present and generally representative of northern Maine’s forests. Prediction models were developed utilizing the random forest algorithm that was calibrated using reference data collected in fixed radius circular plots. For comparison, the volume model used two sets of reference data, with one being fixed radius circular plots and the other variable radius plots. Prediction biases were evaluated with respect to five silvicultural treatments and softwood species composition based on the coefficient of determination (R2, root mean square error and mean bias, as well as residual scatter plots. Overall, this study found that LiDAR tended to underestimate maximum tree height and volume. The maximum tree height and volume models had R2 values of 86.9% and 72.1%, respectively. The accuracy of volume prediction was also sensitive to the plot type used. While it was difficult to develop models with a high R2, due to the complexities of Maine’s forest structures and species composition, the results suggest that low density LiDAR can be used as a supporting tool in forest management for this region.

  17. Managing for Enterprise Security

    National Research Council Canada - National Science Library

    Caralli, Richard A; Allen, Julia H; Stevens, James F; Willke, Bradford J; Wilson, William R

    2004-01-01

    .... But it is no small task. The technical and environmental complexity of today's organizations and the ever-increasing dependence on technology to drive and automate processes and create competitive advantages make security...

  18. Denmark's National Inventory Report

    DEFF Research Database (Denmark)

    Illerup, J. B.; Lyck, E.; Winther, M.

    This report is Denmark's National Inventory Report reported to the Conference of the Parties under the United Nations Framework Convention on Climate Change (UNFCCC) due by 15 April 2001. The report contains information on Denmark's inventories for all years' from 1990 to 1999 for CO2, CH4, N2O, CO...

  19. Denmark's National Inventory Report

    DEFF Research Database (Denmark)

    Illerup, J. B.; Lyck, E.; Winther, M.

    This report is Denmark's National Inventory Report reported to the Conference of the Parties under the United Nations Framework Convention on Climate Change (UNFCCC) due by 15 April 2001. The report contains information on Denmark's inventories for all years' from 1990 to 1999 for CO2, CH4, N2O, ......, NMVOC, SO2, HFCs, PFCs and SF6....

  20. Integrated inventory and monitoring

    Science.gov (United States)

    George Lightner; Hans T. Schreuder; Barry Bollenbacher; Kerry McMenus

    2001-01-01

    Understanding and inventorying our ecological systems is key to addressing how issues, questions, and management actions will affect the composition, structure, and function of these systems. Taking an ecological systems approach to the inventory and monitoring framework, is one which we feel will allow answers to currently identified management questions and new ones...

  1. Inventory control strategies

    International Nuclear Information System (INIS)

    Primrose, D.

    1998-01-01

    Finning International Inc. is in the business of selling, financing and servicing Caterpillar and complementary equipment. Its main markets are in western Canada, Britain and Chile. This paper discusses the parts inventory strategies system for Finning (Canada). The company's territory covers British Columbia, Alberta, the Yukon and the Northwest Territories. Finning's parts inventory consists of 80,000 component units valued at more than $150 M. Distribution centres are located in Langley, British Columbia and Edmonton, Alberta. To make inventory and orders easier to control, Finning has designed a computer-based system, with software written exclusively for Caterpillar dealers. The system makes use of a real time electronic interface with all Finning locations, plus all Caterpillar facilities and other dealers in North America. Details of the system are discussed, including territorial stocking procedures, addition to stock, exhaustion of stock, automatic/suggest order controls, surplus inventory management, and procedures for jointly managed inventory. 3 tabs., 1 fig

  2. 77 FR 3836 - Public Availability of Social Security Administration Fiscal Year (FY) 2011 Service Contract...

    Science.gov (United States)

    2012-01-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0105] Public Availability of Social Security Administration Fiscal Year (FY) 2011 Service Contract Inventory AGENCY: Social Security Administration. ACTION: Notice of Public Availability of FY 2011 Service Contract Inventories. SUMMARY: In accordance with...

  3. 78 FR 6168 - Public Availability of Social Security Administration Fiscal Year (FY) 2012 Service Contract...

    Science.gov (United States)

    2013-01-29

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2013-0001] Public Availability of Social Security Administration Fiscal Year (FY) 2012 Service Contract Inventory AGENCY: Social Security Administration. ACTION: Notice of Public Availability of FY 2012 Service Contract Inventories. SUMMARY: In accordance with...

  4. Microsoft Windows Security Essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed,

  5. SOME ASPECTS REGARDING IMPLICATIONS OF IAS 2 "INVENTORY" IN ROMANIAN ACOUNTING

    Directory of Open Access Journals (Sweden)

    ALIN MONEA

    2011-01-01

    Full Text Available This paper presents some aspects regarding inventories. In many business inventories are the most important assets. The accounting for inventories is a major consideration for many entities because of its significance on both the income statement (cost of goods sold and the statement of financial position. The complexity of accounting for inventories arises from several factors like: the high volume of activity, the various cost flow alternatives that are acceptable and the classification of inventories.

  6. Managing Air Quality - Emissions Inventories

    Science.gov (United States)

    This page describes the role of emission inventories in the air quality management process, a description of how emission inventories are developed, and where U.S. emission inventory information can be found.

  7. Interactive Inventory Monitoring

    Science.gov (United States)

    Garud, Sumedha

    2013-01-01

    Method and system for monitoring present location and/or present status of a target inventory item, where the inventory items are located on one or more inventory shelves or other inventory receptacles that communicate with an inventory base station through use of responders such as RFIDs. A user operates a hand held interrogation and display (lAD) module that communicates with, or is part of the base station to provide an initial inquiry. lnformation on location(s) of the larget invenlory item is also indicated visibly and/or audibly on the receptacle(s) for the user. Status information includes an assessment of operation readiness and a time, if known, that the specified inventory item or class was last removed or examined or modified. Presentation of a user access level may be required for access to the target inventgory item. Another embodiment provides inventory informatin for a stack as a sight-impaired or hearing-impaired person adjacent to that stack.

  8. Y-12 Groundwater Protection Program Monitoring Optimization Plan for Groundwater Monitoring Wells at the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2017-04-01

    This document is the monitoring optimization plan for groundwater monitoring wells associated with the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee. The plan describes the technical approach that is implemented under the Y-12 Groundwater Protection Program (GWPP) to focus available resources on the monitoring wells at Y-12 that provide the most useful hydrologic and groundwater quality monitoring data. The technical approach is based on the GWPP status designation for each well. Under this approach, wells granted “active” status are used by the GWPP for hydrologic monitoring and/or groundwater quality sampling, whereas wells granted “inactive” status are not used for either purpose. The status designation also defines the frequency at which the GWPP will inspect applicable wells, the scope of these well inspections, and extent of any maintenance actions initiated by the GWPP. Details regarding the ancillary activities associated with implementation of this plan (e.g., well inspection) are deferred to the referenced GWPP plans.

  9. Addendum To The Survey Report For The Characterization Of The Five Tanks Located Near The Old Salvage Yard At The Y-12 National Security Complex, Oak Ridge, Tennessee

    International Nuclear Information System (INIS)

    Rollow, Kathy

    2012-01-01

    The purpose if this addendum is to provide clarifying information related to two issues delaying disposal of Tank 2, located west of the Old Salvage Yard at the Y-12 National Security Complex. The two issues are as follows: 1. The discovery and documentation of apparent elevated results on the external rusty surface of Tank 2; 2. The proper interpretation and use of scan data. Oak Ridge Associated Universities (ORAU) health physics technicians (HPTs), operating under the Oak Ridge Institute for Science and Education contract, performed 100% scans over accessible interior and exterior surfaces of the five tanks located near the Old Salvage Yard, per the stakeholder-approved project-specific plan. Three types of measurements were collected, including gamma radiation measurements using a Ludlum model 44-10 gamma scintillation detector connected to a Ludlum model 2221 ratemeter/scaler; alpha radiation measurements using a Ludlum model 43-68 gas proportional detector connected to a 2221 ratemeter/scaler; and alpha-plus-beta radiation measurements also using a Ludlum model 43-68 connected to a 2221 ratermeter/scaler. The alpha-plus-beta characterization data is the primary subject of this addendum

  10. Factor Analysis of the Coopersmith Self-Esteem Inventory

    OpenAIRE

    Güloğlu, Berna; Aydın, Gül

    2001-01-01

    This study investigated the factor structure of the Turkish version of the Coopersmith Self-Esteem Inventory. The results showed that the inventory had a 21-factor highly complex factor structure. However of the empirically found 21 factors only 10 seemed theoretically meaningful. The results were discussed in comparison to the fndings obtained from the studies that were carried out with the original version of the Coopersmith Self-esteem Inventory.

  11. SBA Network Components & Software Inventory

    Data.gov (United States)

    Small Business Administration — SBA’s Network Components & Software Inventory contains a complete inventory of all devices connected to SBA’s network including workstations, servers, routers,...

  12. Accounting concept of inventories in postindustrial economy

    Directory of Open Access Journals (Sweden)

    Pravdyuk N.L.

    2017-06-01

    Full Text Available The accounting of inventories has undergone significant changes over a relatively short period of time. It has changed the scientific picture of their definition and classification, measurement and write-offs reflected in the financial statements. However, these changes happen without proper interpretation and system analysis. And, at least in general terms the inventories are conducted in Ukraine according to IFRS; this causes some obstacles to the objective reflection of working capital of enterprises, and the transparency of disclosure and is not conducive to the formation of a proper investment climate. It is established that the information provision inventory control must meet the requirements of the postindustrial economy by the complicating and deepening the complexity of accounting, the introduction of new forms and their synthesis with the current one, a gradual reorganization to ensure the needs of consumers and enterprise evaluation. The results of the study have substantiated the fundamentals of accounting concepts in the postindustrial economy in the part of the circulating capital, which forms inventories. The information support of inventory management should be implemented in a hierarchical way, when it first and foremost analyzes the working capital, and further deals with inventories and stocks as its subordinate components. The author considers the material goods to be a broader concept than reserves, because they have a dual nature both estimated as the share of negotiable assets, and as the physical component of material costs. The paper gives the definition of this category of symbiosis, which is based on P(CBU 9. The general structure of the current inventories are of significant importance, which has differences in industries, the dominant of which is agriculture, industry, construction, trade, material production. The postindustrial economy caused the questions of differentiation of concepts "production" and "material

  13. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  14. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  15. VA Enterprise Data Inventory

    Data.gov (United States)

    Department of Veterans Affairs — The Department of Veterans Affairs Enterprise Data Inventory accounts for all of the datasets used in the agency's information systems. This entry was approved for...

  16. National Emission Inventory (NEI)

    Data.gov (United States)

    U.S. Environmental Protection Agency — This data exchange allows states to submit data to the US Environmental Protection Agency's National Emissions Inventory (NEI). NEI is a national database of air...

  17. National Wetlands Inventory Points

    Data.gov (United States)

    Minnesota Department of Natural Resources — Wetland point features (typically wetlands that are too small to be as area features at the data scale) mapped as part of the National Wetlands Inventory (NWI). The...

  18. Business Process Inventory

    Data.gov (United States)

    Office of Personnel Management — Inventory of maps and descriptions of the business processes of the U.S. Office of Personnel Management (OPM), with an emphasis on the processes of the Office of the...

  19. Asset Inventory Database

    Data.gov (United States)

    US Agency for International Development — AIDM is used to track USAID assets such as furniture, computers, and equipment. Using portable bar code readers, receiving and inventory personnel can capture...

  20. Toxics Release Inventory (TRI)

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Toxics Release Inventory (TRI) is a dataset compiled by the U.S. Environmental Protection Agency (EPA). It contains information on the release and waste...

  1. National Emission Inventory

    Data.gov (United States)

    U.S. Environmental Protection Agency — The National Emission Inventory contains measured, modeled, and estimated data for emissions of all known source categories in the US (stationary sources, fires,...

  2. NCRN Hemlock Inventory Data

    Data.gov (United States)

    Department of the Interior — ​Data associated with the 2015 hemlock inventory project in NCR. Eastern hemlock (Tsuga canadensis) is a coniferous tree native to the NE and Appalachian regions of...

  3. Public Waters Inventory Maps

    Data.gov (United States)

    Minnesota Department of Natural Resources — This theme is a scanned and rectified version of the Minnesota DNR - Division of Waters "Public Waters Inventory" (PWI) maps. DNR Waters utilizes a small scale...

  4. Logistics and Inventory System -

    Data.gov (United States)

    Department of Transportation — The Logistics and Inventory System (LIS) is the agencys primary supply/support automation tool. The LIS encompasses everything from order entry by field specialists...

  5. Traffic Signs Inventory System

    Directory of Open Access Journals (Sweden)

    J. Ružbarský

    2013-06-01

    Full Text Available The paper is focused on practical application of Cambridge Correlator. The goal is to propose a traffic signs inventory system by using excellent characteristics of correlator in the rapid optical correlation. The proposal of this inventory system includes obtaining of traffic signs to create the database either collecting the GPS coordinates. It is necessary to know the traffic signs position and also to document the entire surface route for later evaluation in offline mode.

  6. Nevada Photo-Based Inventory Pilot (NPIP) photo sampling procedures

    Science.gov (United States)

    Tracey S. Frescino; Gretchen G. Moisen; Kevin A. Megown; Val J. Nelson; Elizabeth A. Freeman; Paul L. Patterson; Mark Finco; James Menlove

    2009-01-01

    The Forest Inventory and Analysis program (FIA) of the U.S. Forest Service monitors status and trends in forested ecoregions nationwide. The complex nature of this broad-scale, strategic-level inventory demands constant evolution and evaluation of methods to get the best information possible while continuously increasing efficiency. In 2004, the "Nevada Photo-...

  7. Groundwater Protection Program Management Plan for the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental LLC; Environmental Compliance Department Environment, Safety, and Health Division Y-12 National Security Complex

    2004-03-31

    This document presents the Groundwater Protection Program (GWPP) management plan for the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12). The Y-12 GWPP functions as the primary point-of-contact for groundwater-related issues at Y-12, provides stewardship of the extensive network of groundwater monitoring wells at Y-12, and serves as a resource for technical expertise, support, and historical data for groundwater-related activities at Y-12. These organizational functions each serve the primary programmatic purpose of the GWPP, which is to ensure that groundwater monitoring activities within areas under Y-12 administrative control provide representative data in compliance with the multiple purposes of applicable state and federal regulations, DOE orders, and the corporate policies of BWXT Y-12, L.L.C. (hereafter referenced as BWXT), the Y-12 management and operations (M&O) contractor for DOE. This GWPP management plan addresses the requirements of DOE Order 450.1 (BWXT Y12 S/RID) regarding the implementation of a site-wide approach for groundwater protection at each DOE facility. Additionally, this plan is a ''living'' document that is reviewed annually, revised and reissued every three years, and is formatted to provide for updating individual sections independent of the rest of the document. Section 2 includes a short description of the groundwater system at Y-12, the history of groundwater monitoring at Y-12 and the corresponding evolution of the GWPP, and an overview of ongoing Y-12 groundwater monitoring activities. Section 3 describes the key elements of the GWPP management strategy. Organizational roles and responsibilities of GWPP personnel are outlined in Section 4. Section 5 presents an overview of the GWPP project plans for applicable programmatic elements. Section 6 lists the reports, plans, and documents that are referenced for technical and administrative details.

  8. Security Expertise

    DEFF Research Database (Denmark)

    This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  9. Materials control and accountability challenges associated with plutonium inventories

    International Nuclear Information System (INIS)

    Crawford, D.W.

    1996-01-01

    There are currently many initiatives underway within the Department of Energy (DOE) to safely and securely manage large plutonium inventories arising from weapons dismantlement, changing missions and facility operations. Plutonium inventory information is increasingly accessible to the public as a result of the secretary of energy's openness initiative. As a result, knowledge of these inventories and levels to which the department has accounted for and controlled these inventories, will be under increased scrutiny from a variety of interest groups. The quality of this accountability data and what this data means will greatly influence the public's perception of how the US is protecting its plutonium inventories. In addition, the department's safeguards program provides an essential basis for the application of International Atomic Energy Agency (IAEA) safeguards that, in addition to possibly other international control regimes, will be in place over a large portion of these future inventories. The capability and functionality of the department's nuclear safeguards program will be important contributors to the success of US programs for the responsible stewardship of these vast plutonium inventories. This paper discusses some of the challenges, in terms of specific issues relating to one part of the department's safeguards program--materials control and accountability (MC and A)--to meet the growing domestic and international requirements and expectations associated with these plutonium inventories

  10. Materials control and accountability challenges associated with plutonium inventories

    Energy Technology Data Exchange (ETDEWEB)

    Crawford, D.W. [USDOE Office of Safeguards and Security, Washington, DC (United States)

    1996-07-01

    There are currently many initiatives underway within the Department of Energy (DOE) to safely and securely manage large plutonium inventories arising from weapons dismantlement, changing missions and facility operations. Plutonium inventory information is increasingly accessible to the public as a result of the secretary of energy`s openness initiative. As a result, knowledge of these inventories and levels to which the department has accounted for and controlled these inventories, will be under increased scrutiny from a variety of interest groups. The quality of this accountability data and what this data means will greatly influence the public`s perception of how the US is protecting its plutonium inventories. In addition, the department`s safeguards program provides an essential basis for the application of International Atomic Energy Agency (IAEA) safeguards that, in addition to possibly other international control regimes, will be in place over a large portion of these future inventories. The capability and functionality of the department`s nuclear safeguards program will be important contributors to the success of US programs for the responsible stewardship of these vast plutonium inventories. This paper discusses some of the challenges, in terms of specific issues relating to one part of the department`s safeguards program--materials control and accountability (MC and A)--to meet the growing domestic and international requirements and expectations associated with these plutonium inventories.

  11. Fukushima Daiichi Radionuclide Inventories

    Energy Technology Data Exchange (ETDEWEB)

    Cardoni, Jeffrey N. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jankovsky, Zachary Kyle [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-09-01

    Radionuclide inventories are generated to permit detailed analyses of the Fukushima Daiichi meltdowns. This is necessary information for severe accident calculations, dose calculations, and source term and consequence analyses. Inventories are calculated using SCALE6 and compared to values predicted by international researchers supporting the OECD/NEA's Benchmark Study on the Accident at Fukushima Daiichi Nuclear Power Station (BSAF). Both sets of inventory information are acceptable for best-estimate analyses of the Fukushima reactors. Consistent nuclear information for severe accident codes, including radionuclide class masses and core decay powers, are also derived from the SCALE6 analyses. Key nuclide activity ratios are calculated as functions of burnup and nuclear data in order to explore the utility for nuclear forensics and support future decommissioning efforts.

  12. Shortening the Xerostomia Inventory

    Science.gov (United States)

    Thomson, William Murray; van der Putten, Gert-Jan; de Baat, Cees; Ikebe, Kazunori; Matsuda, Ken-ichi; Enoki, Kaori; Hopcraft, Matthew; Ling, Guo Y

    2011-01-01

    Objectives To determine the validity and properties of the Summated Xerostomia Inventory-Dutch Version in samples from Australia, The Netherlands, Japan and New Zealand. Study design Six cross-sectional samples of older people from The Netherlands (N = 50), Australia (N = 637 and N = 245), Japan (N = 401) and New Zealand (N = 167 and N = 86). Data were analysed using the Summated Xerostomia Inventory-Dutch Version. Results Almost all data-sets revealed a single extracted factor which explained about half of the variance, with Cronbach’s alpha values of at least 0.70. When mean scale scores were plotted against a “gold standard” xerostomia question, statistically significant gradients were observed, with the highest score seen in those who always had dry mouth, and the lowest in those who never had it. Conclusion The Summated Xerostomia Inventory-Dutch Version is valid for measuring xerostomia symptoms in clinical and epidemiological research. PMID:21684773

  13. Analytical and Numerical Study of the Projective Synchronization of the Chaotic Complex Nonlinear Systems with Uncertain Parameters and Its Applications in Secure Communication

    Directory of Open Access Journals (Sweden)

    Kholod M. Abualnaja

    2014-01-01

    to demonstrate the effectiveness of the proposed synchronization scheme and verify the theoretical results. The above results will provide theoretical foundation for the secure communication applications based on the proposed scheme.

  14. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  15. Node security

    CERN Document Server

    Barnes, Dominic

    2013-01-01

    A practical and fast-paced guide that will give you all the information you need to secure your Node applications.If you are a developer who wishes to secure your Node applications, whether you are already using Node Security in production, or are considering using it for your next project, then this book will enable you to ensure security of your applications. An understanding of JavaScript is a prerequisite, and some experience with Node is recommended, though not required.

  16. National Inventory Report 2002

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-07-01

    The report presents an inventory of greenhouse gas emissions and sinks in Norway from 1990 to 2000. Trends in total greenhouse gas emissions by UNFCCC's sources and gases are described for carbon dioxide (CO{sub 2}), methane (CH{sub 4}), nitrous oxide (N{sub 2}O), tetrafluoromethane (CF{sub 4}), hexafluoroethane (C{sub 2}F{sub 6}), sulphur hexafluoride (SF{sub 6}) and HFCs. Methodology used in the calculation of emissions from key sources in the Norwegian Emission Inventory are presented. Emissions are reported according to UNFCCC/IPCC common reporting format (CRF) (author)

  17. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  18. Applying ABC Analysis to the Navy’s Inventory Management System

    Science.gov (United States)

    2014-09-01

    TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE APPLYING ABC ANALYSIS TO THE NAVY’S INVENTORY MANAGEMENT SYSTEM 5. FUNDING NUMBERS 6...Parts, Navy Enterprise Resource Planning, ABC Inventory Classification. 15. NUMBER OF PAGES 101 16. PRICE CODE 17. SECURITY CLASSIFICATION OF...for public release; distribution is unlimited APPLYING ABC ANALYSIS TO THE NAVY’S INVENTORY MANAGEMENT SYSTEM Benjamin May Lieutenant

  19. 76 FR 4408 - Service Contract Inventory and Corresponding Point of Contact Information Per Section 703 of...

    Science.gov (United States)

    2011-01-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0009] Service Contract Inventory and... providing the Web site address (URL) for the Service Contract Inventory and the corresponding point of... Law 111-117. FOR FURTHER INFORMATION CONTACT: Dennis Wilhite, Director, Office of Budget Execution and...

  20. Designing security holograms

    Science.gov (United States)

    James, Randy; Long, Michael; Newcomb, Diana

    2004-06-01

    Over the years, holograms have evolved from purely decorative images to bona fide security devices. During this evolution, highly secure technologies have been developed specifically for product and document protection. To maximize the security potential of these hologram technologies requires a holistic approach. A hologram alone is not enough. To be effective it must be part of a security program and that security program needs to inform the design and development of the actual hologram. In the most elementary case the security program can be as simple as applying a tamper evident label for a one-day event. In a complex implementation it would include multi-level technologies and corresponding verification methods. A holistic approach is accomplished with good planning and articulation of the problem to be solved, and then meeting the defined security objectives. Excellent communication among all the stakeholders in a particular project is critical to the success of the project. The results of this dialogue inform the design of the security hologram.

  1. Y-12 Groundwater Protection Program Monitoring Optimization Plan For Groundwater Monitoring Wells At The U.S. Department Of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental LLC

    2009-12-01

    This document is the monitoring optimization plan for groundwater monitoring wells associated with the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee (Figure A.1). The plan describes the technical approach that will be implemented under the Y-12 Groundwater Protection Program (GWPP) to focus available resources on the monitoring wells at Y-12 that provide the most useful hydrologic and groundwater quality monitoring data. The technical approach is based on the GWPP status designation for each well (Section 2.0). Under this approach, wells granted 'active' status are used by the GWPP for hydrologic monitoring and/or groundwater quality sampling (Section 3.0), whereas wells granted 'inactive' status are not used for either purpose. The status designation also defines the frequency at which the GWPP will inspect applicable wells, the scope of these well inspections, and extent of any maintenance actions initiated by the GWPP (Section 3.0). Details regarding the ancillary activities associated with implementation of this plan (e.g., well inspection) are deferred to the referenced GWPP plans and procedures (Section 4.0). This plan applies to groundwater wells associated with Y-12 and related waste management areas and facilities located within three hydrogeologic regimes (Figure A.1): the Bear Creek Hydrogeologic Regime (Bear Creek Regime), the Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime), and the Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime). The Bear Creek Regime encompasses a section of Bear Creek Valley (BCV) immediately west of Y-12. The East Fork Regime encompasses most of the Y-12 process, operations, and support facilities in BCV and, for the purposes of this plan, includes a section of Union Valley east of the DOE Oak Ridge Reservation (ORR) boundary along Scarboro Road. The Chestnut Ridge Regime encompasses a section of Chestnut Ridge directly south of Y-12 that is bound on

  2. Groundwater Protection Program Management Plan For The U.S. Department Of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental, LLC

    2009-09-01

    This document presents the Groundwater Protection Program (GWPP) management plan for the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12). The Y-12 GWPP functions as the primary point-of-contact for groundwater-related issues at Y-12, provides stewardship of the extensive network of groundwater monitoring wells at Y-12, and serves as a resource for technical expertise, support, and historical data for groundwater-related activities at Y-12. These organizational functions each serve the primary programmatic purpose of the GWPP, which is to ensure that groundwater monitoring activities within areas under Y-12 administrative control provide representative data in compliance with the multiple purposes of applicable state and federal regulations, DOE orders, and the corporate policies of Babcock & Wilcox Technical Services Y-12 LLC (hereafter referenced as B&W Y-12), the Y-12 management and operations (M&O) contractor for DOE. B&W Y-12 is a new corporate name, assumed in January 2007, for the company formerly known as BWXT Y-12, L.L.C., hereafter referenced as BWXT. This GWPP management plan addresses the requirements of DOE Order 450.1A Environmental Protection Program (hereafter referenced as DOE O 450.1A), which emphasize a site-wide approach for groundwater protection at each DOE facility through implementation of groundwater surveillance monitoring. Additionally, this plan addresses the relevant and applicable GWPP elements and goals described in the DOE O 450.1A technical guidance documents issued in June 2004 (DOE 2004) and May 2005 (DOE 2005). This GWPP management plan is a 'living' document that is reviewed annually, revised and reissued every three years, and is formatted to provide for updating individual sections independent of the rest of the document. Section 2 includes a short description of the groundwater system at Y-12, the history of groundwater monitoring at Y-12 and the corresponding evolution of the GWPP

  3. A Psychometric Evaluation of Super's Work Values Inventory--Revised

    Science.gov (United States)

    Robinson, Carrie H.; Betz, Nancy E.

    2008-01-01

    This study describes the psychometric evaluation of Super's Work Values Inventory--Revised (SWVI-R), an instrument comprised of 12 scales measuring the relative importance placed on the following work-related value dimensions: Achievement, Coworkers, Creativity, Income, Independence, Lifestyle, Mental Challenge, Prestige, Security, Supervision,…

  4. Clinical learning environment inventory: factor analysis.

    Science.gov (United States)

    Newton, Jennifer M; Jolly, Brian C; Ockerby, Cherene M; Cross, Wendy M

    2010-06-01

    This paper is a report of the psychometric testing of the Clinical Learning Environment Inventory. The clinical learning environment is a complex socio-cultural entity that offers a variety of opportunities to engage or disengage in learning. The Clinical Learning Environment Inventory is a self-report instrument consisting of 42 items classified into six scales: personalization, student involvement, task orientation, innovation, satisfaction and individualization. It was developed to examine undergraduate nursing students' perceptions of the learning environment whilst on placement in clinical settings. As a component of a longitudinal project, Bachelor of Nursing students (n = 659) from two campuses of a university in Australia, completed the Clinical Learning Environment Inventory from 2006 to 2008. Principal components analysis using varimax rotation was conducted to explore the factor structure of the inventory. Data for 513 students (77%) were eligible for inclusion. Constraining data to a 6-factor solution explained 51% of the variance. The factors identified were: student-centredness, affordances and engagement, individualization, fostering workplace learning, valuing nurses' work, and innovative and adaptive workplace culture. These factors were reviewed against recent theoretical developments in the literature. The study offers an empirically based and theoretically informed extension of the original Clinical Learning Environment Inventory, which had previously relied on ad hoc clustering of items and the use of internal reliability of its sub-scales. Further research is required to establish the consistency of these new factors.

  5. Purchasing and inventory management techniques for optimizing inventory investment

    International Nuclear Information System (INIS)

    McFarlane, I.; Gehshan, T.

    1993-01-01

    In an effort to reduce operations and maintenance costs among nuclear plants, many utilities are taking a closer look at their inventory investment. Various approaches for inventory reduction have been used and discussed, but these approaches are often limited to an inventory management perspective. Interaction with purchasing and planning personnel to reduce inventory investment is a necessity in utility efforts to become more cost competitive. This paper addresses the activities that purchasing and inventory management personnel should conduct in an effort to optimize inventory investment while maintaining service-level goals. Other functions within a materials management organization, such as the warehousing and investment recovery functions, can contribute to optimizing inventory investment. However, these are not addressed in this paper because their contributions often come after inventory management and purchasing decisions have been made

  6. Inventory order crossovers

    NARCIS (Netherlands)

    Riezebos, J.

    2006-01-01

    The control policies that are used in inventory management systems assume that orders arrive in the same sequence as they were ordered. Due to changes in supply chains and markets, this assumption is no longer valid. This paper aims at providing an improved understanding of the phenomenon of order

  7. Single Item Inventory Models

    NARCIS (Netherlands)

    E.M. Bazsa-Oldenkamp; P. den Iseger

    2001-01-01

    textabstractThis paper extends a fundamental result about single-item inventory systems. This approach allows more general performance measures, demand processes and order policies, and leads to easier analysis and implementation, than prior research. We obtain closed form expressions for the

  8. Marine Education Knowledge Inventory.

    Science.gov (United States)

    Hounshell, Paul B.; Hampton, Carolyn

    This 35-item, multiple-choice Marine Education Knowledge Inventory was developed for use in upper elementary/middle schools to measure a student's knowledge of marine science. Content of test items is drawn from oceanography, ecology, earth science, navigation, and the biological sciences (focusing on marine animals). Steps in the construction of…

  9. THE PRESCHOOL INVENTORY.

    Science.gov (United States)

    CALDWELL, BETTYE M.; SOULE, DONALD

    THE PRESCHOOL INVENTORY BEGAN AS AN ANSWER TO THE NEED FOR SOME TYPE OF INSTRUMENT THAT WOULD PROVIDE AN INDICATION OF HOW MUCH A DISADVANTAGED CHILD, PRIOR TO HIS INTRODUCTION TO HEAD START, HAD ACHIEVED IN AREAS REGARDED AS NECESSARY FOUNDATIONS FOR SUBSEQUENT SUCCESS IN SCHOOL. MEASURING BASIC INTELLIGENCE WAS NOT THE GOAL. RATHER, THE…

  10. Rapid inventory taking system

    International Nuclear Information System (INIS)

    Marsden, P.S.S.F.

    1980-01-01

    A data processing system designed to facilitate inventory taking is described. The process depends upon the earliest possible application of computer techniques and the elimination of manual operations. Data is recorded in optical character recognition (OCR) 'A' form and read by a hand held wand reader. Limited validation checks are applied before recording on mini-tape cassettes. 5 refs

  11. Calculating Optimal Inventory Size

    Directory of Open Access Journals (Sweden)

    Ruby Perez

    2010-01-01

    Full Text Available The purpose of the project is to find the optimal value for the Economic Order Quantity Model and then use a lean manufacturing Kanban equation to find a numeric value that will minimize the total cost and the inventory size.

  12. Perishable Inventory Challenges

    DEFF Research Database (Denmark)

    Damgaard, Cecilie Maria; Nguyen, Vivi Thuy; Hvolby, Hans-Henrik

    2012-01-01

    The paper investigates how inventory control of perishable items is managed and line up some possible options of improvement. This includes a review of relevant literature dealing with the challenges of determining ordering policies for perishable products and a study of how the current procedures...

  13. Information security principles and practice

    CERN Document Server

    Stamp, Mark

    2011-01-01

    Now updated-your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge. Taking a pract

  14. National Security Challenges: Insights from Social, Neurobiological, and Complexity Sciences. Topical Strategic Multi-Layer Assessment (SMA) and U.S. Army ERDC Multi-Agency/Multi-Disciplinary White Papers in Support of National Security Challenges

    Science.gov (United States)

    2012-07-01

    facing the infidel ” or “the life of a martyr.” Remember that norms are social constructions of shared beliefs, and as such are meaningless until a...other tribal section; my tribe against the other tribe; Muslims against infidels .” See also, for example, Montgomery McFate’s, “The “Memory of War...visual image, and this tendency emerges across four distinct domains: sexual , disgust, defense, National Security Challenges Approved for Public

  15. Initial Radionuclide Inventories

    Energy Technology Data Exchange (ETDEWEB)

    H. Miller

    2004-09-19

    The purpose of this analysis is to provide an initial radionuclide inventory (in grams per waste package) and associated uncertainty distributions for use in the Total System Performance Assessment for the License Application (TSPA-LA) in support of the license application for the repository at Yucca Mountain, Nevada. This document is intended for use in postclosure analysis only. Bounding waste stream information and data were collected that capture probable limits. For commercially generated waste, this analysis considers alternative waste stream projections to bound the characteristics of wastes likely to be encountered using arrival scenarios that potentially impact the commercial spent nuclear fuel (CSNF) waste stream. For TSPA-LA, this radionuclide inventory analysis considers U.S. Department of Energy (DOE) high-level radioactive waste (DHLW) glass and two types of spent nuclear fuel (SNF): CSNF and DOE-owned (DSNF). These wastes are placed in two groups of waste packages: the CSNF waste package and the codisposal waste package (CDSP), which are designated to contain DHLW glass and DSNF, or DHLW glass only. The radionuclide inventory for naval SNF is provided separately in the classified ''Naval Nuclear Propulsion Program Technical Support Document'' for the License Application. As noted previously, the radionuclide inventory data presented here is intended only for TSPA-LA postclosure calculations. It is not applicable to preclosure safety calculations. Safe storage, transportation, and ultimate disposal of these wastes require safety analyses to support the design and licensing of repository equipment and facilities. These analyses will require radionuclide inventories to represent the radioactive source term that must be accommodated during handling, storage and disposition of these wastes. This analysis uses the best available information to identify the radionuclide inventory that is expected at the last year of last emplacement

  16. The Justice of Improving Security and Confronting Poverty

    DEFF Research Database (Denmark)

    Farah, Abdulkadir Osman

    2016-01-01

    Following decades of postcolonial dictatorships and authoritarianism, many African countries have experienced expanded efforts by transnational organizations—from both top down and bottom up—aimed at alleviating poverty and improving security. This article provides a partial inventory...

  17. Achieving food security and climate change mitigation through ...

    African Journals Online (AJOL)

    MRS AKINBAMI

    2011-10-11

    Oct 11, 2011 ... Inventory of greenhouse gases emission from agricultural practices and livestock production in the country was assessed ... Key words: Food security, climate change mitigation, rural entrepreneurship development, gender perspective. ...... Report of the Agricultural Sector Assessment Team, US National.

  18. The Evolution of Inventory Management in Manufacturing and Services Companies

    Directory of Open Access Journals (Sweden)

    Gerardo Molinary Fernández

    2000-08-01

    Full Text Available Although inventory management has significantly developed in the past years as a management discipline, its application is still minimal in the service industry and government. In contrast, it is an important tool for any company that is running a competitive business. The management of some companies considers inventory as an asset, not a liability. In addition, in companies in which the use and application of inventory models are common, they can still experience inventory problems. This paper analyzes the weakness of the traditional and most popular inventory model: The Economic Order Quantity model (EOQ. Many of the inventory models available are difficult to understand because they are based on complicate mathematical and statistical formulas. The benefits that computer software have simplifying the use of mathematical formulas are diminished because some of them do not include special applications or solutions when a variation in the assumption of the models is present. When a company implements The Just in Time philosophy (JIT, the management of inventory does not rest in complex formulas. Inventory experts need to emphasize the application of the models instead of the statistical derivation. They also need to be more aggressive in making managers, students and government authorities more aware of managing the inventory levels effectively. The responsibility of good inventory levels is not the sole task of the Operations Department, but the obligation of all the people in a company. Good inventory levels are now a measure of business competitiveness. The goal must be to increase the service level and at the same time reduce the inventory investment.

  19. Denmark's National Inventory Report 2010

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Lyck, Erik; Mikkelsen, Mette Hjorth

    2010-01-01

    This report is Denmark's National Inventory Report 2010. The report contains information on Denmark's emission inventories for all years' from 1990 to 2008 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2.......This report is Denmark's National Inventory Report 2010. The report contains information on Denmark's emission inventories for all years' from 1990 to 2008 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2....

  20. Report: Fiscal Year 2015 Federal Information Security Modernization Act Report: Status of CSB’s Information Security Program

    Science.gov (United States)

    Report #16-P-0086, January 27, 2016. The effectiveness of the CSB’s information security program is challenged by its lack of personal identity verification cards for logical access, complete system inventory.

  1. Strategic information security: facing the cyber impact

    CSIR Research Space (South Africa)

    Grobler, M

    2010-10-01

    Full Text Available Strategic information security is becoming a more prominent aspect of modern day living. With the strong digital component that forms part of modern day business, the multiplicity of security risks and the emergence of increasingly complex threats...

  2. Inventory Control System by Using Vendor Managed Inventory (VMI)

    Science.gov (United States)

    Sabila, Alzena Dona; Mustafid; Suryono

    2018-02-01

    The inventory control system has a strategic role for the business in managing inventory operations. Management of conventional inventory creates problems in the stock of goods that often runs into vacancies and excess goods at the retail level. This study aims to build inventory control system that can maintain the stability of goods availability at the retail level. The implementation of Vendor Managed Inventory (VMI) method on inventory control system provides transparency of sales data and inventory of goods at retailer level to supplier. Inventory control is performed by calculating safety stock and reorder point of goods based on sales data received by the system. Rule-based reasoning is provided on the system to facilitate the monitoring of inventory status information, thereby helping the process of inventory updates appropriately. Utilization of SMS technology is also considered as a medium of collecting sales data in real-time due to the ease of use. The results of this study indicate that inventory control using VMI ensures the availability of goods ± 70% and can reduce the accumulation of goods ± 30% at the retail level.

  3. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  4. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  5. National Biological Monitoring Inventory

    International Nuclear Information System (INIS)

    Burgess, R.L.

    1979-01-01

    The National Biological Monitoring Inventory, initiated in 1975, currently consists of four computerized data bases and voluminous manual files. MAIN BIOMON contains detailed information on 1,021 projects, while MINI BIOMON provides skeletal data for over 3,000 projects in the 50 states, Puerto Rico, the Virgin Islands, plus a few in Canada and Mexico. BIBLIO BIOMON and DIRECTORY BIOMON complete the computerized data bases. The structure of the system provides for on-line search capabilities to generate details of agency sponsorship, indications of funding levels, taxonomic and geographic coverage, length of program life, managerial focus or emphasis, and condition of the data. Examples of each of these are discussed and illustrated, and potential use of the Inventory in a variety of situations is emphasized

  6. Life Cycle Inventory Analysis

    DEFF Research Database (Denmark)

    Bjørn, Anders; Moltesen, Andreas; Laurent, Alexis

    2017-01-01

    The inventory analysis is the third and often most time-consuming part of an LCA. The analysis is guided by the goal and scope definition, and its core activity is the collection and compilation of data on elementary flows from all processes in the studied product system(s) drawing on a combination...... of different sources. The output is a compiled inventory of elementary flows that is used as basis of the subsequent life cycle impact assessment phase. This chapter teaches how to carry out this task through six steps: (1) identifying processes for the LCI model of the product system; (2) planning...... and collecting data; (3) constructing and quality checking unit processes; (4) constructing LCI model and calculating LCI results; (5) preparing the basis for uncertainty management and sensitivity analysis; and (6) reporting....

  7. Y-12 Groundwater Protection Program Monitoring Optimization Plan for Groundwater Monitoring Wells at the U.S. Department of Energy Y-12 National Security Complex

    International Nuclear Information System (INIS)

    2006-01-01

    This document is the monitoring optimization plan for groundwater monitoring wells associated with the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee (Figure A.1). The plan describes the technical approach that will be implemented under the Y-12 Groundwater Protection Program (GWPP) to focus available resources on the monitoring wells at Y-12 that provide the most useful hydrologic and water-quality monitoring data. The technical approach is based on the GWPP status designation for each well (Section 2.0). Under this approach, wells granted ''active'' status are used by the GWPP for hydrologic monitoring and/or groundwater quality sampling (Section 3.0), whereas wells granted ''inactive'' status are not used for either purpose. The status designation also defines the frequency at which the GWPP will inspect applicable wells, the scope of these well inspections, and extent of any maintenance actions initiated by the GWPP (Section 3.0). Details regarding the ancillary activities associated with implementation of this plan (e.g., well inspection) are deferred to the referenced GWPP plans and procedures (Section 4.0). This plan applies to groundwater wells associated with Y-12 and related waste management areas and facilities located within three hydrogeologic regimes (Figure A.1): the Bear Creek Hydrogeologic Regime (Bear Creek Regime), the Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime), and the Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime). The Bear Creek Regime encompasses a section of Bear Creek Valley (BCV) immediately west of Y-12. The East Fork Regime encompasses most of the Y-12 process, operations, and support facilities in BCV and, for the purposes of this plan, includes a section of Union Valley east of the DOE Oak Ridge Reservation (ORR) boundary along Scarboro Road. The Chestnut Ridge Regime encompasses a section of Chestnut Ridge directly south of Y-12 that is bound on the

  8. Y-12 Groundwater Protection Program Monitoring Optimization Plan for Groundwater Monitoring Wells at the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2003-09-30

    This document is the monitoring optimization plan for groundwater monitoring wells associated with the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee (Figure 1). The plan describes the technical approach that will be implemented under the Y-12 Groundwater Protection Program (GWPP) to focus available resources on the monitoring wells at Y-12 which provide the most useful hydrologic and water-quality monitoring data. The technical approach is based on the GWPP status designation for each well (Section 2.0). Under this approach, wells granted ''active'' status are used by the GWPP for hydrologic monitoring and/or groundwater sampling (Section 3.0), whereas well granted ''inactive'' status are not used for either purpose. The status designation also determines the frequency at which the GWPP will inspect applicable wells, the scope of these well inspections, and extent of any maintenance actions initiated by the GWPP (Section 4.0). Details regarding the ancillary activities associated with implementation of this plan (e.g., well inspection) are deferred to the referenced GWPP plans and procedures (Section 5.0). This plan applies to groundwater monitoring wells associated with Y-12 and related waste management facilities located within three hydrogeologic regimes (Figure 1): the Bear Creek Hydrogeologic Regime (Bear Creek Regime), the Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime), and the Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime). The Bear Creek Regime encompasses a section of Bear Creek Valley (BCV) immediately west of Y-12. The East Fork Regime encompasses most of the Y-12 process, operations, and support facilities in BCV and, for the purposes of this plan, includes a section of Union Valley east of the DOE Oak Ridge Reservation (ORR) boundary along Scarboro Road. The Chestnut Ridge Regime is directly south of Y-12 and encompasses a section of Chestnut Ridge that is bound to the

  9. Resolving inventory differences

    International Nuclear Information System (INIS)

    Weber, J.H.; Clark, J.P.

    1991-01-01

    Determining the cause of an inventory difference (ID) that exceeds warning or alarm limits should not only involve investigation into measurement methods and reexamination of the model assumptions used in the calculation of the limits, but also result in corrective actions that improve the quality of the accountability measurements. An example illustrating methods used by Savannah River Site (SRS) personnel to resolve an ID is presented that may be useful to other facilities faced with a similar problem. After first determining that no theft or diversion of material occurred and correcting any accountability calculation errors, investigation into the IDs focused on volume and analytical measurements, limit of error of inventory difference (LEID) modeling assumptions, and changes in the measurement procedures and methods prior to the alarm. There had been a gradual gain trend in IDs prior to the alarm which was reversed by the alarm inventory. The majority of the NM in the facility was stored in four large tanks which helped identify causes for the alarm. The investigation, while indicating no diversion or theft, resulted in changes in the analytical method and in improvements in the measurement and accountability that produced a 67% improvement in the LEID

  10. Managing information technology security risk

    Science.gov (United States)

    Gilliam, David

    2003-01-01

    Information Technology (IT) Security Risk Management is a critical task for the organization to protect against the loss of confidentiality, integrity and availability of IT resources. As systems bgecome more complex and diverse and and attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security risk. This paper describes a two-pronged approach in addressing IT security risk and risk management in the organization: 1) an institutional enterprise appraoch, and 2) a project life cycle approach.

  11. Proactive approach to Corporate Security

    CSIR Research Space (South Africa)

    Grobler, MM

    2010-05-01

    Full Text Available Security Dr Marthie Grobler Council for Scientific and Industrial Research, Pretoria, South Africa © CSIR 2007 www.csir.co.zaSlide 2 Introduction "The success of the Internet has not only changed how the world does business... and safety © CSIR 2007 www.csir.co.zaSlide 6 What is Corporate Security? • Modern day businesses… • strong digital component • multiplicity of security risks • emergence of increasingly complex threats … necessitate an integrated...

  12. Secure computing, economy, and trust

    DEFF Research Database (Denmark)

    Bogetoft, Peter; Damgård, Ivan B.; Jakobsen, Thomas

    In this paper we consider the problem of constructing secure auctions based on techniques from modern cryptography. We combine knowledge from economics, cryptography and security engineering and develop and implement secure auctions for practical real-world problems. In essence this paper is an o......; a real world double auction tailored to the complexity and performance of the basic primitives + and ; and finally evidence that our approach is practically feasible based on experiments with prototypes....

  13. Social security for seafarers globally

    DEFF Research Database (Denmark)

    Jensen, Olaf; Canals, Luisa; Haarløv, Erik

    2013-01-01

    Social security for seafarers globally Background: Social security protection is one of the essential elements of decent work. The issue is complex and no previous epidemiological studies of the coverage among seafarers have yet been performed. Objectives: The aim was to overcome the gap...... of knowledge to promote the discussion and planning of the implementation of social security for all seafarers. Methods: The seafarers completed a short questionnaire concerning their knowledge about their social security status. Results: Significant disparities of coverage of social security were pointed out...... comes from poorer countries without substantial social security systems. The solutions suggested are to implement the minimum requirements as recommended by the ILO 2006 Convention, to survey the implementation and in the long term to struggle for global social equality. Key words: Social security...

  14. Procedure for taking physical inventories

    International Nuclear Information System (INIS)

    Boston, R.A.

    1984-01-01

    Physical inventories are taken periodically to meet Company, State and IAEA requirements. Those physical inventories may be verified by IAEA and/or State inspectors. This presentation describes in an introductory but detailed manner the approaches and procedures used in planning, preparing, conducting, reconciling and reporting physical inventories for the Model Plant. Physical inventories are taken for plant accounting purposes to provide an accurate basis for starting and closing the plant material balance. Physical inventories are also taken for safeguards purposes to provide positive assurance that the nuclear materials of concern are indeed present and accounted for

  15. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  16. Optimal Acquisition and Inventory Control for a Remanufacturing System

    Directory of Open Access Journals (Sweden)

    Zhigang Jiang

    2013-01-01

    Full Text Available Optimal acquisition and inventory control can often make the difference between successful and unsuccessful remanufacturing. However, there is a greater degree of uncertainty and complexity in a remanufacturing system, which leads to a critical need for planning and control models designed to deal with this added uncertainty and complexity. In this paper, a method for optimal acquisition and inventory control of a remanufacturing system is presented. The method considers three inventories, one for returned item and the other for serviceable and recoverable items. Taking the holding cost for returns, recoverable and remanufactured products, remanufacturing cost, disposal cost, and the loss caused by backlog into account, the optimal inventory control model is established to minimize the total costs. Finally, a numerical example is provided to illustrate the proposed methods.

  17. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  18. Secure Objectives for School Security

    Science.gov (United States)

    Dalton-Noblitt, April

    2012-01-01

    In a study conducted among more than 980 American four-year and two-year colleges and universities, including institutions such as the University of Michigan, MIT, UCLA and Columbia, security staff and other administrators identified the five leading goals for their security systems: (1) Preventing unauthorized people from entering their…

  19. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  20. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  1. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  2. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  3. Nuclear security officer training

    International Nuclear Information System (INIS)

    Harrington, W.F.

    1981-01-01

    Training has become complex and precise in today's world of critical review and responsibility. Entrusted to a security officer is the success or demise of large business. In more critical environments the security officer is entrusted with the monitoring and protection of life sensitive systems and devices. The awareness of this high visibility training requirement has been addressed by a limited few. Those involved in the nuclear power industry through dedication and commitment to the American public have without a doubt become leading pioneers in demanding training excellence

  4. Energy Education Materials Inventory

    Energy Technology Data Exchange (ETDEWEB)

    1979-08-01

    The two volumes of the Energy Education Materials Inventory (EEMI) comprise an annotated bibliography of widely available energy education materials and reference sources. This systematic listing is designed to provide a source book which will facilitate access to these educational resources and hasten the inclusion of energy-focused learning experiences in kindergarten through grade twelve. EEMI Volume II expands Volume I and contains items that have become available since its completion in May, 1976. The inventory consists of three major parts. A core section entitled Media contains titles and descriptive information on educational materials, categorized according to medium. The other two major sections - Grade Level and Subject - are cross indexes of the items for which citations appear in the Media Section. These contain titles categorized according to grade level and subject and show the page numbers of the full citations. The general subject area covered includes the following: alternative energy sources (wood, fuel from organic wastes, geothermal energy, nuclear power, solar energy, tidal power, wind energy); energy conservation, consumption, and utilization; energy policy and legislation, environmental/social aspects of energy technology; and fossil fuels (coal, natural gas, petroleum). (RWR)

  5. NRC inventory of dams

    International Nuclear Information System (INIS)

    Lear, G.E.; Thompson, O.O.

    1983-01-01

    The NRC Inventory of Dams has been prepared as required by the charter of the NRC Dam Safety Officer. The inventory lists 51 dams associated with nuclear power plant sites and 14 uranium mill tailings dams (licensed by NRC) in the US as of February 1, 1982. Of the 85 listed nuclear power plants (148 units), 26 plants obtain cooling water from impoundments formed by dams. The 51 dams associated with the plants are: located on a plant site (29 dams at 15 plant sites); located off site but provide plant cooling water (18 dams at 11 additional plant sites); and located upstream from a plant (4 dams) - they have been identified as dams whose failure, and ensuing plant flooding, could result in a radiological risk to the public health and safety. The dams that might be considered NRC's responsibility in terms of the federal dam safety program are identified. This group of dams (20 on nuclear power plant sites and 14 uranium mill tailings dams) was obtained by eliminating dams that do not pose a flooding hazard (e.g., submerged dams) and dams that are regulated by another federal agency. The report includes the principal design features of all dams and related useful information

  6. Strategic Inventories in Vertical Contracts

    OpenAIRE

    Krishnan Anand; Ravi Anupindi; Yehuda Bassok

    2008-01-01

    Classical reasons for carrying inventory include fixed (nonlinear) production or procurement costs, lead times, nonstationary or uncertain supply/demand, and capacity constraints. The last decade has seen active research in supply chain coordination focusing on the role of incentive contracts to achieve first-best levels of inventory. An extensive literature in industrial organization that studies incentives for vertical controls largely ignores the effect of inventories. Does the ability to ...

  7. INVENTORY CLASSIFICATION WITH ABC ANALYSIS

    OpenAIRE

    Kıyak, Erkan; Timuş, Oğuz Han; Karayel, Mehmet

    2015-01-01

    For a substantial organization, managing the expansive inventory is a serious problem. One of the methods to solve this problem used widely is classifying the inventory according to some criteria and managing inventory according to this classisifation. In this study, ABC classification methods are researched and Ng's model, which is one of the most widely used, selected for further investigation. An illustrative example is presented to show the usability of the Ng's method.

  8. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  9. Secure portal.

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing

  10. Security Studies

    OpenAIRE

    ,

    2005-01-01

    Security Studies has firmly established itself as a leading journal on international security issues. The journal publishes theoretical, historical and policy-oriented articles on the causes and consequences of war, and the sources and conditions of peace. The journal has published articles on balancing vs. bandwagoning, deterrence in enduring rivalries, the Domino theory, nuclear weapons proliferation, civil-military relations, political reforms in China, strategic culture in Asia and the P...

  11. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  12. Hanford inventory program user's manual

    International Nuclear Information System (INIS)

    Hinkelman, K.C.

    1994-01-01

    Provides users with instructions and information about accessing and operating the Hanford Inventory Program (HIP) system. The Hanford Inventory Program is an integrated control system that provides a single source for the management and control of equipment, parts, and material warehoused by Westinghouse Hanford Company in various site-wide locations. The inventory is comprised of spare parts and equipment, shop stock, special tools, essential materials, and convenience storage items. The HIP replaced the following systems; ACA, ASP, PICS, FSP, WSR, STP, and RBO. In addition, HIP manages the catalog maintenance function for the General Supplies inventory stocked in the 1164 building and managed by WIMS

  13. Six ways to reduce inventory.

    Science.gov (United States)

    Lunn, T

    1996-05-01

    The purpose of this presentation is to help you reduce the inventory in your operation. We will accomplish that task by discussing six specific methods that companies have used successfully to reduce their inventory. One common attribute of these successes is that they also build teamwork among the people. Every business operation today is concerned with methods to improve customer service. The real trick is to accomplish that task without increasing inventory. We are all concerned with improving our skills at keeping inventory low.

  14. Denmark's National Inventory Report 2013

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Plejdrup, Marlene Schmidt; Winther, Morten

    This report is Denmark’s National Inventory Report 2013. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2011 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2.......This report is Denmark’s National Inventory Report 2013. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2011 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2....

  15. Denmark's National Inventory Report 2014

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Plejdrup, Marlene Schmidt; Winther, Morten

    This report is Denmark’s National Inventory Report 2014. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2012 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2......This report is Denmark’s National Inventory Report 2014. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2012 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2...

  16. Denmark's National Inventory Report 2017

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Plejdrup, Marlene Schmidt; Winther, Morten

    This report is Denmark’s National Inventory Report 2017. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2015 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2......This report is Denmark’s National Inventory Report 2017. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2015 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2...

  17. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  18. How to secure a wireless sensor network

    NARCIS (Netherlands)

    Law, Y.W.; Havinga, Paul J.M.

    2005-01-01

    The security of wireless sensor networks (WSNs) is a complex issue. While security research of WSNs is progressing at a tremendous pace, and many security techniques have been proposed, no comprehensive framework has so far emerged that attempts to tie the bits and pieces together to ease the

  19. National security

    International Nuclear Information System (INIS)

    Anon.

    1975-01-01

    An x-ray-fluorescence analysis system is being developed for determining uranium and plutonium concentrations in the solution obtained when the fuel rods from light-water power reactors are dissolved in nitric acid. These concentrations are needed to inventory the uranium and plutonium handled in fuel reprocessing plants. This technique should make it possible to analyze dissolver solution with speed and a 0.5 percent accuracy

  20. Applying inventory classification to a large inventory management system

    Directory of Open Access Journals (Sweden)

    Benjamin Isaac May

    2017-06-01

    Full Text Available Inventory classification aims to ensure that business-driving inventory items are efficiently managed in spite of constrained resources. There are numerous single- and multiple-criteria approaches to it. Our objective is to improve resource allocation to focus on items that can lead to high equipment availability. This concern is typical of many service industries such as military logistics, airlines, amusement parks and public works. Our study tests several inventory prioritization techniques and finds that a modified multi-criterion weighted non-linear optimization (WNO technique is a powerful approach for classifying inventory, outperforming traditional techniques of inventory prioritization such as ABC analysis in a variety of performance objectives.

  1. Functional Security Model: Managers Engineers Working Together

    Science.gov (United States)

    Guillen, Edward Paul; Quintero, Rulfo

    2008-05-01

    Information security has a wide variety of solutions including security policies, network architectures and technological applications, they are usually designed and implemented by security architects, but in its own complexity this solutions are difficult to understand by company managers and they are who finally fund the security project. The main goal of the functional security model is to achieve a solid security platform reliable and understandable in the whole company without leaving of side the rigor of the recommendations and the laws compliance in a single frame. This paper shows a general scheme of the model with the use of important standards and tries to give an integrated solution.

  2. Controlling Inventory: Real-World Mathematical Modeling

    Science.gov (United States)

    Edwards, Thomas G.; Özgün-Koca, S. Asli; Chelst, Kenneth R.

    2013-01-01

    Amazon, Walmart, and other large-scale retailers owe their success partly to efficient inventory management. For such firms, holding too little inventory risks losing sales, whereas holding idle inventory wastes money. Therefore profits hinge on the inventory level chosen. In this activity, students investigate a simplified inventory-control…

  3. 21 CFR 1304.11 - Inventory requirements.

    Science.gov (United States)

    2010-04-01

    ... the inventory of the registered location to which they are subject to control or to which the person... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Inventory requirements. 1304.11 Section 1304.11... REGISTRANTS Inventory Requirements § 1304.11 Inventory requirements. (a) General requirements. Each inventory...

  4. Denmark's National Inventory Report 2009

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Lyck, Erik; Mikkelsen, Mette Hjorth

    This report is Denmark's National Inventory Report 2009. The report contains information on Denmark's emission inventories for all years' from 1990 to 2007 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2. The report documents the methodology as well as presents activity data and emissi...

  5. Automation of Space Inventory Management

    Science.gov (United States)

    Fink, Patrick W.; Ngo, Phong; Wagner, Raymond; Barton, Richard; Gifford, Kevin

    2009-01-01

    This viewgraph presentation describes the utilization of automated space-based inventory management through handheld RFID readers and BioNet Middleware. The contents include: 1) Space-Based INventory Management; 2) Real-Time RFID Location and Tracking; 3) Surface Acoustic Wave (SAW) RFID; and 4) BioNet Middleware.

  6. Michigan's Fourth Forest Inventory: Area.

    Science.gov (United States)

    John S. Jr. Spencer

    1983-01-01

    The fourth inventory of Michigan's forest resources found 17.5 million acres of commercial forest, down 7% from the 18.9 million found in 1966. This bulletin analyzes findings from the inventory and presents detailed tables of forest area.

  7. Denmark's national inventory report 2006

    DEFF Research Database (Denmark)

    Illerup, Jytte Boll; Lyck, Erik; Nielsen, Ole-Kenneth

    This report is Denmark's National Inventory Report reported to the Conference of the Parties under the United Nations Framework Convention on Climate Change (UNFCCC) due by April 2006. The report contains information on Denmark's inventories for all years' from 1990 to 2004 for CO....

  8. Student-Life Stress Inventory.

    Science.gov (United States)

    Gadzella, Bernadette M.; And Others

    The reliability of the Student-Life Stress Inventory of B. M. Gadzella (1991) was studied. The inventory consists of 51 items listed in 9 sections indicating different types of stressors (frustrations, conflicts, pressures, changes, and self-imposed stressors) and reactions to the stressors (physiological, emotional, behavioral, and cognitive) as…

  9. IPv6 Security

    Science.gov (United States)

    Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.; Wartel, R.

    2017-10-01

    IPv4 network addresses are running out and the deployment of IPv6 networking in many places is now well underway. Following the work of the HEPiX IPv6 Working Group, a growing number of sites in the Worldwide Large Hadron Collider Computing Grid (WLCG) are deploying dual-stack IPv6/IPv4 services. The aim of this is to support the use of IPv6-only clients, i.e. worker nodes, virtual machines or containers. The IPv6 networking protocols while they do contain features aimed at improving security also bring new challenges for operational IT security. The lack of maturity of IPv6 implementations together with the increased complexity of some of the protocol standards raise many new issues for operational security teams. The HEPiX IPv6 Working Group is producing guidance on best practices in this area. This paper considers some of the security concerns for WLCG in an IPv6 world and presents the HEPiX IPv6 working group guidance for the system administrators who manage IT services on the WLCG distributed infrastructure, for their related site security and networking teams and for developers and software engineers working on WLCG applications.

  10. Roadmap on optical security

    Science.gov (United States)

    Javidi, Bahram; Carnicer, Artur; Yamaguchi, Masahiro; Nomura, Takanori; Pérez-Cabré, Elisabet; Millán, María S.; Nishchal, Naveen K.; Torroba, Roberto; Fredy Barrera, John; He, Wenqi; Peng, Xiang; Stern, Adrian; Rivenson, Yair; Alfalou, A.; Brosseau, C.; Guo, Changliang; Sheridan, John T.; Situ, Guohai; Naruse, Makoto; Matsumoto, Tsutomu; Juvells, Ignasi; Tajahuerce, Enrique; Lancis, Jesús; Chen, Wen; Chen, Xudong; Pinkse, Pepijn W. H.; Mosk, Allard P.; Markman, Adam

    2016-08-01

    Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections

  11. ANALYSIS MODEL FOR INVENTORY MANAGEMENT

    Directory of Open Access Journals (Sweden)

    CAMELIA BURJA

    2010-01-01

    Full Text Available The inventory represents an essential component for the assets of the enterprise and the economic analysis gives them special importance because their accurate management determines the achievement of the activity object and the financial results. The efficient management of inventory requires ensuring an optimum level for them, which will guarantee the normal functioning of the activity with minimum inventory expenses and funds which are immobilised. The paper presents an analysis model for inventory management based on their rotation speed and the correlation with the sales volume illustrated in an adequate study. The highlighting of the influence factors on the efficient inventory management ensures the useful information needed to justify managerial decisions, which will lead to a balancedfinancial position and to increased company performance.

  12. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  13. Secure Middleware for Defence Applications

    Science.gov (United States)

    2006-12-01

    Therefore, requirements for such a large, complex distributed system are manifold, and include interoperability, flexibility, modularity, rapid...tackle complexity , the Achilles heel of system vulnerabilities. These demanding requirements, the need to cope with increased uncertainty and...currently consists of the CCM implementation Qedo (Quality of Service enabled distributed objects), MICO as the underlying ORB, with enhanced security

  14. COMPUTER SECURITY AND SECURITY TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    Lazar Stošić

    2013-01-01

    Full Text Available With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution. With the development of computer and communication technologies have developed numerous tools to protect files and other information. A set of tools, procedures, policies and solutions to defend against attacks are collectively referred to as computer network security. It is necessary above all to define and learn about the concepts of attack, risk, threat, vulnerability and asset value. During the design and implementation of information systems should primarily take into account a set of measures to increase security and maintenance at an acceptable level of risk. In any case, there is a need to know the risks in the information system. Sources of potential security problems are challenges and attacks, while the risk relates to the probable outcome and its associated costs due to occurrence of certain events. There are numerous techniques help protect your computer: cryptography, authentication, checked the software, licenses and certificates, valid authorization... This paper explains some of the procedures and potential threats to break into the network and computers as well as potential programs that are used. Guidance and explanation of these programs is not to cause a break-in at someone else's computer, but to highlight the vulnerability of the computer's capabilities.

  15. Arctic Security

    DEFF Research Database (Denmark)

    Wang, Nils

    2013-01-01

    of the general security situation and to identify both the explicit and the implicit agendas of the primary state actors. The region contains all the ingredients for confrontation and conflict but the economical potential for all the parties concerned creates a general interest in dialogue and cooperation...

  16. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  17. INEEL Liquid Effluent Inventory

    Energy Technology Data Exchange (ETDEWEB)

    Major, C.A.

    1997-06-01

    The INEEL contractors and their associated facilities are required to identify all liquid effluent discharges that may impact the environment at the INEEL. This liquid effluent information is then placed in the Liquid Effluent Inventory (LEI) database, which is maintained by the INEEL prime contractor. The purpose of the LEI is to identify and maintain a current listing of all liquid effluent discharge points and to identify which discharges are subject to federal, state, or local permitting or reporting requirements and DOE order requirements. Initial characterization, which represents most of the INEEL liquid effluents, has been performed, and additional characterization may be required in the future to meet regulations. LEI information is made available to persons responsible for or concerned with INEEL compliance with liquid effluent permitting or reporting requirements, such as the National Pollutant Discharge Elimination System, Wastewater Land Application, Storm Water Pollution Prevention, Spill Prevention Control and Countermeasures, and Industrial Wastewater Pretreatment. The State of Idaho Environmental Oversight and Monitoring Program also needs the information for tracking liquid effluent discharges at the INEEL. The information provides a baseline from which future liquid discharges can be identified, characterized, and regulated, if appropriate. The review covered new and removed buildings/structures, buildings/structures which most likely had new, relocated, or removed LEI discharge points, and at least 10% of the remaining discharge points.

  18. Inventory of miscellaneous streams

    International Nuclear Information System (INIS)

    Lueck, K.J.

    1995-09-01

    On December 23, 1991, the US Department of Energy, Richland Operations Office (RL) and the Washington State Department of Ecology (Ecology) agreed to adhere to the provisions of the Department of Ecology Consent Order. The Consent Order lists the regulatory milestones for liquid effluent streams at the Hanford Site to comply with the permitting requirements of Washington Administrative Code. The RL provided the US Congress a Plan and Schedule to discontinue disposal of contaminated liquid effluent into the soil column on the Hanford Site. The plan and schedule document contained a strategy for the implementation of alternative treatment and disposal systems. This strategy included prioritizing the streams into two phases. The Phase 1 streams were considered to be higher priority than the Phase 2 streams. The actions recommended for the Phase 1 and 2 streams in the two reports were incorporated in the Hanford Federal Facility Agreement and Consent Order. Miscellaneous Streams are those liquid effluents streams identified within the Consent Order that are discharged to the ground but are not categorized as Phase 1 or Phase 2 Streams. This document consists of an inventory of the liquid effluent streams being discharged into the Hanford soil column

  19. Recent evidence on the muted inventory cycle

    OpenAIRE

    Andrew J. Filardo

    1995-01-01

    Inventories play an important role in business cycles. Inventory build-ups add momentum to the economy during expansions, while inventory liquidations sap economic strength during recessions. In addition, because inventory fluctuations are notoriously difficult to predict, they present considerable uncertainty in assessing the economic outlook.> The role of inventories in shaping the current outlook for the U.S. economy is particularly uncertain. In the early 1990s, inventory swings appeared ...

  20. Determining an optimum inventory route for an areal object: the case of forest inventory in Finland

    Directory of Open Access Journals (Sweden)

    Henna Etula

    2014-03-01

    Full Text Available In recent decades, routing based on Geographic Information Systems (GIS has become a major branch of technology, which has been used especially in applications related to transport and logistics. However, in terms of the development of methods, routing in a cross-country environment is more difficult, and hence research into it has been relatively scarce. This is particularly true in the context of complex routing problems involving visits to several locations. A typical example of a problem of this kind is field inventory, which is a data collection procedure used in many application areas, particularly those related to environmental research and the management of natural resources. This study presents a problem in which an efficient inventory route is determined for an areal object, such that the area visible from the route meets a prescribed threshold, while maintaining the shortest possible route. Although this problem, referred to here as the Areal Inventory Problem (AIP, is closely related to a multitude of routing and location allocation methods known in the context of GIS, none of them is very well-suited for solving the AIP. This study describes a general solution procedure for the AIP, and introduces an implementation of a heuristic algorithm that can be used to solve a real-world AIP within a reasonable time frame. The proposed approach is demonstrated with actual data related to field inventory practices carried out by the Finnish Forest Centre.

  1. Effective Methodology for Security Risk Assessment of Computer Systems

    OpenAIRE

    Daniel F. García; Adrián Fernández

    2013-01-01

    Today, computer systems are more and more complex and support growing security risks. The security managers need to find effective security risk assessment methodologies that allow modeling well the increasing complexity of current computer systems but also maintaining low the complexity of the assessment procedure. This paper provides a brief analysis of common security risk assessment methodologies leading to the selection of a proper methodology to fulfill these requirements. Then, a detai...

  2. Case Study on Inventory Management Improvement

    Directory of Open Access Journals (Sweden)

    Plinere Darya

    2015-12-01

    Full Text Available Inventory management is a challenging problem area in supply chain management. Companies need to have inventories in warehouses in order to fulfil customer demand, meanwhile these inventories have holding costs and this is frozen fund that can be lost. Therefore, the task of inventory management is to find the quantity of inventories that will fulfil the demand, avoiding overstocks. This paper presents a case study for the assembling company on inventory management. It is proposed to use inventory management in order to decrease stock levels and to apply an agent system for automation of inventory management processes.

  3. Fusion program research materials inventory

    International Nuclear Information System (INIS)

    Roche, T.K.; Wiffen, F.W.; Davis, J.W.; Lechtenberg, T.A.

    1984-01-01

    Oak Ridge National Laboratory maintains a central inventory of research materials to provide a common supply of materials for the Fusion Reactor Materials Program. This will minimize unintended material variations and provide for economy in procurement and for centralized record keeping. Initially this inventory is to focus on materials related to first-wall and structural applications and related research, but various special purpose materials may be added in the future. The use of materials from this inventory for research that is coordinated with or otherwise related technically to the Fusion Reactor Materials Program of DOE is encouraged

  4. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  5. Cyber security of critical infrastructures

    Directory of Open Access Journals (Sweden)

    Leandros A. Maglaras

    2018-03-01

    Full Text Available Modern Supervisory Control and Data Acquisition (SCADA systems are essential for monitoring and managing electric power generation, transmission and distribution. In the age of the Internet of Things, SCADA has evolved into big, complex and distributed systems that are prone to be conventional in addition to new threats. Many security methods can be applied to such systems, having in mind that both high efficiency, real time intrusion identification and low overhead are required. Keywords: SCADA systems, Security

  6. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  7. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  8. Media rights and media security

    Science.gov (United States)

    Baugher, Mark

    2005-03-01

    Digital Rights Management (DRM) systems typically do not treat rights management as a security problem. DRM uses cryptographic techniques but not security relationships. Instead, DRM systems use "tamper-resistant mechanisms" to discourage unauthorized access to rights-managed content. Although proven ineffective in practice, tamper-resistant mechanisms penalize legitimate customers with added complexity and costs that arise from tamper-resisting data or program code. This paper explores how a security relationship between provider and consumer might be more effective for managing rights to content works on two-way networks.

  9. Clinical Decision Support (CDS) Inventory

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Clinical Decision Support (CDS) Inventory contains descriptions of past and present CDS projects across the Federal Government. It includes Federal projects,...

  10. Title V Permitting Statistics Inventory

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Title V Permitting Statistics Inventory contains measured and estimated nationwide statistical data, consisting of counts of permitted sources, types of permits...

  11. Travel reliability inventory for Chicago.

    Science.gov (United States)

    2013-04-01

    The overarching goal of this research project is to enable state DOTs to document and monitor the reliability performance : of their highway networks. To this end, a computer tool, TRIC, was developed to produce travel reliability inventories from : ...

  12. Severe Weather Data Inventory (SWDI)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Severe Weather Data Inventory (SWDI) is an integrated database of severe weather records for the United States. SWDI enables a user to search through a variety...

  13. Colorado statewide historic bridge inventory.

    Science.gov (United States)

    2011-05-01

    The purpose of the Colorado statewide historic bridge inventory was to document and evaluate the National : Register of Historic Places eligibility all on-system highway bridges and grade separation structures built in : Colorado between 1959 and 196...

  14. NPS national transit inventory, 2013

    Science.gov (United States)

    2014-07-31

    This document summarizes key highlights from the National Park Service (NPS) 2013 National Transit Inventory, and presents data for NPS transit systems system-wide. The document discusses statistics related to ridership, business models, fleet charac...

  15. Allegheny County Toxics Release Inventory

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — The Toxics Release Inventory (TRI) data provides information about toxic substances released into the environment or managed through recycling, energy recovery, and...

  16. FEMA Flood Insurance Studies Inventory

    Data.gov (United States)

    Kansas Data Access and Support Center — This digital data set provides an inventory of Federal Emergency Management Agency (FEMA) Flood Insurance Studies (FIS) that have been conducted for communities and...

  17. National Greenhouse Gas Emission Inventory

    Data.gov (United States)

    U.S. Environmental Protection Agency — The National Greenhouse Gas Emission Inventory contains information on direct emissions of greenhouse gases as well as indirect or potential emissions of greenhouse...

  18. Biogenic Emission Inventory System (BEIS)

    Science.gov (United States)

    Biogenic Emission Inventory System (BEIS) estimates volatile organic compound (VOC) emissions from vegetation and nitric oxide (NO) emission from soils. Recent BEIS development has been restricted to the SMOKE system

  19. Systems Intelligence Inventory

    Science.gov (United States)

    Törmänen, Juha; Hämäläinen, Raimo P.; Saarinen, Esa

    2016-01-01

    Purpose: Systems intelligence (SI) (Saarinen and Hämäläinen, 2004) is a construct defined as a person's ability to act intelligently within complex systems involving interaction and feedback. SI relates to our ability to act in systems and reason about systems to adaptively carry out productive actions within and with respect to systems such as…

  20. Secure DBMS.

    Science.gov (United States)

    1982-02-01

    F30602-80-C- 0235 9. PERFORMING ORGANIZATION NAME AND ADDRESS I0. PROGRAM ELEMENT. PROJECT. TASK HARRIS CORPORATION AREA & WORK UNIT NUMBERS Government...performed for the Rome Air Development Center under Contract F30602-80-C- 0235 . The study was performed by the staff of the Hprris Corporation...processors from making TM - HP 6-31 simultaneous incompatable changes to the data base. However, the simple security rule prohibits a lower level

  1. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  2. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  3. Security Engineering

    Science.gov (United States)

    2012-01-31

    Clarkson, Chong, and Myers, 2008; Fujioka and Okamoto, 1992] across a diverse set of redundant components. For example, an automobile brake control...e.g., a radio frequency spectrum analyzer embedded in a subsystem’s hardware chassis , and listening for a wireless triggering command at the time of...S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage, Experimental security analysis of a modern automobile , IEEE Symposium on

  4. The Finnish national forest inventory

    Science.gov (United States)

    Erkki Tomppo

    2009-01-01

    The National Forest Inventory (NFI) of Finland has produced large-area forest resource information since the beginning of 1920s (Ilvessalo 1927). When the 10th inventory (NFI10) started in 2004, the design was changed and the rotation shortened to 5 years. Measurements are done in the entire country each year through measuring one-fifth of the plots. About one-fifth of...

  5. Value-Based Inventory Management

    OpenAIRE

    Michalski, Grzegorz

    2008-01-01

    The basic financial purpose of a firm is to maximize its value. An inventory management system should also contribute to realization of this basic aim. Many current asset management models currently found in financial management literature were constructed with the assumption of book profit maximization as basic aim. However these models could lack what relates to another aim, i.e., maximization of enterprise value. This article presents a modified value-based inventory management model.

  6. Water Security and International Law

    Directory of Open Access Journals (Sweden)

    Tuomas Kuokkanen

    2017-01-01

    Full Text Available The article explores water security from an international law point of view. The article argues that in order to better understand water security it is important to focus on the function of international water law. Even though water security is a relatively recent concept it was latent in the process of the evolution of international water law. In addition, the article examines the relationship between man and water from the point of view of water security. The article seeks to answer the question: how does international water law deal with that relationship? Is water only an object to be utilized and protected or has the relationship become more complex and ambivalent through the occurrence of various extreme events. Furthermore, the article places the concept of water security into a historiographical and substantive context. It explores three broad approaches by international law to water issues: general international law, the regulatory approach and the management approach. The article argues that they are all relevant to water security. Finally, the article seeks to demonstrate that even though water security has emerged as a new notion, this does not mean that international law does not include rules and principles relevant for water security. Indeed, many general principles of international law are applicable in the context of water security. In addition, specific regulations dealing with water quantity and quality issues have been developed in international environmental law, although they are not necessarily labelled as water security rules. Moreover, various risk management methods have been elaborated to deal with water-related disasters and crises. Reciprocally, water security arguments are not necessarily new notions but rather reflect already existing concepts and principles.

  7. Optimal Inventory Control with Advance Supply Information

    Directory of Open Access Journals (Sweden)

    Marko Jaksic

    2016-09-01

    Full Text Available It has been shown in numerous situations that sharing information between the companies leads to improved performance of the supply chain. We study a positive lead time periodic-review inventory system of a retailer facing stochastic demand from his customer and stochastic limited supply capacity of the manufacturer supplying the products to him. The consequence of stochastic supply capacity is that the orders might not be delivered in full, and the exact size of the replenishment might not be known to the retailer. The manufacturer is willing to share the so-called advance supply information (ASI about the actual replenishment of the retailer's pipeline order with the retailer. ASI is provided at a certain time after the orders have been placed and the retailer can now use this information to decrease the uncertainty of the supply, and thus improve its inventory policy. For this model, we develop a dynamic programming formulation, and characterize the optimal ordering policy as a state-dependent base-stock policy. In addition, we show some properties of the base-stock level. While the optimal policy is highly complex, we obtain some additional insights by comparing it to the state-dependent myopic inventory policy. We conduct the numerical analysis to estimate the in uence of the system parameters on the value of ASI. While we show that the interaction between the parameters is relatively complex, the general insight is that due to increasing marginal returns, the majority of the benets are gained only in the case of full, or close to full, ASI visibility.

  8. Nevada Photo-Based Inventory Pilot (NPIP) resource estimates (2004-2005)

    Science.gov (United States)

    Tracey S. Frescino; Gretchen G. Moisen; Paul L. Patterson; Elizabeth A. Freeman; James Menlove

    2016-01-01

    The complex nature of broad-scale, strategic-level inventories, such as the Forest Inventory and Analysis program (FIA) of the USDA Forest Service, demands constant evolution and evaluation of methods to get the best information possible while continuously increasing efficiency. The State of Nevada is predominantly comprised of nonforested Federal lands with a small...

  9. Combining inventories of land cover and forest resources with prediction models and remotely sensed data

    Science.gov (United States)

    Raymond L. Czaplewski

    1989-01-01

    It is difficult to design systems for national and global resource inventory and analysis that efficiently satisfy changing, and increasingly complex objectives. It is proposed that individual inventory, monitoring, modeling, and remote sensing systems be specialized to achieve portions of the objectives. These separate systems can be statistically linked to accomplish...

  10. Measurement of Cruelty in Children: The Cruelty to Animals Inventory

    Science.gov (United States)

    Dadds, Mark R.; Whiting, Clare; Bunn, Paul; Fraser, Jennifer A.; Charlson, Juliana H.; Pirola-Merlo, Andrew

    2004-01-01

    Cruelty to animals may be a particularly pernicious aspect of problematic child development. Progress in understanding the development of the problem is limited due to the complex nature of cruelty as a construct, and limitations with current assessment measures. The Children and Animals Inventory (CAI) was developed as a brief self- and…

  11. Automated Inventory Control System for Nigeria Power Holding ...

    African Journals Online (AJOL)

    The problem of increasing criticalities and complexities of spare parts in service companies, maintenance industries as well as power generation companies motivated this research for solution. The causes of the ... Key Words: Inventory Management,Stochastic demands, shorter lead times, spare parts requirements ...

  12. Model Development for Auto Spare Parts Inventory Control and ...

    African Journals Online (AJOL)

    The immense dynamics and criticality of spare parts and the large revenues accrued, as essential motivating factors for providing control in manufacturing companies has never showed any sign of decrease. In fact, in the vast technological environment of today the complexities of Spare Parts Inventory Control enjoys more ...

  13. Peru Mercury Inventory 2006

    Science.gov (United States)

    Brooks, William E.; Sandoval, Esteban; Yepez, Miguel A.; Howard, Howell

    2007-01-01

    In 2004, a specific need for data on mercury use in South America was indicated by the United Nations Environmental Programme-Chemicals (UNEP-Chemicals) at a workshop on regional mercury pollution that took place in Buenos Aires, Argentina. Mercury has long been mined and used in South America for artisanal gold mining and imported for chlor-alkali production, dental amalgam, and other uses. The U.S. Geological Survey (USGS) provides information on domestic and international mercury production, trade, prices, sources, and recycling in its annual Minerals Yearbook mercury chapter. Therefore, in response to UNEP-Chemicals, the USGS, in collaboration with the Economic Section of the U.S. Embassy, Lima, has herein compiled data on Peru's exports, imports, and byproduct production of mercury. Peru was selected for this inventory because it has a 2000-year history of mercury production and use, and continues today as an important source of mercury for the global market, as a byproduct from its gold mines. Peru is a regional distributor of imported mercury and user of mercury for artisanal gold mining and chlor-alkali production. Peruvian customs data showed that 22 metric tons (t) of byproduct mercury was exported to the United States in 2006. Transshipped mercury was exported to Brazil (1 t), Colombia (1 t), and Guyana (1 t). Mercury was imported from the United States (54 t), Spain (19 t), and Kyrgyzstan (8 t) in 2006 and was used for artisanal gold mining, chlor-alkali production, dental amalgam, or transshipment to other countries in the region. Site visits and interviews provided information on the use and disposition of mercury for artisanal gold mining and other uses. Peru also imports mercury-containing batteries, electronics and computers, fluorescent lamps, and thermometers. In 2006, Peru imported approximately 1,900 t of a wide variety of fluorescent lamps; however, the mercury contained in these lamps, a minimum of approximately 76 kilograms (kg), and in

  14. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  15. Comparing Security Notions of Secret Sharing Schemes

    Directory of Open Access Journals (Sweden)

    Songsong Dai

    2015-03-01

    Full Text Available Different security notions of secret sharing schemes have been proposed by different information measures. Entropies, such as Shannon entropy and min entropy, are frequently used in the setting security notions for secret sharing schemes. Different to the entropies, Kolmogorov complexity was also defined and used in study the security of individual instances for secret sharing schemes. This paper is concerned with these security notions for secret sharing schemes defined by the variational measures, including Shannon entropy, guessing probability, min entropy and Kolmogorov complexity.

  16. Projecting Timber Inventory at the Product Level

    Science.gov (United States)

    Lawrence Teeter; Xiaoping Zhou

    1999-01-01

    Current timber inventory projections generally lack information on inventory by product classes. Most models available for inventory projection and linked to supply analyses are limited to projecting aggregate softwood and hardwood. The research presented describes a methodology for distributing the volume on each FIA (USDA Forest Service Forest Inventory and Analysis...

  17. 76 FR 62327 - Retail Inventory Method

    Science.gov (United States)

    2011-10-07

    ... Internal Revenue Service 26 CFR Part 1 RIN 1545-BJ64 Retail Inventory Method AGENCY: Internal Revenue... regulations relating to the retail inventory method of accounting. The regulations restate and clarify the computation of ending inventory values under the retail inventory method and provide a special rule for...

  18. 10 CFR 39.37 - Physical inventory.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Physical inventory. 39.37 Section 39.37 Energy NUCLEAR... inventory. Each licensee shall conduct a semi-annual physical inventory to account for all licensed material received and possessed under the license. The licensee shall retain records of the inventory for 3 years...

  19. 27 CFR 20.170 - Physical inventory.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Physical inventory. 20.170... Users of Specially Denatured Spirits Inventory and Records § 20.170 Physical inventory. Once in each... physical inventory of each formula of new and recovered specially denatured spirits. (Approved by the...

  20. Base-age invariance and inventory projections

    Science.gov (United States)

    C. J. Cieszewski; R. L. Bailey; B. E. Borders; G. H. Brister; B. D. Shiver

    2000-01-01

    One of the most important functions of forest inventory is to facilitate management decisions towards forest sustainability based on inventory projections into the future. Therefore, most forest inventories are used for predicting future states of the forests, in modern forestry the most common methods used in inventory projections are based on implicit functions...

  1. Resizing the Euro-Mediterranean Dialogue in the Area of Security: The Challenge of Human Security

    Directory of Open Access Journals (Sweden)

    Eduard Soler i Lecha

    2007-02-01

    Full Text Available Although in the countries of the south the concept of human security is not very well-rooted and the security of states or regimes continues to take precedence, this article analyses the extent to which regional co-operation strategies, especially the BarcelonaProcess, have directly or indirectly promoted a new conception of security based on the protection of the citizen. For this, it analyses what had been done in the framework of the political and security basket of the Euro-Mediterranean Partnership up until the Euro-Mediterranean Summit in Barcelona, but it also emphasises some of the important deficiencies, such as inaction in the field of reformation of the security sector. This analysis is framed within a broader discussion about whether or not the Mediterranean is a security complex and whether or not it can become a security community that would make human security one of the foundations of a culture of shared security.

  2. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  3. Arctic Security

    DEFF Research Database (Denmark)

    Wang, Nils

    2013-01-01

    The inclusion of China, India, Japan, Singapore and Italy as permanent observers in the Arctic Council has increased the international status of this forum significantly. This chapter aims to explain the background for the increased international interest in the Arctic region through an analysis...... of the general security situation and to identify both the explicit and the implicit agendas of the primary state actors. The region contains all the ingredients for confrontation and conflict but the economical potential for all the parties concerned creates a general interest in dialogue and cooperation...

  4. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  5. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    and real defence of the country’s neutrality let alone a capability to support possible League of Nations action, should such need arise. The anti-militarist ideology of one party, led to regarding the armed services as harmful to designs for developing civic society and a waste of resources generally...... disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible and real defence of the country’s neutrality let alone a capability to support possible League of Nations action, should such need arise. The anti-militarist ideology...

  6. Annual Danish emissions inventory report to UNECE. Inventory 1990 - 2002

    Energy Technology Data Exchange (ETDEWEB)

    Illerup, J.B.; Nielsen, M.; Winther, M.; Hjort Mikkelsen, M.; Lyck, E.; Hoffmann, L.; Fauser, P.

    2004-05-01

    This report is a documentation report on the emission inventories for Denmark as reported to the UNECE Secretariat under the Convention on Long Range Transboundary Air Pollution due by 15 February 2004. The report contains information on Denmark's emission inventories regarding emissions of (1) SOx for the years 1980-2002, (2) NOx, CO, NMVOC and NH{sub 3} for the years 1985-2002; (3) Particulate matter: TSP, PM10, PM2.5 for the years 2000-2002, (4) Heavy Metals: Pb, Cd, Hg, As, Cr, Cu, Ni, Se and Zn for the years 1990-2002, and (5) Polyaromatic hydrocarbons (PAH): Benzo(a)pyrene, benzo(b)fluoranthene, benzo(k)fluoranthene and indeno(1,2,3-cd)pyrene for the years 1990-2002. Furthermore, the report contains information on background data for emissions inventory. (au)

  7. Data Exchange Inventory System (DEXI)

    Data.gov (United States)

    Social Security Administration — Enterprise tool used to identify data exchanges occurring between SSA and our trading partners. DEXI contains information on both incoming and outgoing exchanges and...

  8. Reconciling food security and bioenergy : Priorities for action

    NARCIS (Netherlands)

    Kline, Keith L.; Msangi, Siwa; Dale, Virginia H.; Woods, Jeremy; Souza, Glaucia m.; Osseweijer, P.; Clancy, Joy S.; Hilbert, Jorge A.; Johnson, Francis X.; Mcdonnell, Patrick C.; Mugera, Harriet K.

    Understanding the complex interactions among food security, bioenergy sustainability, and resource management requires a focus on specific contextual problems and opportunities. The United Nations' 2030 Sustainable Development Goals place a high priority on food and energy security; bioenergy

  9. Computer Security: professionalism in security, too

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    At CERN, we apply a great deal of dedication and professionalism to all the work we do. This is necessary because of the complexity and sophistication of the devices we deal with. However, when it comes to computer security, we can all agree that there is room for improvement.   In some cases, we’ve observed devices that are connected to our Intranet networks without the adequate level of protection. Also, in order to allow it to be disseminated easily with peers, information is often disclosed on public webpages, sometimes without appropriate consideration of important security-related aspects. Program code is lost due to a lack of proper version control or the use of central storage systems. Systems are brought down by “finger trouble”, confusing the right and wrong IP addresses. Software or system development is done directly on production devices, impinging on their proper operation up to the point where the system grinds to a halt. Applications full of useful fe...

  10. Security Assistance: Taxpayer Funds Spent on Equipment That Was Never Shipped to Yemen

    Science.gov (United States)

    2015-07-15

    Military Cooperation ( OMC ) presented their compiled findings from the inventory to the Defense Security Cooperation Agency. Page 21 DOD Actions...Disposition • After completing the February 2015 inventory, OMC worked with DGF and Yemen; DGF agreed to release the equipment if Yemen paid $8,000 by

  11. Falling fuel inventory levels represent growing operational risk

    Energy Technology Data Exchange (ETDEWEB)

    Kaplan, S. [PA Consulting Group, Washington, DC (United States)

    2002-04-01

    Many asset owners have stripped the inventory cupboard bare, exposing themselves and the public, to significant cost and operating risks. The miscalculation is due to a combination of ill-considered cost cutting efforts and a reliance on historical supply patterns that may have little relevance to the future. Generators maintain fuel stockpiles to buffer routine surges and shortfalls in fuel deliveries, and to provide for emergency fuel if normal supplies are interrupted. Coal and some oil-fired plants maintain fuel reserves for both reasons. Gas-fired plants keep oil on-hand for emergencies. The philosophy that smaller is better for fuel inventories needs to be reconsidered. On a common-sense basis, the radical cutback - or in the case of gas, actual elimination - of fuel inventories seems difficult to justify. For 15 years the generation business has been skipping on the security of adequate fuel inventories. At gas-fired stations with no backup fuel, it is as though there is no guard at the gate. The industry needs to re-evaluate its fuel planning before its leaders end up as star attractions at congressional hearings about why the lights went out. 1 ref., 2 figs., 1 tab.

  12. Evaluation Report on The Department's Unclassified Cyber Security Program - 2009

    International Nuclear Information System (INIS)

    Anon

    2009-01-01

    defenses against malicious intruders and other externals threats. These are positive accomplishments. However, in our judgment, additional action is required to further enhance the Department's unclassified cyber security program and help reduce risks to its systems and data. For example, our current review identified opportunities for improvements in areas such as security planning and testing, systems inventory, access controls, and configuration management. In particular, we issued a number of findings at sites managed by the National Nuclear Security Administration (NNSA). We also identified weaknesses across various Department program elements. Issues that warrant further attention include: (1) Weaknesses such as outdated security plans and not completing annual security control self-assessments were identified at several sites; (2) The Department had not yet resolved systems inventory issues and had yet to deploy a complex-wide automated asset management tool to help track information technology resources and identify interfaces between systems or networks; (3) Although certain improvements had been made to enhance access controls, we noted deficiencies such as a lack of periodic account reviews and inadequate password management at a number of sites; and (4) Previously identified weaknesses in configuration management had been corrected, however, we found problems related to weak administrator account settings and failure to install software patches, as well as incomplete implementation of the Federal Desktop Core Configuration. These internal control weaknesses existed, at least in part, because certain cyber security roles and responsibilities were not clearly delineated. Program officials also had not effectively performed monitoring and review activities essential for evaluating the adequacy of cyber security performance. In some cases, officials had not ensured that weaknesses discovered during audits and other evaluations were recorded and tracked to

  13. Metric-Aware Secure Service Orchestration

    Directory of Open Access Journals (Sweden)

    Gabriele Costa

    2012-12-01

    Full Text Available Secure orchestration is an important concern in the internet of service. Next to providing the required functionality the composite services must also provide a reasonable level of security in order to protect sensitive data. Thus, the orchestrator has a need to check whether the complex service is able to satisfy certain properties. Some properties are expressed with metrics for precise definition of requirements. Thus, the problem is to analyse the values of metrics for a complex business process. In this paper we extend our previous work on analysis of secure orchestration with quantifiable properties. We show how to define, verify and enforce quantitative security requirements in one framework with other security properties. The proposed approach should help to select the most suitable service architecture and guarantee fulfilment of the declared security requirements.

  14. Enhancing the Security of Protocols against Actor Key Compromise Problems

    OpenAIRE

    Ma, Jing; Zhang, Wenhui

    2015-01-01

    Security of complex systems is an important issue in software engineering. For complex computer systems involving many actors, security protocols are often used for the communication of sensitive data. Actor key compromise (AKC) denotes a situation where the long-term secret key of an actor may be known to an adversary for some reasons. Many protocols are not secure enough for ensuring security in such a situation. In this paper, we further study this problem by looking at potential types of ...

  15. 77 FR 35883 - Defense Federal Acquisition Regulation Supplement; Contractors Performing Private Security...

    Science.gov (United States)

    2012-06-15

    ... 0750-AH28 Defense Federal Acquisition Regulation Supplement; Contractors Performing Private Security..., training, equipping, and conduct of personnel performing private security functions under DoD contracts... personnel performing private security functions in areas of contingency operations, complex contingency...

  16. Nuclear Materials Management U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO)

    International Nuclear Information System (INIS)

    Jesse Schreiber

    2008-01-01

    In light of the changing Defense Complex mission, the high cost to storing and protecting nuclear materials, and in consideration of scarcity of resources, it is imperative that the U.S. Department of Energy (DOE) owned nuclear materials are managed effectively. The U.S. Department of Energy, National Nuclear Security Administration (NNSA) Strategic Action Plan outlines the strategy for continuing to meet America's nuclear security goals, meeting the overall mission challenges of DOE and NNSA as well as giving focus to local missions. The mission of the NNSA/NSO Nuclear Materials Management (NMM) Program is to ensure that nuclear material inventories are accurately assessed and reported, future material needs are adequately planned, and that existing Nevada Test Site (NTS) inventories are efficiently utilized, staged, or dispositioned. The NNSA/NSO understands that the NTS has unique characteristics to serve and benefit the nation with innovative solutions to the complex problems involving Special Nuclear Materials, hazardous materials, and multi-agency, integrated operations. The NNSA/NSO is defining infrastructure requirements for known future missions, developing footprint consolidation strategic action plans, and continuing in the path of facility modernization and improvements. The NNSA/NSO is striving for the NTS to be acknowledged as an ideal location towards mission expansion and growth. The NTS has the capability of providing isolated, large scale construction and development locations for nuclear power or alternate energy source facilities, expanded nuclear material storage sites, and for new development in 'green' technology

  17. TMI-2 isotopic inventory calculations

    Energy Technology Data Exchange (ETDEWEB)

    Schnitzler, B G; Briggs, J B

    1985-08-01

    Point isotopic depletion methods are used to develop spatially dependent fission product and heavy metal inventories for the TMI-2 core. Burnup data from 1239 fuel nodes (177 elements, 7 axial nodes per element) are utilized to preserve the core axial and radial power distributions. A full-core inventory is calculated utilizing 12 fuel groups (four burnup ranges for each of three initial enrichments). Calculated isotopic ratios are also presented as a function of burnup for selected nuclides. Specific applications of the isotopic ratio data include correlation of fuel debris samples with core location and estimates of fission product release fractions. 24 figs., 25 tabs.

  18. National Inventory Report 2006 - Norway

    Energy Technology Data Exchange (ETDEWEB)

    2006-07-01

    The report presents an inventory of greenhouse gas emissions and sinks in Norway from 1990 to 2004. Trends in total greenhouse gas emissions by UNFCCC's sources and gases are described for carbon dioxide (CO{sub 2}), methane (CH{sub 4}), nitrous oxide (N{sub 2}O), tetrafluoromethane (CF{sub 4}), hexafluoroethane (C{sub 2}F{sub 6}), sulphur hexafluoride (SF{sub 6}) and HFCs. Methodology used in the calculation of emissions from key sources in the Norwegian Emission Inventory are presented. Emissions are reported according to UNFCCC/IPCC common reporting format (CRF)

  19. National Inventory Report 2006 - Norway

    International Nuclear Information System (INIS)

    2006-01-01

    The report presents an inventory of greenhouse gas emissions and sinks in Norway from 1990 to 2004. Trends in total greenhouse gas emissions by UNFCCC's sources and gases are described for carbon dioxide (CO 2 ), methane (CH 4 ), nitrous oxide (N 2 O), tetrafluoromethane (CF 4 ), hexafluoroethane (C 2 F 6 ), sulphur hexafluoride (SF 6 ) and HFCs. Methodology used in the calculation of emissions from key sources in the Norwegian Emission Inventory are presented. Emissions are reported according to UNFCCC/IPCC common reporting format (CRF)

  20. National Inventory Report 2005 Norway

    Energy Technology Data Exchange (ETDEWEB)

    2005-07-01

    The report presents an inventory of greenhouse gas emissions and sinks in Norway from 1990 to 2003. Trends in total greenhouse gas emissions by UNFCCC's sources and gases are described for carbon dioxide (CO{sub 2}), methane (CH{sub 4}), nitrous oxide (N{sub 2}O), tetrafluoromethane (CF{sub 4}), hexafluoroethane (C{sub 2}F{sub 6}), sulphur hexafluoride (SF{sub 6}) and HFCs. Methodology used in the calculation of emissions from key sources in the Norwegian Emission Inventory are presented. Emissions are reported according to UNFCCC/IPCC common reporting format (CRF)

  1. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    of Europe, in the early 1920s the prospects for peace looked promising. Under these circumstances, buttressed by pacifism as the logical reaction to the carnage of the Great War, many a Danish politician on the Left believed that the provisions of the Covenant calling for nations to disarm should...... of the Great War, many a Danish politician on the Left believed that the provisions of the Covenant calling for nations to disarm should be implemented, the sooner the better. In order to accelerate peaceful development, and because their armed forces were seen rather as harmful than conducive to security...... to the international milieu and to the European trend towards reconciliation. New issues assumed prominence as a consequence of the post-war quest for peace and prosperity. Reconstruction of society and increased emphasis on welfare measures brought economy into focus of political canvassing. The League of Nations...

  2. Legal issues in clouds: towards a risk inventory.

    Science.gov (United States)

    Djemame, Karim; Barnitzke, Benno; Corrales, Marcelo; Kiran, Mariam; Jiang, Ming; Armstrong, Django; Forgó, Nikolaus; Nwankwo, Iheanyi

    2013-01-28

    Cloud computing technologies have reached a high level of development, yet a number of obstacles still exist that must be overcome before widespread commercial adoption can become a reality. In a cloud environment, end users requesting services and cloud providers negotiate service-level agreements (SLAs) that provide explicit statements of all expectations and obligations of the participants. If cloud computing is to experience widespread commercial adoption, then incorporating risk assessment techniques is essential during SLA negotiation and service operation. This article focuses on the legal issues surrounding risk assessment in cloud computing. Specifically, it analyses risk regarding data protection and security, and presents the requirements of an inherent risk inventory. The usefulness of such a risk inventory is described in the context of the OPTIMIS project.

  3. The West Haven-Yale Multidimensional Pain Inventory (WHYMPI).

    Science.gov (United States)

    Kerns, R D; Turk, D C; Rudy, T E

    1985-12-01

    The complexity of chronic pain has represented a major dilemma for clinical researchers interested in the reliable and valid assessment of the problem and the evaluation of treatment approaches. The West Haven-Yale Multidimensional Pain Inventory (WHYMPI) was developed in order to fill a widely recognized void in the assessment of clinical pain. Assets of the inventory are its brevity and clarity, its foundation in contemporary psychological theory, its multidimensional focus, and its strong psychometric properties. Three parts of the inventory, comprised of 12 scales, examine the impact of pain on the patients' lives, the responses of others to the patients' communications of pain, and the extent to which patients participate in common daily activities. The instrument is recommended for use in conjunction with behavioral and psychophysiological assessment strategies in the evaluation of chronic pain patients in clinical settings. The utility of the WHYMPI in empirical investigations of chronic pain is also discussed.

  4. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  5. Knowledge-based computer security advisor

    International Nuclear Information System (INIS)

    Hunteman, W.J.; Squire, M.B.

    1991-01-01

    The rapid expansion of computer security information and technology has included little support to help the security officer identify the safeguards needed to comply with a policy and to secure a computing system. This paper reports that Los Alamos is developing a knowledge-based computer security system to provide expert knowledge to the security officer. This system includes a model for expressing the complex requirements in computer security policy statements. The model is part of an expert system that allows a security officer to describe a computer system and then determine compliance with the policy. The model contains a generic representation that contains network relationships among the policy concepts to support inferencing based on information represented in the generic policy description

  6. Language, Semantics, and Methods for Security Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico

    Security protocols help in establishing secure channels between communicating systems. Great care needs therefore to be taken in developing and implementing robust protocols. The complexity of security-protocol interactions can hide, however, security weaknesses that only a formal analysis can...... to a transition semantics which can easily be implemented. (An existing SPL implementation bridges the gap that often exists between abstract protocol models on which verification of security properties is carried out and the implemented protocol.) SPL-nets are a particular kind of contextual Petri...... reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events that a security protocol can perform, and make use of a causal dependency that exists between...

  7. Secure Web Developers Needed!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    You’re about to launch a new website? Cool!! With today’s web programming languages like PHP, Java, Python or Perl, complex websites can be created, easily fulfilling all your use cases. But hold on. Did you ever think about how easily this can be abused? Attackers today are already using automatic tools which can quickly and easily find and exploit vulnerable web applications.   Web applications often suffer from security vulnerabilities, i.e. design flaws or programming bugs that remained undetected during the whole software development cycle. In production these vulnerabilities become security holes, providing an opportunity for exploitation, and can pose immense security risks (and there is no reason to believe that CERN is immune to this). The costs associated with eliminating these bugs could be loosely described by the "1:10:100 rule", i.e. the relative costs for fixing are 1:10:100 for fixing them in the programming:testing:production phases. Thus, the...

  8. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  9. Life-Cycle Inventory Analysis of Bioproducts from a Modular Advanced Biomass Pyrolysis System

    Science.gov (United States)

    Richard Bergman; Hongmei Gu

    2014-01-01

    Expanding bioenergy production has the potential to reduce net greenhouse gas (GHG) emissions and improve energy security. Science-based assessments of new bioenergy technologies are essential tools for policy makers dealing with expanding renewable energy production. Using life cycle inventory (LCI) analysis, this study evaluated a 200-kWe...

  10. De-Inventory Plan for Transuranic Waste Stored at Area G

    Energy Technology Data Exchange (ETDEWEB)

    Hargis, Kenneth Marshall [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Christensen, Davis V. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Shepard, Mark D. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-06-21

    This report describes the strategy and detailed work plan developed by Los Alamos National Laboratory (LANL) to disposition transuranic (TRU) waste stored at its Area G radioactive waste storage site. The focus at this time is on disposition of 3,706 m3 of TRU waste stored above grade by June 30, 2014, which is one of the commitments within the Framework Agreement: Realignment of Environmental Priorities between the Department of Energy (DOE) National Nuclear Security Administration (NNSA) and the State of New Mexico Environment Department (NMED), Reference 1. A detailed project management schedule has been developed to manage this work and better ensure that all required activities are aligned and integrated. The schedule was developed in conjunction with personnel from the NNSA Los Alamos Site Office (LASO), the DOE Carlsbad Field Office (CBFO), the Central Characterization Project (CCP), and Los Alamos National Security, LLC (LANS). A detailed project management schedule for the remainder of the above grade inventory and the below grade inventory will be developed and incorporated into the De-Inventory Plan by December 31, 2012. This schedule will also include all newly-generated TRU waste received at Area G in FYs 2012 and 2013, which must be removed by no later than December 31, 2014, under the Framework Agreement. The TRU waste stored above grade at Area G is considered to be one of the highest nuclear safety risks at LANL, and the Defense Nuclear Facility Safety Board has expressed concern for the radioactive material at risk (MAR) contained within the above grade TRU waste inventory and has formally requested that DOE reduce the MAR. A large wildfire called the Las Conchas Fire burned extensive areas west of LANL in late June and July 2011. Although there was minimal to no impact by the fire to LANL, the fire heightened public concern and news media attention on TRU waste storage at Area G. After the fire, New Mexico Governor Susana Martinez also

  11. FOOD SECURITY AND UNIVERSITY AGRICULTURAL STUDENTS ...

    African Journals Online (AJOL)

    OGA AMOLEGBE

    Food security and its relationship to sustainable agricultural and rural development have increasingly become matters of concern for developing countries and for the international community. While there are many complex factors that influence sustainable development and food security, it is clear that education in ...

  12. Developing an Action Concept Inventory

    Science.gov (United States)

    McGinness, Lachlan P.; Savage, C. M.

    2016-01-01

    We report on progress towards the development of an Action Concept Inventory (ACI), a test that measures student understanding of action principles in introductory mechanics and optics. The ACI also covers key concepts of many-paths quantum mechanics, from which classical action physics arises. We used a multistage iterative development cycle for…

  13. Wisconsin's fourth forest inventory, 1983.

    Science.gov (United States)

    John S. Jr. Spencer; W. Brad Smith; Jerold T. Hahn; Gerhard K. Raile

    1988-01-01

    The fourth inventory of the timber resource of Wisconsin shows that growing-stock volume increased from 11.2 to 15.5 billion cubic feet between 1968 and 1983, and area of timberland increased from 14.5 to 14.8 million acres. Presented are analysis and statistics on forest area and timber volume, growth, mortality, removals, and projections.

  14. COMPUTER ASSISTED INVENTORY CONTROL SYSTEM ...

    African Journals Online (AJOL)

    supply chain actions. This includes integration of information coming from vendors. manufacturers and distributors, so as to smooth up the flow of materials in, through and out of a manufacturing firm. in a more responsive way to customer's demand. The main drawback for effective inventory management is the lack.

  15. Sourcing Life Cycle Inventory Data

    Science.gov (United States)

    The collection and validation of quality lifecycle inventory (LCI) data can be the most difficult and time-consuming aspect of developing a life cycle assessment (LCA). Large amounts of process and production data are needed to complete the LCI. For many studies, the LCA analyst ...

  16. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  17. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  18. Meeting Complex Challenges Through National Security Reform

    Science.gov (United States)

    2008-10-01

    Nation. There- fore, some type of facilitation pro- cess—whether led by the White House or a high envoy–led inter- agency team—must be developed and...ian and military efforts must be integrated with a focus on how best to support efforts in the field through all phases, from conflict and crisis ...financial crisis makes these rela- tionships even more critical as the United States and other countries have to do more with less. Nontra- ditional

  19. Border Security: A Conceptual Model of Complexity

    Science.gov (United States)

    2013-12-01

    to aid stranded drivers with no food, water, or toilets.5 Computer manufacturers in Taiwan, Singapore, and South Korea could not ship their 3...border inspections. Washington State, for example, experienced a 50% drop in tourism and lost over $100 million in local revenue because of the...in large part because of what is known as “The Amistad Case.” The Spanish cargo ship La Amistad ran aground on the coastal border of New York

  20. Assessing Causality in a Complex Security Environment

    Science.gov (United States)

    2015-01-01

    protests (Ivan Bandura) Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated...community • strategic trends • regional dynamics • technology/changes in technology. The term normative factors is a sug- gestion that we might

  1. Secured Advanced Federated Environment (SAFE): A NASA Solution for Secure Cross-Organization Collaboration

    Science.gov (United States)

    Chow, Edward; Spence, Matthew Chew; Pell, Barney; Stewart, Helen; Korsmeyer, David; Liu, Joseph; Chang, Hsin-Ping; Viernes, Conan; Gogorth, Andre

    2003-01-01

    This paper discusses the challenges and security issues inherent in building complex cross-organizational collaborative projects and software systems within NASA. By applying the design principles of compartmentalization, organizational hierarchy and inter-organizational federation, the Secured Advanced Federated Environment (SAFE) is laying the foundation for a collaborative virtual infrastructure for the NASA community. A key element of SAFE is the Micro Security Domain (MSD) concept, which balances the need to collaborate and the need to enforce enterprise and local security rules. With the SAFE approach, security is an integral component of enterprise software and network design, not an afterthought.

  2. Indicators and criteria for assessing the state of food security: the experience of Kazakhstan and foreign countries

    Directory of Open Access Journals (Sweden)

    Z. M. Ayapova

    2017-01-01

    Full Text Available The article presents the criteria and indicators that characterize the country's food security. The foreign experience in the regulation of food security is considered, the use of which in the Republic of Kazakhstan will create conditions for the sustainable development of production, increasing the competitiveness of domestic products, and the formation of an efficiently functioning food market. At the initial stage, the evaluation criteria were the per capita incomes of the population and the carryover stocks of food grains (first at the level of 20% and then 16% of the total annual consumption, now the evaluation criteria are expanding and becoming more complex. The criteria for food security include: the sustainability of the development of the agro-industrial complex (APC, fisheries and forestry, which increases the production of food to increase inventories and in the event of food aid to other countries that have suffered natural disasters or wars; A high level of scientific achievements, increasing technical and technological equipment, improving the gene pool of livestock and crop production; Environmental and nature conservation policies and practices that ensure the conservation and improvement of soil fertility, yield, etc. When establishing the criteria for national food security, it is necessary to take into account that they should characterize the level of satisfaction of the population’s food needs, as well as the degree of sustainability of the country’s food supply. The economic basis of national security in the food sector is the provision of basic food for the population of the country. This means that if an uninterrupted supply of basic foodstuffs is sufficient for medical purposes, the country’s food security can be considered guaranteed.

  3. Calendar Year 2007 Resource Conservation and Recovery Act Annual Monitoring Report for the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee - RCRA Post-Closure Permit Nos. TNHW-113, TNHW-116, and TNHW-128

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental

    2008-02-01

    This report contains groundwater quality monitoring data obtained during calendar year (CY) 2007 at the following hazardous waste treatment, storage, and disposal (TSD) units located at the US Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) in Oak Ridge, Tennessee; this S-3 Site, Oil Landfarm, Bear Creek Burial Grounds/Walk-In Pits (BCBG/WIP), Eastern S-3 Site Plume, Chestnut Ridge Security Pits (CRSP), Chestnut Ridge Sediment Disposal Baste (CRSDB), few Hollow Quarry (KHQ), and East Chestnut Ridge Waste Pile (ECRWP). Hit monitoring data were obtained in accordance with the applicable Resource Conservation and Recovery Act of 1976 (RCRA) hazardous waste post-closure permit (PCP). The Tennessee Department of Environment and Conservation (TDEC) - Division of Solid Waste Management issued the PCPs to define the requirements for RCRA post-closure inspection, maintenance, and groundwater monitoring at the specified TSD units located within the Bear Creek Hydrogeologic Regime (PCP no. TNHW-116), Upper East Fork Poplar Creek Hydrogeologic Regime (PCP no. TNHW-113), and Chestnut Ridge Hydrogeologic Regime (PCP no. TNHW-128). Each PCP requires the Submittal of an annual RCRA groundwater monitoring report containing the groundwater sampling information and analytical results obtained at each applicable TSD unit during the preceding CY, along with an evaluation of groundwater low rates and directions and the analytical results for specified RCRA groundwater target compounds; this report is the RCRA annual groundwater monitoring report for CY 2007. The RCRA post-closure groundwater monitoring requirements specified in the above-referenced PCP for the Chestnut Ridge Regime replace those defined in the previous PCP (permit no. TNHW-088), which expired on September 18, 2005, but remained effective until the TDEC issued the new PCP in September 2006. The new PCP defines site-specific groundwater sampling and analysis requirements for the

  4. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  5. The nature of international health security.

    Science.gov (United States)

    Chiu, Ya-Wen; Weng, Yi-Hao; Su, Yi-Yuan; Huang, Ching-Yi; Chang, Ya-Chen; Kuo, Ken N

    2009-01-01

    Health issues occasionally intersect security issues. Health security has been viewed as an essential part of human security. Policymakers and health professionals, however, do not share a common definition of health security. This article aims to characterize the notions of health security in order to clarify what constitutes the nexus of health and security. The concept of health security has evolved over time so that it encompasses many entities. Analyzing the health reports of four multilateral organizations (the United Nations, World Health Organization, Asia-Pacific Economic Cooperation, and the European Union) produced eight categories of most significant relevance to contemporary health security, allowing comparison of the definitions. The four categories are: emerging diseases; global infectious disease; deliberate release of chemical and biological materials; violence, conflict, and humanitarian emergencies. Two other categories of common concern are natural disasters and environmental change, as well as chemical and radioactive accidents. The final two categories, food insecurity and poverty, are discussed less frequently. Nevertheless, food security is emerging as an increasingly important issue in public health. Health security is the first line of defence against health emergencies. As globalization brings more complexities, dealing with the increased scale and extent of health security will require greater international effort and political support.

  6. Assessing removals for North Central forest inventories.

    Science.gov (United States)

    W. Brad Smith

    1991-01-01

    Discusses method used by the Forest Inventory and Analysis Unit for estimating timber removals. Presents the relationship of timber utilization studies, primary lumber mill studies, and forest inventory data.

  7. Inventory on cleaner production education and training

    DEFF Research Database (Denmark)

    Jørgensen, Michael Søgaard; Pöyry, Sirkka; Huisingh, Donald

    Analysis and presentation of the data from an international inventory on cleaner production education and training......Analysis and presentation of the data from an international inventory on cleaner production education and training...

  8. CoC Housing Inventory Count Reports

    Data.gov (United States)

    Department of Housing and Urban Development — Continuum of Care (CoC) Homeless Assistance Programs Housing Inventory Count Reports are a snapshot of a CoC’s housing inventory, available at the national and state...

  9. Ottawa National Wildlife Refuge : Wildlife Inventory Plan

    Data.gov (United States)

    Department of the Interior — This Wildlife Inventory Plan for Ottawa NWR describes the inventory program’s relation to Refuge objectives and outlines the program’s policies and administration....

  10. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  11. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  12. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  13. Design Principles for Security

    National Research Council Canada - National Science Library

    Benzel, Terry V; Irvine, Cynthia E; Levin, Timothy E; Bhaskara, Ganesha; Nguyen, Thuy D; Clark, Paul C

    2005-01-01

    As a prelude to the clean-slate design for the SecureCore project, the fundamental security principles from more than four decades of research and development in information security technology were reviewed...

  14. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  15. Data Exchange Inventory (DEXI) System

    Data.gov (United States)

    Social Security Administration — DEXI is an intranet application used by SSA users to track all incoming and outgoing data exchanges between SSA and our data exchange partners. Information such as...

  16. National Bridge Inventory (NBI) Bridges

    Data.gov (United States)

    Department of Homeland Security — The NBI is a collection of information (database) describing the more than 600,000 of the Nation's bridges located on public roads, including Interstate Highways,...

  17. Security force-adversary engagement simulation

    International Nuclear Information System (INIS)

    Bennett, H.A.

    1975-01-01

    A dynamic simulation of a security force-adversary engagement has been developed to obtain a better understanding of the complexities involved in security systems. Factors affecting engagement outcomes were identified and interrelated to represent an ambush of an escorted nuclear fuel truck convoy by an adversary group. Other forms of engagement such as assault and skirmish also can be simulated through suitable parameter changes. The dynamic model can provide a relative evaluation of changes in security force levels, equipment, training, and tactics. Continued application and subsequent refinements of the model are expected to augment the understanding of component interaction within a guard-based security system

  18. Security and citizenship in the global south

    DEFF Research Database (Denmark)

    Bilgin, Pinar; Ince, Basak

    2015-01-01

    secured internationally as citizens of newly independent ‘nation-states’ who were protected against interventions and/or ‘indirect rule’ by the (European) International Society, whose practices were often justified on grounds of the former’s ‘failings’ in meeting the so-called ‘standards of civilization......The relationship between security and citizenship is more complex than media portrayals based on binary oppositions seem to suggest (included/excluded, security/insecurity), or mainstream approaches to International Relations (IR) and security seem to acknowledge. This is particularly the case...

  19. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  20. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  1. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  2. 30 CFR 220.032 - Inventories.

    Science.gov (United States)

    2010-07-01

    ... operations. The accumulation of surplus stocks shall be avoided by proper materiel control, inventory and... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Inventories. 220.032 Section 220.032 Mineral... Inventories. (a) The lessee is responsible for NPSL materiel and shall make proper and timely cost and credit...

  3. 10 CFR 34.29 - Quarterly inventory.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Quarterly inventory. 34.29 Section 34.29 Energy NUCLEAR... RADIOGRAPHIC OPERATIONS Equipment § 34.29 Quarterly inventory. (a) Each licensee shall conduct a quarterly physical inventory to account for all sealed sources and for devices containing depleted uranium received...

  4. 23 CFR 650.315 - Inventory.

    Science.gov (United States)

    2010-04-01

    ... 23 Highways 1 2010-04-01 2010-04-01 false Inventory. 650.315 Section 650.315 Highways FEDERAL..., STRUCTURES, AND HYDRAULICS National Bridge Inspection Standards § 650.315 Inventory. (a) Each State or Federal agency must prepare and maintain an inventory of all bridges subject to the NBIS. Certain...

  5. 78 FR 10642 - Service Contracts Inventory

    Science.gov (United States)

    2013-02-14

    ... COMMISSION Service Contracts Inventory AGENCY: Nuclear Regulatory Commission. ACTION: Notice of availability. SUMMARY: The U.S. Nuclear Regulatory Commission (NRC) is providing for public information its Inventory of Contracts for Services for Fiscal Year (FY) 2012. The inventory includes service contract actions over $25...

  6. 7 CFR 984.21 - Handler inventory.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Handler inventory. 984.21 Section 984.21 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements... Regulating Handling Definitions § 984.21 Handler inventory. Handler inventory as of any date means all...

  7. 77 FR 5280 - Service Contracts Inventory

    Science.gov (United States)

    2012-02-02

    ... COMMISSION Service Contracts Inventory AGENCY: Nuclear Regulatory Commission. ACTION: Notice of availability. SUMMARY: The U.S. Nuclear Regulatory Commission (NRC) is providing for public information its Inventory of Contracts for Services for Fiscal Year (FY) 2011. The inventory includes service contract actions over $25...

  8. 75 FR 82095 - Service Contracts Inventory

    Science.gov (United States)

    2010-12-29

    ... Doc No: 2010-32828] NUCLEAR REGULATORY COMMISSION [NRC-2010-0394] Service Contracts Inventory AGENCY... Regulatory Commission (NRC) is providing for public information its Inventory of Contracts for Services for Fiscal Year (FY) 2010. The inventory includes service contract actions over $25,000 that were awarded in...

  9. 26 CFR 1.1374-7 - Inventory.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 11 2010-04-01 2010-04-01 true Inventory. 1.1374-7 Section 1.1374-7 Internal... TAXES Small Business Corporations and Their Shareholders § 1.1374-7 Inventory. (a) Valuation. The fair market value of the inventory of an S corporation on the first day of the recognition period equals the...

  10. 42 CFR 35.41 - Inventory.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Inventory. 35.41 Section 35.41 Public Health PUBLIC... STATION MANAGEMENT Disposal of Money and Effects of Deceased Patients § 35.41 Inventory. Promptly after the death of a patient in a station or hospital of the Service, an inventory of his money and effects...

  11. An annualized forest inventory for Nebraska

    Science.gov (United States)

    Hans T. Schreuder; Tom D. Wardle

    2000-01-01

    This paper addresses opportunities presented to states by an annualized forest inventory system, to be conducted by the Forest Inventory and Analysis program of the USDA Forest Service, and concerns about these inventories. The importance of a balanced approach in assessing timber and nontimber attributes is emphasized, and the paramount importance of maintaining and...

  12. Cyber Security and Resilient Systems

    International Nuclear Information System (INIS)

    Anderson, Robert S.

    2009-01-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation's cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested - both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the

  13. Cyber Security and Resilient Systems

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the

  14. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  15. Security Requirements Management in Software Product Line Engineering

    Science.gov (United States)

    Mellado, Daniel; Fernández-Medina, Eduardo; Piattini, Mario

    Security requirements engineering is both a central task and a critical success factor in product line development due to the complexity and extensive nature of product lines. However, most of the current product line practices in requirements engineering do not adequately address security requirements engineering. Therefore, in this chapter we will propose a security requirements engineering process (SREPPLine) driven by security standards and based on a security requirements decision model along with a security variability model to manage the variability of the artefacts related to security requirements. The aim of this approach is to deal with security requirements from the early stages of the product line development in a systematic way, in order to facilitate conformance with the most relevant security standards with regard to the management of security requirements, such as ISO/IEC 27001 and ISO/IEC 15408.

  16. 48 CFR 245.7311-2 - Safety, security, and fire regulations.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Safety, security, and fire regulations. 245.7311-2 Section 245.7311-2 Federal Acquisition Regulations System DEFENSE ACQUISITION... Inventory 245.7311-2 Safety, security, and fire regulations. ...

  17. TFTR tritium inventory accountability system

    International Nuclear Information System (INIS)

    Saville, C.; Ascione, G.; Elwood, S.; Nagy, A.; Raftopoulos, S.; Rossmassler, R.; Stencel, J.; Voorhees, D.; Tilson, C.

    1995-01-01

    This paper discusses the program, PPPL (Princeton Plasma Physics Laboratory) Material Control and Accountability Plan, that has been implemented to track US Department of Energy's tritium and all other accountable source material. Specifically, this paper details the methods used to measure tritium in various systems at the Tokamak Fusion Test Reactor; resolve inventory differences; perform inventory by difference inside the Tokamak; process and measure plasma exhaust and other effluent gas streams; process, measure and ship scrap or waste tritium on molecular sieve beds; and detail organizational structure of the Material Control and Accountability group. In addition, this paper describes a Unix-based computerized software system developed at PPPL to account for all tritium movements throughout the facility. 5 refs., 2 figs

  18. TFTR tritium inventory accountability system

    Energy Technology Data Exchange (ETDEWEB)

    Saville, C.; Ascione, G.; Elwood, S.; Nagy, A.; Raftopoulos, S.; Rossmassler, R.; Stencel, J.; Voorhees, D.; Tilson, C. [Plasma Physics Lab., Princeton, NJ (United States)

    1995-10-01

    This paper discusses the program, PPPL (Princeton Plasma Physics Laboratory) Material Control and Accountability Plan, that has been implemented to track US Department of Energy`s tritium and all other accountable source material. Specifically, this paper details the methods used to measure tritium in various systems at the Tokamak Fusion Test Reactor; resolve inventory differences; perform inventory by difference inside the Tokamak; process and measure plasma exhaust and other effluent gas streams; process, measure and ship scrap or waste tritium on molecular sieve beds; and detail organizational structure of the Material Control and Accountability group. In addition, this paper describes a Unix-based computerized software system developed at PPPL to account for all tritium movements throughout the facility. 5 refs., 2 figs.

  19. Mathematical and Statistical Opportunities in Cyber Security

    Energy Technology Data Exchange (ETDEWEB)

    Meza, Juan; Campbell, Scott; Bailey, David

    2009-03-23

    The role of mathematics in a complex system such as the Internet has yet to be deeply explored. In this paper, we summarize some of the important and pressing problems in cyber security from the viewpoint of open science environments. We start by posing the question 'What fundamental problems exist within cyber security research that can be helped by advanced mathematics and statistics'? Our first and most important assumption is that access to real-world data is necessary to understand large and complex systems like the Internet. Our second assumption is that many proposed cyber security solutions could critically damage both the openness and the productivity of scientific research. After examining a range of cyber security problems, we come to the conclusion that the field of cyber security poses a rich set of new and exciting research opportunities for the mathematical and statistical sciences.

  20. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  1. Ghana Youth Employment Program Inventory

    OpenAIRE

    Ulzen-Appiah, Ato; Avura, Francis Babongte

    2016-01-01

    This youth employment inventory has been compiled to improve the evidence base for making decisions about how to address the problem of youth unemployment or youth who are not in education and not participating in the labor market in Ghana. Policy makers who are considering measures to help young people make the transition into the labor market and obtain decent work are hampered by a lack ...

  2. Radioactive waste inventories and projections

    International Nuclear Information System (INIS)

    McLaren, L.H.

    1982-11-01

    This bibliography contains information on radioactive waste inventories and projections included in the Department of Energy's Energy Data Base from January 1981 through September 1982. The arrangement is by report number for reports, followed by nonreports in reverse chronological order. These citations are to research reports, journal articles, books, patents, theses, and conference papers from worldwide sources. Five indexes, each preceded by a brief description, are provided: Corporate Author, Personal Author, Subject, Contract Number, and Report Number. (25 abstracts)

  3. Stable isotope research pool inventory

    International Nuclear Information System (INIS)

    1984-03-01

    This report contains a listing of electromagnetically separated stable isotopes which are available at the Oak Ridge National Laboratory for distribution for nondestructive research use on a loan basis. This inventory includes all samples of stable isotopes in the Research Materials Collection and does not designate whether a sample is out on loan or is in reprocessing. For some of the high abundance naturally occurring isotopes, larger amounts can be made available; for example, Ca-40 and Fe-56

  4. National inventory of radioactive wastes

    International Nuclear Information System (INIS)

    1997-01-01

    There are in France 1064 sites corresponding to radioactive waste holders that appear in this radioactive waste inventory. We find the eighteen sites of E.D.F. nuclear power plants, The Cogema mine sites, the Cogema reprocessing plants, The Cea storages, the different factories and enterprises of nuclear industry, the sites of non nuclear industry, the Andra centers, decommissioned installations, disposals with low level radioactive wastes, sealed sources distributors, national defence. (N.C.)

  5. Inventory Dynamics under Transaction Costs

    OpenAIRE

    Jean-Paul Chavas; Paula M. Despins; T. Randy Fortenbery

    2000-01-01

    A conceptual model of storage behavior is developed. Optimal intertemporal pricing is derived to analyze the effects of transaction costs on storage andarbitrage pricing. It is shown how transaction costs can rationalize the existence of an inverse carrying charge for inventory. The model is applied to U.S. soybeans stocks for the period 1960–95. The empirical results suggest that transaction costs have a significant influence on storage behavior andintertemporal arbitrage pricing. Copyright ...

  6. Y-12 Groundwater Protection Program Calendar Year 2000 Groundwater Monitoring Data Evaluation Report for the Upper East Fork Poplar Creek Hydrogeologic Regime at the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee; FINAL

    International Nuclear Information System (INIS)

    None

    2001-01-01

    This report presents an evaluation of the groundwater and surface water monitoring data obtained during calendar year (CY) 2000 in the Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime). The East Fork Regime encompasses many confirmed and potential sources of groundwater and surface water contamination associated with the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) in Oak Ridge, Tennessee. Prepared under the auspices of the Y-12 Groundwater Protection Program (GWPP), this report addresses applicable provisions of DOE Order 5400.1 (General Environmental Protection Program) that require: (1) an evaluation of the quantity and quality of groundwater and surface water in areas that are, or could be, affected by Y-12 operations, (2) an evaluation of groundwater and surface water quality in areas where contaminants from Y-12 operations are most likely to migrate beyond the DOE Oak Ridge Reservation (ORR) property line, and (3) an evaluation of long-term trends in groundwater quality at Y-12. The following sections of this report contain relevant background information (Section 2.0); describe the results of the respective data evaluations required under DOE Order 5400.1 (Section 3.0); summarize significant findings of each evaluation (Section 4.0); and list the technical reports and regulatory documents cited for more detailed information (Section 5.0). Illustrations (maps and trend graphs) are presented in Appendix A. Brief data summary tables referenced in each section are contained within the text; supplemental information and extensive data tables are provided in Appendix B

  7. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  8. Distributed security in closed distributed systems

    DEFF Research Database (Denmark)

    Hernandez, Alejandro Mario

    in their design. There should always exist techniques for ensuring that the required security properties are met. This has been thoroughly investigated through the years, and many varied methodologies have come through. In the case of distributed systems, there are even harder issues to deal with. Many approaches...... have been taken towards solving security problems, yet many questions remain unanswered. Most of these problems are related to some of the following facts: distributed systems do not usually have any central controller providing security to the entire system; the system heterogeneity is usually...... reflected in heterogeneous security aims; the software life cycle entails evolution and this includes security expectations; the distribution is useful if the entire system is “open” to new (a priori unknown) interactions; the distribution itself poses intrinsically more complex security-related problems...

  9. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...... of formal protocol verification. Verification, however, is usually carried out on an abstract model not at all related with a protocol’s implementation. Experience shows that security breaches introduced in implementations of successfully verified models are rather common. The χ-Spaces framework...... is an implementation of SPL (Security Protocol Language), a formal model for studying security protocols. In this paper we discuss the use of χ-Spaces as a tool for developing robust security protocol implementations. To make the case, we take a family of key-translation protocols due to Woo and Lam and show how χ...

  10. Evaluation of performance approximations for (r, q) inventory policies in a lost-sales setting

    DEFF Research Database (Denmark)

    Bhagwan Bendre, Abhijit; Thorstenson, Anders

    The (r, q) inventory policy, in which the replenishment quantity q is ordered, when the inventory position reaches the reorder point r, is one of the most widely practiced control policies for single-stage, single-item inventory systems. This policy has been thoroughly studied under the scenario...... observed as the standard business practice in case of shortages. Moreover, analyses of this setting can assist in better understanding of more complex settings, such as when (r, q) inventory control systems are employed as building blocks of supply chain structures in which lost sales play a significant...... role. In this paper, we consider a single-item inventory system with lost sales controlled by a continuous review (r, q) policy. Demand is Poisson and lead times are assumed to be constant. For a standard cost structure our focus is on analyzing the long-run average cost and fill-rate performance...

  11. 78 FR 17205 - Notice of Availability of Service Contract Inventories

    Science.gov (United States)

    2013-03-20

    ... FEDERAL MARITIME COMMISSION Notice of Availability of Service Contract Inventories AGENCY: Federal Maritime Commission. ACTION: Notice of availability of service contract inventories. FOR FURTHER... Service Contract Inventory Analysis, the FY 2012 Service Contract Inventory, and the FY 2012 Service...

  12. Danish emission inventory for particular matter (PM)

    Energy Technology Data Exchange (ETDEWEB)

    Nielsen, M.; Winther, M.; Illerup, J.B.; Hjort Mikkelsen, M.

    2003-11-01

    The first Danish emission inventory that was reported in 2002 was a provisional-estimate based on data presently available. This report documents methodology, emission factors and references used for an improved Danish emission inventory for particulate matter. Further results of the improved emission inventory for the year 2000 are shown. The particulate matter emission inventory includes TSP, PM,, and PM, The report covers emission inventories for transport and stationary combustion. An appendix covering emissions from agriculture is also included. For the transport sector, both exhaust and non-exhaust emission such as tyre and break wear and road abrasion are included. (au)

  13. Physical inventory taking at Lucas Heights

    International Nuclear Information System (INIS)

    Quealy, K.J.

    1989-01-01

    Physical inventory planning and implementation at the Lucas Heights research reactor as the model facility are described. The description includes the computer-based records system used and the steps to ensure its accuracy, the labelling of separate items of nuclear material, the clean-out procedures for converting in-process material to measurable items, the administrative procedures for inventorying each inventory area, the verification procedures used to include previously measured tamper-safe items in the inventory, and lastly, procedures used to reconcile the inventory and calculate MUF (material unaccounted for). 2 figs

  14. Activity-based costing of security services for a Department of Energy nuclear site

    International Nuclear Information System (INIS)

    Togo, D.F.

    1997-01-01

    Department of Energy (DOE) nuclear facilities are being encouraged to reduce costs but the accounting data typically in use by the financial organizations at these laboratories cannot easily be used to determine which security activities offer the best reduction in cost. For example, labor costs have historically been aggregated over various activities, making it difficult to determine the true costs of performing each activity. To illustrate how this problem can be solved, a study was performed applying activity-based costing (ABC) to a hypothetical DOE facility. ABC is a type of cost-accounting developed expressly to determine truer costs of company activities. The hypothetical facility was defined to have features similar to those found across the DOE nuclear complex. ABC traced costs for three major security functions - Protective Force Operations, Material Control and Accountability, and Technical Security - to various activities. Once these costs had been allocated, we compared the cost of three fictitious upgrades: (1) an improvement in training or weapons that allows the protective force to have better capabilities instead of adding more response forces; (2) a change in the frequency of inventories; and (3) a reduction in the annual frequencies of perimeter sensor tests

  15. Personality Assessment Inventory profiles of university students with eating disorders

    OpenAIRE

    MacGregor, Michael Wm; Lamborn, Paige

    2014-01-01

    Background Eating disorders are complex disorders that involve medical and psychological symptoms. Understanding the psychological factors associated with different eating disorders is important for assessment, diagnosis, and treatment. Methods This study sought to determine on which of the 22 Personality Assessment Inventory (PAI) scales patients with anorexia nervosa, bulimia nervosa, and eating disorder not otherwise specified (EDNOS) differed, and whether the PAI can be used to classify e...

  16. Methodology for evaluation of economic security of industrial enterprises

    OpenAIRE

    Kopytko Marta Ivanovna

    2014-01-01

    This paper investigates the features of evaluation of ensuring economic security of industrial enterprises and the algorithm of complex evaluation of the economic security of industrial enterprises over time and the system of criteria and their limit values ​​and the dynamics of change to determine the level of economic security industrial enterprise in terms of its components.

  17. Constructing a biodiversity terminological inventory.

    Directory of Open Access Journals (Sweden)

    Nhung T H Nguyen

    Full Text Available The increasing growth of literature in biodiversity presents challenges to users who need to discover pertinent information in an efficient and timely manner. In response, text mining techniques offer solutions by facilitating the automated discovery of knowledge from large textual data. An important step in text mining is the recognition of concepts via their linguistic realisation, i.e., terms. However, a given concept may be referred to in text using various synonyms or term variants, making search systems likely to overlook documents mentioning less known variants, which are albeit relevant to a query term. Domain-specific terminological resources, which include term variants, synonyms and related terms, are thus important in supporting semantic search over large textual archives. This article describes the use of text mining methods for the automatic construction of a large-scale biodiversity term inventory. The inventory consists of names of species, amongst which naming variations are prevalent. We apply a number of distributional semantic techniques on all of the titles in the Biodiversity Heritage Library, to compute semantic similarity between species names and support the automated construction of the resource. With the construction of our biodiversity term inventory, we demonstrate that distributional semantic models are able to identify semantically similar names that are not yet recorded in existing taxonomies. Such methods can thus be used to update existing taxonomies semi-automatically by deriving semantically related taxonomic names from a text corpus and allowing expert curators to validate them. We also evaluate our inventory as a means to improve search by facilitating automatic query expansion. Specifically, we developed a visual search interface that suggests semantically related species names, which are available in our inventory but not always in other repositories, to incorporate into the search query. An assessment of

  18. Scalable and Unconditionally Secure Multiparty Computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Nielsen, Jesper Buus

    2007-01-01

    We present a multiparty computation protocol that is unconditionally secure against adaptive and active adversaries, with communication complexity O(Cn)k+O(Dn^2)k+poly(nk), where C is the number of gates in the circuit, n is the number of parties, k is the bit-length of the elements of the field...... over which the computation is carried out, D is the multiplicative depth of the circuit, and κ is the security parameter. The corruption threshold is t security the corruption threshold is t communication complexity is O(nC)k. These are the first unconditionally secure...... protocols where the part of the communication complexity that depends on the circuit size is linear in n. We also present a protocol with threshold t protocol – that is...

  19. European perspectives on security research

    CERN Document Server

    2011-01-01

    Europe’s networked societies of today are shaped by a growing interconnection in almost all areas of life. The complexity of our infrastructures and the concurrent accessibility to means of destruction by terrorist groups and individual perpetrators call for innovative security solutions. However, such evolving innovations inevitably raise fundamental questions of concern in our societies. How do we balance the imperatives of securing our citizens and infrastructures on the one hand, and of protecting of our sacredly held civil liberties on the other? The topical network ‘Safety and Security’ of acatech – the German Academy of Science and Engineering – invited experts from the science academies of various European countries to share their perspectives on security research and the aspect of safety during a two-day workshop hosted by the Fraunhofer Institute for High-Speed Dynamics, Ernst-Mach-Institut in March 2010. This publication is a compilation of contributions made during the workshop.

  20. Do you write secure code?

    CERN Multimedia

    Computer Security Team

    2011-01-01

    At CERN, we are excellent at producing software, such as complex analysis jobs, sophisticated control programs, extensive monitoring tools, interactive web applications, etc. This software is usually highly functional, and fulfils the needs and requirements as defined by its author. However, due to time constraints or unintentional ignorance, security aspects are often neglected. Subsequently, it was even more embarrassing for the author to find out that his code flawed and was used to break into CERN computers, web pages or to steal data…   Thus, if you have the pleasure or task of producing software applications, take some time before and familiarize yourself with good programming practices. They should not only prevent basic security flaws in your code, but also improve its readability, maintainability and efficiency. Basic rules for good programming, as well as essential books on proper software development, can be found in the section for software developers on our security we...

  1. Examining the Impact of Non-Technical Security Management Factors on Information Security Management in Health Informatics

    Science.gov (United States)

    Imam, Abbas H.

    2013-01-01

    Complexity of information security has become a major issue for organizations due to incessant threats to information assets. Healthcare organizations are particularly concerned with security owing to the inherent vulnerability of sensitive information assets in health informatics. While the non-technical security management elements have been at…

  2. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  3. Chapter 3: Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  4. 2009 National inventory of radioactive material and wastes. Geographical inventory

    International Nuclear Information System (INIS)

    2009-01-01

    A geographical inventory of the radioactive wastes present on the French territory (as recorded until the 31 of december, 2007) is presented, region by region. The various types of waste sites (production, processing, conditioning and storage sites, Uranium mines, ANDRA storage centers, historical storage sites and polluted sites where wastes are stored) are listed and located on maps. Details are given on the nature and origin of these wastes (nuclear industry, medical domain, scientific research, conventional industry, Defense...). A total of 1121 sites have been recorded, among which 163 are presented with details and charts

  5. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  6. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  7. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  8. Inventory-based landscape-scale simulation of management effectiveness and economic feasibility with BioSum

    Science.gov (United States)

    Jeremy S. Fried; Larry D. Potts; Sara M. Loreno; Glenn A. Christensen; R. Jamie Barbour

    2017-01-01

    The Forest Inventory and Analysis (FIA)-based BioSum (Bioregional Inventory Originated Simulation Under Management) is a free policy analysis framework and workflow management software solution. It addresses complex management questions concerning forest health and vulnerability for large, multimillion acre, multiowner landscapes using FIA plot data as the initial...

  9. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  10. Between security and military identities: The case of Israeli security experts

    NARCIS (Netherlands)

    Grassiani, E.

    2018-01-01

    The relationship between private security professionals and the military in Israel is complex. While there is growing attention to the fact that security and military actors and their activities are becoming increasingly blurred, the Israeli case shows something different. In this ground-up analysis

  11. WORKSTATION SECURITY ENSURANCE

    OpenAIRE

    Hudoklin, Alenka; Stadler, Alenka

    1998-01-01

    A methodology for the ensured security of a workstation connected in a computer network with in an organization is presented. A technique for the determination of the required security level for a workstation's tangible and intangible components is described. A set of security measures for each security level of the workstation's tangible and intangible components is selected. The methodology is applied to workstations in the computer network of a Slovenian state agency. The required security...

  12. Inventory of nuclear materials in case of emergency

    International Nuclear Information System (INIS)

    Portugal, J.L.; Zanetti, S.

    2001-01-01

    The crisis situations for nuclear materials in nuclear facilities are provided for in the French regulation, as the decree of 12 May 1981 specifies that 'In any circumstance, the Ministry of Industry can order a physical inventory of the materials and its comparison with the accountancy records'. Such an inventory can be ordered in facilities holding category I nuclear materials, in case of a theft for example. The operators must be able to establish quickly if the stolen materials come from their facility. To test the organization set at the operators and competent authority levels respectively, five exercises of increasing complexity have already been carried out. These exercises have permitted the validation of procedures, composition of the various crisis centers, methodology for such an inventory and use of protected communication means. The authority crisis center includes members of the competent Authority and it's technical support body: staff members of the IPSN. It is in charge of the national managing of the operations, in relation with one or several site crisis centers. The site crisis center is the interface between the authorities and the facility crisis center. The operations of inventory are carried out from the roughest checking to the finest ones. To be efficient during the first hours of the crisis, the authority crisis center must have data bases at the disposal of its experts, containing information about physical protection and accountancy of the nuclear materials detained by the site and the relevant facilities. (authors)

  13. Chance-constrained model predictive control applied to inventory management in hospitalary pharmacy.

    Science.gov (United States)

    Maestre, Jose Maria; Ocampo-Martinez, Carlos

    2014-01-01

    This extended abstract addresses the preliminary results of applying uncertainty handling strategies and advanced control techniques to the inventary management of hospitality pharmacy. Inventory management is one of the main tasks that a pharmacy department has to carry out in a hospital. It is a complex problem because it requires to establish a tradeoff between contradictory optimization criteria. The final goal of the proposed research is to update the inventory management system of hospitals such that it is possible to reduce the average inventory while maintaining preestablished clinical guarantees.

  14. Considering inventory distributions in a stochastic periodic inventory routing system

    Science.gov (United States)

    Yadollahi, Ehsan; Aghezzaf, El-Houssaine

    2017-07-01

    Dealing with the stochasticity of parameters is one of the critical issues in business and industry nowadays. Supply chain planners have difficulties in forecasting stochastic parameters of a distribution system. Demand rates of customers during their lead time are one of these parameters. In addition, holding a huge level of inventory at the retailers is costly and inefficient. To cover the uncertainty of forecasting demand rates, researchers have proposed the usage of safety stock to avoid stock-out. However, finding the precise level of safety stock depends on forecasting the statistical distribution of demand rates and their variations in different settings among the planning horizon. In this paper the demand rate distributions and its parameters are taken into account for each time period in a stochastic periodic IRP. An analysis of the achieved statistical distribution of the inventory and safety stock level is provided to measure the effects of input parameters on the output indicators. Different values for coefficient of variation are applied to the customers' demand rate in the optimization model. The outcome of the deterministic equivalent model of SPIRP is simulated in form of an illustrative case.

  15. Tritium inventory tracking and management

    International Nuclear Information System (INIS)

    Eichenberg, T.W.; Klein, A.C.

    1990-01-01

    This investigation has identified a number of useful applications of the analysis of the tracking and management of the tritium inventory in the various subsystems and components in a DT fusion reactor system. Due to the large amounts of tritium that will need to be circulated within such a plant, and the hazards of dealing with the tritium an electricity generating utility may not wish to also be in the tritium production and supply business on a full time basis. Possible scenarios for system operation have been presented, including options with zero net increase in tritium inventory, annual maintenance and blanket replacement, rapid increases in tritium creation for the production of additional tritium supplies for new plant startup, and failures in certain system components. It has been found that the value of the tritium breeding ratio required to stabilize the storage inventory depends strongly on the value and nature of other system characteristics. The real operation of a DT fusion reactor power plant will include maintenance and blanket replacement shutdowns which will affect the operation of the tritium handling system. It was also found that only modest increases in the tritium breeding ratio are needed in order to produce sufficient extra tritium for the startup of new reactors in less than two years. Thus, the continuous operation of a reactor system with a high tritium breeding ratio in order to have sufficient supplies for other plants is not necessary. Lastly, the overall operation and reliability of the power plant is greatly affected by failures in the fuel cleanup and plasma exhaust systems

  16. On the Road to Holistic Decision Making in Adaptive Security

    Directory of Open Access Journals (Sweden)

    Mahsa Emami-Taba

    2013-08-01

    Full Text Available Security is a critical concern in today's software systems. Besides the interconnectivity and dynamic nature of network systems, the increasing complexity in modern software systems amplifies the complexity of IT security. This fact leaves attackers one step ahead in exploiting vulnerabilities and introducing new cyberattacks. The demand for new methodologies in addressing cybersecurity is emphasized by both private and national corporations. A practical solution to dynamically manage the high complexity of IT security is adaptive security, which facilitates analysis of the system's behaviour and hence the prevention of malicious attacks in complex systems. Systems that feature adaptive security detect and mitigate security threats at runtime with little or no administrator involvement. In these systems, decisions at runtime are balanced according to quality and performance goals. This article describes the necessity of holistic decision making in such systems and paves the road to future research.

  17. Robust Inventory System Optimization Based on Simulation and Multiple Criteria Decision Making

    OpenAIRE

    Mortazavi, Ahmad; Arshadi khamseh, Alireza

    2014-01-01

    Inventory management in retailers is difficult and complex decision making process which is related to the conflict criteria, also existence of cyclic changes and trend in demand is inevitable in many industries. In this paper, simulation modeling is considered as efficient tool for modeling of retailer multiproduct inventory system. For simulation model optimization, a novel multicriteria and robust surrogate model is designed based on multiple attribute decision making (MADM) method, design...

  18. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  19. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  20. Domestic Threats, Regional Solutions? The Challenge of Regional Security Integration in Southern Africa

    OpenAIRE

    Hammerstad, Anne

    2005-01-01

    The article discusses the salience of different theories of regional security integration through the prism of the experience of the Southern African Development Community (SADC). It tracks the region's progress from a hostile security complex to a nascent security community and asks what strategy for security integration should be employed to continue this positive trend. Although Southern African leaders seem to prefer a collective security strategy à la NATO, the common security approach o...

  1. Distributed security framework for modern workforce

    International Nuclear Information System (INIS)

    Balatsky, G.; Scherer, C. P.

    2014-01-01

    Safe and sustainable nuclear power production depends on strict adherence to nuclear security as a necessary prerequisite for nuclear power. This paper considers the current challenges for nuclear security, and proposes a conceptual framework to address those challenges. We identify several emerging factors that affect nuclear security: 1. Relatively high turnover rates in the nuclear workforce compared to the earlier years of the nuclear industry, when nuclear workers were more likely to have secure employment, a lifelong career at one company, and retirement on a pension plan. 2. Vulnerabilities stemming from the ubiquitous presence of modern electronics and their patterns of use by the younger workforce. 3. Modern management practices, including outsourcing and short-term contracting (which relates to number 1 above). In such a dynamic and complex environment, nuclear security personnel alone cannot effectively guarantee adequate security. We propose that one solution to this emerging situation is a distributed security model in which the components of nuclear security become the responsibility of each and every worker at a nuclear facility. To implement this model, there needs to be a refurbishment of current workforce training and mentoring practices. The paper will present an example of distributed security framework model, and how it may look in practice. (author)

  2. Distributed security framework for modern workforce

    Energy Technology Data Exchange (ETDEWEB)

    Balatsky, G.; Scherer, C. P., E-mail: gbalatsky@lanl.gov, E-mail: scherer@lanl.gov [Los Alamos National Laboratory, Los Alamos, NM (United States)

    2014-07-01

    Safe and sustainable nuclear power production depends on strict adherence to nuclear security as a necessary prerequisite for nuclear power. This paper considers the current challenges for nuclear security, and proposes a conceptual framework to address those challenges. We identify several emerging factors that affect nuclear security: 1. Relatively high turnover rates in the nuclear workforce compared to the earlier years of the nuclear industry, when nuclear workers were more likely to have secure employment, a lifelong career at one company, and retirement on a pension plan. 2. Vulnerabilities stemming from the ubiquitous presence of modern electronics and their patterns of use by the younger workforce. 3. Modern management practices, including outsourcing and short-term contracting (which relates to number 1 above). In such a dynamic and complex environment, nuclear security personnel alone cannot effectively guarantee adequate security. We propose that one solution to this emerging situation is a distributed security model in which the components of nuclear security become the responsibility of each and every worker at a nuclear facility. To implement this model, there needs to be a refurbishment of current workforce training and mentoring practices. The paper will present an example of distributed security framework model, and how it may look in practice. (author)

  3. Deteriorating Inventory Model for Chilled Food

    OpenAIRE

    Yang, Ming-Feng; Tseng, Wei-Chung

    2015-01-01

    With many aspects that affect inventory policy, product perishability is a critical aspect of inventory policy. Most goods will deteriorate during storage and their original value will decline or be lost. Therefore, deterioration should be taken into account in inventory practice. Chilled food products are very common consumer goods that are, in fact, perishable. If the chilled food quality declines over time customers are less likely to buy it. The value the chilled food retains is, however,...

  4. How Does Collaborative Inventory Management Make Progress?

    OpenAIRE

    Simatupang, Togar Mangihut

    2003-01-01

    Collaborative inventory management (CIM) has revolutionized electronics, textile, apparel, and grocery industries. An intriguing question is how far does the movement of CIM challenge the traditional practice of inventory management? This paper illustrates how to expose and challenge flawed assumptions of traditional inventory management. It also proposes a collaborative replenishment process that consists of a cyclic process of tactical planning, execution, and control. The proposed scheme m...

  5. Data Driven Tuning of Inventory Controllers

    DEFF Research Database (Denmark)

    Huusom, Jakob Kjøbsted; Santacoloma, Paloma Andrade; Poulsen, Niels Kjølstad

    2007-01-01

    A systematic method for criterion based tuning of inventory controllers based on data-driven iterative feedback tuning is presented. This tuning method circumvent problems with modeling bias. The process model used for the design of the inventory control is utilized in the tuning...... as an approximation to reduce time required on experiments. The method is illustrated in an application with a multivariable inventory control implementation on a four tank system....

  6. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  7. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  8. Arguing Against Security Communitarianism

    DEFF Research Database (Denmark)

    Bilgin, Pinar

    2016-01-01

    Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...... as a particular approach that seeks to limit the scope of security to one’s community – be it the ‘nation-state’ or ‘civilization’. I will suggest that arguing against ‘security communitarianism’ requires paying further attention to the postcolonial critique of cosmopolitanism....

  9. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  10. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  11. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  12. The use of modern databases in managing nuclear material inventories

    International Nuclear Information System (INIS)

    Behrens, R.G.

    1994-01-01

    The need for a useful nuclear materials database to assist in the management of nuclear materials within the Department of Energy (DOE) Weapons Complex is becoming significantly more important as the mission of the DOE Complex changes and both international safeguards and storage issues become drivers in determining how these materials are managed. A well designed nuclear material inventory database can provide the Nuclear Materials Manager with an essential cost effective tool for timely analysis and reporting of inventories. This paper discusses the use of databases as a management tool to meet increasing requirements for accurate and timely information on nuclear material inventories and related information. From the end user perspective, this paper discusses the rationale, philosophy, and technical requirements for an integrated database to meet the needs for a variety of users such as those working in the areas of Safeguards, Materials Control and Accountability (MC ampersand A), Nuclear Materials Management, Waste Management, materials processing, packaging and inspection, and interim/long term storage

  13. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  14. Securing abundance : The politics of energy security

    NARCIS (Netherlands)

    Kester, Johannes

    2016-01-01

    Energy Security is a concept that is known in the literature for its ‘slippery’ nature and subsequent wide range of definitions. Instead of another attempt at grasping the essence of this concept, Securing Abundance reformulates the problem and moves away from a definitional problem to a theoretical

  15. Denmark’s National Inventory Report 2012

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Mikkelsen, Mette Hjorth; Hoffmann, Leif

    This report is Denmark’s National Inventory Report 2012. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2010 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2......This report is Denmark’s National Inventory Report 2012. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2010 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2...

  16. Defense Business Operations Fund Inventory Record Accuracy

    National Research Council Canada - National Science Library

    1998-01-01

    .... The overall objective of the audit was to determine whether inventory amounts on the FY 1996 Defense Business Operations Fund Consolidated Financial Statements were presented fairly in accordance...

  17. Danish emission inventories for stationary combustion plants. Inventories until 2008

    Energy Technology Data Exchange (ETDEWEB)

    Nielsen, Malene; Nielsen, Ole-Kenneth; Plejdrup, M.; Hjelgaard, K.

    2010-10-15

    Emission inventories for stationary combustion plants are presented and the methodologies and assumptions used for the inventories are described. The pollutants considered are SO{sub 2}, NO{sub x}, NMVOC, CH{sub 4}, CO, CO{sub 2}, N{sub 2}O, NH{sub 3}, particulate matter, heavy metals, dioxins, HCB and PAH. The CO{sub 2} emission in 2008 was 16 % lower than in 1990. However, fluctuations in the emission level are large as a result of electricity import/export. The emission of CH{sub 4} has increased due to increased use of lean-burn gas engines in combined heating and power (CHP) plants. However, the emission has decreased in recent years due to structural changes in the Danish electricity market. The N{sub 2}O emission was higher in 2008 than in 1990 but the fluctuations in the time-series are significant. A considerable decrease of the SO{sub 2}, NO{sub x} and heavy metal emissions is mainly a result of decreased emissions from large power plants and waste incineration plants. The combustion of wood in residential plants has increased considerably in recent years resulting in increased emission of PAH, particulate matter and CO. The emission of NMVOC has increased since 1990 as a result of both the increased combustion of wood in residential plants and the increased emission from lean-burn gas engines. The dioxin emission decreased since 1990 due to flue gas cleaning on waste incineration plants. However in recent years the emission has increased as a result of the increased combustion of wood in residential plants. (Author)

  18. INCAP - Applying short-term flexibility to control inventories

    OpenAIRE

    Lödding , Hermann; Lohmann , Steffen

    2011-01-01

    Abstract Inventory Based Capacity Control (INCAP) is a very simple method that allows inventory levels to be effectively controlled by using short-term capacity flexibility in make-to-stock settings. Moreover, INCAP can be used for finished goods inventories as well as for semi-finished goods inventories. The basic idea is to define upper and lower inventory limits and to adjust capacities if the inventory level reaches either limit. Should the inventory fall below the lower limit,...

  19. Design of an autonomous exterior security robot

    Science.gov (United States)

    Myers, Scott D.

    1994-01-01

    This paper discusses the requirements and preliminary design of robotic vehicle designed for performing autonomous exterior perimeter security patrols around warehouse areas, ammunition supply depots, and industrial parks for the U.S. Department of Defense. The preliminary design allows for the operation of up to eight vehicles in a six kilometer by six kilometer zone with autonomous navigation and obstacle avoidance. In addition to detection of crawling intruders at 100 meters, the system must perform real-time inventory checking and database comparisons using a microwave tags system.

  20. Insider Threat and Information Security Management

    Science.gov (United States)

    Coles-Kemp, Lizzie; Theoharidou, Marianthi

    The notion of insider has multiple facets. An organization needs to identify which ones to respond to. The selection, implementetion and maintenance of information security countermeasures requires a complex combination of organisational policies, functions and processes, which form Information Security Management. This chapter examines the role of current information security management practices in addressing the insider threat. Most approaches focus on frameworks for regulating insider behaviour and do not allow for the various cultural responses to the regulatory and compliance framework. Such responses are not only determined by enforcement of policies and awareness programs, but also by various psychological and organisational factors at an individual or group level. Crime theories offer techniques that focus on such cultural responses and can be used to enhance the information security management design. The chapter examines the applicability of several crime theories and concludes that they can contribute in providing additional controls and redesign of information security management processes better suited to responding to the insider threat.

  1. Inventory extension at the Nuclear Materials Storage Facility

    International Nuclear Information System (INIS)

    Stanbro, W.D.; Longmire, V.; Olinger, C.T.; Argo, P.E.

    1996-09-01

    The planned renovation of the Nuclear Material Storage Facility (NMSF) at Los Alamos National Laboratory will be a significant addition to the plutonium storage capacity of the nuclear weapons complex. However, the utility of the facility may be impaired by an overly conservative approach to performing inventories of material in storage. This report examines options for taking advantage of provisions in Department of Energy orders to extend the time between inventories. These extensions are based on a combination of modern surveillance technology, facility design features, and revised operational procedures. The report also addresses the possibility that NMSF could be the site of some form of international inspection as part of the US arms control and nonproliferation policy

  2. Security in Computer Applications

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  3. Social Security Administration

    Science.gov (United States)

    ... a my Social Security account. Newsroom Social Security's Fiscal Year (FY) 2017 Agency Financial Report (AFR) Our ... Us Accessibility FOIA Open Government Glossary Privacy Report Fraud, Waste or Abuse Site Map Other Government Websites: ...

  4. While Working Around Security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg

    Users of technology encounter various IT security mechanisms in their everyday lives. If these mechanisms fail to support everyday activities, they either get in the way, or the users find a way to work around them. Even though users manage to carry out everyday activities by using substandard......’ experiences of security influence the way they make sense of, assess, and handle IT security mechanisms. Moreover, I studied cases in which the users handled IT security sensitive technology in a secure way, but still had unwanted experiences of security. Through the developed design methods I was able...... to activate and access study participants’ prior experiences of making sense of IT security sensitive technology. Moreover, the methods helped clarify users’ immediate experience in an encounter with IT security sensitive technology. The findings were integrated into the design of a digital signature solution...

  5. Privatising security and war

    Directory of Open Access Journals (Sweden)

    José L Gómez del Prado

    2011-03-01

    Full Text Available State security functions normally carried out by national armies or police forces are being outsourced to private military and security companies in countries where conflict is displacing many people....

  6. Privatising security and war

    OpenAIRE

    José L Gómez del Prado

    2011-01-01

    State security functions normally carried out by national armies or police forces are being outsourced to private military and security companies in countries where conflict is displacing many people....

  7. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  8. Institutionalizing Security Force Assistance

    National Research Council Canada - National Science Library

    Binetti, Michael R

    2008-01-01

    .... It looks at the manner in which security assistance guidance is developed and executed. An examination of national level policy and the guidance from senior military and civilian leaders highlights the important role of Security Force Assistance...

  9. Air Cargo Security

    Science.gov (United States)

    2007-07-30

    security identification display areas ( SIDAs ). This effectively elevates the required security measures for these cargo handling areas and requires...monitoring. Additional technologies, such as computer algorithms for highlighting potential threat objects, may also be considered to aid human observers

  10. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  11. Secure DTN Communications Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Innoflight proposes to implement and perform an on-orbit demonstration of a Secure DTN communications suite on the SCaN Testbed aboard the ISS. Secure DTN is a...

  12. Re-thinking Grid Security Architecture

    OpenAIRE

    Demchenko, Y.; de Laat, C.; Koeroo, O.; Groep, D.; van Engelen, R.; Govindaraju, M.; Cafaro, M.

    2008-01-01

    The security models used in Grid systems today strongly bear the marks of their diverse origin. Historically retrofitted to the distributed systems they are designed to protect and control, the security model is usually limited in scope and applicability, and its implementation tailored towards a few specific deployment scenarios. A common approach towards even the "basic" elements such as authentication to resources is only now emerging, whereas for more complex issues such as community orga...

  13. Composing security protocols: from confidentiality to privacy

    OpenAIRE

    Arapinis, Myrto; Cheval, Vincent; Delaune, Stéphanie

    2015-01-01

    Security protocols are used in many of our daily-life applications, and our privacy largely depends on their design. Formal verification techniques have proved their usefulness to analyse these protocols, but they become so complex that modular techniques have to be developed. We propose several results to safely compose security protocols. We consider arbitrary primitives modeled using an equational theory, and a rich process algebra close to the applied pi calculus. Relying on these composi...

  14. Hash functions and information theoretic security

    DEFF Research Database (Denmark)

    Bagheri, Nasoor; Knudsen, Lars Ramkilde; Naderi, Majid

    2009-01-01

    Information theoretic security is an important security notion in cryptography as it provides a true lower bound for attack complexities. However, in practice attacks often have a higher cost than the information theoretic bound. In this paper we study the relationship between information theoretic...... attack costs and real costs. We show that in the information theoretic model, many well-known and commonly used hash functions such as MD5 and SHA-256 fail to be preimage resistant....

  15. Oil inventory behaviour: the public and private sector relationship and the free-rider problem

    International Nuclear Information System (INIS)

    Al-Faris, A.F.

    1992-01-01

    For oil-importing countries, the uninterrupted flow of energy sources lies at the heart of their national security. The crises of 1973-74 and 1979-80 have demonstrated the vulnerability of their economies to oil shortages, and the need to maintain a certain level of stocks to absorb unexpected losses in normal supply. On the other hand, oil producers have perceived a large inventory accumulation as a destabilizing factor to the oil market. This paper introduces fresh evidence on the dynamic nature of the relationship between OECD countries on the one hand and the public and private sectors on the other. The aims of the paper are, thus, twofold. The first is to highlight the underlying determinants of the inventory policies in major OECD countries. Of particular interest to this inquiry is the question of the free-rider phenomenon. The second is to study the interaction between public and private inventories in the framework of a dynamic model. (author)

  16. Windows Security patch required

    CERN Multimedia

    3004-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  17. Cloud security mechanisms

    OpenAIRE

    2014-01-01

    Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud...

  18. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  19. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  20. Security system signal supervision

    International Nuclear Information System (INIS)

    Chritton, M.R.; Matter, J.C.

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs

  1. Windows Security patch required

    CERN Multimedia

    2003-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables, ... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  2. Windows Security patch required

    CERN Multimedia

    2003-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  3. Android application security essentials

    CERN Document Server

    Rai, Pragati

    2013-01-01

    Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and technologists who wish to enhance their knowledge of Android security will find this book interesting. Some prior knowledge of development on the Android stack is desirable but not required.

  4. Introduction to Hardware Security

    OpenAIRE

    Yier Jin

    2015-01-01

    Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain an...

  5. Web Security Testing Cookbook

    CERN Document Server

    Hope, Paco

    2008-01-01

    Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad hoc security assessments, these recipes are repeatable, concise, and systematic-perfect for integrating into your regular test suite.

  6. The Cambridge Behavioural Inventory revised.

    Science.gov (United States)

    Wear, Helen J; Wedderburn, Catherine J; Mioshi, Eneida; Williams-Gray, Caroline H; Mason, Sarah L; Barker, Roger A; Hodges, John R

    2008-01-01

    Neurobehavioural and psychiatric symptoms are common in a range of neurodegenerative disorders with distinct profiles which are helpful in the diagnosis and monitoring of these disorders. The Cambridge Behavioural Inventory (CBI) has been shown to distinguish frontotemporal dementia (FTD), Alzheimer's disease (AD), Huntington's disease (HD) and Parkinson's disease (PD), but it is lengthy. To develop a shorter version of the 81 item CBI. CBI data from 450 participants with behavioural variant frontotemporal dementia (bv-FTD) (64), AD (96), PD (215) and HD (75) were analysed using Principal Components Analysis and measures of internal consistency (Cronbach alpha). A reduced 45-item questionnaire was developed. The instrument identified distinct behavioural profiles and performed as well as the original version. A shorter (45 item) version of the CBI is capable of differentiating bv-FTD and AD from PD and HD. It may be useful in delineating the type and extent of problems in these disorders as well as monitoring therapeutic interventions.

  7. Evaluation of process inventory uncertainties

    International Nuclear Information System (INIS)

    Roberts, N.J.

    1980-01-01

    This paper discusses the determination of some of the process inventory uncertainties in the Fast Flux Test Facility (FFTF) process line at the Los Alamos Scientific Laboratory (LASL) Plutonium Processing Facility (TA-55). A brief description of the FFTF process is given, along with a more detailed look at the peroxide precipitation and re-dissolution (PR) process. Emphasis is placed on the identification of the product and sidestreams from the unit processes, as they have application to the accountability measurements. The method of measurement of each of the product and sidestreams and their associated uncertainties are discussed. Some typical data for the PR process are presented, along with a discussion of the data. The data presented are based on our operating experience, and data on file in the TA-55 Nuclear Material Accountability System (PF/LASS/

  8. Secure it now or secure it later: the benefits of addressing cyber-security from the outset

    Science.gov (United States)

    Olama, Mohammed M.; Nutaro, James

    2013-05-01

    The majority of funding for research and development (R&D) in cyber-security is focused on the end of the software lifecycle where systems have been deployed or are nearing deployment. Recruiting of cyber-security personnel is similarly focused on end-of-life expertise. By emphasizing cyber-security at these late stages, security problems are found and corrected when it is most expensive to do so, thus increasing the cost of owning and operating complex software systems. Worse, expenditures on expensive security measures often mean less money for innovative developments. These unwanted increases in cost and potential slowing of innovation are unavoidable consequences of an approach to security that finds and remediate faults after software has been implemented. We argue that software security can be improved and the total cost of a software system can be substantially reduced by an appropriate allocation of resources to the early stages of a software project. By adopting a similar allocation of R&D funds to the early stages of the software lifecycle, we propose that the costs of cyber-security can be better controlled and, consequently, the positive effects of this R&D on industry will be much more pronounced.

  9. Mobile communication security

    NARCIS (Netherlands)

    Broek, F.M.J. van den

    2016-01-01

    Security of the mobile network Fabian van den Broek We looked at the security of the wireless connection between mobile phone and cell towers and suggested possible improvements. The security was analysed on a design level, by looking at the protocols and encryption techniques, but also on an

  10. Learning Puppet security

    CERN Document Server

    Slagle, Jason

    2015-01-01

    If you are a security professional whose workload is increasing, or a Puppet professional looking to increase your knowledge of security, or even an experienced systems administrator, then this book is for you. This book will take you to the next level of security automation using Puppet. The book requires no prior knowledge of Puppet to get started.

  11. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  12. Secure pairing with biometrics

    NARCIS (Netherlands)

    Buhan, I.R.; Boom, B.J.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.

    Secure pairing enables two devices that share no prior context with each other to agree upon a security association, which they can use to protect their subsequent communication. Secure pairing offers guarantees of the association partner identity and it should be resistant to eavesdropping and to a

  13. Core software security security at the source

    CERN Document Server

    Ransome, James

    2013-01-01

    First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan

  14. THEORY OF SPARE PARTS INVENTORY MANAGEMENT FOR PRODUCTION EQUIPMENT

    OpenAIRE

    KATARZYNA GRONDYS

    2013-01-01

    This article presents theoretical basis of spare parts inventory management in manufacturing company. Basis definitions, allocation and differences in spare parts inventory management were compared with other manufacturing inventories. The issue of spare parts inventory management is emphasized in aspect of maintaining continuity of production and generated costs of maintaining inventory.

  15. Inventory processes for HANDI 2000 business management system

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, D.

    1998-08-24

    Inventory records are maintained in the following inventory systems: HIP, (Spare Parts), WIM, (General Supplies): Convenient Storage, Shop Stock, Essential Materials, Special Tools, ESP (Excess Inventory). Requisitions for replenishment of inventory items are initiated in the respective inventory system and then forwarded to the purchasing system.

  16. 26 CFR 1.1013-1 - Property included in inventory.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 11 2010-04-01 2010-04-01 true Property included in inventory. 1.1013-1 Section... inventory. The basis of property required to be included in inventory is the last inventory value of such property in the hands of the taxpayer. The requirements with respect to the valuation of an inventory are...

  17. 10 CFR 300.6 - Emissions inventories.

    Science.gov (United States)

    2010-01-01

    ... reporting entity (although a reporting entity often makes these types of adjustments when calculating... without also reporting an inventory of the total emissions, but such entities should inventory and report... with the entity's initial entity statement. (2) After starting to report, each reporting entity that...

  18. 43 CFR 10.9 - Inventories.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Inventories. 10.9 Section 10.9 Public... Museums and Federal Collections § 10.9 Inventories. (a) General. This section carries out section 5 of the Act. Under section 5 of the Act, each museum or Federal agency that has possession or control over...

  19. A Validation of the Emotional Intelligence Inventory.

    Science.gov (United States)

    Tapia, Martha; Marsh, George E., II

    This study examined the concurrent validity of the Emotional Intelligence Inventory (M. Tapia, 2001) and the Emotional Intelligence Scale (N. Schutte and others, 1998). The responses to the inventories of 234 college students, 84 males and 250 females, were analyzed. Correlations between the total score on the two scales were significant.…

  20. B Plant exhaust filter inventory analysis

    International Nuclear Information System (INIS)

    Lan, J.S.; Wootan, D.W.; Carter, L.L.; Bunch, W.L.; Covey, L.I.; Greenborg, J.

    1994-10-01

    This paper describes a method for determining radionuclide inventories in filters using measurements of radiation fields that determine photon dose rates and photon-plus-electron dose rates between filter banks. The mathematical approach quantifies the curie inventories of filter banks by using the measured dose rates and the calculated Green's functions involving detector responses per unit source