WorldWideScience

Sample records for security complex inventories

  1. Designing Intelligent Secure Android Application for Effective Chemical Inventory

    Science.gov (United States)

    Shukran, Mohd Afizi Mohd; Naim Abdullah, Muhammad; Nazri Ismail, Mohd; Maskat, Kamaruzaman; Isa, Mohd Rizal Mohd; Shahfee Ishak, Muhammad; Adib Khairuddin, Muhamad

    2017-08-01

    Mobile services support various situations in everyday life and with the increasing sophistication of phone functions, the daily life is much more easier and better especially in term of managing tools and apparatus. Since chemical inventory management system has been experiencing a new revolution from antiquated to an automated inventory management system, some additional features should be added in current chemical inventory system. Parallel with the modern technologies, chemical inventory application using smart phone has been developed. Several studies about current related chemical inventory management using smart phone application has been done in this paper in order to obtain an overview on recent studies in smartphone application for chemical inventory system which are needed in schools, universities or other education institutions. This paper also discuss about designing the proposed secure mobile chemical inventory system. The study of this paper can provide forceful review analysis support for the chemical inventory management system related research.

  2. Reducing food wastage, improving food security? An inventory study on stakeholders’ perspectives and the current state

    NARCIS (Netherlands)

    Tielens, J.; Candel, J.J.L.

    2014-01-01

    This study is concerned with the relation between food wastage reduction and the improvement of food security. The central question of this inventory study is to what extent interventions to reduce food wastage are effective contributions for food security, in particular for local access in

  3. Design tools for complex dynamic security systems.

    Energy Technology Data Exchange (ETDEWEB)

    Byrne, Raymond Harry; Rigdon, James Brian; Rohrer, Brandon Robinson; Laguna, Glenn A.; Robinett, Rush D. III (.; ); Groom, Kenneth Neal; Wilson, David Gerald; Bickerstaff, Robert J.; Harrington, John J.

    2007-01-01

    The development of tools for complex dynamic security systems is not a straight forward engineering task but, rather, a scientific task where discovery of new scientific principles and math is necessary. For years, scientists have observed complex behavior but have had difficulty understanding it. Prominent examples include: insect colony organization, the stock market, molecular interactions, fractals, and emergent behavior. Engineering such systems will be an even greater challenge. This report explores four tools for engineered complex dynamic security systems: Partially Observable Markov Decision Process, Percolation Theory, Graph Theory, and Exergy/Entropy Theory. Additionally, enabling hardware technology for next generation security systems are described: a 100 node wireless sensor network, unmanned ground vehicle and unmanned aerial vehicle.

  4. A retrospective study of phonetic inventory complexity in acquisition of Spanish: Implications for phonological universals

    OpenAIRE

    Cataño, Lorena; Barlow, Jessica A.; Moyna, María Irene

    2009-01-01

    This study evaluates 39 different phonetic inventories of 16 Spanish-speaking children (ages 0;11 to 5;1) in terms of hierarchical complexity. Phonetic featural differences are considered in order to evaluate the proposed implicational hierarchy of Dinnsen et al.’s phonetic inventory typology for English. The children’s phonetic inventories are examined independently and in relation to one another. Five hierarchical complexity levels are proposed, similar to those of English and other languag...

  5. Physical security technologies for weapons complex reconfiguration facilities

    International Nuclear Information System (INIS)

    Jaeger, C.D.

    1994-01-01

    Sandia National Laboratories was a member of the Weapons Complex Reconfiguration (WCR) Safeguards and Security (S ampersand S) team providing assistance to the Department of Energy's (DOE) Office of Weapons Complex Reconfiguration. The physical security systems in the new and upgraded facilities being considered for the WCR had to meet DOE orders and other requirements set forth in the WCR Programmatic Design Criteria (PDC), incorporate the latest physical security technologies using proven state-of-the-art systems and meet fundamental security principles. The outcome was to avoid costly retrofits and provide effective and comprehensive protection against current and projected threats with minimal impact on operations, costs and schedule. Physical security requirements for WCR facilities include: (1) reducing S ampersand S life-cycle costs, (2) where feasible automating S ampersand S functions to minimize operational costs, access to critical assets and exposure of people to hazardous environments, (3) increasing the amount of delay to outsider adversary attack, (4) compartmentalizing the facility to minimize the number of personnel requiring access to critical areas and (5) having reliable and maintainable systems. To be most effective against threats physical security must be integrated with facility operations, safety and other S ampersand S activities, such as material control and accountability, nuclear measurements and computer and information security. This paper will discuss the S ampersand S issues, requirements, technology opportunities and needs. Physical security technologies and systems considered in the design effort of the Weapons Complex Reconfiguration facilities will be reviewed

  6. Study of Intelligent Secure Chemical Inventory Management System

    Science.gov (United States)

    Shukran, Mohd Afizi Mohd; Naim Abdullah, Muhammad; Nazri Ismail, Mohd; Maskat, Kamaruzaman; Isa, Mohd Rizal Mohd; Shahfee Ishak, Muhammad; Adib Khairuddin, Muhamad

    2017-08-01

    Chemical inventory management system has been experiencing a new revolution from traditional inventory system which is manual to an automated inventory management system. In this paper, some review of the classic and modern approaches to chemical inventory management system has been discussed. This paper also describe about both type of inventory management. After a comparative analysis of the traditional method and automated method, it can be said that both methods have some distinctive characteristics. Moreover, the automated inventory management method has higher accuracy of calculation because the calculations are handled by software, eliminating possible errors and saving time. The automated inventory system also allows users and administrators to track the availability, location and consumption of chemicals. The study of this paper can provide forceful review analysis support for the chemical inventory management related research.

  7. Security Inequalities in North America: Reassessing Regional Security Complex Theory

    Directory of Open Access Journals (Sweden)

    Richard Kilroy

    2017-12-01

    Full Text Available This article re-evaluates earlier work done by the authors on Regional Security Complex Theory (RSCT in North America, using sectoral analysis initially developed by Buzan and Waever, but also adding the variables of institutions, identity, and interests. These variables are assessed qualitatively in the contemporary context on how they currently impress upon the process of securitization within sectoral relations between Canada, Mexico, and the United States. The article reviews the movement from bilateral security relations between these states to the development of a trilateral response to regional security challenges post- 9/11. It further addresses the present period and what appears to be a security process derailed by recent political changes and security inequalities, heightened by the election of Donald Trump in 2016. The article argues that while these three states initially evinced a convergence of regional security interests after 9/11, which did create new institutional responses, under the current conditions, divergence in political interests and security inequalities have reduced the explanatory power of RSCT in North America. Relations between states in North American are becoming less characterized by the role of institutions and interests and more by identity politics in the region.

  8. Assessment of private security guards by Suicide Probability Scale and Brief Symptom Inventory.

    Science.gov (United States)

    Dogan, Bulent; Canturk, Gurol; Canturk, Nergis; Guney, Sevgi; Özcan, Ebru

    2016-01-01

    The aim of the present study was to investigate the influence of suicide probability and relevant sociodemographic features and to provide information for preventing suicide in private security guards working under the stressful conditions and continuous exposure to the negative and traumatic life events. 200 private security guards and 200 personnels of Ankara University participated in the study. A sociodemographic information questionnaire, the Suicide Probability Scale (SPS) and the Brief Symptom Inventory (BSI) were used to collect the data. Gender, marital status, income, religious beliefs, experiencing a life-threatening situation, history of a suicide attempt, smoking and not having a chronic disease caused statistically significant differences in the scores for SPS between the private security guards group and the controls. Moreover there was a statistically significant positive correlation between the total scores of the subscales of SPS and the total scores of BSI. Like police officers and gendarmes, private security guards are at high risk of committing and attempting suicide because of being at stressful work settings and also suffering from secondary trauma. It is required that they should be aware of their tendency to commit suicide and have regular psychiatric screenings.

  9. Complexity Studies and Security in the Complex World: An Epistemological Framework of Analysis

    Science.gov (United States)

    Mesjasz, Czeslaw

    The impact of systems thinking can be found in numerous security-oriented research, beginning from the early works on international system: Pitrim Sorokin, Quincy Wright, first models of military conflict and war: Frederick Lanchester, Lewis F. Richardson, national and military security (origins of RAND Corporation), through development of game theory-based conflict studies, International Relations, classical security studies of Morton A. Kaplan, Karl W. Deutsch [Mesjasz 1988], and ending with contemporary ideas of broadened concepts of security proposed by the Copenhagen School [Buzan et al 1998]. At present it may be even stated that the new military and non-military threats to contemporary complex society, such as low-intensity conflicts, regional conflicts, terrorism, environmental disturbances, etc. cannot be embraced without ideas taken from modern complex systems studies.

  10. Nevada National Security Site Underground Radionuclide Inventory, 1951-1992: Accounting for Radionuclide Decay through September 30, 2012

    Energy Technology Data Exchange (ETDEWEB)

    Finnegan, David Lawrence [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Bowen, Scott Michael [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Thompson, Joseph L. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Miller, Charles M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Baca, Phyllis L. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Olivas, Loretta F. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Geoffrion, Carmen G. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Smith, David K. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Goishi, Wataru [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Esser, Bradley K. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Meadows, Jesse W. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Namboodiri, Neil [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Wild, John F. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-03-16

    This report is an update of report LA-13859-MS (Bowen et al., 2001). In that original report, the underground radionuclide inventory at the Nevada National Security Site (NNSS) was decay corrected to September 23, 1992, the date of the last underground nuclear test at the NNSS. In this report, the inventory is updated to account for the decay of radionuclides over two additional decades (1992-2012) and revised tritium, fission product and actinide inventory figures and tables are presented. The maximum contaminant levels for radionuclides were also updated to Safe Drinking Water Act Maximum Contaminant Levels (MCLs) (CFR, 2013). Also, a number of minor errata found in the original publication were corrected. An inventory of radionuclides produced by 828 underground nuclear tests conducted at the NNSS by the Lawrence Livermore National Laboratory, the Los Alamos National Laboratory, and the Department of the Defense from 1951 to 1992 includes tritium, fission products, actinides, and activation products. The inventory presented in this report provides an estimate of radioactivity remaining underground at the NNSS after nuclear testing. The original test inventory is decayed to September 30, 2012, and predictions of inventory decay over the subsequent 1000 years are presented. For the purposes of summary and publication, the Los Alamos National Laboratory and Lawrence Livermore National Laboratory authors of this report subdivided the inventory into five areas corresponding to the principal geographic test centers at the NNSS. The five areas roughly correspond to Underground Test Area “Corrective Action Units” (CAUs) for remediation of groundwater. In addition, the inventory is further subdivided for the Yucca Flat region by tests where the working point depth is more than 328 feet (100 meters) above the water table and tests that were detonated below that level. Water levels used were those from the U. S. Department of Energy, Nevada Operations Office (1997

  11. Complex networks: Dynamics and security

    Indian Academy of Sciences (India)

    This paper presents a perspective in the study of complex networks by focusing on how dynamics may affect network security under attacks. ... Department of Mathematics and Statistics, Arizona State University, Tempe, Arizona 85287, USA; Institute of Mathematics and Computer Science, University of Sao Paulo, Brazil ...

  12. Competing policy packages and the complexity of energy security

    International Nuclear Information System (INIS)

    Sovacool, Benjamin K.; Saunders, Harry

    2014-01-01

    To underscore both the diversity and severity of energy security tradeoffs, this study examines five different energy security policy packages—five distinct strategies aimed at reducing oil dependence, enhancing energy affordability, expanding access to modern energy services, responding to climate change, and minimizing the water intensity of energy production. It identifies both compelling synergies and conflicts between each of the five strategies. The central value of the study is that it turns on its head the widely accepted notion of a “portfolio approach” or “all of the above” strategy to energy policymaking. To make this case, the article begins by elucidating the complexity and multidimensionality of energy security as a concept. It then introduces our five energy security policy packages to illustrate how some energy security objectives complement each other whereas others counteract each other. It concludes by noting that energy security is not an absolute state, and that achieving it only “works” by prioritizing some dimensions, or policy goals and packages, more than others. - Highlights: • Energy security is a complex, multidimensional concept. • Policy packages aimed at achieving energy security often conflict with each other. • Energy security only “works” by prioritizing some dimensions more than others

  13. Analysis of Dynamic Complexity of the Cyber Security Ecosystem of Colombia

    Directory of Open Access Journals (Sweden)

    Angélica Flórez

    2016-07-01

    Full Text Available This paper presents two proposals for the analysis of the complexity of the Cyber security Ecosystem of Colombia (CEC. This analysis shows the available knowledge about entities engaged in cyber security in Colombia and the relationships between them, which allow an understanding of the synergy between the different existing components. The complexity of the CEC is detailed from the view of the Influence Diagram of System Dynamics and the Domain Diagram of Software Engineering. The resulting model makes cyber security evident as a strategic component of national security.

  14. Y‑12 National Security Complex

    Data.gov (United States)

    Federal Laboratory Consortium — The Y‑12 National Security Complex is a premier manufacturing facility dedicated to making our nation and the world a safer place and plays a vital role in the...

  15. Complexity of food preparation and food security status in low-income young women.

    Science.gov (United States)

    Engler-Stringer, Rachel; Stringer, Bernadette; Haines, Ted

    2011-01-01

    This study was conducted to explore whether preparing more complex meals was associated with higher food security status. This mixed-methods, community-based study involved the use of semistructured interviews to examine the cooking practices of a group of young, low-income women in Montreal. Fifty participants aged 18 to 35 were recruited at 10 locations in five low-income neighbourhoods. Food security status was the main outcome measure and the main exposure variable, "complex food preparation," combined the preparation of three specific food types (soups, sauces, and baked goods) using basic ingredients. Low-income women preparing a variety of meals using basic ingredients at least three times a week were more than twice as likely to be food secure as were women preparing more complex meals less frequently. Women who prepared more complex meals more frequently had higher food security. Whether this means that preparing more complex foods results in greater food security remains unclear, as this was an exploratory study.

  16. A Complex Systems Approach to More Resilient Multi-Layered Security Systems

    Energy Technology Data Exchange (ETDEWEB)

    Brown, Nathanael J. K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Katherine A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Bandlow, Alisa [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nozick, Linda Karen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Waddell, Lucas [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Levin, Drew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Whetzel, Jonathan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-09-01

    In July 2012, protestors cut through security fences and gained access to the Y-12 National Security Complex. This was believed to be a highly reliable, multi-layered security system. This report documents the results of a Laboratory Directed Research and Development (LDRD) project that created a consistent, robust mathematical framework using complex systems analysis algorithms and techniques to better understand the emergent behavior, vulnerabilities and resiliency of multi-layered security systems subject to budget constraints and competing security priorities. Because there are several dimensions to security system performance and a range of attacks that might occur, the framework is multi-objective for a performance frontier to be estimated. This research explicitly uses probability of intruder interruption given detection (PI) as the primary resilience metric. We demonstrate the utility of this framework with both notional as well as real-world examples of Physical Protection Systems (PPSs) and validate using a well-established force-on-force simulation tool, Umbra.

  17. Security of fissile materials in Russia

    International Nuclear Information System (INIS)

    Bukharin, O.

    1996-01-01

    The problem of security of huge stocks of weapons-usable highly enriched uranium and plutonium in Russia against theft or diversion remains a serious nonproliferation concern. During the Cold War, the security of Soviet nuclear materials was based on centralization and discipline, protection by the military, and intrusive political oversight of the people. The recent fundamental societal changes have rendered these arrangements inadequate, and the security of nuclear materials has decreased. Safeguarding nuclear materials in Russia is particularly difficult because of their very large inventories and the size and complexity of the nation's nuclear infrastructure. Russia needs a reliable and more objective technology-based system of nuclear safeguards designed to control nuclear materials. The Russian government and the international community are working towards this goal

  18. Problems of Ensuring Complex Business Security in the Conditions of Modern Globalization

    OpenAIRE

    Anatoliy Petrovich Sterkhov

    2015-01-01

    From the viewpoint of ensuring complex business security, the relevance of the present work is associated with the rationale of multilevel hierarchical approach to the classification of security threats in the age of globalization. The specificity of the threats specific to one or another level of the economy, helps to better understand and consequently to build an effective system of ensuring complex business security. For each of the nine hierarchical levels of the economy the author identi...

  19. Analysis of the low-level waste radionuclide inventory for the Radioactive Waste Management Complex performance assessment

    Energy Technology Data Exchange (ETDEWEB)

    Plansky, L.E.; Hoiland, S.A.

    1992-02-01

    This report summarizes the results of a study to improve the estimates of the radionuclides in the low-level radioactive waste (LLW) inventory which is buried in the Idaho National Engineering Laboratory (INEL) Radioactive Waste Management Complex (RWMC) Subsurface Disposal Area (SDA). The work is done to support the RWMC draft performance assessment (PA). Improved radionuclide inventory estimates are provided for the INEL LLW generators. Engineering, environmental assessment or other research areas may find use for the information in this report. It may also serve as a LLW inventory baseline for data quality assurance. The individual INEL LLW generators, their history and their activities are also described in detail.

  20. Analysis of the low-level waste radionuclide inventory for the Radioactive Waste Management Complex performance assessment

    International Nuclear Information System (INIS)

    Plansky, L.E.; Hoiland, S.A.

    1992-02-01

    This report summarizes the results of a study to improve the estimates of the radionuclides in the low-level radioactive waste (LLW) inventory which is buried in the Idaho National Engineering Laboratory (INEL) Radioactive Waste Management Complex (RWMC) Subsurface Disposal Area (SDA). The work is done to support the RWMC draft performance assessment (PA). Improved radionuclide inventory estimates are provided for the INEL LLW generators. Engineering, environmental assessment or other research areas may find use for the information in this report. It may also serve as a LLW inventory baseline for data quality assurance. The individual INEL LLW generators, their history and their activities are also described in detail

  1. Joint inventory control and pricing in a service-inventory system

    DEFF Research Database (Denmark)

    Marand, Ata Jalili; Li, Hongyan Jenny; Thorstenson, Anders

    2017-01-01

    This study addresses joint inventory control and pricing decisions for a service-inventory system. In such a system both an on-hand inventory item and a positive service time are required to fulfill customer demands. The service-inventory system also captures main features of the classical...... inventory systems with a positive processing time, e.g., make-to-order systems. In this study, the service-inventory system is modeled as an M/M/1 queue in which the customer arrival rate is price dependent. The inventory of an individual item is continuously reviewed under an (r,Q) policy....... The replenishment lead times of the inventory are exponentially distributed. Furthermore, customers arriving during stock-out periods are lost. The stochastic customer inter-arrival times, service times, and inventory replenishment lead times cause the high complexity of the problem and the difficulty in solving it...

  2. Problems of Ensuring Complex Business Security in the Conditions of Modern Globalization

    Directory of Open Access Journals (Sweden)

    Anatoliy Petrovich Sterkhov

    2015-12-01

    Full Text Available From the viewpoint of ensuring complex business security, the relevance of the present work is associated with the rationale of multilevel hierarchical approach to the classification of security threats in the age of globalization. The specificity of the threats specific to one or another level of the economy, helps to better understand and consequently to build an effective system of ensuring complex business security. For each of the nine hierarchical levels of the economy the author identifies the main threats to the business, as well as the objects and subjects of this study. It is noted that the performance of the business in the form of a complex hierarchical system depends on the principle of specification. The author gives examples of the use of the basic principles of specification. It is noted that the decomposition of the economic system from the viewpoint of its hierarchical nature is of great importance not only to the distribution of the goals and objectives of security of business levels of the system, but their subordination corresponding to each level. The result is the development of specific recommendations and elaboration of the main directions to ensure complex business security for mega-, macro-, micro-, mini-, nano - and mesoeconomic levels. Although the priority of action in multi-level hierarchical system is directed from the upper to the lower levels, the success of the system as a whole depends on the behavior of all system components. It is stated that the interaction with the environment in business occurs mainly in the lower levels of the hierarchy. The quality system of ensuring complex business security which deals with hierarchical positions, will depend not so much on top-level elements, but on response to intervention on the part of lower level, more precisely from their total effect. In other words, the quality of the system of integrated safety management business provides organized feedbacks in the system.

  3. Joining inventory by parataxonomists with DNA barcoding of a large complex tropical conserved wildland in northwestern Costa Rica.

    Directory of Open Access Journals (Sweden)

    Daniel H Janzen

    Full Text Available BACKGROUND: The many components of conservation through biodiversity development of a large complex tropical wildland, Area de Conservacion Guanacaste (ACG, thrive on knowing what is its biodiversity and natural history. For 32 years a growing team of Costa Rican parataxonomists has conducted biodiversity inventory of ACG caterpillars, their food plants, and their parasitoids. In 2003, DNA barcoding was added to the inventory process. METHODOLOGY/PRINCIPAL FINDINGS: We describe some of the salient consequences for the parataxonomists of barcoding becoming part of a field biodiversity inventory process that has centuries of tradition. From the barcoding results, the parataxonomists, as well as other downstream users, gain a more fine-scale and greater understanding of the specimens they find, rear, photograph, database and deliver. The parataxonomists also need to adjust to collecting more specimens of what appear to be the "same species"--cryptic species that cannot be distinguished by eye or even food plant alone--while having to work with the name changes and taxonomic uncertainty that comes with discovering that what looked like one species may be many. CONCLUSIONS/SIGNIFICANCE: These career parataxonomists, despite their lack of formal higher education, have proven very capable of absorbing and working around the additional complexity and requirements for accuracy and detail that are generated by adding barcoding to the field base of the ACG inventory. In the process, they have also gained a greater understanding of the fine details of phylogeny, relatedness, evolution, and species-packing in their own tropical complex ecosytems. There is no reason to view DNA barcoding as incompatible in any way with tropical biodiversity inventory as conducted by parataxonomists. Their year-round on-site inventory effort lends itself well to the sampling patterns and sample sizes needed to build a thorough barcode library. Furthermore, the biological

  4. Data Exchange Inventory System for Telecommunications and Systems Operations (DEXI-OTSO)

    Data.gov (United States)

    Social Security Administration — This Data Exchange Inventory (DEXI) for the Office of Telecommunications and System Operations, (OTSO) Network Troubleshooting is a browser-based inventory database...

  5. Recycled Uranium Mass Balance Project Y-12 National Security Complex Site Report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-12-01

    This report has been prepared to summarize the findings of the Y-12 National Security Complex (Y-12 Complex) Mass Balance Project and to support preparation of associated U. S. Department of Energy (DOE) site reports. The project was conducted in support of DOE efforts to assess the potential for health and environmental issues resulting from the presence of transuranic (TRU) elements and fission products in recycled uranium (RU) processed by DOE and its predecessor agencies. The United States government used uranium in fission reactors to produce plutonium and tritium for nuclear weapons production. Because uranium was considered scarce relative to demand when these operations began almost 50 years ago, the spent fuel from U.S. fission reactors was processed to recover uranium for recycling. The estimated mass balance for highly enriched RU, which is of most concern for worker exposure and is the primary focus of this project, is summarized in a table. A discrepancy in the mass balance between receipts and shipments (plus inventory and waste) reflects an inability to precisely distinguish between RU and non-RU shipments and receipts involving the Y-12 Complex and Savannah River. Shipments of fresh fuel (non-RU) and sweetener (also non-RU) were made from the Y-12 Complex to Savannah River along with RU shipments. The only way to distinguish between these RU and non-RU streams using available records is by enrichment level. Shipments of {le}90% enrichment were assumed to be RU. Shipments of >90% enrichment were assumed to be non-RU fresh fuel or sweetener. This methodology using enrichment level to distinguish between RU and non-RU results in good estimates of RU flows that are reasonably consistent with Savannah River estimates. Although this is the best available means of distinguishing RU streams, this method does leave a difference of approximately 17.3 MTU between receipts and shipments. Slightly depleted RU streams received by the Y-12 Complex from ORGDP and

  6. Effective software-oriented cryptosystem in complex PC security software

    Directory of Open Access Journals (Sweden)

    A. Moldovyan

    1995-02-01

    Full Text Available To ensure high encryption rate and good data security, an organization of an encipherement program in the form of two modules was proposed. The first module is used for customizing the second one, the latter being the resident of the program, which maintains all application calls about encryption procedures. This approach is shown to be perspective for the elaboration of the cryptosystems with indefinite cryptalgorithm. Several typical software-oriented cryptoschemes are considered. The developed cryptomodules have high encipherement rate (2-10 Mbps for Intel 386 and secure high information protection level Organization of a new computer security software complex COBRA is considered. High enciphering rate and good data protection are provided by the resident cryptomodule using less than 1 kbyte of the main memory and working in dynamic encryption mode.

  7. Collaborative Decision Making Process for Complex Defense, Security and Stability Challenges

    NARCIS (Netherlands)

    Bemmel, I.E. van; Eikelboom, A.R.

    2014-01-01

    How to intervene in crises and conflicts? How to cope with complex challenges in the field of defense, security and stability? Questions like these are difficult to answer due to amongst others the involvement of multiple stakeholders that contribute to these complex challenges and need to cooperate

  8. Nuclear materials inventory plan

    International Nuclear Information System (INIS)

    Doerr, R.W.; Nichols, D.H.

    1982-03-01

    In any processing, manufacturing, or active storage facility it is impractical to assume that any physical security system can prevent the diversion of Special Nuclear Material (SNM). It is, therefore, the responsibility of any DOE Contractor, Licensee, or other holder of SNM to provide assurance that loss or diversion of a significant quantity of SNM is detectable. This ability to detect must be accomplishable within a reasonable time interval and can be accomplished only by taking physical inventories. The information gained and decisions resulting from these inventories can be no better than the SNM accounting system and the quality of measurements performed for each receipt, removal and inventory. Inventories interrupt processing or production operations, increase personnel exposures, and can add significantly to the cost of any operation. Therefore, realistic goals for the inventory must be defined and the relationship of the inherent parameters used in its validation be determined. Purpose of this document is to provide a statement of goals and a plan of action to achieve them

  9. A Continuous Automated Vault Inventory System (CAVIS) for accountability monitoring of stored nuclear materials

    International Nuclear Information System (INIS)

    Pickett, C.A.; Barham, M.A.; Gafford, T.A.; Hutchinson, D.P.; Jordan, J.K.; Maxey, L.C.; Moran, B.W.; Muhs, J.; Nodine, R.; Simpson, M.L.

    1994-01-01

    Nearly all facilities that store hazardous (radioactive or non-radioactive) materials must comply with prevailing federal, state, and local laws. These laws usually have components that require periodic physical inspections to insure that all materials remain safely and securely stored. The inspections are generally labor intensive, slow, put personnel at risk, and only find anomalies after they have occurred. The system described in this paper was developed for monitoring stored nuclear materials resulting from weapons dismantlement, but its applications extend to any storage facility that meets the above criteria. The traditional special nuclear material (SNM) accountability programs, that are currently used within most of the Department of Energy (DOE) complex, require the physical entry of highly trained personnel into SNM storage vaults. This imposes the need for additional security measures, which typically mandate that extra security personnel be present while SNM inventories are performed. These requirements increase labor costs and put additional personnel at risk to radiation exposure. In some cases, individuals have received radiation exposure equivalent to the annual maximum during just one inventory verification. With increasing overhead costs, the current system is rapidly becoming too expensive to operate, the need for an automated method of inventory verification is evident. The Continuous Automated Vault Inventory System (CAVIS) described in this paper was designed and prototyped as a low cost, highly reliable, and user friendly system that is capable of providing, real-time weight, gamma. and neutron energy confirmation from each item stored in a SNM vault. This paper describes the sensor technologies, the CAVIS prototype system (built at Y- 12 for highly enriched uranium storage), the technical requirements that must be achieved to assure successful implementation, and descriptions of sensor technologies needed for a plutonium facility

  10. A Continuous Automated Vault Inventory System (CAVIS) for accountability monitoring of stored nuclear materials

    Energy Technology Data Exchange (ETDEWEB)

    Pickett, C.A.; Barham, M.A.; Gafford, T.A.; Hutchinson, D.P.; Jordan, J.K.; Maxey, L.C.; Moran, B.W.; Muhs, J.; Nodine, R.; Simpson, M.L. [and others

    1994-12-08

    Nearly all facilities that store hazardous (radioactive or non-radioactive) materials must comply with prevailing federal, state, and local laws. These laws usually have components that require periodic physical inspections to insure that all materials remain safely and securely stored. The inspections are generally labor intensive, slow, put personnel at risk, and only find anomalies after they have occurred. The system described in this paper was developed for monitoring stored nuclear materials resulting from weapons dismantlement, but its applications extend to any storage facility that meets the above criteria. The traditional special nuclear material (SNM) accountability programs, that are currently used within most of the Department of Energy (DOE) complex, require the physical entry of highly trained personnel into SNM storage vaults. This imposes the need for additional security measures, which typically mandate that extra security personnel be present while SNM inventories are performed. These requirements increase labor costs and put additional personnel at risk to radiation exposure. In some cases, individuals have received radiation exposure equivalent to the annual maximum during just one inventory verification. With increasing overhead costs, the current system is rapidly becoming too expensive to operate, the need for an automated method of inventory verification is evident. The Continuous Automated Vault Inventory System (CAVIS) described in this paper was designed and prototyped as a low cost, highly reliable, and user friendly system that is capable of providing, real-time weight, gamma. and neutron energy confirmation from each item stored in a SNM vault. This paper describes the sensor technologies, the CAVIS prototype system (built at Y- 12 for highly enriched uranium storage), the technical requirements that must be achieved to assure successful implementation, and descriptions of sensor technologies needed for a plutonium facility.

  11. Securing Digital Audio using Complex Quadratic Map

    Science.gov (United States)

    Suryadi, MT; Satria Gunawan, Tjandra; Satria, Yudi

    2018-03-01

    In This digital era, exchanging data are common and easy to do, therefore it is vulnerable to be attacked and manipulated from unauthorized parties. One data type that is vulnerable to attack is digital audio. So, we need data securing method that is not vulnerable and fast. One of the methods that match all of those criteria is securing the data using chaos function. Chaos function that is used in this research is complex quadratic map (CQM). There are some parameter value that causing the key stream that is generated by CQM function to pass all 15 NIST test, this means that the key stream that is generated using this CQM is proven to be random. In addition, samples of encrypted digital sound when tested using goodness of fit test are proven to be uniform, so securing digital audio using this method is not vulnerable to frequency analysis attack. The key space is very huge about 8.1×l031 possible keys and the key sensitivity is very small about 10-10, therefore this method is also not vulnerable against brute-force attack. And finally, the processing speed for both encryption and decryption process on average about 450 times faster that its digital audio duration.

  12. 45 CFR 1336.67 - Security and collateral: Responsibilities of the Loan Administrator.

    Science.gov (United States)

    2010-10-01

    ... inventory or proceeds of inventory sales as well as marketable securities and cash collateral accounts. (1... security at any time during the term of the loan if after review and monitoring an assessment indicates the...

  13. 78 FR 6168 - Public Availability of Social Security Administration Fiscal Year (FY) 2012 Service Contract...

    Science.gov (United States)

    2013-01-29

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2013-0001] Public Availability of Social Security Administration Fiscal Year (FY) 2012 Service Contract Inventory AGENCY: Social Security Administration. ACTION: Notice of Public Availability of FY 2012 Service Contract Inventories. SUMMARY: In accordance with...

  14. 77 FR 3836 - Public Availability of Social Security Administration Fiscal Year (FY) 2011 Service Contract...

    Science.gov (United States)

    2012-01-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0105] Public Availability of Social Security Administration Fiscal Year (FY) 2011 Service Contract Inventory AGENCY: Social Security Administration. ACTION: Notice of Public Availability of FY 2011 Service Contract Inventories. SUMMARY: In accordance with...

  15. The Role Of Commercially Provided Security in Africa's Patrimonial Security Complexes

    OpenAIRE

    Kinsey, Christopher; Krieg, Andreas

    2014-01-01

    With the concept of public security generally absent in Africa and a factionalized security sector of both state and non-state actors delivering security exclusively to certain groups affiliated with patrimonial elites, this paper examines the role of commercial providers of security within African security sectors. In factionalized security sectors with limited territorial reach, the state unable or unwilling to provide security as a public good within its boundaries has long lost its monopo...

  16. Sensor concentrator unit for the Continuous Automated Vault Inventory System

    Energy Technology Data Exchange (ETDEWEB)

    Nodine, R.N.; Lenarduzzi, R.

    1997-06-01

    The purpose of this document is to describe the use and operation of the sensor concentrator in the Continuous Automated Vault Inventory System (CAVIS). The CAVIS electronically verifies the presence of items of stored special nuclear material (SNM). US Department of Energy orders require that stored SNM be inventoried periodically to provide assurance that the material is secure. Currently this inventory is a highly manual activity, requiring personnel to enter the storage vaults. Using a CAVIS allows the frequency of physical inventories to be significantly reduced, resulting in substantial cost savings, increased security, and improved safety. The electronic inventory of stored SNM requires two different types of sensors for each item. The two sensors measure different parameters of the item, usually weight and gamma rays. A CAVIS is constructed using four basic system components: sensors, sensor concentrators, a data collection unit, and a database/user interface unit. One sensor concentrator supports the inventory of up to 20 items (40 sensors) and continuously takes readings from the item sensors. On request the sensor concentrator outputs the most recent sensor readings to the data collection unit. The information transfer takes place over a RS485 communications link. The data collection unit supports from 1 to 120 sensor concentrators (1 to 2,400 items) and is referred to as the Sensor Polling and Configuration System (SPCS). The SPCS is connected by a secure Transmission Control Protocol/Internet Protocol (TCP/IP) network to the database/user interface unit, which is referred to as the Graphical Facility Information Center (GraFIC). A CAVIS containing more than 2,400 items is supported by connecting additional SPCS units to the GraFIC.

  17. Sensor concentrator unit for the Continuous Automated Vault Inventory System

    International Nuclear Information System (INIS)

    Nodine, R.N.; Lenarduzzi, R.

    1997-06-01

    The purpose of this document is to describe the use and operation of the sensor concentrator in the Continuous Automated Vault Inventory System (CAVIS). The CAVIS electronically verifies the presence of items of stored special nuclear material (SNM). US Department of Energy orders require that stored SNM be inventoried periodically to provide assurance that the material is secure. Currently this inventory is a highly manual activity, requiring personnel to enter the storage vaults. Using a CAVIS allows the frequency of physical inventories to be significantly reduced, resulting in substantial cost savings, increased security, and improved safety. The electronic inventory of stored SNM requires two different types of sensors for each item. The two sensors measure different parameters of the item, usually weight and gamma rays. A CAVIS is constructed using four basic system components: sensors, sensor concentrators, a data collection unit, and a database/user interface unit. One sensor concentrator supports the inventory of up to 20 items (40 sensors) and continuously takes readings from the item sensors. On request the sensor concentrator outputs the most recent sensor readings to the data collection unit. The information transfer takes place over a RS485 communications link. The data collection unit supports from 1 to 120 sensor concentrators (1 to 2,400 items) and is referred to as the Sensor Polling and Configuration System (SPCS). The SPCS is connected by a secure Transmission Control Protocol/Internet Protocol (TCP/IP) network to the database/user interface unit, which is referred to as the Graphical Facility Information Center (GraFIC). A CAVIS containing more than 2,400 items is supported by connecting additional SPCS units to the GraFIC

  18. A novel sort of adaptive complex synchronizations of two indistinguishable chaotic complex nonlinear models with uncertain parameters and its applications in secure communications

    Science.gov (United States)

    Mahmoud, Emad E.; Abood, Fatimah S.

    In this paper, we will demonstrate the adaptive complex anti-lag synchronization (CALS) of two indistinguishable complex chaotic nonlinear systems with the parameters which are uncertain. The significance of CALS is not advised well in the literature yet. The CALS contains or consolidate two sorts of synchronizations (anti-lag synchronization ALS and lag synchronization LS). The state variable of the master system synchronizes with an alternate state variable of the slave system. Depending on the function of Lyapunov, a plan is orchestrated to achieve CALS of chaotic attractors of complex systems with unverifiable parameters. CALS of two indistinguishable complexes of Lü systems is viewed as, for example, an occasion for affirming the likelihood of the plan exhibited. In physics, we can see complex chaotic systems in numerous different applications, for example, applied sciences or engineering. With a specific end goal to affirm the proposed synchronization plan viability and demonstrate the hypothetical outcomes, we can compute the numerical simulation. The above outcomes will give the hypothetical establishment to the secure communication applications. CALS of complex chaotic systems in which a state variable of the master system synchronizes with an alternate state variable of the slave system is an encouraging sort of synchronization as it contributes excellent security in secure communication. Amid this secure communication, the synchronization between transmitter and collector is shut and message signals are recouped. The encryption and restoration of the signals are simulated numerically.

  19. Mirage: Mitigating Illicit Inventorying in a RFID Enabled Retail Environment

    OpenAIRE

    White, Jonathan; Banerjee, Nilanjan

    2010-01-01

    Given its low dollar and maintenance cost, RFID is poised to become the enabling technology for inventory control and supply chain management. However, as an outcome of its low cost, RFID based inventory control is susceptible to pernicious security and privacy threats. A deleterious attack on such a system is corporate espionage, where attackers through illicit inventorying infer sales and restocking trends for products. In this paper, we first present plausible aftermaths of corporate espio...

  20. Inventory Optimization through Safety Stock Schemata

    Directory of Open Access Journals (Sweden)

    Abdul Aleem

    2013-04-01

    Full Text Available In the complex business environment and stiff competition, inventory optimization in an industry's supply chain has gained tremendous significance. It has become business imperative to optimally tune the supply chain and save lot of working capital by reducing inventory levels; this can surely be done while increasing the customer service level and utilizing the internal capacities optimally. Stock out costs and stock surplus costs both impact businesses badly, the former in the form of opportunity loss and resultantly causing customer annoyance and later in high financial markups and increasing cost and reducing margins accordingly. So inventory optimization can essentially help to reduce costs, which results in a considerable improvement of the company performance indicators. Traditional IMS (Inventory Management System followed in a selected manufacturing industry has been examined for all types of inventories, i.e. raw materials; WIP (Work In Process, and finished goods as a case study. The paper suggests an optimized inventory model for an organization to provide the best possible customer service within the restraint of the lowest practical inventory costs. The safety stock optimization was implemented in a complex business environment and considerable savings were realized thereof

  1. Defining "The Weakest Link" Comparative Security in Complex Systems of Systems

    NARCIS (Netherlands)

    Pieters, Wolter

    2013-01-01

    Cloud architectures are complex socio-technical systems of systems, consisting not only of technological components and their connections, but also of physical premises and employees. When analysing security of such systems and considering countermeasures, the notion of "weakest link" often appears.

  2. Security Data Warehouse Application

    Science.gov (United States)

    Vernon, Lynn R.; Hennan, Robert; Ortiz, Chris; Gonzalez, Steve; Roane, John

    2012-01-01

    The Security Data Warehouse (SDW) is used to aggregate and correlate all JSC IT security data. This includes IT asset inventory such as operating systems and patch levels, users, user logins, remote access dial-in and VPN, and vulnerability tracking and reporting. The correlation of this data allows for an integrated understanding of current security issues and systems by providing this data in a format that associates it to an individual host. The cornerstone of the SDW is its unique host-mapping algorithm that has undergone extensive field tests, and provides a high degree of accuracy. The algorithm comprises two parts. The first part employs fuzzy logic to derive a best-guess host assignment using incomplete sensor data. The second part is logic to identify and correct errors in the database, based on subsequent, more complete data. Host records are automatically split or merged, as appropriate. The process had to be refined and thoroughly tested before the SDW deployment was feasible. Complexity was increased by adding the dimension of time. The SDW correlates all data with its relationship to time. This lends support to forensic investigations, audits, and overall situational awareness. Another important feature of the SDW architecture is that all of the underlying complexities of the data model and host-mapping algorithm are encapsulated in an easy-to-use and understandable Perl language Application Programming Interface (API). This allows the SDW to be quickly augmented with additional sensors using minimal coding and testing. It also supports rapid generation of ad hoc reports and integration with other information systems.

  3. The Justice of Improving Security and Confronting Poverty

    DEFF Research Database (Denmark)

    Farah, Abdulkadir Osman

    2016-01-01

    Following decades of postcolonial dictatorships and authoritarianism, many African countries have experienced expanded efforts by transnational organizations—from both top down and bottom up—aimed at alleviating poverty and improving security. This article provides a partial inventory of such eff......Following decades of postcolonial dictatorships and authoritarianism, many African countries have experienced expanded efforts by transnational organizations—from both top down and bottom up—aimed at alleviating poverty and improving security. This article provides a partial inventory...

  4. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  5. Modernization at the Y-12 National Security Complex: A Case for Additional Experimental Benchmarks

    Energy Technology Data Exchange (ETDEWEB)

    Thornbury, M. L. [Y-12 National Security Complex, Oak Ridge, TN (United States); Juarez, C. [Y-12 National Security Complex, Oak Ridge, TN (United States); Krass, A. W. [Y-12 National Security Complex, Oak Ridge, TN (United States)

    2017-08-14

    Efforts are underway at the Y-12 National Security Complex (Y-12) to modernize the recovery, purification, and consolidation of un-irradiated, highly enriched uranium metal. Successful integration of advanced technology such as Electrorefining (ER) eliminates many of the intermediate chemistry systems and processes that are the current and historical basis of the nuclear fuel cycle at Y-12. The cost of operations, the inventory of hazardous chemicals, and the volume of waste are significantly reduced by ER. It also introduces unique material forms and compositions related to the chemistry of chloride salts for further consideration in safety analysis and engineering. The work herein briefly describes recent investigations of nuclear criticality for 235UO2Cl2 (uranyl chloride) and 6LiCl (lithium chloride) in aqueous solution. Of particular interest is the minimum critical mass of highly enriched uranium as a function of the molar ratio of 6Li to 235U. The work herein also briefly describes recent investigations of nuclear criticality for 235U metal reflected by salt mixtures of 6LiCl or 7LiCl (lithium chloride), KCl (potassium chloride), and 235UCl3 or 238UCl3 (uranium tri-chloride). Computational methods for analysis of nuclear criticality safety and published nuclear data are employed in the absence of directly relevant experimental criticality benchmarks.

  6. How the Office of Safeguards and Security Technology development program facilitates safeguarding and securing the DOE complex

    International Nuclear Information System (INIS)

    Smoot, W.

    1995-01-01

    The technology development program's (TDP's) mission is to provide technologies or methodologies that address safeguards and security requirements throughout the U.S. DOE complex as well as to meet headquarters' policy needs. This includes developing state-of-the-art technologies or modifying existing technologies in physical security, material control and accountability, information security, and integrated safeguards systems. The TDP has an annual process during which it solicits user requirements from the field. These requirements are analyzed by DOE headquarters and laboratory personnel for technical merit. The requirements are then prioritized at headquarters, and the highest priorities are incorporated into our budget. Although this user-needs process occurs formally once a year, user requirements are accepted at any time. The status of funded technologies is communicated through briefings, programs reviews, and various documents that are available to all interested parties. Participants in several interagency groups allows our program to benefit from what others are doing and to prevent duplications of efforts throughout the federal community. Many technologies are transferred to private industry

  7. Analysis of costs-benefits tradeoffs of complex security systems

    International Nuclear Information System (INIS)

    Hicks, M.J.

    1996-01-01

    Essential to a systems approach to design of security systems is an analysis of the cost effectiveness of alternative designs. While the concept of analysis of costs and benefits is straightforward, implementation can be at the least tedious and, for complex designs and alternatives, can become nearly intractable without the help of structured analysis tools. PACAIT--Performance and Cost Analysis Integrated Tools--is a prototype tool. The performance side of the analysis collates and reduces data from ASSESS, and existing DOE PC-based security systems performance analysis tool. The costs side of the analysis uses ACE, an existing DOD PC-based costs analysis tool. Costs are reported over the full life-cycle of the system, that is, the costs to procure, operate, maintain and retire the system and all of its components. Results are collected in Microsoft reg-sign Excel workbooks and are readily available to analysts and decision makers in both tabular and graphical formats and at both the system and path-element levels

  8. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network.

    Directory of Open Access Journals (Sweden)

    Sumithra Alagarsamy

    Full Text Available Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff Equation using an Integration Factor (DiffEIF, minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network.

  9. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network.

    Science.gov (United States)

    Alagarsamy, Sumithra; Rajagopalan, S P

    2017-01-01

    Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network.

  10. US Department of Energy`s weapons complex scrap metal inventory. Research report

    Energy Technology Data Exchange (ETDEWEB)

    Duda, J.R.

    1993-07-01

    Two tasks comprise the thrust of this contracted effort. Task 1 is the development of a Source List and is based on determining a list of public documents pertaining to contaminated/uncontaminated scrap metals, equipment, and other materials of value, were they not contaminated or could they be decontaminated. Task 2 is to develop an inventory of such materials from the Task 1 list of public documentation. In more detail, the Task 2 Inventory Report is based upon fulfillment of the following requirement to prepare and submit an Inventory Report based on the information obtained in the Source List. The Inventory Report shall define the type, quantity, and location of used equipment, scrap metal, and other materials existing within DOE`s system. The Inventory Report shall list: the site where the equipment, scrap metal, or other material resides; the type and size of equipment; the type and volume and/or weight of scrap metal or other material; its source; the type and level of contamination; its accessibility; the current annual rate of generation; and the projected annual rate of generation of the material.

  11. A Genetic Algorithm on Inventory Routing Problem

    Directory of Open Access Journals (Sweden)

    Nevin Aydın

    2014-03-01

    Full Text Available Inventory routing problem can be defined as forming the routes to serve to the retailers from the manufacturer, deciding on the quantity of the shipment to the retailers and deciding on the timing of the replenishments. The difference of inventory routing problems from vehicle routing problems is the consideration of the inventory positions of retailers and supplier, and making the decision accordingly. Inventory routing problems are complex in nature and they can be solved either theoretically or using a heuristics method. Metaheuristics is an emerging class of heuristics that can be applied to combinatorial optimization problems. In this paper, we provide the relationship between vendor-managed inventory and inventory routing problem. The proposed genetic for solving vehicle routing problem is described in detail.

  12. On projective synchronization of hyperchaotic complex nonlinear systems based on passive theory for secure communications

    International Nuclear Information System (INIS)

    Mahmoud, Gamal M; Mahmoud, Emad E; Arafa, Ayman A

    2013-01-01

    In this paper we deal with the projective synchronization (PS) of hyperchaotic complex nonlinear systems and its application in secure communications based on passive theory. The unpredictability of the scaling factor in PS can additionally enhance the security of communications. In this paper, a scheme for secure message transmission is proposed, and we try to transmit more than one large or bounded message from the transmitter to the receiver. The new hyperchaotic complex Lorenz system is employed to encrypt these messages. In the transmitter, the original messages are modulated into its parameter. In the receiver, we assume that the parameter of the receiver system is uncertain. The controllers and corresponding parameter update law are constructed to achieve PS between the transmitter and receiver system with an uncertain parameter, and identify the unknown parameter via passive theory. The original messages can be recovered successfully through some simple operations by the estimated parameter. Numerical results have verified the effectiveness and feasibility of the presented method. (paper)

  13. Final Site-Wide Environmental Impact Statement for the Y-12 National Security Complex

    International Nuclear Information System (INIS)

    2001-01-01

    The National Nuclear Security Administration (NNSA) a separately organized agency within the U.S. Department of Energy (DOE) is responsible for providing the Nation with nuclear weapons and ensuring that those nuclear weapons remain safe, secure, and reliable. As one of the DOE major production facilities, the Y-12 National Security Complex has been DOE's primary site for enriched uranium processing and storage, and one of the manufacturing facilities for maintaining the U.S. nuclear weapons stockpile. In response to the end of the Cold War and changes in the world's political regimes, the emphasis of the U.S. weapons program has shifted dramatically over the past few years from developing and producing new weapons to dismantlement and maintenance of a smaller, enduring stockpile. The ''Stockpile Stewardship and Management Programmatic Environmental Impact Statement'' [SSM PEIS], DOE/EIS-0236, issued in September 1996, evaluated alternatives for maintaining the safety and reliability of the nuclear weapons stockpile without underground nuclear testing or production of new-design weapons. In the SSM PEIS Record of Decision (ROD), DOE decided to maintain the national security missions at the Y-12 National Security Complex, but to downsize Y-12 consistent with reduced requirements. These national security missions include (1) maintaining the capability and capacity to fabricate secondaries, limited life components, and case parts for nuclear response; (2) evaluating components and subsystems returned from the stockpile; (3) storing enriched uranium that is designated for national security purposes; (4) storing depleted uranium and lithium parts; (5) dismantling nuclear weapons secondaries returned from the stockpile; (6) processing uranium and lithium (which includes chemical recovery, purification, and conversion of enriched uranium and lithium to a form suitable for long-term storage and/or further use); and (7) providing support to weapons laboratories. During the

  14. Development of a symptoms questionnaire for complex regional pain syndrome and potentially related illnesses: the Trauma Related Neuronal Dysfunction Symptoms Inventory

    NARCIS (Netherlands)

    Collins, S.; van Hilten, J.J.; Marinus, J.J.; Zuurmond, W.W.A.; de Lange, J.J.; Perez, R.S.G.M.

    2008-01-01

    Collins S, van Hilten JJ, Marinus J, Zuurmond WW, de Lange JJ, Perez RS. Development of a symptoms questionnaire for complex regional pain syndrome and potentially related illnesses: the Trauma Related Neuronal Dysfunction Symptoms Inventory. Objective: To develop a questionnaire to evaluate

  15. Inventories of organic materials and complexing agents in intermediate-level long-lived parcels (Report PNGMDR 2013-2015)

    International Nuclear Information System (INIS)

    2014-01-01

    This report presents an inventory of organic materials and of complexing agents they may produce within parcels of alpha wastes which are to be produced or are being currently produced. The report proposes the results of campaigns of measurements of degassing, and comparison with results of modelling studies. The assessment of degassing rates of parcels of alpha wastes is completed by an assessment of hydrogen produced by radiolysis of interstitial water within the concrete container. Thus, after a presentation of the main parcels used by the CEA for intermediate-level long-lived wastes, and of an inventory of wastes containing organic materials, this report describes the consequences of radiolysis on polymers, and describes the objectives of R and D studies. It reports measurements and presents simulation tools for heterogeneous wastes, homogeneous wastes, production of water-soluble degradation products, and transfer and adsorption of these products in the storage site argillite

  16. Report: Fiscal Year 2015 Federal Information Security Modernization Act Report: Status of CSB’s Information Security Program

    Science.gov (United States)

    Report #16-P-0086, January 27, 2016. The effectiveness of the CSB’s information security program is challenged by its lack of personal identity verification cards for logical access, complete system inventory.

  17. 76 FR 4408 - Service Contract Inventory and Corresponding Point of Contact Information Per Section 703 of...

    Science.gov (United States)

    2011-01-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0009] Service Contract Inventory and... providing the Web site address (URL) for the Service Contract Inventory and the corresponding point of... Law 111-117. FOR FURTHER INFORMATION CONTACT: Dennis Wilhite, Director, Office of Budget Execution and...

  18. Optimal Acquisition and Inventory Control for a Remanufacturing System

    Directory of Open Access Journals (Sweden)

    Zhigang Jiang

    2013-01-01

    Full Text Available Optimal acquisition and inventory control can often make the difference between successful and unsuccessful remanufacturing. However, there is a greater degree of uncertainty and complexity in a remanufacturing system, which leads to a critical need for planning and control models designed to deal with this added uncertainty and complexity. In this paper, a method for optimal acquisition and inventory control of a remanufacturing system is presented. The method considers three inventories, one for returned item and the other for serviceable and recoverable items. Taking the holding cost for returns, recoverable and remanufactured products, remanufacturing cost, disposal cost, and the loss caused by backlog into account, the optimal inventory control model is established to minimize the total costs. Finally, a numerical example is provided to illustrate the proposed methods.

  19. Factor Analysis of the Coopersmith Self-Esteem Inventory

    OpenAIRE

    Güloğlu, Berna; Aydın, Gül

    2001-01-01

    This study investigated the factor structure of the Turkish version of the Coopersmith Self-Esteem Inventory. The results showed that the inventory had a 21-factor highly complex factor structure. However of the empirically found 21 factors only 10 seemed theoretically meaningful. The results were discussed in comparison to the fndings obtained from the studies that were carried out with the original version of the Coopersmith Self-esteem Inventory.

  20. 48 CFR 245.7311-2 - Safety, security, and fire regulations.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Safety, security, and fire regulations. 245.7311-2 Section 245.7311-2 Federal Acquisition Regulations System DEFENSE ACQUISITION... Inventory 245.7311-2 Safety, security, and fire regulations. ...

  1. A Psychometric Evaluation of Super's Work Values Inventory--Revised

    Science.gov (United States)

    Robinson, Carrie H.; Betz, Nancy E.

    2008-01-01

    This study describes the psychometric evaluation of Super's Work Values Inventory--Revised (SWVI-R), an instrument comprised of 12 scales measuring the relative importance placed on the following work-related value dimensions: Achievement, Coworkers, Creativity, Income, Independence, Lifestyle, Mental Challenge, Prestige, Security, Supervision,…

  2. Materials control and accountability challenges associated with plutonium inventories

    International Nuclear Information System (INIS)

    Crawford, D.W.

    1996-01-01

    There are currently many initiatives underway within the Department of Energy (DOE) to safely and securely manage large plutonium inventories arising from weapons dismantlement, changing missions and facility operations. Plutonium inventory information is increasingly accessible to the public as a result of the secretary of energy's openness initiative. As a result, knowledge of these inventories and levels to which the department has accounted for and controlled these inventories, will be under increased scrutiny from a variety of interest groups. The quality of this accountability data and what this data means will greatly influence the public's perception of how the US is protecting its plutonium inventories. In addition, the department's safeguards program provides an essential basis for the application of International Atomic Energy Agency (IAEA) safeguards that, in addition to possibly other international control regimes, will be in place over a large portion of these future inventories. The capability and functionality of the department's nuclear safeguards program will be important contributors to the success of US programs for the responsible stewardship of these vast plutonium inventories. This paper discusses some of the challenges, in terms of specific issues relating to one part of the department's safeguards program--materials control and accountability (MC and A)--to meet the growing domestic and international requirements and expectations associated with these plutonium inventories

  3. Materials control and accountability challenges associated with plutonium inventories

    Energy Technology Data Exchange (ETDEWEB)

    Crawford, D.W. [USDOE Office of Safeguards and Security, Washington, DC (United States)

    1996-07-01

    There are currently many initiatives underway within the Department of Energy (DOE) to safely and securely manage large plutonium inventories arising from weapons dismantlement, changing missions and facility operations. Plutonium inventory information is increasingly accessible to the public as a result of the secretary of energy`s openness initiative. As a result, knowledge of these inventories and levels to which the department has accounted for and controlled these inventories, will be under increased scrutiny from a variety of interest groups. The quality of this accountability data and what this data means will greatly influence the public`s perception of how the US is protecting its plutonium inventories. In addition, the department`s safeguards program provides an essential basis for the application of International Atomic Energy Agency (IAEA) safeguards that, in addition to possibly other international control regimes, will be in place over a large portion of these future inventories. The capability and functionality of the department`s nuclear safeguards program will be important contributors to the success of US programs for the responsible stewardship of these vast plutonium inventories. This paper discusses some of the challenges, in terms of specific issues relating to one part of the department`s safeguards program--materials control and accountability (MC and A)--to meet the growing domestic and international requirements and expectations associated with these plutonium inventories.

  4. Experimental inventory verification system

    International Nuclear Information System (INIS)

    Steverson, C.A.; Angerman, M.I.

    1991-01-01

    As Low As Reasonably Achievable (ALARA) goals and Department of Energy (DOE) inventory requirements are frequently in conflict at facilities across the DOE complex. The authors wish, on one hand, to verify the presence of correct amounts of nuclear materials that are in storage or in process; yet on the other hand, we wish to achieve ALARA goals by keeping individual and collective exposures as low as social, technical, economic, practical, and public policy considerations permit. The Experimental Inventory Verification System (EIVSystem) is a computer-based, camera-driven system that utilizes image processing technology to detect change in vault areas. Currently in the test and evaluation phase at Idaho National Engineering Laboratory, this system guards personnel. The EIVSystem continually monitors the vault, providing proof of changed status for objects sorted within the vault. This paper reports that these data could provide the basis for reducing inventory requirements when no change has occurred, thus helping implement ALARA policy; the data will also help describe there target area of an inventory when change has been shown to occur

  5. Y-12 National Security Complex National Historic Preservation Act Historic Preservation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2003-09-30

    The Historic Preservation Plan (HPP) recognizes that the Y-12 National Security Complex is a vital and long-term component of DOE and NNSA. In addition to NNSA missions, the Office of Science and Energy, the Office of Nuclear Energy, and the Office of Environmental Management have properties located at Y-12 that must be taken into consideration. The HPP also recognizes that the challenge for cultural resource management is incorporating the requirements of NNSA, SC, NE, and EM missions while preserving and protecting its historic resources. The HPP seeks to find an effective way to meet the obligations at Y-12 for historic and archeological protection while at the same time facilitating effective completion of ongoing site mission activities, including removal of obsolete or contaminated facilities, adaptive reuse of existing facilities whenever feasible, and construction of new facilities in order to meet site mission needs. The Y-12 Historic Preservation Plan (HPP) defines the preservation strategy for the Y-12 National Security Complex and will direct efficient compliance with the NHPA and federal archaeological protection legislation at Y-12 as DOE and NNSA continues mission activities of the site.

  6. An empirical application of regional security complex theory on eastern partnership region

    Directory of Open Access Journals (Sweden)

    Ludmila STUPARU

    2015-12-01

    Full Text Available Eastern Partnership (EaP is a very dynamic region. If a year ago the EaP was seen as an authentic and vibrant „laboratory” of democracy building, overcoming the remains of the totalitarian state and putting the basis of a free and pluralist society, nowadays the Eastern Partnership is seen as an „out-dated” approach of the EU. However, Eastern Partnership is visible on European political arena and the big powers (USA, Russia and the EU pay attention more and more to the evolution of EaP countries. Moreover, it seems to be a confrontation between Russia and Western powers regarding the political and geopolitical orientation of EaP countries. Kremlin tries actively to stop the efforts of the EaP to close to the EU and on the other side, the EU as well as the USA encourage EaP countries to implement reforms in order to build their democracy. This paper aims to analyse the Eastern Partnership in terms of security complex, trying to argue that Eastern Partnership countries at this phase don’t form a Regional Security Complex and the EU and USA should rethink its approach towards this region.

  7. Modernization at the Y-12 National Security Complex: A Case for Additional Experimental Benchmarks

    Energy Technology Data Exchange (ETDEWEB)

    Thornbury, Matthew [Y-12 National Security Complex, Oak Ridge, TN (United States)

    2017-10-25

    Electrorefining (ER) is a major part of efforts at the Y-12 National Security Complex to revolutionize the reprocessing and purification of enriched uranium (EU). Successful implementation of ER could drastically reduce the operational costs and footprint, hazardous materials use, and waste generation.

  8. Blood inventory management: hospital best practice.

    Science.gov (United States)

    Stanger, Sebastian H W; Yates, Nicola; Wilding, Richard; Cotton, Sue

    2012-04-01

    Blood is a perishable product, and hence good management of inventories is crucial. Blood inventory management is a trade-off between shortage and wastage. The challenge is to keep enough stock to ensure a 100% supply of blood while keeping time expiry losses at a minimum. This article focuses on inventory management of red blood cells in hospital transfusion laboratories to derive principles of best practice and makes recommendations that will ensure losses due to time expiry are kept to a minimum. The literature was reviewed to identify available models for perishable inventory management. Historical data from the UK blood supply chain was analyzed to identify hospitals with good inventory management practice and low wastage levels. Transfusion laboratory managers in the selected hospitals were interviewed in 7 case studies with the aim of identifying drivers for low wastage and good inventory management practice. The findings from the case studies were compared with the literature. The extant literature asserts that the drivers for good inventory performance are the use of complex inventory models and algorithms. This study has found this not to be the case. Instead, good performance is driven by the quality of transfusion laboratory staff, who must be skilled, regularly trained, and experienced. Electronic crossmatching, transparency of the inventory, and simple management procedures also facilitate good performance. Copyright © 2012 Elsevier Inc. All rights reserved.

  9. Y-12 National Security Complex Water Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Elam, Shana E.; Bassett, P.; McMordie Stoughton, Kate

    2010-11-01

    The Department of Energy's Federal Energy Management Program (FEMP) sponsored a water assessment at the Y 12 National Security Complex (Y 12) located in Oak Ridge, Tennessee. Driven by mandated water reduction goals of Executive Orders 13423 and 13514, the objective of the water assessment is to develop a comprehensive understanding of the current water-consuming applications and equipment at Y 12 and to identify key areas for water efficiency improvements that could be applied not only at Y-12 but at other Federal facilities as well. FEMP selected Pacific Northwest National Laboratory to coordinate and manage the water assessment. PNNL contracted Water Savers, LLC to lead the technical aspects of the water assessment. Water Savers provided key technical expertise in water auditing, metering, and cooling systems. This is the report of that effort, which concluded that the Y-12 facility could realize considerable water savings by implementing the recommended water efficiency opportunities.

  10. Development of an industrial complex for ensuring national competitiveness and economic security

    Directory of Open Access Journals (Sweden)

    A. V. Kalach

    2016-01-01

    Full Text Available Living standards depends on the state of the country’s industrial complex. In a message to Russian President Vladimir Putin's Federal Assembly was asked to implement in 2015 a national technological initiative, the development of industries of the new technological order. As a result of the predominance of the industry of the sixth technological order should occur major changes in the structure of production factors and significance. It follows the inevitability of structural changes in the system of economic institutions and mechanisms of economic security and competitiveness of the state achieve the main goal of the state program “The development of industry and increase its competitiveness” is carried out through the following the directions of sub-programs: investment goods (chemical complex development composite materials, industrial biotechnology, power engineering, machine tool industry, agricultural machinery, machinery specialized production, transport engineering; goods (light industry, children;s products industry, the automotive industry; military-industrial complex; infrastructure (development of engineering activities, industrial parks; semi-finished goods and materials (timber industry, metallurgy, industrial development of rare-earth metals. At the current pace of technological and economic development, the 6 th technological structure will come into proliferation phase in 2010–2020, and in the phase of maturity – 40-ies of XXI century. At the same time in 2020–2025 there will be a new scientific-technical and technological revolution, which will become the basis for developing, synthesizing advances in the above basic technologies. In this paper, we proposed as a tool to ensure the economic security of the state to use the acceleration system of technical development of the industrial complex.

  11. Inventory differences: An evaluation methodology

    International Nuclear Information System (INIS)

    Heinberg, C.L.; Roberts, N.J.

    1987-01-01

    This paper discusses an evaluation methodology which is used for inventory differences at the Los Alamos National Laboratory. It is recognized that there are various methods which can be, and are being, used to evaluate process inventory differences at DOE facilities. The purpose of this paper is to share our thoughts on the subject and our techniques with those who are responsible for the evaluation of inventory differences at their facility. One of the most dangerous aspects of any evaluation technique, especially one as complex as most inventory difference evaluations tend to be, is to fail to look at the tools being used as indicators. There is a tendency to look at the results of an evaluation by one technique as an absolute. At the Los Alamos National Laboratory, several tools are used and the final evaluation is based on a combination of the observed results of a many-faceted evaluation. The tools used and some examples are presented

  12. SOME ASPECTS REGARDING IMPLICATIONS OF IAS 2 "INVENTORY" IN ROMANIAN ACOUNTING

    Directory of Open Access Journals (Sweden)

    ALIN MONEA

    2011-01-01

    Full Text Available This paper presents some aspects regarding inventories. In many business inventories are the most important assets. The accounting for inventories is a major consideration for many entities because of its significance on both the income statement (cost of goods sold and the statement of financial position. The complexity of accounting for inventories arises from several factors like: the high volume of activity, the various cost flow alternatives that are acceptable and the classification of inventories.

  13. Mathematical model and coordination algorithms for ensuring complex security of an organization

    Science.gov (United States)

    Novoseltsev, V. I.; Orlova, D. E.; Dubrovin, A. S.; Irkhin, V. P.

    2018-03-01

    The mathematical model of coordination when ensuring complex security of the organization is considered. On the basis of use of a method of casual search three types of algorithms of effective coordination adequate to mismatch level concerning security are developed: a coordination algorithm at domination of instructions of the coordinator; a coordination algorithm at domination of decisions of performers; a coordination algorithm at parity of interests of the coordinator and performers. Assessment of convergence of the algorithms considered above it was made by carrying out a computing experiment. The described algorithms of coordination have property of convergence in the sense stated above. And, the following regularity is revealed: than more simply in the structural relation the algorithm, for the smaller number of iterations is provided to those its convergence.

  14. Extending Mobile Security Robots to Force Protection Missions

    National Research Council Canada - National Science Library

    Carroll, Daniel

    2002-01-01

    ...) sites for physical security and automated inventory missions MDARS was initiated in 1989 to improve the effectiveness of a shrinking guard force, but was quickly expanded to address the intensive...

  15. Isotopes, Inventories and Seasonality: Unraveling Methane Source Distribution in the Complex Landscapes of the United Kingdom.

    Science.gov (United States)

    Lowry, D.; Fisher, R. E.; Zazzeri, G.; Lanoisellé, M.; France, J.; Allen, G.; Nisbet, E. G.

    2017-12-01

    Unlike the big open landscapes of many continents with large area sources dominated by one particular methane emission type that can be isotopically characterized by flight measurements and sampling, the complex patchwork of urban, fossil and agricultural methane sources across NW Europe require detailed ground surveys for characterization (Zazzeri et al., 2017). Here we outline the findings from multiple seasonal urban and rural measurement campaigns in the United Kingdom. These surveys aim to: 1) Assess source distribution and baseline in regions of planned fracking, and relate to on-site continuous baseline climatology. 2) Characterize spatial and seasonal differences in the isotopic signatures of the UNFCCC source categories, and 3) Assess the spatial validity of the 1 x 1 km UK inventory for large continuous emitters, proposed point sources, and seasonal / ephemeral emissions. The UK inventory suggests that 90% of methane emissions are from 3 source categories, ruminants, landfill and gas distribution. Bag sampling and GC-IRMS delta13C analysis shows that landfill gives a constant signature of -57 ±3 ‰ throughout the year. Fugitive gas emissions are consistent regionally depending on the North Sea supply regions feeding the network (-41 ± 2 ‰ in N England, -37 ± 2 ‰ in SE England). Ruminant, mostly cattle, emissions are far more complex as these spend winters in barns and summers in fields, but are essentially a mix of 2 end members, breath at -68 ±3 ‰ and manure at -51 ±3 ‰, resulting in broad summer field emission plumes of -64 ‰ and point winter barn emission plumes of -58 ‰. The inventory correctly locates emission hotspots from landfill, larger sewage treatment plants and gas compressor stations, giving a broad overview of emission distribution for regional model validation. Mobile surveys are adding an extra layer of detail to this which, combined with isotopic characterization, has identified spatial distribution of gas pipe leaks

  16. The Effectiveness of an Electronic Security Management System in a Privately Owned Apartment Complex

    Science.gov (United States)

    Greenberg, David F.; Roush, Jeffrey B.

    2009-01-01

    Poisson and negative binomial regression methods are used to analyze the monthly time series data to determine the effects of introducing an integrated security management system including closed-circuit television (CCTV), door alarm monitoring, proximity card access, and emergency call boxes to a large privately-owned complex of apartment…

  17. Meiosis gene inventory of four ciliates reveals the prevalence of a synaptonemal complex-independent crossover pathway.

    Science.gov (United States)

    Chi, Jingyun; Mahé, Frédéric; Loidl, Josef; Logsdon, John; Dunthorn, Micah

    2014-03-01

    To establish which meiosis genes are present in ciliates, and to look for clues as to which recombination pathways may be treaded by them, four genomes were inventoried for 11 meiosis-specific and 40 meiosis-related genes. We found that the set of meiosis genes shared by Tetrahymena thermophila, Paramecium tetraurelia, Ichthyophthirius multifiliis, and Oxytricha trifallax is consistent with the prevalence of a Mus81-dependent class II crossover pathway that is considered secondary in most model eukaryotes. There is little evidence for a canonical class I crossover pathway that requires the formation of a synaptonemal complex (SC). This gene inventory suggests that meiotic processes in ciliates largely depend on mitotic repair proteins for executing meiotic recombination. We propose that class I crossovers and SCs were reduced sometime during the evolution of ciliates. Consistent with this reduction, we provide microscopic evidence for the presence only of degenerate SCs in Stylonychia mytilus. In addition, lower nonsynonymous to synonymous mutation rates of some of the meiosis genes suggest that, in contrast to most other nuclear genes analyzed so far, meiosis genes in ciliates are largely evolving at a slower rate than those genes in fungi and animals.

  18. Validity evidence for the Security Scale as a measure of perceived attachment security in adolescence.

    Science.gov (United States)

    Van Ryzin, Mark J; Leve, Leslie D

    2012-04-01

    In this study, the validity of a self-report measure of children's perceived attachment security (the Kerns Security Scale) was tested using adolescents. With regards to predictive validity, the Security Scale was significantly associated with (1) observed mother-adolescent interactions during conflict and (2) parent- and teacher-rated social competence. With regards to convergent validity, the Security Scale was significantly associated with all subscales of the Adult Attachment Scale (i.e., Depend, Anxiety, and Close) as measured 3 years later. Further, these links were found even after controlling for mother-child relationship quality as assessed by the Inventory of Parent and Peer Attachment (IPPA), and chi-square difference tests indicated that the Security Scale was generally a stronger predictor as compared to the IPPA. These results suggest that the Security Scale can be used to assess perceived attachment security across both childhood and adolescence, and thus could contribute significantly to developmental research during this period. Copyright © 2011 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  19. One-time pad, complexity of verification of keys, and practical security of quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Molotkov, S. N., E-mail: sergei.molotkov@gmail.com [Russian Academy of Sciences, Institute of Solid State Physics (Russian Federation)

    2016-11-15

    A direct relation between the complexity of the complete verification of keys, which is one of the main criteria of security in classical systems, and a trace distance used in quantum cryptography is demonstrated. Bounds for the minimum and maximum numbers of verification steps required to determine the actual key are obtained.

  20. One-time pad, complexity of verification of keys, and practical security of quantum cryptography

    International Nuclear Information System (INIS)

    Molotkov, S. N.

    2016-01-01

    A direct relation between the complexity of the complete verification of keys, which is one of the main criteria of security in classical systems, and a trace distance used in quantum cryptography is demonstrated. Bounds for the minimum and maximum numbers of verification steps required to determine the actual key are obtained.

  1. Spatial variations of wet deposition rates in an extended region of complex topography deduced from measurements of 210Pb soil inventories

    International Nuclear Information System (INIS)

    Branford, D.; Mourne, R.W.; Fowler, D.

    1998-01-01

    The radionuclide 210 Pb derived from gaseous 222 Rn present in the atmosphere becomes attached to the same aerosols as the bulk of the main pollutants sulphur and nitrogen. When scavenged from the atmosphere by precipitation, the 210 Pb is readily attached to organic matter in the surface horizons of the soil. Inventories of 210 Pb in soil can thus be used to measure the spatial variations in wet (or cloud) deposition due to orography averaged over many precipitation events (half-life of 210 Pb is 22·3 year). Measurements of soil 210 Pb inventories were made along a transect through complex terrain in the Scottish Highlands to quantify the orographic enhancement of wet deposition near the summits of the three mountains Ben Cruachan, Beinn Dorain and Ben Lawers, which, respectively, lie at distances of approximately 30, 55 and 80 km from the coast in the direction of the prevailing wind. The inventory of 210 Pb on the wind-facing slopes of Ben Cruachan shows an increase with altitude that rises faster than the precipitation rate, which is indicative of seeder-feeder scavenging of orographic cloud occurring around the summit. Results for Beinn Dorain show a smaller rise with altitude whereas those for Ben Lawers give no indication of a rise. It is concluded that the seeder-feeder mechanism in regions of complex topology decreases in effectiveness as a function of distance inland along the direction of the prevailing wind. (Copyright (c) 1998 Elsevier Science B.V., Amsterdam. All rights reserved.)

  2. An Investigation of the Factors Related to Low Parent-Adolescent Attachment Security in Taiwan.

    Science.gov (United States)

    Chen, Chen-Jung; Sung, Huei-Chuan; Chen, Yi-Chang; Wang, Chih-Hung

    2017-09-01

    Adolescence may involve increases in many behavioral problems and psychosocial maladaptation. Adolescents must successfully cope with these challenges to achieve positive developmental milestones. To investigate whether low parental attachment security among adolescents in Taiwan is associated with their demographic characteristics, psychosocial maladaptation, and depression. A cross-sectional survey. A total of 335 adolescents completed the questionnaires. The Inventory of Parent and Peer Attachment, the Chinese version of the Youth Self-Report, and the Beck Depression Inventory-II were used to survey the participants. Correlation and multiple linear regressions, using low attachment security as the response variable, were used in the statistical analysis. The prevalence of Taiwanese adolescents with low parental attachment security was 38.5%. Low parental attachment security in adolescents was significantly associated with parental remarriage status and psychosocial maladaptation. By considering these risk factors, nursing educators and nurses could develop effective interventions to strengthen parent-adolescent attachment security.

  3. Nuclear Materials Management U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO)

    International Nuclear Information System (INIS)

    Jesse Schreiber

    2008-01-01

    In light of the changing Defense Complex mission, the high cost to storing and protecting nuclear materials, and in consideration of scarcity of resources, it is imperative that the U.S. Department of Energy (DOE) owned nuclear materials are managed effectively. The U.S. Department of Energy, National Nuclear Security Administration (NNSA) Strategic Action Plan outlines the strategy for continuing to meet America's nuclear security goals, meeting the overall mission challenges of DOE and NNSA as well as giving focus to local missions. The mission of the NNSA/NSO Nuclear Materials Management (NMM) Program is to ensure that nuclear material inventories are accurately assessed and reported, future material needs are adequately planned, and that existing Nevada Test Site (NTS) inventories are efficiently utilized, staged, or dispositioned. The NNSA/NSO understands that the NTS has unique characteristics to serve and benefit the nation with innovative solutions to the complex problems involving Special Nuclear Materials, hazardous materials, and multi-agency, integrated operations. The NNSA/NSO is defining infrastructure requirements for known future missions, developing footprint consolidation strategic action plans, and continuing in the path of facility modernization and improvements. The NNSA/NSO is striving for the NTS to be acknowledged as an ideal location towards mission expansion and growth. The NTS has the capability of providing isolated, large scale construction and development locations for nuclear power or alternate energy source facilities, expanded nuclear material storage sites, and for new development in 'green' technology

  4. Legal issues in clouds: towards a risk inventory.

    Science.gov (United States)

    Djemame, Karim; Barnitzke, Benno; Corrales, Marcelo; Kiran, Mariam; Jiang, Ming; Armstrong, Django; Forgó, Nikolaus; Nwankwo, Iheanyi

    2013-01-28

    Cloud computing technologies have reached a high level of development, yet a number of obstacles still exist that must be overcome before widespread commercial adoption can become a reality. In a cloud environment, end users requesting services and cloud providers negotiate service-level agreements (SLAs) that provide explicit statements of all expectations and obligations of the participants. If cloud computing is to experience widespread commercial adoption, then incorporating risk assessment techniques is essential during SLA negotiation and service operation. This article focuses on the legal issues surrounding risk assessment in cloud computing. Specifically, it analyses risk regarding data protection and security, and presents the requirements of an inherent risk inventory. The usefulness of such a risk inventory is described in the context of the OPTIMIS project.

  5. A data communications systems for tamper-protected special nuclear materials (SNM) inventory management

    International Nuclear Information System (INIS)

    Hurkamp, A.C.

    1995-01-01

    The Department of Energy (D.O.E.) is responsible for the long term storage and protection of large quantities of Special Nuclear Material (SNM). This material is stored within individual containers located in vaults. Security measures are required to ensure that the SNM remains within the canisters where it is stored and that it is not disturbed in any manner. Conventional security and inventory techniques are manpower intensive and often require exposure to radiation hazards. The Purpose of this D.O.E sponsored project is to develop a cost effective system to monitor Special Nuclear Materials that, when fielded, would result in an extension of manual inventory cycles at a wide variety of SNM storage locations. The system consists of a computer, radio frequency interrogator, and individual miniaturized radio frequency transponders (tags) that are co-located with individual SNM containers. Each tag can perform SNM inventory, tamper alarm, and multiple sensor data transmission to the interrogator under the control of software designed by the user. SNM custodians can customize the system by their choice of packaging, software, and sensors. When implemented in accordance with current department of energy (D.O.E.) Policy on SNM inventory extension, the system has the potential to qualify for maximum extension times thus saving considerable resources through reduction of radiation exposure

  6. Understanding complexities in coupled dynamics of human-water and food security

    Science.gov (United States)

    Usmani, M.; Kondal, A.; Lin, L.; Colwell, R. R.; Jutla, A.

    2017-12-01

    Traditional premise of food security is associated with satisfying human hunger by providing sufficient calories to population. Water is the key variable associated with the growth of crops, which is then used as a metric of success for abundance of food across globe. The current framework often negates complex coupled interaction between availability of food nutrients and human well-being (such as productivity, work efficiency, low birth weight, physical and mental growth). Our analysis suggests that 1 in 3 humans suffer from malnutrition across the globe. In last five decades, most of the countries have a decreasing availability trend in at least one of the twenty-three essential food nutrients required for human well-being. We argue that food security can only be achieved if information on use of water for crops and consumption of food must include availability of nutrients for humans. Here, we propose a new concept of "consumptive nutrients" that include constant feedback mechanism between water-human and societal processes- essential for growth, distribution and consumption of food nutrients. Using Ethiopia as a signature rain-fed agricultural region, we will show how decreasing precipitation has led to an increase in crop productivity, but decreased availability of nutrients for humans. This in turn has destabilizing impact on overall regional economy. We will demonstrate why inclusion of nutrients must be a part of discussion for ensuring food security to human population.

  7. Assessment of Used Nuclear Fuel Inventory Relative to Disposition Options

    International Nuclear Information System (INIS)

    Wagner, John C.; Peterson, Joshua L.; Mueller, Don; Gehin, Jess C.; Worrall, Andrew; Taiwo, Temitope; Nutt, Mark; Williamson, Mark A.; Todosow, Mike; Wigeland, Roald; Halsey, William; Omberg, Ronald; Swift, Peter; Carter, Joe

    2013-01-01

    This paper presents a technical assessment of the current inventory [∼70,150 metric tons of heavy metal (MTHM) as of 2011] of U.S.-discharged used nuclear fuel (UNF) to support decisions regarding fuel cycle strategies and research, development and demonstration (RD and D) needs. The assessment considered discharged UNF from commercial nuclear electricity generation and defense and research programs and determined that the current UNF inventory can be divided into the following three categories: 1. Disposal - excess material that is not needed for other purposes; 2. Research - material needed for RD and D purposes to support waste management (e.g., UNF storage, transportation, and disposal) and development of alternative fuel cycles (e.g., separations and advanced fuels/reactors); and 3. Recycle/Recovery - material with inherent and/or strategic value. A set of key assumptions and attributes relative to the disposition options was used to categorize the current UNF inventory. Based on consideration of RD and D needs, time frames and material needs for deployment of alternative fuel cycles, characteristics of the current UNF inventory, and possible uses to support national security interests, it was determined that the vast majority of the category, without the need for retrieval for reuse or research purposes. Access to the material in the Research and Recycle/Recovery categories should be retained to support RD and D needs and national security interests. This assessment does not assume any decision about future fuel cycle options or preclude any potential options, including those with potential recycling of commercial UNF, since the ∼2,000 MTHM that is generated annually could provide the feedstock needed for deployment of alternative fuel cycles.

  8. On the Communication Complexity of Secure Function Evaluation with Long Output

    DEFF Research Database (Denmark)

    Hubacek, Pavel; Wichs, Daniel

    2015-01-01

    We study the communication complexity of secure function evaluation (SFE). Consider a setting where Alice has a short input χA, Bob has an input χB and we want Bob to learn some function y = f(χA, χB) with large output size. For example, Alice has a small secret decryption key, Bob has a large...... value. Moreover, we show that even in an offline/online protocol, the communication of the online phase must have output-size dependence. This negative result uses an incompressibility argument and it generalizes several recent lower bounds for functional encryption and (reusable) garbled circuits...

  9. Brazilian Policy and the Creation of a Regional Security Complex in the South Atlantic: Pax Brasiliana?

    Directory of Open Access Journals (Sweden)

    Beatriz Rodrigues Bessa Mattos

    Full Text Available Abstract Over the past five years, the South Atlantic region has become a central element of Brazilian security policy, with Brazil actively supporting the notion of a trans-oceanic security consciousness involving African littoral states. It has invested in diplomatic initiatives such as the Zone of Peace and Cooperation of the South Atlantic (ZPCSA, or ZOPACAS, and extensive military co-operation with West African states such as São Tomé e Príncipe, Namibia and Cape Verde. Its internal security and defence policy documents have repeatedly been updated to reflect this dimension, and now provide the foundation for advancing these initiatives. This policy thrust is directed at securing Brazil’s offshore oil assets, and limiting the influence of what it has termed ‘extra-regional powers’ such as the P-5. This article highlights these initiatives and reviews the prospects for this policy by examining the plausibility of the South Atlantic region as a regional security complex in the sense coined by Buzan and Wæver. The analysis is based on the role of geographical and linguistic proximity in international relations, and the impact of multilateral bodies on building support for a regional approach to security governance.

  10. Ordering Cost Reduction in Inventory Model with Defective Items and Backorder Price Discount

    Directory of Open Access Journals (Sweden)

    Karuppuchamy Annadurai

    2014-01-01

    Full Text Available In the real market, as unsatisfied demands occur, the longer the length of lead time is, the smaller the proportion of backorder would be. In order to make up for the inconvenience and even the losses of royal and patient customers, the supplier may offer a backorder price discount to secure orders during the shortage period. Also, ordering policies determined by conventional inventory models may be inappropriate for the situation in which an arrival lot contains some defective items. To compensate for the inconvenience of backordering and to secure orders, the supplier may offer a price discount on the stockout item. The purpose of this study is to explore a coordinated inventory model including defective arrivals by allowing the backorder price discount and ordering cost as decision variables. There are two inventory models proposed in this paper, one with normally distributed demand and another with distribution free demand. A computer code using the software Matlab 7.0 is developed to find the optimal solution and present numerical examples to illustrate the models. The results in the numerical examples indicate that the savings of the total cost are realized through ordering cost reduction and backorder price discount.

  11. Annual Storm Water Report for the Y-12 National Security Complex Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Environment Compliance Department

    2012-01-01

    The storm water pollution prevention program at the Y-12 National Security Complex (Y-12 Complex) intends to protect the quality of storm water runoff through: (1) reducing the exposure of metal accumulation areas to precipitation, (2) implementation of Best Management Practices, (3) sampling during rain events and subsequent analysis, and (4) routine surveillances. When prescribed, the analytical data is compared to a set of cut-off concentration values to determine how the Y-12 Complex relates to other metal fabrication industries in the state of Tennessee. The quality of the storm water exiting the Y-12 Complex via East Fork Poplar Creek indicated some improvement in 2011. This improvement is attributable to the completion of several construction, demolition and remediation projects which occurred in 2010 and 2011. Emphasis will continue to be placed on site inspections and the timely implementation of improved storm water control measures as deemed necessary.

  12. Annual Storm Water Report for the Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Clean Water Compliance Section of the Environment Compliance Department

    2012-01-01

    The storm water pollution prevention program at the Y-12 National Security Complex (Y-12 Complex) intends to protect the quality of storm water runoff through: (1) reducing the exposure of metal accumulation areas to precipitation, (2) implementation of Best Management Practices, (3) sampling during rain events and subsequent analysis, and (4) routine surveillances. When prescribed, the analytical data is compared to a set of cut-off concentration values to determine how the Y-12 Complex relates to other metal fabrication industries in the state of Tennessee. The quality of the storm water exiting the Y-12 Complex via East Fork Poplar Creek indicated some improvement in 2011. This improvement is attributable to the completion of several construction, demolition and remediation projects which occurred in 2010 and 2011. Emphasis will continue to be placed on site inspections and the timely implementation of improved storm water control measures as deemed necessary.

  13. Complex agro-ecosystems for food security in a changing climate

    Science.gov (United States)

    Khumairoh, Uma; Groot, Jeroen CJ; Lantinga, Egbert A

    2012-01-01

    Attempts to increase food crop yields by intensifying agricultural systems using high inputs of nonrenewable resources and chemicals frequently lead to de-gradation of natural resources, whereas most technological innovations are not accessible for smallholders that represent the majority of farmers world wide. Alternatively, cocultures consisting of assemblages of plant and animal species can support ecological processes of nutrient cycling and pest control, which may lead to increasing yields and declining susceptibility to extreme weather conditions with increasing complexity of the systems. Here we show that enhancing the complexity of a rice production system by adding combinations of compost, azolla, ducks, and fish resulted in strongly increased grain yields and revenues in a season with extremely adverse weather conditions on East Java, Indonesia. We found that azolla, duck, and fish increased plant nutrient content, tillering and leaf area expansion, and strongly reduced the density of six different pests. In the most complex system comprising all components the highest grain yield was obtained. The net revenues of this system from sales of rice grain, fish, and ducks, after correction for extra costs, were 114% higher than rice cultivation with only compost as fertilizer. These results provide more insight in the agro-ecological processes and demonstrate how complex agricultural systems can contribute to food security in a changing climate. If smallholders can be trained to manage these systems and are supported for initial investments by credits, their livelihoods can be improved while producing in an ecologically benign way. PMID:22957173

  14. Security option file - Exploitation (DOS-Expl)

    International Nuclear Information System (INIS)

    2016-01-01

    This document aims at presenting functions performed by Cigeo during its exploitation phase, its main technical and security options which are envisaged with respect to different types of internal or external risks, and a first assessment of its impact on mankind and on the environment during its exploitation in normal operation as well as in incidental or accidental situations. A first volume addresses security principles, approach and management in relationship with the legal and regulatory framework. The second volume presents input data related to waste parcels and used for the installation sizing and operation, the main site characteristics, the main technical options regarding structures and equipment, and the main options regarding exploitation (parcel management, organisational and human aspects, and effluent management). The third volume describes how parcel are processed from their arrival to their setting in storage compartment, an inventory of internal and external risks, and a first assessment of consequences of scenarios on mankind and on the environment. The fourth volume presents options and operations which are envisaged regarding Cigeo closure, and inventory of associated risks

  15. Nevada Photo-Based Inventory Pilot (NPIP) resource estimates (2004-2005)

    Science.gov (United States)

    Tracey S. Frescino; Gretchen G. Moisen; Paul L. Patterson; Elizabeth A. Freeman; James Menlove

    2016-01-01

    The complex nature of broad-scale, strategic-level inventories, such as the Forest Inventory and Analysis program (FIA) of the USDA Forest Service, demands constant evolution and evaluation of methods to get the best information possible while continuously increasing efficiency. The State of Nevada is predominantly comprised of nonforested Federal lands with a small...

  16. Inventory Control System by Using Vendor Managed Inventory (VMI)

    Science.gov (United States)

    Sabila, Alzena Dona; Mustafid; Suryono

    2018-02-01

    The inventory control system has a strategic role for the business in managing inventory operations. Management of conventional inventory creates problems in the stock of goods that often runs into vacancies and excess goods at the retail level. This study aims to build inventory control system that can maintain the stability of goods availability at the retail level. The implementation of Vendor Managed Inventory (VMI) method on inventory control system provides transparency of sales data and inventory of goods at retailer level to supplier. Inventory control is performed by calculating safety stock and reorder point of goods based on sales data received by the system. Rule-based reasoning is provided on the system to facilitate the monitoring of inventory status information, thereby helping the process of inventory updates appropriately. Utilization of SMS technology is also considered as a medium of collecting sales data in real-time due to the ease of use. The results of this study indicate that inventory control using VMI ensures the availability of goods ± 70% and can reduce the accumulation of goods ± 30% at the retail level.

  17. Inventory Control System by Using Vendor Managed Inventory (VMI

    Directory of Open Access Journals (Sweden)

    Dona Sabila Alzena

    2018-01-01

    Full Text Available The inventory control system has a strategic role for the business in managing inventory operations. Management of conventional inventory creates problems in the stock of goods that often runs into vacancies and excess goods at the retail level. This study aims to build inventory control system that can maintain the stability of goods availability at the retail level. The implementation of Vendor Managed Inventory (VMI method on inventory control system provides transparency of sales data and inventory of goods at retailer level to supplier. Inventory control is performed by calculating safety stock and reorder point of goods based on sales data received by the system. Rule-based reasoning is provided on the system to facilitate the monitoring of inventory status information, thereby helping the process of inventory updates appropriately. Utilization of SMS technology is also considered as a medium of collecting sales data in real-time due to the ease of use. The results of this study indicate that inventory control using VMI ensures the availability of goods ± 70% and can reduce the accumulation of goods ± 30% at the retail level.

  18. Activity-based costing of security services for a Department of Energy nuclear site

    International Nuclear Information System (INIS)

    Togo, D.F.

    1997-01-01

    Department of Energy (DOE) nuclear facilities are being encouraged to reduce costs but the accounting data typically in use by the financial organizations at these laboratories cannot easily be used to determine which security activities offer the best reduction in cost. For example, labor costs have historically been aggregated over various activities, making it difficult to determine the true costs of performing each activity. To illustrate how this problem can be solved, a study was performed applying activity-based costing (ABC) to a hypothetical DOE facility. ABC is a type of cost-accounting developed expressly to determine truer costs of company activities. The hypothetical facility was defined to have features similar to those found across the DOE nuclear complex. ABC traced costs for three major security functions - Protective Force Operations, Material Control and Accountability, and Technical Security - to various activities. Once these costs had been allocated, we compared the cost of three fictitious upgrades: (1) an improvement in training or weapons that allows the protective force to have better capabilities instead of adding more response forces; (2) a change in the frequency of inventories; and (3) a reduction in the annual frequencies of perimeter sensor tests

  19. The Personality Inventory Scales: a self-rating clinical instrument for diagnosis of personality disorder.

    Science.gov (United States)

    Burgess, J W

    1991-12-01

    A personality inventory was developed as an aid in securing history and beliefs relevant to the assessment of personality structure and the diagnosis of personality disorders. The inventory was developed by restating DSM diagnostic criteria in everyday language, rewording the resulting statements in the form of True/False questions, and placing these questions in a short, self-paced booklet which subjects could complete in about 15 minutes. The following assessments were made and discussed: construct validity, split-half reliability, test-retest reliability, comparison with a standardized interview, and comparison with actual clinical assessments. The personality inventory is discussed as a useful accompaniment to the diagnostic interview in clinical settings and for research into personality structure and personality disorders.

  20. Inventory Control System by Using Vendor Managed Inventory (VMI)

    OpenAIRE

    Dona Sabila Alzena; Mustafid Mustafid; Suryono Suryono

    2018-01-01

    The inventory control system has a strategic role for the business in managing inventory operations. Management of conventional inventory creates problems in the stock of goods that often runs into vacancies and excess goods at the retail level. This study aims to build inventory control system that can maintain the stability of goods availability at the retail level. The implementation of Vendor Managed Inventory (VMI) method on inventory control system provides transparency of sales data an...

  1. Geographic/conceptual delimitation of the «Southern Mediterranean». A Regional Security Complex?

    Directory of Open Access Journals (Sweden)

    Alberto Priego Moreno

    2016-07-01

    Full Text Available This article seeks to analyse how the Mediterranean Area has evolved after the changes occurred with the so-called Arab Springs. The main idea is to focus on the Southern Mediterranean as a dynamic space that expands itself as a result of its internal transformations and subsequent external changes caused by the Arab Spring. We will use the IR theory of the Regional Security Complex as it is considered as the most adaptable to this changing reality.

  2. Nuclear safeguards and security: we can do better.

    Energy Technology Data Exchange (ETDEWEB)

    Johnston, R. G. (Roger G.); Warner, Jon S.; Garcia, A. R. E. (Anthony R. E.); Martinez, R. K. (Ronald K.); Lopez, L. N. (Leon N.); Pacheco, A. N. (Adam N.); Trujillo, S. J. (Sonia J.); Herrera, A. M. (Alicia M.); Bitzer, E. G. (Edward G.), III

    2005-01-01

    There are a number of practical ways to significantly improve nuclear safeguards and security. These include recognizing and minimizing the insider threat; using adversarial vulnerability assessments to find vulnerabilities and countermeasures; fully appreciating the disparate nature of domestic and international nuclear safeguards; improving tamper detection and tamper-indicating seals; not confusing the inventory and security functions; and recognizing the limitations of GPS tracking, contact memory buttons, and RFID tags. The efficacy of nuclear safeguards depends critically on employing sophisticated security strategies and effective monitoring hardware. The Vulnerability Assessment Team (VAT) at Los Alamos National Laboratory has extensively researched issues associated with nuclear safeguards, especially in the areas of tamper/intrusion detection, transport security, and vulnerability assessments. This paper discusses some of our findings, recommendations, and warnings.

  3. Purchasing and inventory management techniques for optimizing inventory investment

    International Nuclear Information System (INIS)

    McFarlane, I.; Gehshan, T.

    1993-01-01

    In an effort to reduce operations and maintenance costs among nuclear plants, many utilities are taking a closer look at their inventory investment. Various approaches for inventory reduction have been used and discussed, but these approaches are often limited to an inventory management perspective. Interaction with purchasing and planning personnel to reduce inventory investment is a necessity in utility efforts to become more cost competitive. This paper addresses the activities that purchasing and inventory management personnel should conduct in an effort to optimize inventory investment while maintaining service-level goals. Other functions within a materials management organization, such as the warehousing and investment recovery functions, can contribute to optimizing inventory investment. However, these are not addressed in this paper because their contributions often come after inventory management and purchasing decisions have been made

  4. INVESTMENT ACTIVITY OF AGRIBUSINESS IN THE AGROINDUSTRIAL COMPLEX REGION, AS ONE OF THE ELEMENTS OF THE FINANCIAL SECURITY OF THE AGRO-INDUSTRIAL COMPLEX OF THE STATE

    Directory of Open Access Journals (Sweden)

    Olga Nikolaevna Uglitskikh

    2015-09-01

    Full Text Available The developed economic-political situation around of Russia, specifies an indispensability of support of agricultural commodity producers as from their financial well-being, investment activity the financial security of agrarian and industrial complex of the state depends. Limitation of own financial resources at agrarians does not allow them to realize independently conceived projects. Studying of questions of formation and functioning of investment activity in agriculture of Stavropol Territory and an assessment of investment projects offered to reali-zation, have allowed to analyse investment activity of agrarian and industrial complex of region up to the introduction of Russia into WTO and in conditions of its membership. By results of the lead assessment the administrative areas of region showing the greatest investment activity, threats of a financial security of agrarian and industrial complex of region not putting by the activity have been revealed. It is drawn a conclusion on influence West-American sanctions on financial without-danger agra-rian and industrial complex of the state and the responsibility сельхозтоваропроизводителей about delivery of agricultural production in necessary volume and import substitution.

  5. Ultra-fast secure communication with complex systems in classical channels (Conference Presentation)

    KAUST Repository

    Mazzone, Valerio

    2017-04-28

    Developing secure communications is a research area of growing interest. During the past years, several cryptographic schemes have been developed, with Quantum cryptography being a promising scheme due to the use of quantum effects, which make very difficult for an eavesdropper to intercept the communication. However, practical quantum key distribution methods have encountered several limitations; current experimental realizations, in fact, fail to scale up on long distances, as well as in providing unconditional security and speed comparable to classical optical communications channels. Here we propose a new, low cost and ultra-fast cryptographic system based on a fully classical optical channel. Our cryptographic scheme exploits the complex synchronization of two different random systems (one on the side of the sender and another on the side of the receiver) to realize a “physical” one paid system. The random medium is created by an optical chip fabricated through electron beam lithography on a Silicon On Insulator (SOI) substrate. We present experiments with ps lasers and commercial fibers, showing the ultrafast distribution of a random key between two users (Alice and Bob), with absolute no possibility for a passive/active eavesdropper to intercept the communication. Remarkably, this system enables the same security of quantum cryptography, but with the use of a classical communication channel. Our system exploits a unique synchronization that exists between two different random systems, and at such is extremely versatile and can enable safe communications among different users in standards telecommunications channels.

  6. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  7. Complex Security System for Premises Under Conditions of Large Volume of Passenger Traffic

    Directory of Open Access Journals (Sweden)

    Yakubov Vladimir

    2016-01-01

    Full Text Available Subsystems of the design of a complex security system for premises under conditions of large volume of passenger traffic are considered. These subsystems provide video- and thermal imaging control, radio wave tomography, and gas analysis. Simultaneous application of all examined variants will essentially increase the probability of timely prevention of dangerous situations with the probability of false alarm as low as possible. It is important that finally, this will provide protection of population and will facilitate the work of intelligence services.

  8. Optimization of Inventory

    OpenAIRE

    PROKOPOVÁ, Nikola

    2017-01-01

    The subject of this thesis is optimization of inventory in selected organization. Inventory optimization is a very important topic in each organization because it reduces storage costs. At the beginning the inventory theory is presented. It shows the meaning and types of inventory, inventory control and also different methods and models of inventory control. Inventory optimization in the enterprise can be reached by using models of inventory control. In the second part the company on which is...

  9. Central Asia as a Regional Security Complex from the Perspectives of Realism, Liberalism and Constructivism

    Directory of Open Access Journals (Sweden)

    Caroline Putri Pratama

    2013-05-01

    Full Text Available Tulisan ini bertujuan menganalisis kawasan Asia Tengah, dilihat dari perspektif Realisme, Liberalisme dan Konstruktivisme, melalui teori Regional Security Complex oleh Barry Buzan dan Ole Waever. Teori ini hendak menunjukkan keamanan regional berdasarkan interdependensi antar unit dalam kawasan dilihat dari struktur power dan proses sekuritisasi di dalamnya, demikian pola hubungan keamanan dalam kawasan Asia Tengah berusaha dijelaskan dengan elemen-elemen dari ketiga paradigma yang terdapat dalam teori tersebut. Hasil analisis tulisan ini menunjukkan bahwa Asia Tengah dipandang sebagai bentuk insecurity interdependence by external forces dari perspektif Realis, security interdependence by interest dari perspektif Liberalis dan securitization interdependence by understanding of threat/security dari perspektif Konstruktivis. Kompleks keamanan Asia Tengah termasuk dalam tipe kompleks keamanan Great Power, terlihat dari peran besar kekuatan-kekuatan eksternal terutama Rusia dan Cina dalam kawasan tersebut; baik dalam pembentukan pola pertemanan dengan kerjasama, pola permusuhan dengan persaingan dan ketakutan, juga proses sekuritisasi isu separatisme, ekstremisme dan terorisme sebagai ancaman terhadap keamanan regional.Tulisan ini diambil dari tugas karya akhir penulis yang diajukan untuk medapatkan gelar Sarjana Sosial dari Departemen Ilmu Hubungan Internasional, Universitas Indonesia.

  10. Life-Cycle Inventory Analysis of Bioproducts from a Modular Advanced Biomass Pyrolysis System

    Science.gov (United States)

    Richard Bergman; Hongmei Gu

    2014-01-01

    Expanding bioenergy production has the potential to reduce net greenhouse gas (GHG) emissions and improve energy security. Science-based assessments of new bioenergy technologies are essential tools for policy makers dealing with expanding renewable energy production. Using life cycle inventory (LCI) analysis, this study evaluated a 200-kWe...

  11. Metric-Aware Secure Service Orchestration

    Directory of Open Access Journals (Sweden)

    Gabriele Costa

    2012-12-01

    Full Text Available Secure orchestration is an important concern in the internet of service. Next to providing the required functionality the composite services must also provide a reasonable level of security in order to protect sensitive data. Thus, the orchestrator has a need to check whether the complex service is able to satisfy certain properties. Some properties are expressed with metrics for precise definition of requirements. Thus, the problem is to analyse the values of metrics for a complex business process. In this paper we extend our previous work on analysis of secure orchestration with quantifiable properties. We show how to define, verify and enforce quantitative security requirements in one framework with other security properties. The proposed approach should help to select the most suitable service architecture and guarantee fulfilment of the declared security requirements.

  12. SACHET, Dynamic Fission Products Inventory in PWR Multiple Compartment System

    International Nuclear Information System (INIS)

    Kodaira, Hideki

    1990-01-01

    1 - Description of program or function: SACHET evaluates the dynamic fission product inventories in the multiple compartment system of pressurized water reactor (PWR) plants. 2 - Method of solution: SACHET utilizes a matrix of fission product core inventory which is previously calculated by the ORIGEN code. 3 - Restrictions on the complexity of the problem: Liquid wastes such as chemical waste and detergent waste are not included

  13. Enhancing the Safety and Security of Radioactive Sources

    International Nuclear Information System (INIS)

    Hickey, J.

    2004-01-01

    The NRC initiatives to improve safety and security of sources began before 091101 and include both international and domestic activities. They supported the development and implementation of the IAEA Code of Conduct, which provides categorization of sources of concern, based on risk, improvement of regulatory programs of all member countries and improvement of safety and security of sources. International activities include the IAEA International Conference on Security of Sources (Vienna, Austria, March, 2003), the trilateral cooperation with Canada and Mexico, the assistance to individual countries to improve security and the proposed rule on export and import of radioactive material. The domestic initiatives are to issue the security orders and advisories to licensees, issue the panoramic irradiator orders (June 2003), issue the manufacturer orders (January 2004), complete the interim national source inventory, develop the national source tracking system, maintain the orphan source registration and retrieval program and upgrade the emergency preparedness

  14. A framework for modelling the complexities of food and water security under globalisation

    Science.gov (United States)

    Dermody, Brian J.; Sivapalan, Murugesu; Stehfest, Elke; van Vuuren, Detlef P.; Wassen, Martin J.; Bierkens, Marc F. P.; Dekker, Stefan C.

    2018-01-01

    We present a new framework for modelling the complexities of food and water security under globalisation. The framework sets out a method to capture regional and sectoral interdependencies and cross-scale feedbacks within the global food system that contribute to emergent water use patterns. The framework integrates aspects of existing models and approaches in the fields of hydrology and integrated assessment modelling. The core of the framework is a multi-agent network of city agents connected by infrastructural trade networks. Agents receive socio-economic and environmental constraint information from integrated assessment models and hydrological models respectively and simulate complex, socio-environmental dynamics that operate within those constraints. The emergent changes in food and water resources are aggregated and fed back to the original models with minimal modification of the structure of those models. It is our conviction that the framework presented can form the basis for a new wave of decision tools that capture complex socio-environmental change within our globalised world. In doing so they will contribute to illuminating pathways towards a sustainable future for humans, ecosystems and the water they share.

  15. The use of modern databases in managing nuclear material inventories

    International Nuclear Information System (INIS)

    Behrens, R.G.

    1994-01-01

    The need for a useful nuclear materials database to assist in the management of nuclear materials within the Department of Energy (DOE) Weapons Complex is becoming significantly more important as the mission of the DOE Complex changes and both international safeguards and storage issues become drivers in determining how these materials are managed. A well designed nuclear material inventory database can provide the Nuclear Materials Manager with an essential cost effective tool for timely analysis and reporting of inventories. This paper discusses the use of databases as a management tool to meet increasing requirements for accurate and timely information on nuclear material inventories and related information. From the end user perspective, this paper discusses the rationale, philosophy, and technical requirements for an integrated database to meet the needs for a variety of users such as those working in the areas of Safeguards, Materials Control and Accountability (MC ampersand A), Nuclear Materials Management, Waste Management, materials processing, packaging and inspection, and interim/long term storage

  16. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  17. The Evolution of Inventory Management in Manufacturing and Services Companies

    Directory of Open Access Journals (Sweden)

    Gerardo Molinary Fernández

    2000-08-01

    Full Text Available Although inventory management has significantly developed in the past years as a management discipline, its application is still minimal in the service industry and government. In contrast, it is an important tool for any company that is running a competitive business. The management of some companies considers inventory as an asset, not a liability. In addition, in companies in which the use and application of inventory models are common, they can still experience inventory problems. This paper analyzes the weakness of the traditional and most popular inventory model: The Economic Order Quantity model (EOQ. Many of the inventory models available are difficult to understand because they are based on complicate mathematical and statistical formulas. The benefits that computer software have simplifying the use of mathematical formulas are diminished because some of them do not include special applications or solutions when a variation in the assumption of the models is present. When a company implements The Just in Time philosophy (JIT, the management of inventory does not rest in complex formulas. Inventory experts need to emphasize the application of the models instead of the statistical derivation. They also need to be more aggressive in making managers, students and government authorities more aware of managing the inventory levels effectively. The responsibility of good inventory levels is not the sole task of the Operations Department, but the obligation of all the people in a company. Good inventory levels are now a measure of business competitiveness. The goal must be to increase the service level and at the same time reduce the inventory investment.

  18. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  19. Control system implementation for a complex low inventory cryogenic distillation system for Princeton TFTR

    International Nuclear Information System (INIS)

    Busigin, A.; Busigin, C.J.; Adamek, F.; Woodall, K.B.; Robins, J.R.; Bellamy, D.G.; Fong, C.; Kalyanam, K.M.; Sood, S.K.

    1995-01-01

    The TFTR Tritium Purification System (TPS) is based on a Pd/Ag diffuser front-end for separating hydrogen isotopes from inert gas, and a four column cryogenic distillation cascade for separation of hydrogen isotopes. The system has a tritium inventory of approximately 0.5 g while successfully producing pure H 2 , D 2 and T 2 products. The system has recently been built and successfully commissioned with protium and deuterium. Stable automatic control of the cascade has been demonstrated even when feed rate and composition varied. The automatic control scheme maintained stable column inventories and excellent H 2 and D 2 product qualities. The control system employed new control concepts such as real time analysis of mid-column composition using temperature and pressure data for feedback control. Very stable column inventory control was achieved by automatic adjustment of inter-column flows (feed forward and feed back). This paper discusses the control system design and presents performance test results. (orig.)

  20. The system of innovative development of the agroindustrial complex in order to ensure the economic security of the region

    Directory of Open Access Journals (Sweden)

    T. I. Ovchinnikova

    2017-01-01

    Full Text Available The basis for innovative development of the agroindustrial complex is the goals, principles and methods that determine the economic security of the region. The category of “economic security”is often identified with the sustainability, competitiveness and risk-free economy of agricultural and processing enterprises. Ensuring the economically safe functioning of all industries and spheres of regional agribusiness is impossible without interconnection with science and education. The most important principles necessary for the formation in the regional and national agribusinesses of a developed economically secure market of scientific, technical and innovative products for agroindustrial purposes are the following: providing the scientific and research sphere of the agro-industrial complex with highly qualified personnel; ensuring real freedom and independence in the activities of research institutions; the formation of a common interdependent economic space and interest; organization of specialized market structures in the field of research and innovation development; development and application within the regional agro-industrial complex of a scientifically grounded economic mechanism for regulating the functioning and stimulating the development of the market for scientific and technical innovation products. Purposeful development of the civilized market of scientific, technical and innovative products of agro-industrial design with its corresponding structures and organizational-economic mechanism is an objective necessity of functioning of economic security of the national economy. The interests of the economic and food security of the region and the state as a whole need to increase the financing of the agricultural sector and the processing industry to a level that will overcome the investment and innovation crisis caused by sanctions. To this end, we believe it is necessary to finance the innovative investment agrarian fund at the

  1. Between security and military identities: The case of Israeli security experts

    NARCIS (Netherlands)

    Grassiani, E.

    2018-01-01

    The relationship between private security professionals and the military in Israel is complex. While there is growing attention to the fact that security and military actors and their activities are becoming increasingly blurred, the Israeli case shows something different. In this ground-up analysis

  2. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  3. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  4. Applying inventory classification to a large inventory management system

    Directory of Open Access Journals (Sweden)

    Benjamin Isaac May

    2017-06-01

    Full Text Available Inventory classification aims to ensure that business-driving inventory items are efficiently managed in spite of constrained resources. There are numerous single- and multiple-criteria approaches to it. Our objective is to improve resource allocation to focus on items that can lead to high equipment availability. This concern is typical of many service industries such as military logistics, airlines, amusement parks and public works. Our study tests several inventory prioritization techniques and finds that a modified multi-criterion weighted non-linear optimization (WNO technique is a powerful approach for classifying inventory, outperforming traditional techniques of inventory prioritization such as ABC analysis in a variety of performance objectives.

  5. De-Inventory Plan for Transuranic Waste Stored at Area G

    Energy Technology Data Exchange (ETDEWEB)

    Hargis, Kenneth Marshall [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Christensen, Davis V. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Shepard, Mark D. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-06-21

    This report describes the strategy and detailed work plan developed by Los Alamos National Laboratory (LANL) to disposition transuranic (TRU) waste stored at its Area G radioactive waste storage site. The focus at this time is on disposition of 3,706 m3 of TRU waste stored above grade by June 30, 2014, which is one of the commitments within the Framework Agreement: Realignment of Environmental Priorities between the Department of Energy (DOE) National Nuclear Security Administration (NNSA) and the State of New Mexico Environment Department (NMED), Reference 1. A detailed project management schedule has been developed to manage this work and better ensure that all required activities are aligned and integrated. The schedule was developed in conjunction with personnel from the NNSA Los Alamos Site Office (LASO), the DOE Carlsbad Field Office (CBFO), the Central Characterization Project (CCP), and Los Alamos National Security, LLC (LANS). A detailed project management schedule for the remainder of the above grade inventory and the below grade inventory will be developed and incorporated into the De-Inventory Plan by December 31, 2012. This schedule will also include all newly-generated TRU waste received at Area G in FYs 2012 and 2013, which must be removed by no later than December 31, 2014, under the Framework Agreement. The TRU waste stored above grade at Area G is considered to be one of the highest nuclear safety risks at LANL, and the Defense Nuclear Facility Safety Board has expressed concern for the radioactive material at risk (MAR) contained within the above grade TRU waste inventory and has formally requested that DOE reduce the MAR. A large wildfire called the Las Conchas Fire burned extensive areas west of LANL in late June and July 2011. Although there was minimal to no impact by the fire to LANL, the fire heightened public concern and news media attention on TRU waste storage at Area G. After the fire, New Mexico Governor Susana Martinez also

  6. Categorization of Used Nuclear Fuel Inventory in Support of a Comprehensive National Nuclear Fuel Cycle Strategy

    International Nuclear Information System (INIS)

    Wagner, John C.; Peterson, Joshua L.; Mueller, Don; Gehin, Jess C.; Worrall, Andrew; Taiwo, Temitope; Nutt, Mark; Williamson, Mark A.; Todosow, Mike; Wigeland, Roald; Halsey, William; Omberg, Ronald; Swift, Peter; Carter, Joe

    2013-01-01

    A technical assessment of the current inventory [∼70,150 metric tons of heavy metal (MTHM) as of 2011] of U.S.-discharged used nuclear fuel (UNF) has been performed to support decisions regarding fuel cycle strategies and research, development and demonstration (RD and D) needs. The assessment considered discharged UNF from commercial nuclear electricity generation and defense and research programs and determined that the current UNF inventory can be divided into the following three categories: 1. Disposal - excess material that is not needed for other purposes; 2. Research - material needed for RD and D purposes to support waste management (e.g., UNF storage, transportation, and disposal) and development of alternative fuel cycles (e.g., separations and advanced fuels/reactors); and 3. Recycle/Recovery - material with inherent and/or strategic value. A set of key assumptions and attributes relative to the various disposition options were used to categorize the current UNF inventory. Based on consideration of RD and D needs, time frames and material needs for deployment of alternative fuel cycles, characteristics of the current UNF inventory, and possible uses to support national security interests, it was determined that the vast majority of the current UNF inventory should be placed in the Disposal category, without the need to make fuel retrievable from disposal for reuse or research purposes. Access to the material in the Research and Recycle/Recovery categories should be retained to support RD and D needs and national security interests. This assessment does not assume any decision about future fuel cycle options or preclude any potential options, including those with potential recycling of commercial UNF.

  7. Adaptative synchronization in multi-output fractional-order complex dynamical networks and secure communications

    Science.gov (United States)

    Mata-Machuca, Juan L.; Aguilar-López, Ricardo

    2018-01-01

    This work deals with the adaptative synchronization of complex dynamical networks with fractional-order nodes and its application in secure communications employing chaotic parameter modulation. The complex network is composed of multiple fractional-order systems with mismatch parameters and the coupling functions are given to realize the network synchronization. We introduce a fractional algebraic synchronizability condition (FASC) and a fractional algebraic identifiability condition (FAIC) which are used to know if the synchronization and parameters estimation problems can be solved. To overcome these problems, an adaptative synchronization methodology is designed; the strategy consists in proposing multiple receiver systems which tend to follow asymptotically the uncertain transmitters systems. The coupling functions and parameters of the receiver systems are adjusted continually according to a convenient sigmoid-like adaptative controller (SLAC), until the measurable output errors converge to zero, hence, synchronization between transmitter and receivers is achieved and message signals are recovered. Indeed, the stability analysis of the synchronization error is based on the fractional Lyapunov direct method. Finally, numerical results corroborate the satisfactory performance of the proposed scheme by means of the synchronization of a complex network consisting of several fractional-order unified chaotic systems.

  8. A framework for modelling the complexities of food and water security under globalisation

    Directory of Open Access Journals (Sweden)

    B. J. Dermody

    2018-01-01

    Full Text Available We present a new framework for modelling the complexities of food and water security under globalisation. The framework sets out a method to capture regional and sectoral interdependencies and cross-scale feedbacks within the global food system that contribute to emergent water use patterns. The framework integrates aspects of existing models and approaches in the fields of hydrology and integrated assessment modelling. The core of the framework is a multi-agent network of city agents connected by infrastructural trade networks. Agents receive socio-economic and environmental constraint information from integrated assessment models and hydrological models respectively and simulate complex, socio-environmental dynamics that operate within those constraints. The emergent changes in food and water resources are aggregated and fed back to the original models with minimal modification of the structure of those models. It is our conviction that the framework presented can form the basis for a new wave of decision tools that capture complex socio-environmental change within our globalised world. In doing so they will contribute to illuminating pathways towards a sustainable future for humans, ecosystems and the water they share.

  9. Prediction of radionuclide inventory for the low-and intermediated-level radioactive waste disposal facility the radioactive waste classification

    International Nuclear Information System (INIS)

    Jung, Kang Il; Jeong, Noh Gyeom; Moon, Young Pyo; Jeong, Mi Seon; Park, Jin Beak

    2016-01-01

    To meet nuclear regulatory requirements, more than 95% individual radionuclides in the low- and intermediate-level radioactive waste inventory have to be identified. In this study, the radionuclide inventory has been estimated by taking the long-term radioactive waste generation, the development plan of disposal facility, and the new radioactive waste classification into account. The state of radioactive waste cumulated from 2014 was analyzed for various radioactive sources and future prospects for predicting the long-term radioactive waste generation. The predicted radionuclide inventory results are expected to contribute to secure the development of waste disposal facility and to deploy the safety case for its long-term safety assessment

  10. Electronic healthcare information security

    CERN Document Server

    Dube, Kudakwashe; Shoniregun, Charles A

    2010-01-01

    The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

  11. Meeting Complex Challenges Through National Security Reform

    National Research Council Canada - National Science Library

    Gockel, Kathy

    2008-01-01

    .... The Obama administration will have no shortage of advice pouring in from myriad sources on how to address the dynamic nature of security given the wars in Iraq and Afghanistan and the global financial turmoil...

  12. Security matters : privacy in voting and fairness in digital exchange

    NARCIS (Netherlands)

    Jonker, H.L.

    2009-01-01

    Security matters. In the real world, there are various basic mechanisms that provide security. The digital counterparts of these basic mechanisms have been studied and are now well understood. Understanding of more complex security notions has yet to mature. This thesis studies two complex security

  13. Application of queuing theory in inventory systems with substitution flexibility

    Science.gov (United States)

    Seyedhoseini, S. M.; Rashid, Reza; Kamalpour, Iman; Zangeneh, Erfan

    2015-03-01

    Considering the competition in today's business environment, tactical planning of a supply chain becomes more complex than before. In many multi-product inventory systems, substitution flexibility can improve profits. This paper aims to prepare a comprehensive substitution inventory model, where an inventory system with two substitute products with ignorable lead time has been considered, and effects of simultaneous ordering have been examined. In this paper, demands of customers for both of the products have been regarded as stochastic parameters, and queuing theory has been used to construct a mathematical model. The model has been coded by C++, and it has been analyzed due to a real example, where the results indicate efficiency of proposed model.

  14. Inventory parameters

    CERN Document Server

    Sharma, Sanjay

    2017-01-01

    This book provides a detailed overview of various parameters/factors involved in inventory analysis. It especially focuses on the assessment and modeling of basic inventory parameters, namely demand, procurement cost, cycle time, ordering cost, inventory carrying cost, inventory stock, stock out level, and stock out cost. In the context of economic lot size, it provides equations related to the optimum values. It also discusses why the optimum lot size and optimum total relevant cost are considered to be key decision variables, and uses numerous examples to explain each of these inventory parameters separately. Lastly, it provides detailed information on parameter estimation for different sectors/products. Written in a simple and lucid style, it offers a valuable resource for a broad readership, especially Master of Business Administration (MBA) students.

  15. Accounting concept of inventories in postindustrial economy

    Directory of Open Access Journals (Sweden)

    Pravdyuk N.L.

    2017-06-01

    Full Text Available The accounting of inventories has undergone significant changes over a relatively short period of time. It has changed the scientific picture of their definition and classification, measurement and write-offs reflected in the financial statements. However, these changes happen without proper interpretation and system analysis. And, at least in general terms the inventories are conducted in Ukraine according to IFRS; this causes some obstacles to the objective reflection of working capital of enterprises, and the transparency of disclosure and is not conducive to the formation of a proper investment climate. It is established that the information provision inventory control must meet the requirements of the postindustrial economy by the complicating and deepening the complexity of accounting, the introduction of new forms and their synthesis with the current one, a gradual reorganization to ensure the needs of consumers and enterprise evaluation. The results of the study have substantiated the fundamentals of accounting concepts in the postindustrial economy in the part of the circulating capital, which forms inventories. The information support of inventory management should be implemented in a hierarchical way, when it first and foremost analyzes the working capital, and further deals with inventories and stocks as its subordinate components. The author considers the material goods to be a broader concept than reserves, because they have a dual nature both estimated as the share of negotiable assets, and as the physical component of material costs. The paper gives the definition of this category of symbiosis, which is based on P(CBU 9. The general structure of the current inventories are of significant importance, which has differences in industries, the dominant of which is agriculture, industry, construction, trade, material production. The postindustrial economy caused the questions of differentiation of concepts "production" and "material

  16. Determining an optimum inventory route for an areal object: the case of forest inventory in Finland

    Directory of Open Access Journals (Sweden)

    Henna Etula

    2014-03-01

    Full Text Available In recent decades, routing based on Geographic Information Systems (GIS has become a major branch of technology, which has been used especially in applications related to transport and logistics. However, in terms of the development of methods, routing in a cross-country environment is more difficult, and hence research into it has been relatively scarce. This is particularly true in the context of complex routing problems involving visits to several locations. A typical example of a problem of this kind is field inventory, which is a data collection procedure used in many application areas, particularly those related to environmental research and the management of natural resources. This study presents a problem in which an efficient inventory route is determined for an areal object, such that the area visible from the route meets a prescribed threshold, while maintaining the shortest possible route. Although this problem, referred to here as the Areal Inventory Problem (AIP, is closely related to a multitude of routing and location allocation methods known in the context of GIS, none of them is very well-suited for solving the AIP. This study describes a general solution procedure for the AIP, and introduces an implementation of a heuristic algorithm that can be used to solve a real-world AIP within a reasonable time frame. The proposed approach is demonstrated with actual data related to field inventory practices carried out by the Finnish Forest Centre.

  17. Categorization of Used Nuclear Fuel Inventory in Support of a Comprehensive National Nuclear Fuel Cycle Strategy - 13575

    Energy Technology Data Exchange (ETDEWEB)

    Wagner, John C.; Peterson, Joshua L.; Mueller, Don E.; Gehin, Jess C.; Worrall, Andrew [Oak Ridge National Laboratory, P.O. Box 2008, Bldg. 5700, MS-6170, Oak Ridge, TN 37831 (United States); Taiwo, Temitope; Nutt, Mark; Williamson, Mark A. [Argonne National Laboratory (United States); Todosow, Mike [Brookhaven National Laboratory (United States); Wigeland, Roald [Idaho National Laboratory (United States); Halsey, William G. [Lawrence Livermore National Laboratory (United States); Omberg, Ronald P. [Pacific Northwest National Laboratory (United States); Swift, Peter N. [Sandia National Laboratories (United States); Carter, Joe [Savannah River National Laboratory (United States)

    2013-07-01

    A technical assessment of the current inventory [∼70,150 metric tons of heavy metal (MTHM) as of 2011] of U.S.-discharged used nuclear fuel (UNF) has been performed to support decisions regarding fuel cycle strategies and research, development and demonstration (RD and D) needs. The assessment considered discharged UNF from commercial nuclear electricity generation and defense and research programs and determined that the current UNF inventory can be divided into the following three categories: 1. Disposal - excess material that is not needed for other purposes; 2. Research - material needed for RD and D purposes to support waste management (e.g., UNF storage, transportation, and disposal) and development of alternative fuel cycles (e.g., separations and advanced fuels/reactors); and 3. Recycle/Recovery - material with inherent and/or strategic value. A set of key assumptions and attributes relative to the various disposition options were used to categorize the current UNF inventory. Based on consideration of RD and D needs, time frames and material needs for deployment of alternative fuel cycles, characteristics of the current UNF inventory, and possible uses to support national security interests, it was determined that the vast majority of the current UNF inventory should be placed in the Disposal category, without the need to make fuel retrievable from disposal for reuse or research purposes. Access to the material in the Research and Recycle/Recovery categories should be retained to support RD and D needs and national security interests. This assessment does not assume any decision about future fuel cycle options or preclude any potential options, including those with potential recycling of commercial UNF. (authors)

  18. Categorization of Used Nuclear Fuel Inventory in Support of a Comprehensive National Nuclear Fuel Cycle Strategy - 13575

    International Nuclear Information System (INIS)

    Wagner, John C.; Peterson, Joshua L.; Mueller, Don E.; Gehin, Jess C.; Worrall, Andrew; Taiwo, Temitope; Nutt, Mark; Williamson, Mark A.; Todosow, Mike; Wigeland, Roald; Halsey, William G.; Omberg, Ronald P.; Swift, Peter N.; Carter, Joe

    2013-01-01

    A technical assessment of the current inventory [∼70,150 metric tons of heavy metal (MTHM) as of 2011] of U.S.-discharged used nuclear fuel (UNF) has been performed to support decisions regarding fuel cycle strategies and research, development and demonstration (RD and D) needs. The assessment considered discharged UNF from commercial nuclear electricity generation and defense and research programs and determined that the current UNF inventory can be divided into the following three categories: 1. Disposal - excess material that is not needed for other purposes; 2. Research - material needed for RD and D purposes to support waste management (e.g., UNF storage, transportation, and disposal) and development of alternative fuel cycles (e.g., separations and advanced fuels/reactors); and 3. Recycle/Recovery - material with inherent and/or strategic value. A set of key assumptions and attributes relative to the various disposition options were used to categorize the current UNF inventory. Based on consideration of RD and D needs, time frames and material needs for deployment of alternative fuel cycles, characteristics of the current UNF inventory, and possible uses to support national security interests, it was determined that the vast majority of the current UNF inventory should be placed in the Disposal category, without the need to make fuel retrievable from disposal for reuse or research purposes. Access to the material in the Research and Recycle/Recovery categories should be retained to support RD and D needs and national security interests. This assessment does not assume any decision about future fuel cycle options or preclude any potential options, including those with potential recycling of commercial UNF. (authors)

  19. Forest inventory in Myanmar

    Energy Technology Data Exchange (ETDEWEB)

    Bo, Sit [Forest Resource Div., Forest Department (Myanmar)

    1993-10-01

    Forest inventory in Myanmar started in 1850s. Up till 1975, Myanmar Forest Department conducted forest inventories covering approximately one forest division every year. The National Forest Survey and Inventory Project funded by UNDP and assisted by FAO commenced in 1981 and the National Forest Management and Inventory project followed in 1986. Up till end March 1993, pre-investment inventory has covered 26.7 million acres, reconnaissance inventory 5.4 million acres and management inventory has carried out in 12 townships

  20. Forest inventory in Myanmar

    International Nuclear Information System (INIS)

    Sit Bo

    1993-01-01

    Forest inventory in Myanmar started in 1850s. Up till 1975, Myanmar Forest Department conducted forest inventories covering approximately one forest division every year. The National Forest Survey and Inventory Project funded by UNDP and assisted by FAO commenced in 1981 and the National Forest Management and Inventory project followed in 1986. Up till end March 1993, pre-investment inventory has covered 26.7 million acres, reconnaissance inventory 5.4 million acres and management inventory has carried out in 12 townships

  1. Secure it now or secure it later: the benefits of addressing cyber-security from the outset

    Science.gov (United States)

    Olama, Mohammed M.; Nutaro, James

    2013-05-01

    The majority of funding for research and development (R&D) in cyber-security is focused on the end of the software lifecycle where systems have been deployed or are nearing deployment. Recruiting of cyber-security personnel is similarly focused on end-of-life expertise. By emphasizing cyber-security at these late stages, security problems are found and corrected when it is most expensive to do so, thus increasing the cost of owning and operating complex software systems. Worse, expenditures on expensive security measures often mean less money for innovative developments. These unwanted increases in cost and potential slowing of innovation are unavoidable consequences of an approach to security that finds and remediate faults after software has been implemented. We argue that software security can be improved and the total cost of a software system can be substantially reduced by an appropriate allocation of resources to the early stages of a software project. By adopting a similar allocation of R&D funds to the early stages of the software lifecycle, we propose that the costs of cyber-security can be better controlled and, consequently, the positive effects of this R&D on industry will be much more pronounced.

  2. Examining the Impact of Non-Technical Security Management Factors on Information Security Management in Health Informatics

    Science.gov (United States)

    Imam, Abbas H.

    2013-01-01

    Complexity of information security has become a major issue for organizations due to incessant threats to information assets. Healthcare organizations are particularly concerned with security owing to the inherent vulnerability of sensitive information assets in health informatics. While the non-technical security management elements have been at…

  3. Very Low Food Security in US Households Is Predicted by Complex Patterns of Health, Economics, and Service Participation.

    Science.gov (United States)

    Choi, Seul Ki; Fram, Maryah S; Frongillo, Edward A

    2017-10-01

    Background: Very low food security (VLFS) happens at the intersection of nuanced and complex patterns of risk characteristics across multiple domains. Little is known about the idiosyncratic situations that lead households to experience VLFS. Objective: We used classification and regression tree (CART) analysis, which can handle complex combinations of predictors, to identify patterns of characteristics that distinguish VLFS households in the United States from other households. Methods: Data came from 3 surveys, the 2011-2014 National Health Interview Survey (NHIS), the 2005-2012 NHANES, and the 2002-2012 Current Population Survey (CPS), with sample participants aged ≥18 y and households with income Survey participants were stratified into households with children, adult-only households, and older-adult households (NHIS, CPS) or individuals aged 18-64 y and individuals aged ≥65 y (NHANES). Household food security was measured with the use of the 10-item US Adult Food Security Scale. Variables from multiple domains, including sociodemographic characteristics, health, health care, and participation in social welfare and food assistance programs, were considered as predictors. The 3 data sources were analyzed separately with the use of CART analysis. Results: Household experiences of VLFS were associated with different predictors for different types of households and often occurred at the intersection of multiple characteristics spanning unmet medical needs, poor health, disability, limitation, depressive symptoms, low income, and food assistance program participation. These predictors built complex trees with various combinations in different types of households. Conclusions: This study showed that multiple characteristics across multiple domains distinguished VLFS households. Flexible and nonlinear methods focusing on a wide range of risk characteristics should be used to identify VLFS households and to inform policies and programs that can address VLFS

  4. Network Paradigm of Information Security

    Directory of Open Access Journals (Sweden)

    Alexandr Diomidovich Afanasyev

    2016-03-01

    Full Text Available An issue of topological analysis has been claimed as a key one while creating robust and secure network systems. Some examples of complex network applications in information security domain have been cited.

  5. Interactive Inventory Monitoring

    Science.gov (United States)

    Garud, Sumedha

    2013-01-01

    Method and system for monitoring present location and/or present status of a target inventory item, where the inventory items are located on one or more inventory shelves or other inventory receptacles that communicate with an inventory base station through use of responders such as RFIDs. A user operates a hand held interrogation and display (lAD) module that communicates with, or is part of the base station to provide an initial inquiry. lnformation on location(s) of the larget invenlory item is also indicated visibly and/or audibly on the receptacle(s) for the user. Status information includes an assessment of operation readiness and a time, if known, that the specified inventory item or class was last removed or examined or modified. Presentation of a user access level may be required for access to the target inventgory item. Another embodiment provides inventory informatin for a stack as a sight-impaired or hearing-impaired person adjacent to that stack.

  6. The Y-12 National Security Complex Foreign Research Reactor Uranium Supply Production

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, T. [Nuclear Technology and Nonproliferation Programs, B and W Y-12, L.L.C., Y-12 National Security Complex, Oak Ridge, Tennessee (United States); Keller, A.P. [Disposition and Supply Programs, B and W Y-12, L.L.C., Y-12 National Security Complex, Oak Ridge, Tennessee (United States)

    2011-07-01

    The Foreign Research Reactor (FRR) Uranium Supply Program at the Y-12 National Security Complex supports the nonproliferation objectives of the National Nuclear Security Administration (NNSA) HEU Disposition, the Reduced Enrichment Research and Test Reactors (RERTR), and the United States (U.S.) FRR Spent Nuclear Fuel (SNF) Acceptance Programs. The FRR Supply Program supports the important U.S. government nuclear nonproliferation commitment to serve as a reliable and cost-effective uranium supplier for those foreign research reactors that are converting or have converted to Low-Enriched Uranium (LEU) fuel under the RERTR Program. The NNSA Y-12 Site Office maintains the prime contracts with foreign government agencies for the supply of LEU for their research reactors. The LEU is produced by down blending Highly Enriched Uranium (HEU) that has been declared surplus to the U.S. national defense needs. The down blending and sale of the LEU supports the Surplus HEU Disposition Program Record of Decision to make the HEU non-weapons usable and to recover the economic value of the uranium to the extent feasible. In addition to uranium metal feedstock for fuel fabrication, Y-12 can produce LEU in different forms to support new fuel development or target fabrication for medical isotope production. With production improvements and efficient delivery preparations, Y-12 continues to successfully support the global research reactor community. (author)

  7. Construct validity of the pediatric evaluation of disability inventory computer adaptive test (PEDI-CAT) in children with medical complexity.

    Science.gov (United States)

    Dumas, Helene M; Fragala-Pinkham, Maria A; Rosen, Elaine L; O'Brien, Jane E

    2017-11-01

    To assess construct (convergent and divergent) validity of the Pediatric Evaluation of Disability Inventory Computer Adaptive Test (PEDI-CAT) in a sample of children with complex medical conditions. Demographics, clinical information, PEDI-CAT normative score, and the Post-Acute Acuity Rating for Children (PAARC) level were collected for all post-acute hospital admissions (n = 110) from 1 April 2015 to 1 March 2016. Correlations between the PEDI-CAT Daily Activities, Mobility, and Social/Cognitive domain scores for the total sample and across three age groups (infant, preschool, and school-age) were calculated. Differences in mean PEDI-CAT scores for each domain across two groups, children with "Less Complexity," or "More Complexity" based on PAARC level were examined. All correlations for the total sample and age subgroups were statistically significant and trends across age groups were evident with the stronger associations between domains for the infant group. Significant differences were found between mean PEDI-CAT Daily Activities, Mobility, and Social/Cognitive normative scores across the two complexity groups with children in the "Less Complex" group having higher PEDI-CAT scores for all domains. This study provides evidence indicating the PEDI-CAT can be used with confidence in capturing and differentiating children's level of function in a post-acute care setting. Implications for Rehabilitation The PEDI-CAT is measure of function for children with a variety of conditions and can be used in any clinical setting. Convergent validity of the PEDI-CAT's Daily Activities, Mobility, and Social/Cognitive domains was significant and particularly strong for infants and young children with medical complexity. The PEDI-CAT was able to discriminate groups of children with differing levels of medical complexity admitted to a pediatric post-acute care hospital.

  8. Information security principles and practice

    CERN Document Server

    Stamp, Mark

    2011-01-01

    Now updated-your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge. Taking a pract

  9. Secure equality and greater-than tests with sublinear online complexity

    DEFF Research Database (Denmark)

    Lipmaa, Helger; Toft, Tomas

    2013-01-01

    Secure multiparty computation (MPC) allows multiple parties to evaluate functions without disclosing the private inputs. Secure comparisons (testing equality and greater-than) are important primitives required by many MPC applications. We propose two equality tests for ℓ-bit values with O(1) online...

  10. Hidden inventory and safety considerations

    International Nuclear Information System (INIS)

    Anderson, A.R.; James, R.H.; Morgan, F.

    1976-01-01

    Preliminary results are described of the evaluation of residual plutonium in a process line used for the production of experimental fast reactor fuel. Initial attention has been focussed on a selection of work boxes used for processing powders and solutions. Amounts of material measured as ''hidden inventory'' are generally less than 0.1 percent of throughput but in one box containing very complex equipment the amount was exceptionally about 0.5 percent. The total surface area of the box and the installed equipment appears to be the most significant factor in determining the amount of plutonium held-up as ''hidden inventory,'' representing an average of about 4 x 10 -4 g cm -2 . Present results are based on gamma spectrometer measurements but neutron techniques are being developed to overcome some of the inherent uncertainties in the gamma method. It is suggested that the routine use of sample plates of known surface area would be valuable in monitoring the deposition of plutonium in work boxes

  11. The Evaluation of Internal Control Implementation Over Merchandise Inventory at PT. Suramando (Pharmaceutical Distributors and General Suppliers) in Manado

    OpenAIRE

    Runtu, Treesje; Seredei, Srijantri

    2015-01-01

    Inventory is a firms current assets, that its amount is material and constituting one of essential factor in the corporate operational activity. That is why a good internal controls to must be done secure supplies from the acts of fraud, deviation and damage. The purpose of this study is to evaluate the internal control over merchandise inventory at PT. Suramando it is running well. The method used is qualitative method through descriptive analysis. The final conclusion is that based on the e...

  12. Using Proven Reference Monitor Patterns for Security Evaluation

    Directory of Open Access Journals (Sweden)

    Mark R. Heckman

    2016-04-01

    Full Text Available The most effective approach to evaluating the security of complex systems is to deliberately construct the systems using security patterns specifically designed to make them evaluable. Just such an integrated set of security patterns was created decades ago based on the Reference Monitor abstraction. An associated systematic security engineering and evaluation methodology was codified as an engineering standard in the Trusted Computer System Evaluation Criteria (TCSEC. This paper explains how the TCSEC and its Trusted Network Interpretation (TNI constitute a set of security patterns for large, complex and distributed systems and how those patterns have been repeatedly and successfully used to create and evaluate some of the most secure government and commercial systems ever developed.

  13. The West Haven-Yale Multidimensional Pain Inventory (WHYMPI).

    Science.gov (United States)

    Kerns, R D; Turk, D C; Rudy, T E

    1985-12-01

    The complexity of chronic pain has represented a major dilemma for clinical researchers interested in the reliable and valid assessment of the problem and the evaluation of treatment approaches. The West Haven-Yale Multidimensional Pain Inventory (WHYMPI) was developed in order to fill a widely recognized void in the assessment of clinical pain. Assets of the inventory are its brevity and clarity, its foundation in contemporary psychological theory, its multidimensional focus, and its strong psychometric properties. Three parts of the inventory, comprised of 12 scales, examine the impact of pain on the patients' lives, the responses of others to the patients' communications of pain, and the extent to which patients participate in common daily activities. The instrument is recommended for use in conjunction with behavioral and psychophysiological assessment strategies in the evaluation of chronic pain patients in clinical settings. The utility of the WHYMPI in empirical investigations of chronic pain is also discussed.

  14. The Consequences to National Security of Jurisdictional Gray Areas Between Emergency Management and Homeland Security

    Science.gov (United States)

    2014-09-01

    nation of pride and resiliency but also the owner of a complex inwardly focused, national security organization. To examine the JGAs between EM and HS...national security. A snapshot 13 years post 9/11 reveals a nation of pride and resiliency but also the owner of a complex inwardly focused...acceptance with or without guilt for the social disparity picture captured in the wake of Hurricane Katrina. “Perhaps the most disturbing fact that

  15. On the Road to Holistic Decision Making in Adaptive Security

    Directory of Open Access Journals (Sweden)

    Mahsa Emami-Taba

    2013-08-01

    Full Text Available Security is a critical concern in today's software systems. Besides the interconnectivity and dynamic nature of network systems, the increasing complexity in modern software systems amplifies the complexity of IT security. This fact leaves attackers one step ahead in exploiting vulnerabilities and introducing new cyberattacks. The demand for new methodologies in addressing cybersecurity is emphasized by both private and national corporations. A practical solution to dynamically manage the high complexity of IT security is adaptive security, which facilitates analysis of the system's behaviour and hence the prevention of malicious attacks in complex systems. Systems that feature adaptive security detect and mitigate security threats at runtime with little or no administrator involvement. In these systems, decisions at runtime are balanced according to quality and performance goals. This article describes the necessity of holistic decision making in such systems and paves the road to future research.

  16. The Emerging Architecture of a Regional Security Complex in the ...

    African Journals Online (AJOL)

    2015-03-03

    Mar 3, 2015 ... Council for the Development of Social Science Research in Africa, 2017 .... of International Security Studies by appropriating Regional Security .... collaborative network is also embedded across Saharan and Sahelian Africa, ... (previously located in the city of Baga in Nigeria's Borno State), fell into the.

  17. Development of a non-radiological air emissions inventory for a nuclear industrial facility

    International Nuclear Information System (INIS)

    Patnoe, C.A.; Porter, G.V.; Almquist, R.S.

    1991-01-01

    This paper describes the major issues that impacted the organization and structure of a project for developing a comprehensive non- radiological air emissions inventory for a nuclear weapons facility. The major issues addressed paralleled the development of the inventory project and fall into the following categories: (1) defining the scope of work, (2) developing and managing the air emission inventory project, and (3) field investigations and evaluating operations for air emissions. This paper also describes the lines of communication that were established with state regulators to resolve problems and develop a successful working relationship. This paper illustrates a means to complete a complex air emission inventory with proper organization and cooperation with regulatory agencies. Further, it indicates the need of critical evaluation of project tasks to evaluate their impact on project schedule; it provides a method for implementing a quality assurance program that audits all phases of the emission survey; and it demonstrates a way of effectively managing outside contractors to meet schedule requirements and assure a high quality product. This paper is of value to those undertaking a similar complex air emission survey. 2 refs

  18. Optimal Inventory Control with Advance Supply Information

    Directory of Open Access Journals (Sweden)

    Marko Jaksic

    2016-09-01

    Full Text Available It has been shown in numerous situations that sharing information between the companies leads to improved performance of the supply chain. We study a positive lead time periodic-review inventory system of a retailer facing stochastic demand from his customer and stochastic limited supply capacity of the manufacturer supplying the products to him. The consequence of stochastic supply capacity is that the orders might not be delivered in full, and the exact size of the replenishment might not be known to the retailer. The manufacturer is willing to share the so-called advance supply information (ASI about the actual replenishment of the retailer's pipeline order with the retailer. ASI is provided at a certain time after the orders have been placed and the retailer can now use this information to decrease the uncertainty of the supply, and thus improve its inventory policy. For this model, we develop a dynamic programming formulation, and characterize the optimal ordering policy as a state-dependent base-stock policy. In addition, we show some properties of the base-stock level. While the optimal policy is highly complex, we obtain some additional insights by comparing it to the state-dependent myopic inventory policy. We conduct the numerical analysis to estimate the in uence of the system parameters on the value of ASI. While we show that the interaction between the parameters is relatively complex, the general insight is that due to increasing marginal returns, the majority of the benets are gained only in the case of full, or close to full, ASI visibility.

  19. Microsoft Windows Security Essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed,

  20. Developing a new stochastic competitive model regarding inventory and price

    Science.gov (United States)

    Rashid, Reza; Bozorgi-Amiri, Ali; Seyedhoseini, S. M.

    2015-09-01

    Within the competition in today's business environment, the design of supply chains becomes more complex than before. This paper deals with the retailer's location problem when customers choose their vendors, and inventory costs have been considered for retailers. In a competitive location problem, price and location of facilities affect demands of customers; consequently, simultaneous optimization of the location and inventory system is needed. To prepare a realistic model, demand and lead time have been assumed as stochastic parameters, and queuing theory has been used to develop a comprehensive mathematical model. Due to complexity of the problem, a branch and bound algorithm has been developed, and its performance has been validated in several numerical examples, which indicated effectiveness of the algorithm. Also, a real case has been prepared to demonstrate performance of the model for real world.

  1. Inventory extension at the Nuclear Materials Storage Facility

    International Nuclear Information System (INIS)

    Stanbro, W.D.; Longmire, V.; Olinger, C.T.; Argo, P.E.

    1996-09-01

    The planned renovation of the Nuclear Material Storage Facility (NMSF) at Los Alamos National Laboratory will be a significant addition to the plutonium storage capacity of the nuclear weapons complex. However, the utility of the facility may be impaired by an overly conservative approach to performing inventories of material in storage. This report examines options for taking advantage of provisions in Department of Energy orders to extend the time between inventories. These extensions are based on a combination of modern surveillance technology, facility design features, and revised operational procedures. The report also addresses the possibility that NMSF could be the site of some form of international inspection as part of the US arms control and nonproliferation policy

  2. Oil inventory behaviour: the public and private sector relationship and the free-rider problem

    International Nuclear Information System (INIS)

    Al-Faris, A.F.

    1992-01-01

    For oil-importing countries, the uninterrupted flow of energy sources lies at the heart of their national security. The crises of 1973-74 and 1979-80 have demonstrated the vulnerability of their economies to oil shortages, and the need to maintain a certain level of stocks to absorb unexpected losses in normal supply. On the other hand, oil producers have perceived a large inventory accumulation as a destabilizing factor to the oil market. This paper introduces fresh evidence on the dynamic nature of the relationship between OECD countries on the one hand and the public and private sectors on the other. The aims of the paper are, thus, twofold. The first is to highlight the underlying determinants of the inventory policies in major OECD countries. Of particular interest to this inquiry is the question of the free-rider phenomenon. The second is to study the interaction between public and private inventories in the framework of a dynamic model. (author)

  3. Evaluation Report on The Department's Unclassified Cyber Security Program - 2009

    International Nuclear Information System (INIS)

    Anon

    2009-01-01

    defenses against malicious intruders and other externals threats. These are positive accomplishments. However, in our judgment, additional action is required to further enhance the Department's unclassified cyber security program and help reduce risks to its systems and data. For example, our current review identified opportunities for improvements in areas such as security planning and testing, systems inventory, access controls, and configuration management. In particular, we issued a number of findings at sites managed by the National Nuclear Security Administration (NNSA). We also identified weaknesses across various Department program elements. Issues that warrant further attention include: (1) Weaknesses such as outdated security plans and not completing annual security control self-assessments were identified at several sites; (2) The Department had not yet resolved systems inventory issues and had yet to deploy a complex-wide automated asset management tool to help track information technology resources and identify interfaces between systems or networks; (3) Although certain improvements had been made to enhance access controls, we noted deficiencies such as a lack of periodic account reviews and inadequate password management at a number of sites; and (4) Previously identified weaknesses in configuration management had been corrected, however, we found problems related to weak administrator account settings and failure to install software patches, as well as incomplete implementation of the Federal Desktop Core Configuration. These internal control weaknesses existed, at least in part, because certain cyber security roles and responsibilities were not clearly delineated. Program officials also had not effectively performed monitoring and review activities essential for evaluating the adequacy of cyber security performance. In some cases, officials had not ensured that weaknesses discovered during audits and other evaluations were recorded and tracked to

  4. A Historical Evaluation of the U15 Complex, Nevada National Security Site, Nye County, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Drollinger, Harold [Desert Research Inst., Nevada University, Reno, NV (United States); Holz, Barbara A. [Desert Research Inst., Nevada University, Reno, NV (United States); Bullard, Thomas F. [Desert Research Inst., Nevada University, Reno, NV (United States); Goldenberg, Nancy G. [Desert Research Inst., Nevada University, Reno, NV (United States); Ashbaugh, Laurence J. [Desert Research Inst., Nevada University, Reno, NV (United States); Griffin, Wayne R. [Desert Research Inst., Nevada University, Reno, NV (United States)

    2014-01-01

    This report presents a historical evaluation of the U15 Complex on the Nevada National Security Site (NNSS) in southern Nevada. The work was conducted by the Desert Research Institute at the request of the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office and the U.S. Department of Defense, Defense Threat Reduction Agency. Three underground nuclear tests and two underground nuclear fuel storage experiments were conducted at the complex. The nuclear tests were Hard Hat in 1962, Tiny Tot in 1965, and Pile Driver in 1966. The Hard Hat and Pile Driver nuclear tests involved different types of experiment sections in test drifts at various distances from the explosion in order to determine which sections could best survive in order to design underground command centers. The Tiny Tot nuclear test involved an underground cavity in which the nuclear test was executed. It also provided data in designing underground structures and facilities to withstand a nuclear attack. The underground nuclear fuel storage experiments were Heater Test 1 from 1977 to 1978 and Spent Fuel Test - Climax from 1978 to 1985. Heater Test 1 was used to design the later Spent Fuel Test - Climax experiment. The latter experiment was a model of a larger underground storage facility and primarily involved recording the conditions of the spent fuel and the surrounding granite medium. Fieldwork was performed intermittently in the summers of 2011 and 2013, totaling 17 days. Access to the underground tunnel complex is sealed and unavailable. Restricted to the surface, four buildings, four structures, and 92 features associated with nuclear testing and fuel storage experiment activities at the U15 Complex have been recorded. Most of these are along the west side of the complex and next to the primary access road and are characteristic of an industrial mining site, albeit one with scientific interests. The geomorphological fieldwork was conducted over three days in the

  5. A Historical Evaluation of the U15 Complex, Nevada National Security Site, Nye County, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Drollinger, Harold [Desert Research Inst., Nevada University, Reno, NV (United States); Holz, Barbara A. [Desert Research Inst., Nevada University, Reno, NV (United States); Bullard, Thomas F. [Desert Research Inst., Nevada University, Reno, NV (United States); Goldenberg, Nancy G. [Desert Research Inst., Nevada University, Reno, NV (United States); Ashbaugh, Laurence J. [Desert Research Inst., Nevada University, Reno, NV (United States); Griffin, Wayne R. [Desert Research Inst., Nevada University, Reno, NV (United States)

    2014-01-09

    This report presents a historical evaluation of the U15 Complex on the Nevada National Security Site (NNSS) in southern Nevada. The work was conducted by the Desert Research Institute at the request of the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office and the U.S. Department of Defense, Defense Threat Reduction Agency. Three underground nuclear tests and two underground nuclear fuel storage experiments were conducted at the complex. The nuclear tests were Hard Hat in 1962, Tiny Tot in 1965, and Pile Driver in 1966. The Hard Hat and Pile Driver nuclear tests involved different types of experiment sections in test drifts at various distances from the explosion in order to determine which sections could best survive in order to design underground command centers. The Tiny Tot nuclear test involved an underground cavity in which the nuclear test was executed. It also provided data in designing underground structures and facilities to withstand a nuclear attack. The underground nuclear fuel storage experiments were Heater Test 1 from 1977 to 1978 and Spent Fuel Test - Climax from 1978 to 1985. Heater Test 1 was used to design the later Spent Fuel Test - Climax experiment. The latter experiment was a model of a larger underground storage facility and primarily involved recording the conditions of the spent fuel and the surrounding granite medium. Fieldwork was performed intermittently in the summers of 2011 and 2013, totaling 17 days. Access to the underground tunnel complex is sealed and unavailable. Restricted to the surface, four buildings, four structures, and 92 features associated with nuclear testing and fuel storage experiment activities at the U15 Complex have been recorded. Most of these are along the west side of the complex and next to the primary access road and are characteristic of an industrial mining site, albeit one with scientific interests. The geomorphological fieldwork was conducted over three days in the

  6. Knowledge-based computer security advisor

    International Nuclear Information System (INIS)

    Hunteman, W.J.; Squire, M.B.

    1991-01-01

    The rapid expansion of computer security information and technology has included little support to help the security officer identify the safeguards needed to comply with a policy and to secure a computing system. This paper reports that Los Alamos is developing a knowledge-based computer security system to provide expert knowledge to the security officer. This system includes a model for expressing the complex requirements in computer security policy statements. The model is part of an expert system that allows a security officer to describe a computer system and then determine compliance with the policy. The model contains a generic representation that contains network relationships among the policy concepts to support inferencing based on information represented in the generic policy description

  7. Joint Optimization of Preventive Maintenance and Spare Parts Inventory with Appointment Policy

    Directory of Open Access Journals (Sweden)

    Jing Cai

    2017-01-01

    Full Text Available Under the background of the wide application of condition-based maintenance (CBM in maintenance practice, the joint optimization of maintenance and spare parts inventory is becoming a hot research to take full advantage of CBM and reduce the operational cost. In order to avoid both the high inventory level and the shortage of spare parts, an appointment policy of spare parts is first proposed based on the prediction of remaining useful lifetime, and then a corresponding joint optimization model of preventive maintenance and spare parts inventory is established. Due to the complexity of the model, the combination method of genetic algorithm and Monte Carlo is presented to get the optimal maximum inventory level, safety inventory level, potential failure threshold, and appointment threshold to minimize the cost rate. Finally, the proposed model is studied through a case study and compared with both the separate optimization and the joint optimization without appointment policy, and the results show that the proposed model is more effective. In addition, the sensitivity analysis shows that the proposed model is consistent with the actual situation of maintenance practices and inventory management.

  8. Cost and performance analysis of physical security systems

    International Nuclear Information System (INIS)

    Hicks, M.J.; Yates, D.; Jago, W.H.; Phillips, A.W.

    1998-04-01

    Analysis of cost and performance of physical security systems can be a complex, multi-dimensional problem. There are a number of point tools that address various aspects of cost and performance analysis. Increased interest in cost tradeoffs of physical security alternatives has motivated development of an architecture called Cost and Performance Analysis (CPA), which takes a top-down approach to aligning cost and performance metrics. CPA incorporates results generated by existing physical security system performance analysis tools, and utilizes an existing cost analysis tool. The objective of this architecture is to offer comprehensive visualization of complex data to security analysts and decision-makers

  9. Border Security: A Conceptual Model of Complexity

    Science.gov (United States)

    2013-12-01

    law , constitutional powers, environmental regulations, and civil rights, http://tpplegal.files.wordpress.com/2012/05/isds-domestic-legal-process...Violation NAFTA North American Free Trade Agreement NII Non-Intrusive Inspection POE Port of Entry PPD-8 Presidential Policy Directive 8...security measured? What constitutes a measure of effectiveness for protection? These are all questions presented to representatives of the Department of

  10. While Working Around Security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg

    Users of technology encounter various IT security mechanisms in their everyday lives. If these mechanisms fail to support everyday activities, they either get in the way, or the users find a way to work around them. Even though users manage to carry out everyday activities by using substandard...... IT security mechanisms or via workarounds, it will influence their experience of security. If researchers and designers only focus on IT security artifacts and fail to take the user experience into account, incorrect processes or workarounds will occur. Accordingly, to get users to follow the correct process...... may seem to be a criterion of success, even though it may yield a less appropriate experience of security. This dissertation deals with an improved understanding of IT security sensitive IT artifacts and presents three design methods, and a framework for addressing the complexities and contingencies...

  11. Procedure for taking physical inventories

    International Nuclear Information System (INIS)

    Anon.

    1981-01-01

    This session is intended to apprise one of the various aspects of procedures and routines that Exxon Nuclear uses with respect to its nuclear materials physical inventory program. The presentation describes how plant physical inventories are planned and taken. The description includes the planning and preparation for taking the inventory, the clean-out procedures for converting in-process material to measurable items, the administrative procedures for establishing independent inventory teams and for inventorying each inventory area, the verification procedures used to include previously measured tamper-safed items in the inventory, and lastly, procedures used to reconcile the inventory and calculate MUF (materials unaccounted for). The purpose of the session is to enable participants to: (1) understand the planning and pre-inventorty procedures and their importance; (2) understand the need for and the required intensity of clean-out procedures; (3) understand how inventory teams are formed, and how the inventory is conducted; (4) understand the distinction between inventory previously measured tamper-safed items and other materials not so characterized; (5) understand the reconciliation procedures; and (6) calculate a MUF given the book and inventory results

  12. Literature Review on Cyber Security Investment Decisions

    OpenAIRE

    ŞENTÜRK, Hakan; ÇİL, Celal Zaim; SAĞIROĞLU, Şeref

    2016-01-01

    Severe financial losses incurred by cyber security attacks with increasing complexity and frequency, as well as booming cyber security sector offering variety of products as investment options have led the focus of the research in the field to the economic dimension of cyber security. The need for determination of methods to be used when making cyber security investment decisions under budget constraints have become prominent. In five sections as the cyber security investment strategies, risk...

  13. Social security for seafarers globally

    DEFF Research Database (Denmark)

    Jensen, Olaf; Canals, Luisa; Haarløv, Erik

    2013-01-01

    Social security for seafarers globally Background: Social security protection is one of the essential elements of decent work. The issue is complex and no previous epidemiological studies of the coverage among seafarers have yet been performed. Objectives: The aim was to overcome the gap...... of knowledge to promote the discussion and planning of the implementation of social security for all seafarers. Methods: The seafarers completed a short questionnaire concerning their knowledge about their social security status. Results: Significant disparities of coverage of social security were pointed out...... comes from poorer countries without substantial social security systems. The solutions suggested are to implement the minimum requirements as recommended by the ILO 2006 Convention, to survey the implementation and in the long term to struggle for global social equality. Key words: Social security...

  14. How to secure a wireless sensor network

    NARCIS (Netherlands)

    Law, Y.W.; Havinga, Paul J.M.

    2005-01-01

    The security of wireless sensor networks (WSNs) is a complex issue. While security research of WSNs is progressing at a tremendous pace, and many security techniques have been proposed, no comprehensive framework has so far emerged that attempts to tie the bits and pieces together to ease the

  15. Security aspects of database systems implementation

    OpenAIRE

    Pokorný, Tomáš

    2009-01-01

    The aim of this thesis is to provide a comprehensive overview of database systems security. Reader is introduced into the basis of information security and its development. Following chapter defines a concept of database system security using ISO/IEC 27000 Standard. The findings from this chapter form a complex list of requirements on database security. One chapter also deals with legal aspects of this domain. Second part of this thesis offers a comparison of four object-relational database s...

  16. Oak Ridge Reservation Environmental Protection Rad Neshaps Radionuclide Inventory Web Database and Rad Neshaps Source and Dose Database.

    Science.gov (United States)

    Scofield, Patricia A; Smith, Linda L; Johnson, David N

    2017-07-01

    The U.S. Environmental Protection Agency promulgated national emission standards for emissions of radionuclides other than radon from US Department of Energy facilities in Chapter 40 of the Code of Federal Regulations (CFR) 61, Subpart H. This regulatory standard limits the annual effective dose that any member of the public can receive from Department of Energy facilities to 0.1 mSv. As defined in the preamble of the final rule, all of the facilities on the Oak Ridge Reservation, i.e., the Y-12 National Security Complex, Oak Ridge National Laboratory, East Tennessee Technology Park, and any other U.S. Department of Energy operations on Oak Ridge Reservation, combined, must meet the annual dose limit of 0.1 mSv. At Oak Ridge National Laboratory, there are monitored sources and numerous unmonitored sources. To maintain radiological source and inventory information for these unmonitored sources, e.g., laboratory hoods, equipment exhausts, and room exhausts not currently venting to monitored stacks on the Oak Ridge National Laboratory campus, the Environmental Protection Rad NESHAPs Inventory Web Database was developed. This database is updated annually and is used to compile emissions data for the annual Radionuclide National Emission Standards for Hazardous Air Pollutants (Rad NESHAPs) report required by 40 CFR 61.94. It also provides supporting documentation for facility compliance audits. In addition, a Rad NESHAPs source and dose database was developed to import the source and dose summary data from Clean Air Act Assessment Package-1988 computer model files. This database provides Oak Ridge Reservation and facility-specific source inventory; doses associated with each source and facility; and total doses for the Oak Ridge Reservation dose.

  17. Inventory - Dollars and sense

    International Nuclear Information System (INIS)

    Samson, J.R.

    1992-01-01

    Nuclear utilities are becoming more aware of the importance of having an inventory investment that supports two opposing philosophies. The business philosophy wants a minimal inventory investment to support a better return on invested dollars. This increase in return comes from having the dollars available to invest versus having the money tied up in inventory sitting on the shelf. The opposing viewpoint is taken by maintenance/operations organizations, which desire the maximum inventory available on-site to repair any component at any time to keep the units on-line at all times. Financial managers also want to maintain cash flow throughout operations so that plants run without interruptions. Inventory management is therefore a mixture of financial logistics with an operation perspective in mind. A small amount of common sense and accurate perception also help. The challenge to the materials/inventory manager is to optimize effectiveness of the inventory by having high material availability at the lowest possible cost

  18. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  19. Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes

    Directory of Open Access Journals (Sweden)

    Ji-Jian Chin

    2014-01-01

    Full Text Available Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user’s secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions.

  20. Efficient and provable secure pairing-free security-mediated identity-based identification schemes.

    Science.gov (United States)

    Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C-W

    2014-01-01

    Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions.

  1. Security engineering: systems engineering of security through the adaptation and application of risk management

    Science.gov (United States)

    Gilliam, David P.; Feather, Martin S.

    2004-01-01

    Information Technology (IT) Security Risk Management is a critical task in the organization, which must protect its resources and data against the loss of confidentiality, integrity, and availability. As systems become more complex and diverse, and more vulnerabilities are discovered while attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security. This paper describes an approach to address IT security risk through risk management and mitigation in both the institution and in the project life cycle.

  2. A European Perspective on Security Research

    Science.gov (United States)

    Liem, Khoen; Hiller, Daniel; Castex, Christoph

    Tackling the complexity and interdependence of today's security environment in the globalized world of the 21st century is an everlasting challenge. Whereas the end of the Cold War presented a caesura of global dimension for the political and economic architecture and a realignment of power distribution and international relations between former adversaries, September 11th of 2001 may be seen as another caesura. Since then, specifically among countries of the Western hemisphere, traditional security paradigms and theories have been critically questioned and the different security cultures and perceptions have resulted in diverse security and defence policies as well as in security research efforts of individual countries. Consensus, it seems, exists on the question of what the threats are that our modern interconnected societies are facing. Whether looking at international terrorism, organized crime, climate change, the illegal trafficking of goods and people or naturally caused catastrophes, these phenomena all have in common that they are in most cases of transnational nature. Formerly existing dividing lines between internal and external security continue to fade, presenting an enormous challenge for those in charge of designing security policy and even more so for the various institutions safeguarding European security. That is why dissent often revolves around the question on how to get hold of these complex problems. Geographic location, cultural background, ethical make-up of society as well as relations with neighbouring countries are all important aspects to be considered when assessing the security culture and policy of individual countries.

  3. Mathematical and Statistical Opportunities in Cyber Security

    Energy Technology Data Exchange (ETDEWEB)

    Meza, Juan; Campbell, Scott; Bailey, David

    2009-03-23

    The role of mathematics in a complex system such as the Internet has yet to be deeply explored. In this paper, we summarize some of the important and pressing problems in cyber security from the viewpoint of open science environments. We start by posing the question 'What fundamental problems exist within cyber security research that can be helped by advanced mathematics and statistics'? Our first and most important assumption is that access to real-world data is necessary to understand large and complex systems like the Internet. Our second assumption is that many proposed cyber security solutions could critically damage both the openness and the productivity of scientific research. After examining a range of cyber security problems, we come to the conclusion that the field of cyber security poses a rich set of new and exciting research opportunities for the mathematical and statistical sciences.

  4. Inventory control strategies

    International Nuclear Information System (INIS)

    Primrose, D.

    1998-01-01

    Finning International Inc. is in the business of selling, financing and servicing Caterpillar and complementary equipment. Its main markets are in western Canada, Britain and Chile. This paper discusses the parts inventory strategies system for Finning (Canada). The company's territory covers British Columbia, Alberta, the Yukon and the Northwest Territories. Finning's parts inventory consists of 80,000 component units valued at more than $150 M. Distribution centres are located in Langley, British Columbia and Edmonton, Alberta. To make inventory and orders easier to control, Finning has designed a computer-based system, with software written exclusively for Caterpillar dealers. The system makes use of a real time electronic interface with all Finning locations, plus all Caterpillar facilities and other dealers in North America. Details of the system are discussed, including territorial stocking procedures, addition to stock, exhaustion of stock, automatic/suggest order controls, surplus inventory management, and procedures for jointly managed inventory. 3 tabs., 1 fig

  5. Data Security in Smart Cities: Challenges and Solutions

    Directory of Open Access Journals (Sweden)

    Daniela POPESCUL

    2016-01-01

    Full Text Available The purpose of this paper is to provide an extensive overview of security-related problems in the context of smart cities, seen as huge data consumers and producers. Trends as hyper connectivity, messy complexity, loss of boundary and industrialized hacking transform smart cities in complex environments in which the already-existing security analysis are not useful anymore. Specific data-security requirements and solutions are approached in a four-layer framework, with elements considered to be critical to the operation of a smart city: smart things, smart spaces, smart systems and smart citizens. As urban management should pay close attention to security and privacy protection, network protocols, identity management, standardization, trusted architecture etc., the paper will serve them as a start point for better decisions in security design and management.

  6. INVENTORY MANAGEMENT IN THE ENTERPRISE THROUGH THE APPLICATION OF IFRS 2 INVENTORIES

    Directory of Open Access Journals (Sweden)

    Svetlozar Stefanov

    2016-07-01

    Full Text Available The focus in the article is on the issues of valuation and presentation of the inventories under the meaning on the International Accounting Standard 2 Inventories. The Standard provides guidance on the determination of costs of finished products and its recognition as and expense in the production and sale finished products, including guidance for determination of the net realizable value. The latter is defined as the estimated selling price less the estimated costs of completion and estimated costs necessary to make the sale. The cost of inventories comprises all costs of purchase, cost of conversion and other costs incurred in bringing the inventories to a condition suitable for subsequent use. The amount of the cost for materials used or products sold and the finished product is determined using one of the following methods: a specifically defined value, first-in � first out or weighted average cost of lots delivered. When inventories are sold, the carrying amount of those inventories is recognized as an expense in the period in which the related sales revenue is recognized. The amount of any write-down of inventories to net realizable value is recorded as a current expense and is recognized as an expense in the period the write-down occurs.

  7. Estimating dead wood during national forest inventories: a review of inventory methodologies and suggestions for harmonization.

    Science.gov (United States)

    Woodall, Christopher W; Rondeux, Jacques; Verkerk, Pieter J; Ståhl, Göran

    2009-10-01

    Efforts to assess forest ecosystem carbon stocks, biodiversity, and fire hazards have spurred the need for comprehensive assessments of forest ecosystem dead wood (DW) components around the world. Currently, information regarding the prevalence, status, and methods of DW inventories occurring in the world's forested landscapes is scattered. The goal of this study is to describe the status, DW components measured, sample methods employed, and DW component thresholds used by national forest inventories that currently inventory DW around the world. Study results indicate that most countries do not inventory forest DW. Globally, we estimate that about 13% of countries inventory DW using a diversity of sample methods and DW component definitions. A common feature among DW inventories was that most countries had only just begun DW inventories and employ very low sample intensities. There are major hurdles to harmonizing national forest inventories of DW: differences in population definitions, lack of clarity on sample protocols/estimation procedures, and sparse availability of inventory data/reports. Increasing database/estimation flexibility, developing common dimensional thresholds of DW components, publishing inventory procedures/protocols, releasing inventory data/reports to international peer review, and increasing communication (e.g., workshops) among countries inventorying DW are suggestions forwarded by this study to increase DW inventory harmonization.

  8. Open source systems security certification

    CERN Document Server

    Damiani, Ernesto; El Ioini, Nabil

    2009-01-01

    Open Source Advances in Computer Applications book series provides timely technological and business information for: Enabling Open Source Systems (OSS) to become an integral part of systems and devices produced by technology companies; Inserting OSS in the critical path of complex network development and embedded products, including methodologies and tools for domain-specific OSS testing (lab code available), plus certification of security, dependability and safety properties for complex systems; Ensuring integrated systems, including OSS, meet performance and security requirements as well as achieving the necessary certifications, according to the overall strategy of OSS usage on the part of the adopter

  9. Hash functions and information theoretic security

    DEFF Research Database (Denmark)

    Bagheri, Nasoor; Knudsen, Lars Ramkilde; Naderi, Majid

    2009-01-01

    Information theoretic security is an important security notion in cryptography as it provides a true lower bound for attack complexities. However, in practice attacks often have a higher cost than the information theoretic bound. In this paper we study the relationship between information theoretic...

  10. World Glacier Inventory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The World Glacier Inventory (WGI) contains information for over 130,000 glaciers. Inventory parameters include geographic location, area, length, orientation,...

  11. Managing information technology security risk

    Science.gov (United States)

    Gilliam, David

    2003-01-01

    Information Technology (IT) Security Risk Management is a critical task for the organization to protect against the loss of confidentiality, integrity and availability of IT resources. As systems bgecome more complex and diverse and and attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security risk. This paper describes a two-pronged approach in addressing IT security risk and risk management in the organization: 1) an institutional enterprise appraoch, and 2) a project life cycle approach.

  12. Canine Supply for Physical Security: An Analysis of the Royal Australian Air Force Military Working Dog Program

    Science.gov (United States)

    2016-03-01

    PHYSICAL SECURITY: AN ANALYSIS OF THE ROYAL AUSTRALIAN AIR FORCE MILITARY WORKING DOG PROGRAM by Mark W. Powell March 2016 Thesis...AN ANALYSIS OF THE ROYAL AUSTRALIAN AIR FORCE MILITARY WORKING DOG PROGRAM 5. FUNDING NUMBERS 6. AUTHOR(S) Mark W. Powell 7. PERFORMING...increased demand on its physical security elements. Its military working dog (MWD) workforce is required to meet an inventory of 204 by end of year 2023 as

  13. Impact of a highly detailed emission inventory on modeling accuracy

    Science.gov (United States)

    Taghavi, M.; Cautenet, S.; Arteta, J.

    2005-03-01

    During Expérience sur Site pour COntraindre les Modèles de Pollution atmosphérique et de Transport d'Emissions (ESCOMPTE) campaign (June 10 to July 14, 2001), two pollution events observed during an intensive measurement period (IOP2a and IOP2b) have been simulated. The comprehensive Regional Atmospheric Modeling Systems (RAMS) model, version 4.3, coupled online with a chemical module including 29 species is used to follow the chemistry of a polluted zone over Southern France. This online method takes advantage of a parallel code and use of the powerful computer SGI 3800. Runs are performed with two emission inventories: the Emission Pre Inventory (EPI) and the Main Emission Inventory (MEI). The latter is more recent and has a high resolution. The redistribution of simulated chemical species (ozone and nitrogen oxides) is compared with aircraft and surface station measurements for both runs at regional scale. We show that the MEI inventory is more efficient than the EPI in retrieving the redistribution of chemical species in space (three-dimensional) and time. In surface stations, MEI is superior especially for primary species, like nitrogen oxides. The ozone pollution peaks obtained from an inventory, such as EPI, have a large uncertainty. To understand the realistic geographical distribution of pollutants and to obtain a good order of magnitude in ozone concentration (in space and time), a high-resolution inventory like MEI is necessary. Coupling RAMS-Chemistry with MEI provides a very efficient tool able to simulate pollution plumes even in a region with complex circulations, such as the ESCOMPTE zone.

  14. EMCAS, an evaluation methodology for safeguards and security systems

    International Nuclear Information System (INIS)

    Eggers, R.F.; Giese, E.W.; Bichl, F.J.

    1987-01-01

    EMCAS is an evaluation methodology for safeguards and security systems. It provides a score card of projected or actual system performance for several areas of system operation. In one area, the performance of material control and accounting and security systems, which jointly defend against the insider threat to divert or steal special nuclear material (SNM) using stealth and deceit, is evaluated. Time-dependent and time-independent risk equations are used for both diversion and theft risk calculations. In the case of loss detection by material accounting, a detailed timeliness model is provided to determine the combined effects of loss detection sensitivity and timeliness on the overall effectiveness of the material accounting detection procedure. Calculated risks take into account the capabilities of process area containment/surveillance, material accounting mass balance tests, and physical protection barriers and procedures. In addition, EMCAS evaluates the Material Control and Accounting (MCandA) System in the following areas: (1) system capability to detect errors in the official book inventory of SNM, using mass balance accounting methods, (2) system capability to prevent errors from entering the nuclear material data base during periods of operation between mass balance tests, (3) time to conduct inventories and resolve alarms, and (4) time lost from production to carry out material control and accounting loss detection activities

  15. Secure Enclaves: An Isolation-centric Approach for Creating Secure High Performance Computing Environments

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological Univ., Cookeville, TN (United States); Caldwell, Blake A. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Hicks, Susan Elaine [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Koch, Scott M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Naughton, III, Thomas J. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Pelfrey, Daniel S. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Pogge, James R [Tennessee Technological Univ., Cookeville, TN (United States); Scott, Stephen L [Tennessee Technological Univ., Cookeville, TN (United States); Shipman, Galen M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Sorrillo, Lawrence [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-01-01

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data at various security levels but in so doing are often enclaved at the highest security posture. This approach places significant restrictions on the users of the system even when processing data at a lower security level and exposes data at higher levels of confidentiality to a much broader population than otherwise necessary. The traditional approach of isolation, while effective in establishing security enclaves poses significant challenges for the use of shared infrastructure in HPC environments. This report details current state-of-the-art in virtualization, reconfigurable network enclaving via Software Defined Networking (SDN), and storage architectures and bridging techniques for creating secure enclaves in HPC environments.

  16. Vendor-managed inventory

    DEFF Research Database (Denmark)

    Govindan, Kannan

    2013-01-01

    Vendor-managed inventory (VMI) represents the methodology through which the upstream stage of a supply chain (vendor) takes responsibility for managing the inventories at the downstream stage (customer) based on previously agreed limits. VMI is another method by which supply chains can be managed...... review, we have identified six dimensions of VMI: namely, inventory, transportation, manufacturing, general benefits, coordination/collaboration, and information sharing. In addition, there are, three methodological classifications: modelling, simulation, and case studies. Finally, we will consider...

  17. Time-dependent tritium inventories and flow rates in fuel cycle components of a tokamak fusion reactor

    International Nuclear Information System (INIS)

    Kuan, W.

    1995-01-01

    Time-dependent inventories and flow rates for several components of the fuel cycle are modeled and studied through the use of a new modular-type model for the dynamic simulation of the fuel cycle in a fusion reactor. The complex dynamic behavior in the modeled subsystems is analyzed using this new model. Preliminary results using fuel cycle design configurations similar to ITER are presented and analyzed. The inventories and flow rates inside the primary vacuum pumping, fuel cleanup unit and isotope separation system are studied. Ways to minimize the tritium inventory are also assessed. This was performed by looking at various design options that could be used to minimize tritium inventory for specific components. (orig.)

  18. Housing Inventory Count

    Data.gov (United States)

    Department of Housing and Urban Development — This report displays the data communities reported to HUD about the nature of their dedicated homeless inventory, referred to as their Housing Inventory Count (HIC)....

  19. 27 CFR 40.201 - Inventories.

    Science.gov (United States)

    2010-04-01

    ... PROCESSED TOBACCO Operations by Manufacturers of Tobacco Products Inventories and Reports § 40.201 Inventories. Every manufacturer of tobacco products shall make true and accurate inventories on Form 5210.9... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Inventories. 40.201...

  20. Culturing Security System of Chemical Laboratory in Indonesia

    Directory of Open Access Journals (Sweden)

    Eka Dian Pusfitasari

    2017-04-01

    Full Text Available Indonesia has experiences on the lack of chemical security such as: a number of bombing terrors and hazardous chemicals found in food. Bomb used in terror is a homemade bomb made from chemicals which are widely spread in the research laboratories such as a mixture of pottasium chlorate, sulphur, and alumunium. Therefore, security of chemicals should be implemented to avoid the misused of the chemicals. Although it has experienced many cases of the misuse of chemicals, and many regulations and seminars related to chemical security have been held, but the implementation of chemical security is still a new thing for Indonesian citizens. The evident is coming from the interviews conducted in this study. Questions asked in this interview/survey included: the implementation of chemical safety and chemical security in laboratory; chemical inventory system and its regulation; and training needed for chemical security implementation. Respondents were basically a researcher from Government Research Institutes, University laboratories, senior high school laboratories, and service laboratories were still ambiguous in distinguishing chemical safety and chemical security. Because of this condition, most Indonesia chemical laboratories did not totally apply chemical security system. Education is very important step to raise people awareness and address this problem. Law and regulations should be sustained by all laboratory personnel activities to avoid chemical diversion to be used for harming people and environment. The Indonesia Government could also develop practical guidelines and standards to be applied to all chemical laboratories in Indonesia. These acts can help Government’s efforts to promote chemical security best practices which usually conducted by doing seminars and workshop.

  1. Security force-adversary engagement simulation

    International Nuclear Information System (INIS)

    Bennett, H.A.

    1975-01-01

    A dynamic simulation of a security force-adversary engagement has been developed to obtain a better understanding of the complexities involved in security systems. Factors affecting engagement outcomes were identified and interrelated to represent an ambush of an escorted nuclear fuel truck convoy by an adversary group. Other forms of engagement such as assault and skirmish also can be simulated through suitable parameter changes. The dynamic model can provide a relative evaluation of changes in security force levels, equipment, training, and tactics. Continued application and subsequent refinements of the model are expected to augment the understanding of component interaction within a guard-based security system

  2. Between the Sheets: a Library-wide Inventory with Google

    Directory of Open Access Journals (Sweden)

    Craig Boman

    2017-10-01

    Full Text Available When it comes to taking an inventory of physical items, libraries often rely on their traditional integrated library system’s (ILS à la carte add ons; outside vendors; or other possibly outdated, complex, and often expensive methods. For libraries with shrinking budgets and other limited resources, high costs can put these methods out of reach. At the University of Dayton Libraries, we set out to develop an inexpensive and reasonably easy-to-use method for conducting a library-wide physical item inventory. In this article, we explain a custom built Google Sheets-based library inventory system, along with some code for the implementation of a RESTful API (written in PHP that interacts with our ILS. We will also explain our use of Google Apps scripts in our Google Sheet, which are crucial to our systems. Although this method used a specific ILS (Innovative Interfaces' Sierra product and custom-built RESTful APIs, it may be possible to use similar approaches with other ILS software. Additional notes include areas for improvement and recommendations for interoperability with other ILS systems.

  3. Databases for highway inventories. Proposal for a new model

    Energy Technology Data Exchange (ETDEWEB)

    Perez Casan, J.A.

    2016-07-01

    Database models for highway inventories are based on classical schemes for relational databases: many related tables, in which the database designer establishes, a priori, every detail that they consider relevant for inventory management. This kind of database presents several problems. First, adapting the model and its applications when new database features appear is difficult. In addition, the different needs of different sets of road inventory users are difficult to fulfil with these schemes. For example, maintenance management services, road authorities and emergency services have different needs. In addition, this kind of database cannot be adapted to new scenarios, such as other countries and regions (that may classify roads or name certain elements differently). The problem is more complex if the language used in these scenarios is not the same as that used in the database design. In addition, technicians need a long time to learn to use the database efficiently. This paper proposes a flexible, multilanguage and multipurpose database model, which gives an effective and simple solution to the aforementioned problems. (Author)

  4. Between security and military identities: The case of Israeli security experts.

    Science.gov (United States)

    Grassiani, Erella

    2018-02-01

    The relationship between private security professionals and the military in Israel is complex. While there is growing attention to the fact that security and military actors and their activities are becoming increasingly blurred, the Israeli case shows something different. In this ground-up analysis of the relationship between private security practices and the military, I investigate its constant negotiation by private security professionals through their identification with and differentiation from the military, whereby they reconfigure the meaning of military capital. This identity work should be understood, I propose, within the strongly militarist context of Israeli society, where military capital is highly valued. I argue that actors who exit the military system feel the need to demonstrate the added value of their work in the private sector in order for it to gain value in the light of the symbolic capital given to the military. I analyse these processes as leading to a new kind of militarism, which includes security skills and ideas about professionalism. Such an approach sheds new light on the ways in which security actors can actively reconfigure the workings of military capital in and outside the nation-state and produce a different kind of militarism.

  5. Functional Assessment Inventory Manual.

    Science.gov (United States)

    Crewe, Nancy M.; Athelstan, Gary T.

    This manual, which provides extensive new instructions for administering the Functional Assessment Inventory (FAI), is intended to enable counselors to begin using the inventory without undergoing any special training. The first two sections deal with the need for functional assessment and issues in the development and use of the inventory. The…

  6. Inventory of nuclear materials in case of emergency

    International Nuclear Information System (INIS)

    Portugal, J.L.; Zanetti, S.

    2001-01-01

    The crisis situations for nuclear materials in nuclear facilities are provided for in the French regulation, as the decree of 12 May 1981 specifies that 'In any circumstance, the Ministry of Industry can order a physical inventory of the materials and its comparison with the accountancy records'. Such an inventory can be ordered in facilities holding category I nuclear materials, in case of a theft for example. The operators must be able to establish quickly if the stolen materials come from their facility. To test the organization set at the operators and competent authority levels respectively, five exercises of increasing complexity have already been carried out. These exercises have permitted the validation of procedures, composition of the various crisis centers, methodology for such an inventory and use of protected communication means. The authority crisis center includes members of the competent Authority and it's technical support body: staff members of the IPSN. It is in charge of the national managing of the operations, in relation with one or several site crisis centers. The site crisis center is the interface between the authorities and the facility crisis center. The operations of inventory are carried out from the roughest checking to the finest ones. To be efficient during the first hours of the crisis, the authority crisis center must have data bases at the disposal of its experts, containing information about physical protection and accountancy of the nuclear materials detained by the site and the relevant facilities. (authors)

  7. Measurement of Cruelty in Children: The Cruelty to Animals Inventory

    Science.gov (United States)

    Dadds, Mark R.; Whiting, Clare; Bunn, Paul; Fraser, Jennifer A.; Charlson, Juliana H.; Pirola-Merlo, Andrew

    2004-01-01

    Cruelty to animals may be a particularly pernicious aspect of problematic child development. Progress in understanding the development of the problem is limited due to the complex nature of cruelty as a construct, and limitations with current assessment measures. The Children and Animals Inventory (CAI) was developed as a brief self- and…

  8. Optimal fuel inventory strategies

    International Nuclear Information System (INIS)

    Caspary, P.J.; Hollibaugh, J.B.; Licklider, P.L.; Patel, K.P.

    1990-01-01

    In an effort to maintain their competitive edge, most utilities are reevaluating many of their conventional practices and policies in an effort to further minimize customer revenue requirements without sacrificing system reliability. Over the past several years, Illinois Power has been rethinking its traditional fuel inventory strategies, recognizing that coal supplies are competitive and plentiful and that carrying charges on inventory are expensive. To help the Company achieve one of its strategic corporate goals, an optimal fuel inventory study was performed for its five major coal-fired generating stations. The purpose of this paper is to briefly describe Illinois Power's system and past practices concerning coal inventories, highlight the analytical process behind the optimal fuel inventory study, and discuss some of the recent experiences affecting coal deliveries and economic dispatch

  9. Information security in the context of philosophy of management

    Directory of Open Access Journals (Sweden)

    Irina Yurievna Alekseeva

    2017-04-01

    Full Text Available Building a culture of information security involves consideration of problems of management in society. Ideas and approaches developed in philosophy of management are relevant to studies in problems of information security in broader methodological and social context. The article focuses on problems of information and psychological security in social systems. The author considers disorienting signs and signals as information threat to security of persons and societies. The author argues that management ideology of pseudo-economical reductionism makes distortion at the level of values and priorities of the system. This ideology exalts competitiveness to the detriment of the systems’ viability. Philosophy of complexity (better known as “philosophy of complex systems” embraces new visions for methodology of management in XXI century. “Observer of complexity” and “complexity of observer of complexity” phenomena are central in this context. The problem of appropriate language for system self-description is of critical importance. This language is necessary for substantive production of intellectual tools for problems solving and decision making; refusal to produce such tools is fraught with decrease of information security level.

  10. Diagnostic and proposal for use of safety inventory into finished products for a plastics company

    Directory of Open Access Journals (Sweden)

    Elpidio Oscar Benitez Nara

    2013-02-01

    Full Text Available The stock is essential for companies. Thinking about it, it is increasingly necessary to develop techniques that seek to reduce inventory levels making them suitable to the company structure and satisfactorily meet the needs of increasingly demanding customers while maintaining the service level. The safety stock is derived from various uncertainties such as shortage of raw materials and difficulties in producing variations in sales projections thus scaling of this safety stock is a most difficult task to perform. In this sense, the present study aims to demonstrate the Inventory Management structure acceptable to a company that seeks to reduce capital invested in stocks as well as a for continuous review reorder point. The research was developed through an analysis of the current policy Inventories of the company, where we sought the most representative products of the product line. For these products it was necessary future sales forecasts for the annual period where it was possible to scale according to company politic Inventories of the average stocks of these products in order to compare with the stocks of securities calculated using specific equations. Then, using the equations it was also defined the point of application of all the studied products was defined, as a model for continuous revision product line studied. Finally the proposed method for use of safety stock techniques showed good results as a reduction of approximately 43% of capital invested in safety stock if compared to current Inventories policy of the company.

  11. Media rights and media security

    Science.gov (United States)

    Baugher, Mark

    2005-03-01

    Digital Rights Management (DRM) systems typically do not treat rights management as a security problem. DRM uses cryptographic techniques but not security relationships. Instead, DRM systems use "tamper-resistant mechanisms" to discourage unauthorized access to rights-managed content. Although proven ineffective in practice, tamper-resistant mechanisms penalize legitimate customers with added complexity and costs that arise from tamper-resisting data or program code. This paper explores how a security relationship between provider and consumer might be more effective for managing rights to content works on two-way networks.

  12. A single-item inventory model for expected inventory order crossovers

    NARCIS (Netherlands)

    Riezebos, J.; Gaalman, G.J.C.

    2009-01-01

    Expected inventory order crossovers Occur if at the moment of ordering it is expected that orders will not arrive in the sequence they are ordered. Recent research has shown that (it) expected inventory order crossovers will be encountered more frequently in future, and that (b) use of a myopic

  13. Functional Security Model: Managers Engineers Working Together

    Science.gov (United States)

    Guillen, Edward Paul; Quintero, Rulfo

    2008-05-01

    Information security has a wide variety of solutions including security policies, network architectures and technological applications, they are usually designed and implemented by security architects, but in its own complexity this solutions are difficult to understand by company managers and they are who finally fund the security project. The main goal of the functional security model is to achieve a solid security platform reliable and understandable in the whole company without leaving of side the rigor of the recommendations and the laws compliance in a single frame. This paper shows a general scheme of the model with the use of important standards and tries to give an integrated solution.

  14. Controlling Inventory: Real-World Mathematical Modeling

    Science.gov (United States)

    Edwards, Thomas G.; Özgün-Koca, S. Asli; Chelst, Kenneth R.

    2013-01-01

    Amazon, Walmart, and other large-scale retailers owe their success partly to efficient inventory management. For such firms, holding too little inventory risks losing sales, whereas holding idle inventory wastes money. Therefore profits hinge on the inventory level chosen. In this activity, students investigate a simplified inventory-control…

  15. Inventory extension considerations for long-term storage at the nuclear materials storage facility

    International Nuclear Information System (INIS)

    Olinger, C.T.; Stanbro, W.D.; Longmire, V.; Argo, P.E.; Nielson, S.M.

    1996-01-01

    Los Alamos National Laboratory is in the process of modifying its nuclear materials storage facility to a long-term storage configuration. In support of this effort, we examined technical and administrative means to extend periods between physical inventories. Both the frequency and sample size during a physical inventory could significantly impact required sizing of the non-destructive assay (NDA) laboratory as well as material handling capabilities. Several options are being considered, including (1) treating each storage location as a separate vault, (2) minimizing the number of items returned for quantitative analysis by optimizing the use of in situ confirmatory measurements, and (3) utilizing advanced monitoring technologies. Careful consideration of these parameters should allow us to achieve and demonstrate safe and secure storage while minimizing the impact on facility operations and without having to increase the size of the NDA laboratory beyond that required for anticipated shipping and receiving activities

  16. 21 CFR 1304.11 - Inventory requirements.

    Science.gov (United States)

    2010-04-01

    ... the inventory of the registered location to which they are subject to control or to which the person... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Inventory requirements. 1304.11 Section 1304.11... REGISTRANTS Inventory Requirements § 1304.11 Inventory requirements. (a) General requirements. Each inventory...

  17. Secure RAID Schemes for Distributed Storage

    OpenAIRE

    Huang, Wentao; Bruck, Jehoshua

    2016-01-01

    We propose secure RAID, i.e., low-complexity schemes to store information in a distributed manner that is resilient to node failures and resistant to node eavesdropping. We generalize the concept of systematic encoding to secure RAID and show that systematic schemes have significant advantages in the efficiencies of encoding, decoding and random access. For the practical high rate regime, we construct three XOR-based systematic secure RAID schemes with optimal or almost optimal encoding and ...

  18. Foreign research reactor uranium supply program: The Y-12 national security complex process

    International Nuclear Information System (INIS)

    Nelson, T.; Eddy, B.G.

    2010-01-01

    The Foreign Research Reactor (FRR) Uranium Supply Program at the Y-12 National Security Complex supports the nonproliferation objectives of the HEU Disposition Program, the Reduced Enrichment Research and Test Reactors (RERTR) Program, and the United States FRR Spent Nuclear Fuel (SNF) Acceptance Program. The Y-12 National Nuclear Security Administration (NNSA) Y-12 Site Office maintains the prime contracts with foreign governments for the supply of Low-Enriched Uranium (LEU) for their research reactors. The LEU is produced by down blending Highly Enriched Uranium (HEU) that has been declared surplus to the U.S. national defense needs. The down blending and sale of the LEU supports the Surplus HEU Disposition Program Record of Decision to make the HEU non-weapons usable and to recover the economic value of the uranium to the extent feasible. This program supports the important U.S. government and nuclear nonproliferation commitment to serve as a reliable and cost-effective uranium supplier for those foreign research reactors that are converting or have converted to LEU fuel under the guidance of the NNSA RERTR Program. In conjunction with the FRR SNF Acceptance Program which supports the global nonproliferation efforts to disposition U.S.-origin HEU, the Y-12 FRR Uranium Supply Program can provide the LEU for the replacement fuel fabrication. In addition to feedstock for fuel fabrication, Y-12 supplies LEU for target fabrication for medical isotope production. The Y-12 process uses supply forecasting tools, production improvements and efficient delivery preparations to successfully support the global research reactor community

  19. Keystone Business Models for Network Security Processors

    OpenAIRE

    Arthur Low; Steven Muegge

    2013-01-01

    Network security processors are critical components of high-performance systems built for cybersecurity. Development of a network security processor requires multi-domain experience in semiconductors and complex software security applications, and multiple iterations of both software and hardware implementations. Limited by the business models in use today, such an arduous task can be undertaken only by large incumbent companies and government organizations. Neither the “fabless semiconductor...

  20. Translation and Psychometric of Personality Disorders Inventory According to DMS-V

    Directory of Open Access Journals (Sweden)

    Vahideh Nayeri

    2017-03-01

    Full Text Available Background and Objectives: Personality disorders are prevalent among psychiatric patients. These disorders can exist along with other psychiatric disorders or predispose the patients to them. Patients with personality disorder are usually not aware of their disease, and their treatment is difficult and complicated. The present research was performed with the purpose of determining affected patients usually do not have insight about their condition and it make the treatment a complex and hard process. The aim of current study was to determine construct and criterion validity of personality disorders diagnostic tool according to DSM-V. Methods: This study was a cross-sectional study with correlational design. In this study, Personality Disorder Inventory was translated based on DSM-V, and its psychometric was determined in Persian. The questionnaire’s validity was determined by concurrent validity method using NEO personality inventory. A total of 74 patients and 29 students with personality disorders, whose disorder was recognized by clinical interview, completed two questionnaire. The correlation between domains of the two questionnaires was determined by Pearson correlation test. Results: There were significant correlations between the domains of Personality Disorder Inventory and those of NEO Personality Inventory (p<0.001(. Conclusion: The results of the present research showed that the Persian version of PID-5 has appropriate criterion, construct, and convergence validity compared to NEO personality inventory.

  1. Security Management and Safeguards Office

    Science.gov (United States)

    Bewley, Nathaniel M.

    2004-01-01

    The Security Management and Safeguards Office at NASA is here to keep the people working in a safe environment. They also are here to protect the buildings and documents from sabotage, espionage, and theft. During the summer of 2004, I worked with Richard Soppet in Physical Security. While I was working here I helped out with updating the map that we currently use at NASA Glenn Research Center, attended meetings for homeland security, worked with the security guards and the locksmith. The meetings that I attended for homeland security talked about how to protect ourselves before something happened, they told us to always be on the guard and look for anything suspicious, and the different ways that terrorist groups operate. When I was with the security guards I was taught how to check someone into the base, showed how to use a radar gun, observed a security guard make a traffic stop for training and was with them while they patrolled NASA Glenn Research Center to make sure things were running smooth and no one was in danger. When I was with the lock smith I was taught how to make keys and locks for the employees here at NASA. The lock smith also showed me that he had inventory cabinets of files that show how many keys were out to people and who currently has access to the rooms that they keys were made for. I also helped out the open house at NASA Glenn Research Center. I helped out by showing the Army Reserves, and Brook Park's SWAT team where all the main events were going to take place a week before the open house was going to begin. Then during the open house I helped out by making sure people had there IDS, checked through there bags, and handed out a map to them that showed where the different activities were going to take place. So the main job here at NASA Glenn Research Center for the Security Management and Safeguards Office is to make sure that nothing is stolen, sabotaged, and espionaged. Also most importantly make sure all the employees here at NASA are

  2. Material control and accounting in the Department of Energy's nuclear fuel complex

    Energy Technology Data Exchange (ETDEWEB)

    None

    1989-01-01

    Material control and accounting takes place within an envelope of activities related to safeguards and security, as well as to safety, health, and environment, all of which need to be managed to assure that the entire nuclear fuel complex can operate in a societally accepted manner. Within this envelope the committee was directed to carry out the following scope of work: (1) Review the MCandA systems in use at selected DOE facilities that are processing special nuclear material (SNM) in various physical and chemical forms. (2) Design and convene a workshop for senior representatives from each of DOE's facilities on the flows and inventories of nuclear materials. (3) Plan and conduct a series of site visits to each of the facilities to observe first hand the processing operations and the related MCandA systems. (4) Review the potential improvement in overall safeguard systems effectiveness, as measured by expected reduction in inventory difference control limits and inventory differences for materials balance accounts and facilities, or other criteria as appropriate. Indicate how this affects the relative degree of uncertainty in the system. (5) Review the efficiency of operating the MCandA system with and without the upgrading options and assess whether upgrading will contribute further efficiencies in operation, which may reduce many of the current operations costs. Determine if the current system is cost-effective. (6) Recommend the most promising technical approaches for further development by DOE and further study as warranted.

  3. Robust Inventory System Optimization Based on Simulation and Multiple Criteria Decision Making

    Directory of Open Access Journals (Sweden)

    Ahmad Mortazavi

    2014-01-01

    Full Text Available Inventory management in retailers is difficult and complex decision making process which is related to the conflict criteria, also existence of cyclic changes and trend in demand is inevitable in many industries. In this paper, simulation modeling is considered as efficient tool for modeling of retailer multiproduct inventory system. For simulation model optimization, a novel multicriteria and robust surrogate model is designed based on multiple attribute decision making (MADM method, design of experiments (DOE, and principal component analysis (PCA. This approach as a main contribution of this paper, provides a framework for robust multiple criteria decision making under uncertainty.

  4. Procedure for taking physical inventories

    International Nuclear Information System (INIS)

    Boston, R.A.

    1984-01-01

    Physical inventories are taken periodically to meet Company, State and IAEA requirements. Those physical inventories may be verified by IAEA and/or State inspectors. This presentation describes in an introductory but detailed manner the approaches and procedures used in planning, preparing, conducting, reconciling and reporting physical inventories for the Model Plant. Physical inventories are taken for plant accounting purposes to provide an accurate basis for starting and closing the plant material balance. Physical inventories are also taken for safeguards purposes to provide positive assurance that the nuclear materials of concern are indeed present and accounted for

  5. Networks and network analysis for defence and security

    CERN Document Server

    Masys, Anthony J

    2014-01-01

    Networks and Network Analysis for Defence and Security discusses relevant theoretical frameworks and applications of network analysis in support of the defence and security domains. This book details real world applications of network analysis to support defence and security. Shocks to regional, national and global systems stemming from natural hazards, acts of armed violence, terrorism and serious and organized crime have significant defence and security implications. Today, nations face an uncertain and complex security landscape in which threats impact/target the physical, social, economic

  6. IPv6 Security

    Science.gov (United States)

    Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.; Wartel, R.

    2017-10-01

    IPv4 network addresses are running out and the deployment of IPv6 networking in many places is now well underway. Following the work of the HEPiX IPv6 Working Group, a growing number of sites in the Worldwide Large Hadron Collider Computing Grid (WLCG) are deploying dual-stack IPv6/IPv4 services. The aim of this is to support the use of IPv6-only clients, i.e. worker nodes, virtual machines or containers. The IPv6 networking protocols while they do contain features aimed at improving security also bring new challenges for operational IT security. The lack of maturity of IPv6 implementations together with the increased complexity of some of the protocol standards raise many new issues for operational security teams. The HEPiX IPv6 Working Group is producing guidance on best practices in this area. This paper considers some of the security concerns for WLCG in an IPv6 world and presents the HEPiX IPv6 working group guidance for the system administrators who manage IT services on the WLCG distributed infrastructure, for their related site security and networking teams and for developers and software engineers working on WLCG applications.

  7. EMCAS: An evaluation methodology for safeguards and security systems

    International Nuclear Information System (INIS)

    Eggers, R.F.; Giese, E.W.; Bichl, F.J.

    1987-01-01

    EMCAS is an evaluation methodology for safeguards and security systems. It provides a score card of projected or actual system performance for several areas of system operation. In one area, the performance of material control and accounting and security systems, which jointly defend against the insider threat to divert or steal special nuclear material (SNM) using stealth and deceit, is evaluated. Time-dependent and time-independent risk equations are used for both diversion and theft risk calculations. In the case of loss detection by material accounting, a detailed timeliness model is provided to determine the combined effects of loss detection sensitivity and timeliness on the overall effectiveness of the material accounting detection procedure. Calculated risks take into account the capabilities of process area containment/surveillance, material accounting mass balance tests, and physical protection barriers and procedures. In addition, EMCAS evaluates the Material Control and Accounting (MC and A) System in the following areas: (1) system capability to detect errors in the official book inventory of SNM, using mass balance accounting methods, (2) system capability to prevent errors from entering the nuclear material data base during periods of operation between mass balance tests, (3) time to conduct inventories and resolve alarms, and (4) time lost from production to carry out material control and accounting loss detection activities. 3 figs., 5 tabs

  8. Initial Radionuclide Inventories

    Energy Technology Data Exchange (ETDEWEB)

    H. Miller

    2004-09-19

    The purpose of this analysis is to provide an initial radionuclide inventory (in grams per waste package) and associated uncertainty distributions for use in the Total System Performance Assessment for the License Application (TSPA-LA) in support of the license application for the repository at Yucca Mountain, Nevada. This document is intended for use in postclosure analysis only. Bounding waste stream information and data were collected that capture probable limits. For commercially generated waste, this analysis considers alternative waste stream projections to bound the characteristics of wastes likely to be encountered using arrival scenarios that potentially impact the commercial spent nuclear fuel (CSNF) waste stream. For TSPA-LA, this radionuclide inventory analysis considers U.S. Department of Energy (DOE) high-level radioactive waste (DHLW) glass and two types of spent nuclear fuel (SNF): CSNF and DOE-owned (DSNF). These wastes are placed in two groups of waste packages: the CSNF waste package and the codisposal waste package (CDSP), which are designated to contain DHLW glass and DSNF, or DHLW glass only. The radionuclide inventory for naval SNF is provided separately in the classified ''Naval Nuclear Propulsion Program Technical Support Document'' for the License Application. As noted previously, the radionuclide inventory data presented here is intended only for TSPA-LA postclosure calculations. It is not applicable to preclosure safety calculations. Safe storage, transportation, and ultimate disposal of these wastes require safety analyses to support the design and licensing of repository equipment and facilities. These analyses will require radionuclide inventories to represent the radioactive source term that must be accommodated during handling, storage and disposition of these wastes. This analysis uses the best available information to identify the radionuclide inventory that is expected at the last year of last emplacement

  9. Social climate along the pathway of care in women's secure mental health service: variation with level of security, patient motivation, therapeutic alliance and level of disturbance.

    Science.gov (United States)

    Long, C G; Anagnostakis, K; Fox, E; Silaule, P; Somers, J; West, R; Webster, A

    2011-07-01

    Social climate has been measured in a variety of therapeutic settings, but there is little information about it in secure mental health services, or how it may vary along a gender specific care pathway. To assess social climate in women's secure wards and its variation by level of security and ward type, therapeutic alliance, patient motivation, treatment engagement and disturbed behaviour. Three-quarters (80, 76%) of staff and nearly all (65, 92%) of patients in the two medium-security wards and two low-security wards that comprised the unit completed the Essen Climate Evaluation Schema (EssenCES) and the California Psychotherapy Alliance Scale (CALPAS); patients also completed the Patient Motivation Inventory (PMI). Pre-assessment levels of disturbed behaviour and treatment engagement were recorded. Social climate varied according to ward type and level of security. EssenCES ratings indicative of positive social climate were associated with lower levels of security; such ratings were also associated with lower behavioural disturbance and with higher levels of motivation, treatment engagement and therapeutic alliance. This serial cross-sectional survey indicated that use of the EssenCES alone might be a good practical measure of treatment progress/responsivity. A longitudinal study would be an important next step in establishing the extent to which it would be useful in this regard. Copyright © 2010 John Wiley & Sons, Ltd.

  10. Secure Multiparty Quantum Computation for Summation and Multiplication.

    Science.gov (United States)

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2016-01-21

    As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics.

  11. Validation of Schema Coping Inventory and Schema Mode Inventory in Adolescents

    NARCIS (Netherlands)

    van Wijk-Herbrink, M.F.; Roelofs, J.; Broers, N.J.; Rijkeboer, M.M.; Arntz, A.; Bernstein, D.P.

    2018-01-01

    This study investigated whether the schema therapy constructs of schema coping and schema modes have validity in adolescents. We examined the validity and reliability of the Schema Coping Inventory (SCI) and an 80-item version of the Schema Mode Inventory (SMI) in a mixed sample of adolescents.

  12. Scalable and Unconditionally Secure Multiparty Computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Nielsen, Jesper Buus

    2007-01-01

    We present a multiparty computation protocol that is unconditionally secure against adaptive and active adversaries, with communication complexity O(Cn)k+O(Dn^2)k+poly(nk), where C is the number of gates in the circuit, n is the number of parties, k is the bit-length of the elements of the field...... over which the computation is carried out, D is the multiplicative depth of the circuit, and κ is the security parameter. The corruption threshold is t passive security the corruption threshold is t 

  13. 7 CFR 1955.65 - Management of inventory and/or custodial real property.

    Science.gov (United States)

    2010-01-01

    ... more than 25 single-family dwellings, a more complex management contract for SFH property, or an... 7 Agriculture 14 2010-01-01 2009-01-01 true Management of inventory and/or custodial real property... HOUSING SERVICE, RURAL BUSINESS-COOPERATIVE SERVICE, RURAL UTILITIES SERVICE, AND FARM SERVICE AGENCY...

  14. Network Security Validation Using Game Theory

    Science.gov (United States)

    Papadopoulou, Vicky; Gregoriades, Andreas

    Non-functional requirements (NFR) such as network security recently gained widespread attention in distributed information systems. Despite their importance however, there is no systematic approach to validate these requirements given the complexity and uncertainty characterizing modern networks. Traditionally, network security requirements specification has been the results of a reactive process. This however, limited the immunity property of the distributed systems that depended on these networks. Security requirements specification need a proactive approach. Networks' infrastructure is constantly under attack by hackers and malicious software that aim to break into computers. To combat these threats, network designers need sophisticated security validation techniques that will guarantee the minimum level of security for their future networks. This paper presents a game-theoretic approach to security requirements validation. An introduction to game theory is presented along with an example that demonstrates the application of the approach.

  15. A demonstration of a low cost approach to security at shipping facilities and ports

    Science.gov (United States)

    Huck, Robert C.; Al Akkoumi, Mouhammad K.; Herath, Ruchira W.; Sluss, James J., Jr.; Radhakrishnan, Sridhar; Landers, Thomas L.

    2010-04-01

    Government funding for the security at shipping facilities and ports is limited so there is a need for low cost scalable security systems. With over 20 million sea, truck, and rail containers entering the United States every year, these facilities pose a large risk to security. Securing these facilities and monitoring the variety of traffic that enter and leave is a major task. To accomplish this, the authors have developed and fielded a low cost fully distributed building block approach to port security at the inland Port of Catoosa in Oklahoma. Based on prior work accomplished in the design and fielding of an intelligent transportation system in the United States, functional building blocks, (e.g. Network, Camera, Sensor, Display, and Operator Console blocks) can be assembled, mixed and matched, and scaled to provide a comprehensive security system. The following functions are demonstrated and scaled through analysis and demonstration: Barge tracking, credential checking, container inventory, vehicle tracking, and situational awareness. The concept behind this research is "any operator on any console can control any device at any time."

  16. On Inventory Control For Perishable Inventory Systems Subject To Uncertainties On Customer Demands

    OpenAIRE

    Abbou , Rosa; Loiseau , Jean-Jacques; Khaldi , Hajer; Farraa , Berna ,

    2017-01-01

    International audience; This paper deals with the inventory controller design for constrained production systems subject to uncertainties on the customer demands. The case study focuses on the inventory regulation problem in production systems where contain perishable finite products. Such systems are characterized by the presence of delays due to production processes, and constraints from the instantaneous inventory level, production level and the finite capacities of stocks. To do that, we ...

  17. Management of Information Security in Financial Accounting

    OpenAIRE

    Aurel Serb; Constantin Baron; Nicoleta Magdalena Iacob; Costinela-Luminita Defta

    2014-01-01

    Security issues in financial accounting are complex, and the risks are often difficult to stipulate, even for experts. The issues presented in this article try to be formed in a contribution to the consolidation of problems in the field of risk, and former vulnerabilities in cyber security in financial accounting. The use of an information security management system became a requirement for organizations because on the states began adopting mandatory data protection legislation and informatio...

  18. Effect of imports of uranium on the national security. Critical technologies

    International Nuclear Information System (INIS)

    1989-09-01

    The report gives results of an investigation to determine the effects of uranium imports on the national security. Uranium is essential to the operation of the Navy's nuclear-powered fleet, for nuclear weapon capability and for civilian nuclear energy generation. US utilities imported 43.8 percent of their uranium requirements in 1986 and 51.1 percent in 1987. The report finds that the domestic industry's competitiveness has deteriorated in recent years, due to the easily accessible and richer deposits available elsewhere. The report concludes, however, that in a national security emergency, defense requirements could be met through stockpiles of finished nuclear materials set aside for military needs. Furthermore, civilian requirements could be met through US production, reliable imports, inventories, and tails reprocessing. The report, therefore, finds that uranium is not being imported in such quantities or under such circumstances as to represent a threat to the national security

  19. A Case Study on a Security Maturity Assessment of a Business-to-Business Electronic Commerce Organization

    OpenAIRE

    Shirley A. Becker; Anthony Berkemeyer

    2004-01-01

    GlobalUBid.com is a B2B (business-to-business) e-commerce company offering excess and obsolete inventory to online customers. GlobalUBid is rapidly expanding into the global online marketplace; but recently, its Web site crashed due to a denial-of-service (DOS) attack. A lack of security awareness at an organizational level has left GlobalUBid’s online system vulnerable to internal and external attacks. Though informal security policies are in place, many employees are not aware of them nor...

  20. Model of a Nuclear Security Naval Agency for radiation control of the Industrial Complex of of Submarine Construction and Maintenance Ship with Nuclear Propulsion

    International Nuclear Information System (INIS)

    Lins Junior, Amilton de Sousa

    2017-01-01

    Due to the construction, by Brazilian Navy, of a Submarine Construction and Maintenance Ship with Nuclear Propulsion, where, among other activities, the commissioning and exchange of the fuel elements of the reactor in the future Nuclear Submarine, and of a Naval Base where the Nuclear Submarine and the Conventional Submarines, it is necessary the establishment of a Nuclear Security Naval Agency to monitor activities involving ionizing radiation sources and nuclear materials aimed at the radiological protection of exposed occupationally individuals (IOE), the general public and the environment. It should be noted that nuclear and radioactive material will be present only in a part of the yard called Radiological Complex. Therefore, the development of a structure for the control of the Radiological Complex is fundamental, considering that the future licensing process will be unprecedented in Brazil and will face several difficulties. This work presents a model of a structure for the radiological control of the industrial complex for the construction and maintenance of the submarine with nuclear propulsion, as well as the fundamental concepts of the activities, such as inspection, regulations and authorizations, to be carried out by the various component sectors of the Nuclear Security Naval Agency. (author)

  1. Cyber Security and Resilient Systems

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the

  2. Cyber Security and Resilient Systems

    International Nuclear Information System (INIS)

    Anderson, Robert S.

    2009-01-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation's cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested - both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the

  3. Denmark's National Inventory Report 2010

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Lyck, Erik; Mikkelsen, Mette Hjorth

    2010-01-01

    This report is Denmark's National Inventory Report 2010. The report contains information on Denmark's emission inventories for all years' from 1990 to 2008 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2.......This report is Denmark's National Inventory Report 2010. The report contains information on Denmark's emission inventories for all years' from 1990 to 2008 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2....

  4. Strategies for Preserving Owner Privacy in the National Information Management System of the USDA Forest Service's Forest Inventory and Analysis Unit

    Science.gov (United States)

    Andrew Lister; Charles Scott; Susan King; Michael Hoppus; Brett Butler; Douglas Griffith

    2005-01-01

    The Food Security Act of 1985 prohibits the disclosure of any information collected by the USDA Forest Service's FIA program that would link individual landowners to inventory plot information. To address this, we developed a technique based on a "swapping" procedure in which plots with similar characteristics are exchanged, and on a ...

  5. HHS Enterprise Data Inventory

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Enterprise Data Inventory (EDI) is the comprehensive inventory listing of agency data resources including public, restricted public, and non-public datasets.

  6. 27 CFR 20.170 - Physical inventory.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Physical inventory. 20.170... Users of Specially Denatured Spirits Inventory and Records § 20.170 Physical inventory. Once in each... physical inventory of each formula of new and recovered specially denatured spirits. (Approved by the...

  7. Security challenges for virtualization in cloud

    International Nuclear Information System (INIS)

    Tayab, A.

    2015-01-01

    Virtualization is a model that is vastly growing in IT industry. Virtualization provides more than one logical resource in one single physical machine. Infrastructure use cloud services and on behalf of virtualization, cloud computing is also a rapidly growing model of IT industry. Cloud provider and cloud user, both remain ignorant of each other's security. Since virtualization and cloud computing are rapidly expanding and becoming more and more complex in infrastructure, more security is required to protect them from potential attacks and security threats. Virtualization provides various benefits in terms of hardware utilization, resources protection, remote access and other resources. This paper intends to discuss the common exploits of security uses in the virtualized environment and focuses on the security threats from the attacker's perspective. This paper discuss the major areas of virtualized model environment and also address the security concerns. And finally presents a solution for secure valorization in IT infrastructure and to protect inter communication of virtual machines. (author)

  8. Computer Security: transparent monitoring for your protection

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2016-01-01

    Computer security can be handled in one of two ways: in secrecy, behind a black curtain; or out in the open, subject to scrutiny and with full transparency. We believe that the latter is the only right way for CERN, and have always put that belief into practice. In keeping with this spirit, here is a reminder of how we monitor (your) CERN activities in order to guarantee timely responses to computer security incidents.   We monitor all network traffic coming into and going out of CERN. Automatic tools look for suspicious patterns like connections to known malicious IP addresses, web pages or domains. They check for malicious files being downloaded and make statistical analyses of connections in order to identify unusual behaviour. The automatic analysis of the logs from the CERN Domain Name Servers complements this and provides a redundant means of detection. We also constantly scan the CERN office network and keep an inventory of the individual network services running on each device: w...

  9. Security Requirements Management in Software Product Line Engineering

    Science.gov (United States)

    Mellado, Daniel; Fernández-Medina, Eduardo; Piattini, Mario

    Security requirements engineering is both a central task and a critical success factor in product line development due to the complexity and extensive nature of product lines. However, most of the current product line practices in requirements engineering do not adequately address security requirements engineering. Therefore, in this chapter we will propose a security requirements engineering process (SREPPLine) driven by security standards and based on a security requirements decision model along with a security variability model to manage the variability of the artefacts related to security requirements. The aim of this approach is to deal with security requirements from the early stages of the product line development in a systematic way, in order to facilitate conformance with the most relevant security standards with regard to the management of security requirements, such as ISO/IEC 27001 and ISO/IEC 15408.

  10. Endogenous Business Cycle Dynamics within Metzlers Inventory Model: Adding an Inventory Floor.

    Science.gov (United States)

    Sushko, Irina; Wegener, Michael; Westerhoff, Frank; Zaklan, Georg

    2009-04-01

    Metzlers inventory model may produce dampened fluctuations in economic activity, thus contributing to our understanding of business cycle dynamics. For some parameter combinations, however, the model generates oscillations with increasing amplitude, implying that the inventory stock of firms eventually turns negative. Taking this observation into account, we reformulate Metzlers model by simply putting a floor to the inventory level. Within the new piecewise linear model, endogenous business cycle dynamics may now be triggered via a center bifurcation, i.e. for certain parameter combinations production changes are (quasi-)periodic.

  11. Savannah River Plant's Accountability Inventory Management System (AIMS) (Nuclear materials inventory control)

    International Nuclear Information System (INIS)

    Croom, R.G.

    1976-06-01

    The Accountability Inventory Management System (AIMS) is a new computer inventory control system for nuclear materials at the Savannah River Plant, Aiken, South Carolina. The system has two major components, inventory files and system parameter files. AIMS, part of the overall safeguards program, maintains an up-to-date record of nuclear material by location, produces reports required by ERDA in addition to onplant reports, and is capable of a wide range of response to changing input/output requirements through use of user-prepared parameter cards, as opposed to basic system reprogramming

  12. INFORMATION SECURITY MANAGEMENT IN ORGANIZATIONS

    OpenAIRE

    Ndungu , Maryanne; Kandel, Sushila

    2015-01-01

    In today's globally interconnected economy, information security has become one of the most complex issues of concern at the world's leading organizations. The capital value of information is significantly increasing and forming a large part of the shareholder value due to increased dependence on information. Organizations that want to achieve competitive advantage amongst other goals have information security at the centre of their concerns. It is now evident that information is a busin...

  13. 27 CFR 40.523 - Inventories.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Inventories. 40.523... PROCESSED TOBACCO Manufacture of Processed Tobacco Operations by Manufacturers of Processed Tobacco § 40.523 Inventories. Every manufacturer of processed tobacco must provide a true and accurate inventory on TTB F 5210...

  14. Hydrogen inventory in gallium

    International Nuclear Information System (INIS)

    Mazayev, S.N.; Prokofiev, Yu.G.

    1994-01-01

    Investigations of hydrogen inventory in gallium (99.9%) were carried out after saturation both from molecular phase and from glow discharge plasma at room temperature, 370 and 520 K. Saturation took place during 3000 s under hydrogen pressure of 20 Pa, and ion flux was about 1x10 15 ions/cm 2 s with an energy about 400 eV during discharge. Hydrogen concentration in Ga at room temperature and that for 370 K by the saturation from gaseous phase was (2-3)x10 14 cm -3 Pa -1/2 . Hydrogen concentration at temperature 520 K increased by five times. Inventory at room temperature for irradiation from discharge was 7x10 16 cm -3 at the dose about 3x10 18 ions/cm 2 . It was more than inventory at temperature 520 K by four times and more than maximum inventory from gaseous phase at 520 K by a factor of 10. Inventory increased when temperature decreased. Diffusion coefficient D=0.003 exp(-2300/RT) cm 2 /s, was estimated from temperature dependence. ((orig.))

  15. Denmark's National Inventory Report 2014

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Plejdrup, Marlene Schmidt; Winther, Morten

    This report is Denmark’s National Inventory Report 2014. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2012 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2......This report is Denmark’s National Inventory Report 2014. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2012 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2...

  16. Denmark's National Inventory Report 2013

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Plejdrup, Marlene Schmidt; Winther, Morten

    This report is Denmark’s National Inventory Report 2013. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2011 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2.......This report is Denmark’s National Inventory Report 2013. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2011 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2....

  17. Denmark's National Inventory Report 2017

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Plejdrup, Marlene Schmidt; Winther, Morten

    This report is Denmark’s National Inventory Report 2017. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2015 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2......This report is Denmark’s National Inventory Report 2017. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2015 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2...

  18. Six ways to reduce inventory.

    Science.gov (United States)

    Lunn, T

    1996-05-01

    The purpose of this presentation is to help you reduce the inventory in your operation. We will accomplish that task by discussing six specific methods that companies have used successfully to reduce their inventory. One common attribute of these successes is that they also build teamwork among the people. Every business operation today is concerned with methods to improve customer service. The real trick is to accomplish that task without increasing inventory. We are all concerned with improving our skills at keeping inventory low.

  19. ANALYSIS MODEL FOR INVENTORY MANAGEMENT

    Directory of Open Access Journals (Sweden)

    CAMELIA BURJA

    2010-01-01

    Full Text Available The inventory represents an essential component for the assets of the enterprise and the economic analysis gives them special importance because their accurate management determines the achievement of the activity object and the financial results. The efficient management of inventory requires ensuring an optimum level for them, which will guarantee the normal functioning of the activity with minimum inventory expenses and funds which are immobilised. The paper presents an analysis model for inventory management based on their rotation speed and the correlation with the sales volume illustrated in an adequate study. The highlighting of the influence factors on the efficient inventory management ensures the useful information needed to justify managerial decisions, which will lead to a balancedfinancial position and to increased company performance.

  20. National Wetlands Inventory Polygons

    Data.gov (United States)

    Minnesota Department of Natural Resources — Wetland area features mapped as part of the National Wetlands Inventory (NWI). The National Wetlands Inventory is a national program sponsored by the US Fish and...

  1. 10 CFR 39.37 - Physical inventory.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Physical inventory. 39.37 Section 39.37 Energy NUCLEAR... inventory. Each licensee shall conduct a semi-annual physical inventory to account for all licensed material received and possessed under the license. The licensee shall retain records of the inventory for 3 years...

  2. Base-age invariance and inventory projections

    Science.gov (United States)

    C. J. Cieszewski; R. L. Bailey; B. E. Borders; G. H. Brister; B. D. Shiver

    2000-01-01

    One of the most important functions of forest inventory is to facilitate management decisions towards forest sustainability based on inventory projections into the future. Therefore, most forest inventories are used for predicting future states of the forests, in modern forestry the most common methods used in inventory projections are based on implicit functions...

  3. Annual Danish emissions inventory report to UNECE. Inventory 1990 - 2002

    Energy Technology Data Exchange (ETDEWEB)

    Illerup, J B; Nielsen, M; Winther, M; Hjort Mikkelsen, M; Lyck, E; Hoffmann, L; Fauser, P

    2004-05-01

    This report is a documentation report on the emission inventories for Denmark as reported to the UNECE Secretariat under the Convention on Long Range Transboundary Air Pollution due by 15 February 2004. The report contains information on Denmark's emission inventories regarding emissions of (1) SOx for the years 1980-2002, (2) NOx, CO, NMVOC and NH{sub 3} for the years 1985-2002; (3) Particulate matter: TSP, PM10, PM2.5 for the years 2000-2002, (4) Heavy Metals: Pb, Cd, Hg, As, Cr, Cu, Ni, Se and Zn for the years 1990-2002, and (5) Polyaromatic hydrocarbons (PAH): Benzo(a)pyrene, benzo(b)fluoranthene, benzo(k)fluoranthene and indeno(1,2,3-cd)pyrene for the years 1990-2002. Furthermore, the report contains information on background data for emissions inventory. (au)

  4. Annual Danish emissions inventory report to UNECE. Inventory 1990 - 2002

    Energy Technology Data Exchange (ETDEWEB)

    Illerup, J.B.; Nielsen, M.; Winther, M.; Hjort Mikkelsen, M.; Lyck, E.; Hoffmann, L.; Fauser, P.

    2004-05-01

    This report is a documentation report on the emission inventories for Denmark as reported to the UNECE Secretariat under the Convention on Long Range Transboundary Air Pollution due by 15 February 2004. The report contains information on Denmark's emission inventories regarding emissions of (1) SOx for the years 1980-2002, (2) NOx, CO, NMVOC and NH{sub 3} for the years 1985-2002; (3) Particulate matter: TSP, PM10, PM2.5 for the years 2000-2002, (4) Heavy Metals: Pb, Cd, Hg, As, Cr, Cu, Ni, Se and Zn for the years 1990-2002, and (5) Polyaromatic hydrocarbons (PAH): Benzo(a)pyrene, benzo(b)fluoranthene, benzo(k)fluoranthene and indeno(1,2,3-cd)pyrene for the years 1990-2002. Furthermore, the report contains information on background data for emissions inventory. (au)

  5. Household Food Security Policy Analysis A System Dynamics Perspective

    Directory of Open Access Journals (Sweden)

    Isdore Paterson Guma

    2015-08-01

    Full Text Available Household food security FS is complex and requires multiple stakeholder intervention. Systemic approach aids stakeholders to understand the mechanisms and feedback between complexities in food security providing effective decision making as global resource consumption continues to grow. The study investigated food security challenges and a system dynamics model was developed for evaluating policies and intervention strategies for better livelihood at household level. Dynamic synthesis methodology questionnaires and interview guide were used to unearth food security challenges faced by households. A causal loop diagram was drawn. The model demonstrates a balance between food stock seeds preserved seeds for sale and consumption from crop harvest throughout the food cycles. This research makes contribution to the literature by evaluating dynamic synthesis methodology and FS policy discussions from a feedback point of view.

  6. Recent evidence on the muted inventory cycle

    OpenAIRE

    Andrew J. Filardo

    1995-01-01

    Inventories play an important role in business cycles. Inventory build-ups add momentum to the economy during expansions, while inventory liquidations sap economic strength during recessions. In addition, because inventory fluctuations are notoriously difficult to predict, they present considerable uncertainty in assessing the economic outlook.> The role of inventories in shaping the current outlook for the U.S. economy is particularly uncertain. In the early 1990s, inventory swings appeared ...

  7. Integrated inventory information system

    Digital Repository Service at National Institute of Oceanography (India)

    Sarupria, J.S.; Kunte, P.D.

    The nature of oceanographic data and the management of inventory level information are described in Integrated Inventory Information System (IIIS). It is shown how a ROSCOPO (report on observations/samples collected during oceanographic programme...

  8. Computer Security: professionalism in security, too

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    At CERN, we apply a great deal of dedication and professionalism to all the work we do. This is necessary because of the complexity and sophistication of the devices we deal with. However, when it comes to computer security, we can all agree that there is room for improvement.   In some cases, we’ve observed devices that are connected to our Intranet networks without the adequate level of protection. Also, in order to allow it to be disseminated easily with peers, information is often disclosed on public webpages, sometimes without appropriate consideration of important security-related aspects. Program code is lost due to a lack of proper version control or the use of central storage systems. Systems are brought down by “finger trouble”, confusing the right and wrong IP addresses. Software or system development is done directly on production devices, impinging on their proper operation up to the point where the system grinds to a halt. Applications full of useful fe...

  9. Structural load inventory database for the Kansas City federal complex

    International Nuclear Information System (INIS)

    Hashimoto, P.S.; Johnson, M.W.; Nakaki, D.K.; Lynch, D.T.; Drury, M.A.

    1995-01-01

    A structural load inventory database (LID) has been developed to support configuration management at the DOE Kansas City Plant (KCP). The objective of the LID is to record loads supported by the plant structures and to provide rapid assessments of the impact of future facility modifications on structural adequacy. Development of the LID was initiated for the KCP's Main Manufacturing Building. Field walkdowns were performed to determine all significant loads supported by the structure, including the weight of piping, service equipment, etc. These loads were compiled in the LID. Structural analyses for natural phenomena hazards were performed in accordance with UCRL-15910. Software to calculate demands on the structural members due to gravity loads, total demands including both gravity and seismic loads, and structural member demand-to-capacity ratios were also developed and integrated into the LID. Operation of the LID is menu-driven. The LID user has options to review and print existing loads and corresponding demand-to-capacity ratios, and to update the supported loads and demand-to-capacity ratios for any future facility modifications

  10. THE DEVELOPMENT OF A WEB BASED DATABASE APPLICATIONS OF PROCUREMENT, INVENTORY, AND SALES AT PT. INTERJAYA SURYA MEGAH

    Directory of Open Access Journals (Sweden)

    Choirul Huda

    2011-10-01

    Full Text Available The objective of this research is to develop a web based database application for the procurement, inventory and sales at PT. Interjaya Surya Megah. The current system at PT. Interjaya Surya Megah is running manually, so the company has difficulty in carrying out its activities. The methodology, that is used in this research, includes interviews, observation, literature review, conceptual database design, logical database design and physical database design. The results are the establishment of a web-based database application at PT. Interjaya Surya Megah. The conclusion is the company can be easier to run the day-to-day activities because data processing becomes faster and more accurate, faster report generation and more accurate, more secure data storage.Keywords: database; application; procurement; inventory; sales

  11. 30 CFR 220.032 - Inventories.

    Science.gov (United States)

    2010-07-01

    ... operations. The accumulation of surplus stocks shall be avoided by proper materiel control, inventory and... physical inventory that has not been credited to NPSL operations under § 220.015(a)(2) shall be credited to... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Inventories. 220.032 Section 220.032 Mineral...

  12. Nuclear security officer training

    International Nuclear Information System (INIS)

    Harrington, W.F.

    1981-01-01

    Training has become complex and precise in today's world of critical review and responsibility. Entrusted to a security officer is the success or demise of large business. In more critical environments the security officer is entrusted with the monitoring and protection of life sensitive systems and devices. The awareness of this high visibility training requirement has been addressed by a limited few. Those involved in the nuclear power industry through dedication and commitment to the American public have without a doubt become leading pioneers in demanding training excellence

  13. Methodology for evaluation of economic security of industrial enterprises

    OpenAIRE

    Kopytko Marta Ivanovna

    2014-01-01

    This paper investigates the features of evaluation of ensuring economic security of industrial enterprises and the algorithm of complex evaluation of the economic security of industrial enterprises over time and the system of criteria and their limit values ​​and the dynamics of change to determine the level of economic security industrial enterprise in terms of its components.

  14. The nature of international health security.

    Science.gov (United States)

    Chiu, Ya-Wen; Weng, Yi-Hao; Su, Yi-Yuan; Huang, Ching-Yi; Chang, Ya-Chen; Kuo, Ken N

    2009-01-01

    Health issues occasionally intersect security issues. Health security has been viewed as an essential part of human security. Policymakers and health professionals, however, do not share a common definition of health security. This article aims to characterize the notions of health security in order to clarify what constitutes the nexus of health and security. The concept of health security has evolved over time so that it encompasses many entities. Analyzing the health reports of four multilateral organizations (the United Nations, World Health Organization, Asia-Pacific Economic Cooperation, and the European Union) produced eight categories of most significant relevance to contemporary health security, allowing comparison of the definitions. The four categories are: emerging diseases; global infectious disease; deliberate release of chemical and biological materials; violence, conflict, and humanitarian emergencies. Two other categories of common concern are natural disasters and environmental change, as well as chemical and radioactive accidents. The final two categories, food insecurity and poverty, are discussed less frequently. Nevertheless, food security is emerging as an increasingly important issue in public health. Health security is the first line of defence against health emergencies. As globalization brings more complexities, dealing with the increased scale and extent of health security will require greater international effort and political support.

  15. Food Security and University Agricultural Students Involvement in ...

    African Journals Online (AJOL)

    Food security and its relationship to sustainable agricultural and rural development have increasingly become matters of concern for developing countries and for the international community. While there are many complex factors that influence sustainable development and food security, it is clear that education in ...

  16. Science Inventory | US EPA

    Science.gov (United States)

    The Science Inventory is a searchable database of research products primarily from EPA's Office of Research and Development. Science Inventory records provide descriptions of the product, contact information, and links to available printed material or websites.

  17. Navigating the Leadership Landscape: Creating an Inventory to Identify Leadership Education Programs for Health Professionals.

    Science.gov (United States)

    Gertler, Matthew; Verma, Sarita; Tassone, Maria; Seltzer, Jane; Careau, Emmanuelle

    2015-01-01

    As health systems become increasingly complex, there is growing emphasis on collaborative leadership education for health system change. The Canadian Interprofessional Health Leadership Collaborative conducted research on this phenomenon through a scoping and systematic review of the health leadership literature, key informant interviews and an inventory of health leadership programs in Canada. The inventory is unique, accounting for educational programming missed by traditional scholarly literature reviews. A major finding is that different health professions have access to health leadership education in different stages of their careers. This pioneering inventory suggests that needs may differ between health professions but also that there is a growing demand for multiple types of programs for specific targeted audiences, and a strategic need for collaborative leadership education in healthcare.

  18. Genetic algorithm to optimize two-echelon inventory control system for perishable goods in terms of active packaging

    Directory of Open Access Journals (Sweden)

    Babak Yousefi Yegane

    2012-01-01

    Full Text Available This paper considers an inventory control policy for a two-echelon inventory control system with one supplier-one buyer. We consider the case of deteriorating items which lead to shortage in supply chain. Therefore, it is necessary to decrease the deterioration rate by adding some specification to the packaging of these items that is known as active packaging. Although this packaging can reduce the deteriorating rate of products, but may be increases the cost of both supplier and buyer. Because of the complexity of the mathematical model, a genetic algorithm has been developed to determine the best policy of this inventory control system.

  19. 42 CFR 35.41 - Inventory.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Inventory. 35.41 Section 35.41 Public Health PUBLIC... STATION MANAGEMENT Disposal of Money and Effects of Deceased Patients § 35.41 Inventory. Promptly after the death of a patient in a station or hospital of the Service, an inventory of his money and effects...

  20. Feature economy vs. logical complexity in phonological pattern learning

    NARCIS (Netherlands)

    Seinhorst, K.T.

    Complexity has been linked to ease of learning. This article explores the roles of two measures of complexity – feature economy and logical complexity – in the acquisition of sets of signs, taken from a small sign language that serves as an analogue of plosive inventories in spoken language. In a

  1. Y-12 Groundwater Protection Program Extent Of The Primary Groundwater Contaminants At The Y-12 National Security Complex

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2013-12-01

    This report presents data summary tables and maps used to define and illustrate the approximate lateral extent of groundwater contamination at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee. The data tables and maps address the primary (i.e., most widespread and mobile) organic, inorganic, and radiological contaminants in the groundwater. The sampling locations, calculated contaminant concentrations, plume boundary values, and paired map format used to define, quantify, delineate, and illustrate the approximate extent of the primary organic, inorganic, and radiological contaminants in groundwater at Y-12 are described.

  2. The international safeguards and domestic safeguards and security interface

    International Nuclear Information System (INIS)

    Whitworth, A.

    1996-01-01

    The International Safeguards Division, in conjunction with the Office of Safeguards and Security, organized a workshop on the international safeguards/domestic safeguards and security interface that was held in March 1996. The purpose of the workshop was to identify and resolve domestic safeguards and security issues associated with the implementation of International Atomic Energy Agency (IAEA) safeguards in the Department of Energy (DOE) complex. The workshop drew heavily upon lessons learned in the application of IAEA safeguards at storage facilities in oak Ridge, Hanford, and Rocky Flats. It was anticipated that the workshop would facilitate a consistent DOE safeguards and security approach for the implementation of IAEA safeguards in the DOE complex. This paper discusses the issues and resolutions of several issues raised at the workshop that involve primarily the domestic material control and accountability program

  3. Conceptualizing and measuring energy security: A synthesized approach

    International Nuclear Information System (INIS)

    Sovacool, Benjamin K.; Mukherjee, Ishani

    2011-01-01

    This article provides a synthesized, workable framework for analyzing national energy security policies and performance. Drawn from research interviews, survey results, a focused workshop, and an extensive literature review, this article proposes that energy security ought to be comprised of five dimensions related to availability, affordability, technology development, sustainability, and regulation. We then break these five dimensions down into 20 components related to security of supply and production, dependency, and diversification for availability; price stability, access and equity, decentralization, and low prices for affordability; innovation and research, safety and reliability, resilience, energy efficiency, and investment for technology development; land use, water, climate change, and air pollution for sustainability; and governance, trade, competition, and knowledge for sound regulation. Further still, our synthesis lists 320 simple indicators and 52 complex indicators that policymakers and scholars can use to analyze, measure, track, and compare national performance on energy security. The article concludes by offering implications for energy policy more broadly. -- Highlights: → Energy security should consist of five dimensions related to availability, affordability, technology development, sustainability, and regulation. → The dimensions of energy security can be broken down into 20 components. → These components can be distilled into 320 simple indicators and 52 complex indicators.

  4. Optimization of inventory management in furniture manufacturing

    OpenAIRE

    Karkauskas, Justinas

    2017-01-01

    Aim of research - to present inventory management optimization guidelines for furniture manufacturing company, based on analysis of scientific literature and empirical research. Tasks of the Issue: • Disclose problems of inventory management in furniture manufacturing sector; • To analyze theoretical inventory management decisions; • To develop theoretical inventory management optimization model; • Do empirical research of inventory management and present offers for optimizatio...

  5. Impacts of Vehicle (In)Security

    Energy Technology Data Exchange (ETDEWEB)

    Chugg, J.; Rohde, K.

    2015-05-01

    Nuclear and radioactive material is routinely transported worldwide every day. Since 2010, the complexity of the transport vehicle to support such activities has grown exponentially. Many core functions of a vehicle are now handled by small embedded computer modules with more being added each year to enhance the owner’s experience and convenience. With a system as complex as today’s automobile, the potential for cyber security issues is certain. Hackers have begun exploring this new domain with public information increasingly disseminated. Because vehicles are allowed into and around secure nuclear facilities, the potential for using a vehicle as a new cyber entry point or vector into the facility is now plausible and must be mitigated. In addition, compromising such a vehicle could aide in illicit removal of nuclear material, putting sensitive cargo at risk. Because cyber attacks can now be introduced using vehicles, cyber security, needs to be integrated into an organization’s design basis threat document. Essentially, a vehicle now extends the perimeter for which security professionals are responsible.Electronic Control Units (ECU) responsible for handling all core and ancillary vehicle functions are interconnected using the controller area network (CAN) bus. A typical CAN network in a modern automobile contains 50 or more ECUs. The CAN protocol now supports a wide variety of areas, including automotive, road transportation, rail transportation, industrial automation, power generation, maritime, military vehicles, aviation, and medical devices. In many ways, the nuclear industry is employing the CAN bus protocol or other similar broadcast serial networks. This paper will provide an overview of the current state of automobile and CAN Bus security, as well as an overview of what has been publicly disclosed by many research organizations. It will then present several hypotheses of how vehicle security issues may impact nuclear activities. An initial

  6. Special Problems in Securing a Reduction in Working Hours: The Case of Security Workers

    OpenAIRE

    Paul Lundall

    2002-01-01

    The paper considers the complex process of introducing a regime of shorter working hours in the private security sector in South Africa. While the process of reducing the working hours of security workers in 1999 was bold, there is potential for real gains and losses to be derived from the process and this depends on the system and levels of compensation that are negotiated for the period of transition to the new schedules in working hours. A reduction in normal working hours can affect the s...

  7. Installation and early operation of a complex low inventory cryogenic distillation system for the Princeton TFTR

    International Nuclear Information System (INIS)

    Busigin, A.; Busigin, C.J.; Robins, J.R.; Woodall, K.B.; Bellamy, D.G.; Fong, C.; Kalyanam, K.; Sood, S.K.

    1995-01-01

    A low inventory Tritium Purification System (TPS) has just been installed at the Princeton Plasma Physics Laboratory (PPPL). The TPS was designed specifically for PPPL, based on their specifications for exhaust gases. The generic design, however, can easily be modified to accept a large variety of input conditions. The Princeton system is designed to have a total tritium inventory of approximately 0.5 g while producing pure product streams consisting of H 2 , D 2 , and T 2 . The purpose of the system is to separate and recycle unburnt tritium from the TFTR and to produce hydrogen and deuterium streams that are free of tritium. These streams can be disposed by stacking, thus eliminating the need to create large volume waste streams that are contaminated with tritium and that must be managed for permanent disposal. This paper will discuss the installation, the modifications and preliminary results of operation of this system at Princeton. 2 refs., 3 figs

  8. IT Security Support for Spaceport Command and Control System

    Science.gov (United States)

    McLain, Jeffrey

    2013-01-01

    During the fall 2013 semester, I worked at the Kennedy Space Center as an IT Security Intern in support of the Spaceport Command and Control System under the guidance of the IT Security Lead Engineer. Some of my responsibilities included assisting with security plan documentation collection, system hardware and software inventory, and malicious code and malware scanning. Throughout the semester, I had the opportunity to work on a wide range of security related projects. However, there are three projects in particular that stand out. The first project I completed was updating a large interactive spreadsheet that details the SANS Institutes Top 20 Critical Security Controls. My task was to add in all of the new commercial of the shelf (COTS) software listed on the SANS website that can be used to meet their Top 20 controls. In total, there are 153 unique security tools listed by SANS that meet one or more of their 20 controls. My second project was the creation of a database that will allow my mentor to keep track of the work done by the contractors that report to him in a more efficient manner by recording events as they occur throughout the quarter. Lastly, I expanded upon a security assessment of the Linux machines being used on center that I began last semester. To do this, I used a vulnerability and configuration tool that scans hosts remotely through the network and presents the user with an abundance of information detailing each machines configuration. The experience I gained from working on each of these projects has been invaluable, and I look forward to returning in the spring semester to continue working with the IT Security team.

  9. Cyber security of critical infrastructures

    Directory of Open Access Journals (Sweden)

    Leandros A. Maglaras

    2018-03-01

    Full Text Available Modern Supervisory Control and Data Acquisition (SCADA systems are essential for monitoring and managing electric power generation, transmission and distribution. In the age of the Internet of Things, SCADA has evolved into big, complex and distributed systems that are prone to be conventional in addition to new threats. Many security methods can be applied to such systems, having in mind that both high efficiency, real time intrusion identification and low overhead are required. Keywords: SCADA systems, Security

  10. Formal Analysis of Graphical Security Models

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi

    , software components and human actors interacting with each other to form so-called socio-technical systems. The importance of socio-technical systems to modern societies requires verifying their security properties formally, while their inherent complexity makes manual analyses impracticable. Graphical...... models for security offer an unrivalled opportunity to describe socio-technical systems, for they allow to represent different aspects like human behaviour, computation and physical phenomena in an abstract yet uniform manner. Moreover, these models can be assigned a formal semantics, thereby allowing...... formal verification of their properties. Finally, their appealing graphical notations enable to communicate security concerns in an understandable way also to non-experts, often in charge of the decision making. This dissertation argues that automated techniques can be developed on graphical security...

  11. Hanford inventory program user's manual

    International Nuclear Information System (INIS)

    Hinkelman, K.C.

    1994-01-01

    Provides users with instructions and information about accessing and operating the Hanford Inventory Program (HIP) system. The Hanford Inventory Program is an integrated control system that provides a single source for the management and control of equipment, parts, and material warehoused by Westinghouse Hanford Company in various site-wide locations. The inventory is comprised of spare parts and equipment, shop stock, special tools, essential materials, and convenience storage items. The HIP replaced the following systems; ACA, ASP, PICS, FSP, WSR, STP, and RBO. In addition, HIP manages the catalog maintenance function for the General Supplies inventory stocked in the 1164 building and managed by WIMS

  12. Security and citizenship in the global south

    DEFF Research Database (Denmark)

    Bilgin, Pinar; Ince, Basak

    2015-01-01

    secured internationally as citizens of newly independent ‘nation-states’ who were protected against interventions and/or ‘indirect rule’ by the (European) International Society, whose practices were often justified on grounds of the former’s ‘failings’ in meeting the so-called ‘standards of civilization......The relationship between security and citizenship is more complex than media portrayals based on binary oppositions seem to suggest (included/excluded, security/insecurity), or mainstream approaches to International Relations (IR) and security seem to acknowledge. This is particularly the case...... in the post-imperial and/or postcolonial contexts of global South where the transition of people from subjecthood to citizenship is better understood as a process of in/securing. For, people were secured domestically as they became citizens with access to a regime of rights and duties. People were also...

  13. Safety analysis and inventory control of transuranic and low-level waste in common storage

    International Nuclear Information System (INIS)

    Porten, D.R.; Bonner, A.L.; Joyce, J.P.

    1993-01-01

    This paper describes a methodology developed For the inventory control of low-level waste (LLW) and transuranic (TRU) waste, when both are stored in the same location, and both contribute to an inventory constrained by safety considerations. Development of the method arose from the necessity to make safety analysis calculations for the addition of LLW, in quantities greater than existing inventory limits would allow when stored with TRU waste, in the Hanford Central Waste Complex (CWC)-Ensuring that the dose consequences of credible releases are maintained at low-hazard limits or less, was used to allow greater than Type A quantities of LLW into the CWC. Basically, what happens is the original limited amount of TRU allowed is reduced by some equivalent amount of LLW introduced. The total quantity of TRU, and LLW in excess of Type A quantities, must be administratively maintained via curie equivalency Factors to ensure operation as a low-hazard Facility. The ''equivalency'' between TRU and LLW proposed here is specific only to the CWC, but the methodology can be used for other specific applications, such as TRU and LLW storage or handling facilities where inventory limits must be enforced or where a simplified inventory system is required

  14. Modelling operations and security of cloud systems using Z-notation and Chinese Wall security policy

    Science.gov (United States)

    Basu, Srijita; Sengupta, Anirban; Mazumdar, Chandan

    2016-11-01

    Enterprises are increasingly using cloud computing for hosting their applications. Availability of fast Internet and cheap bandwidth are causing greater number of people to use cloud-based services. This has the advantage of lower cost and minimum maintenance. However, ensuring security of user data and proper management of cloud infrastructure remain major areas of concern. Existing techniques are either too complex, or fail to properly represent the actual cloud scenario. This article presents a formal cloud model using the constructs of Z-notation. Principles of the Chinese Wall security policy have been applied to design secure cloud-specific operations. The proposed methodology will enable users to safely host their services, as well as process sensitive data, on cloud.

  15. Optimal ABC inventory classification using interval programming

    NARCIS (Netherlands)

    Rezaei, J.; Salimi, N.

    2015-01-01

    Inventory classification is one of the most important activities in inventory management, whereby inventories are classified into three or more classes. Several inventory classifications have been proposed in the literature, almost all of which have two main shortcomings in common. That is, the

  16. No Nation Is Home Alone: Understanding The International Dimension Of Homeland Security Through Global Transportation Security Programs

    Science.gov (United States)

    2016-03-01

    global economy have produced security gaps susceptible to exploitation. Transportation infrastructure , such as air and seaports, can be the target...15 Karen DeYoung, “New Issue of Jihadist Magazine Produced by Al-Qaeda in Yemen Suggests Attacks on U.S.,” Washington Post, December 24, 2014. http...is a complex system of people, things, and infrastructure that cross national boundaries; security policies must continue to be implemented to

  17. An Analysis of the Optimal Multiobjective Inventory Clustering Decision with Small Quantity and Great Variety Inventory by Applying a DPSO

    Science.gov (United States)

    Li, Meng-Hua

    2014-01-01

    When an enterprise has thousands of varieties in its inventory, the use of a single management method could not be a feasible approach. A better way to manage this problem would be to categorise inventory items into several clusters according to inventory decisions and to use different management methods for managing different clusters. The present study applies DPSO (dynamic particle swarm optimisation) to a problem of clustering of inventory items. Without the requirement of prior inventory knowledge, inventory items are automatically clustered into near optimal clustering number. The obtained clustering results should satisfy the inventory objective equation, which consists of different objectives such as total cost, backorder rate, demand relevance, and inventory turnover rate. This study integrates the above four objectives into a multiobjective equation, and inputs the actual inventory items of the enterprise into DPSO. In comparison with other clustering methods, the proposed method can consider different objectives and obtain an overall better solution to obtain better convergence results and inventory decisions. PMID:25197713

  18. Brazilian Validation of the Attachment to God Inventory (IAD-Br

    Directory of Open Access Journals (Sweden)

    Hartmut August

    2018-03-01

    Full Text Available Bowlby’s Attachment Theory proposes that the person seeks protection and security with his or her caregiver, establishing a significant bond, which Bowlby characterizes as “attachment relationship”. The relationship with God can also be understood as an attachment relationship. Until now, there are no instruments in Brazil to measure one’s attachment to God. The purpose of this article is to present the adaptation and validation process of the Attachment to God Inventory for the Brazilian context, resulting in a Brazilian version of the Attachment to God Inventory (IAD-Br. The validation methodology for the IAD-Br consisted of Portuguese translation, reverse translation to English, pre-test, data collection, and validation through confirmatory factorial analysis (CFA. A total of 470 people participated in the study: 179 men and 291 women. Confirmatory factorial analysis presented unsatisfactory statistical parameters. Of the 28 items of the instrument, 11 items did not present adequate Item-Total Correlation. After excluding these 11 items, the instrument presented adequate adjustment indices. The IAD-Br, composed of 17 items, is able to be used to measure attachment to God in Brazil and constitutes a relevant instrument to identify the attachment to God style, being useful for application in the psychotherapeutic clinic and in contexts of spiritual care.

  19. Personality Assessment Inventory profiles of university students with eating disorders

    OpenAIRE

    MacGregor, Michael Wm; Lamborn, Paige

    2014-01-01

    Background Eating disorders are complex disorders that involve medical and psychological symptoms. Understanding the psychological factors associated with different eating disorders is important for assessment, diagnosis, and treatment. Methods This study sought to determine on which of the 22 Personality Assessment Inventory (PAI) scales patients with anorexia nervosa, bulimia nervosa, and eating disorder not otherwise specified (EDNOS) differed, and whether the PAI can be used to classify e...

  20. Approach to estimation of level of information security at enterprise based on genetic algorithm

    Science.gov (United States)

    V, Stepanov L.; V, Parinov A.; P, Korotkikh L.; S, Koltsov A.

    2018-05-01

    In the article, the way of formalization of different types of threats of information security and vulnerabilities of an information system of the enterprise and establishment is considered. In a type of complexity of ensuring information security of application of any new organized system, the concept and decisions in the sphere of information security are expedient. One of such approaches is the method of a genetic algorithm. For the enterprises of any fields of activity, the question of complex estimation of the level of security of information systems taking into account the quantitative and qualitative factors characterizing components of information security is relevant.

  1. INCAP - Applying short-term flexibility to control inventories

    OpenAIRE

    Lödding , Hermann; Lohmann , Steffen

    2011-01-01

    Abstract Inventory Based Capacity Control (INCAP) is a very simple method that allows inventory levels to be effectively controlled by using short-term capacity flexibility in make-to-stock settings. Moreover, INCAP can be used for finished goods inventories as well as for semi-finished goods inventories. The basic idea is to define upper and lower inventory limits and to adjust capacities if the inventory level reaches either limit. Should the inventory fall below the lower limit,...

  2. Distributed security framework for modern workforce

    Energy Technology Data Exchange (ETDEWEB)

    Balatsky, G.; Scherer, C. P., E-mail: gbalatsky@lanl.gov, E-mail: scherer@lanl.gov [Los Alamos National Laboratory, Los Alamos, NM (United States)

    2014-07-01

    Safe and sustainable nuclear power production depends on strict adherence to nuclear security as a necessary prerequisite for nuclear power. This paper considers the current challenges for nuclear security, and proposes a conceptual framework to address those challenges. We identify several emerging factors that affect nuclear security: 1. Relatively high turnover rates in the nuclear workforce compared to the earlier years of the nuclear industry, when nuclear workers were more likely to have secure employment, a lifelong career at one company, and retirement on a pension plan. 2. Vulnerabilities stemming from the ubiquitous presence of modern electronics and their patterns of use by the younger workforce. 3. Modern management practices, including outsourcing and short-term contracting (which relates to number 1 above). In such a dynamic and complex environment, nuclear security personnel alone cannot effectively guarantee adequate security. We propose that one solution to this emerging situation is a distributed security model in which the components of nuclear security become the responsibility of each and every worker at a nuclear facility. To implement this model, there needs to be a refurbishment of current workforce training and mentoring practices. The paper will present an example of distributed security framework model, and how it may look in practice. (author)

  3. Distributed security framework for modern workforce

    International Nuclear Information System (INIS)

    Balatsky, G.; Scherer, C. P.

    2014-01-01

    Safe and sustainable nuclear power production depends on strict adherence to nuclear security as a necessary prerequisite for nuclear power. This paper considers the current challenges for nuclear security, and proposes a conceptual framework to address those challenges. We identify several emerging factors that affect nuclear security: 1. Relatively high turnover rates in the nuclear workforce compared to the earlier years of the nuclear industry, when nuclear workers were more likely to have secure employment, a lifelong career at one company, and retirement on a pension plan. 2. Vulnerabilities stemming from the ubiquitous presence of modern electronics and their patterns of use by the younger workforce. 3. Modern management practices, including outsourcing and short-term contracting (which relates to number 1 above). In such a dynamic and complex environment, nuclear security personnel alone cannot effectively guarantee adequate security. We propose that one solution to this emerging situation is a distributed security model in which the components of nuclear security become the responsibility of each and every worker at a nuclear facility. To implement this model, there needs to be a refurbishment of current workforce training and mentoring practices. The paper will present an example of distributed security framework model, and how it may look in practice. (author)

  4. CASP CompTIA Advanced Security Practitioner Study Guide Exam CAS-001

    CERN Document Server

    Gregg, Michael

    2012-01-01

    Get Prepared for CompTIA Advanced Security Practitioner (CASP) Exam Targeting security professionals who either have their CompTIA Security+ certification or are looking to achieve a more advanced security certification, this CompTIA Authorized study guide is focused on the new CompTIA Advanced Security Practitioner (CASP) Exam CAS-001. Veteran IT security expert and author Michael Gregg details the technical knowledge and skills you need to conceptualize, design, and engineer secure solutions across complex enterprise environments. He prepares you for aspects of the certification test that as

  5. Strategic Inventories in Vertical Contracts

    OpenAIRE

    Krishnan Anand; Ravi Anupindi; Yehuda Bassok

    2008-01-01

    Classical reasons for carrying inventory include fixed (nonlinear) production or procurement costs, lead times, nonstationary or uncertain supply/demand, and capacity constraints. The last decade has seen active research in supply chain coordination focusing on the role of incentive contracts to achieve first-best levels of inventory. An extensive literature in industrial organization that studies incentives for vertical controls largely ignores the effect of inventories. Does the ability to ...

  6. Inventories and sales uncertainty\\ud

    OpenAIRE

    Caglayan, M.; Maioli, S.; Mateut, S.

    2011-01-01

    We investigate the empirical linkages between sales uncertainty and firms´ inventory investment behavior while controlling for firms´ financial strength. Using large panels of manufacturing firms from several European countries we find that higher sales uncertainty leads to larger stocks of inventories. We also identify an indirect effect of sales uncertainty on inventory accumulation through the financial strength of firms. Our results provide evidence that financial strength mitigates the a...

  7. 77 FR 5280 - Service Contracts Inventory

    Science.gov (United States)

    2012-02-02

    ... NUCLEAR REGULATORY COMMISSION [NRC-2012-0023] Service Contracts Inventory AGENCY: Nuclear...) is providing for public information its Inventory of Contracts for Services for Fiscal Year (FY) 2011. The inventory includes service contract actions over $25,000 that were awarded in FY 2011. ADDRESSES...

  8. 78 FR 10642 - Service Contracts Inventory

    Science.gov (United States)

    2013-02-14

    ... NUCLEAR REGULATORY COMMISSION [NRC-2013-0029] Service Contracts Inventory AGENCY: Nuclear...) is providing for public information its Inventory of Contracts for Services for Fiscal Year (FY) 2012. The inventory includes service contract actions over $25,000 that were awarded in FY 2012. ADDRESSES...

  9. SBA Network Components & Software Inventory

    Data.gov (United States)

    Small Business Administration — SBA’s Network Components & Software Inventory contains a complete inventory of all devices connected to SBA’s network including workstations, servers, routers,...

  10. 48 CFR 49.602-2 - Inventory forms.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Inventory forms. 49.602-2... TERMINATION OF CONTRACTS Contract Termination Forms and Formats 49.602-2 Inventory forms. Standard Form (SF) 1428, Inventory Disposal Schedule, and SF 1429, Inventory Disposal Schedule—Continuation Sheet, shall...

  11. 10 CFR 850.20 - Baseline beryllium inventory.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Baseline beryllium inventory. 850.20 Section 850.20 Energy... Baseline beryllium inventory. (a) The responsible employer must develop a baseline inventory of the... inventory, the responsible employer must: (1) Review current and historical records; (2) Interview workers...

  12. The research of computer network security and protection strategy

    Science.gov (United States)

    He, Jian

    2017-05-01

    With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.

  13. Friendship Security, But Not Friendship Intimacy, Moderates the Stability of Anxiety During Preadolescence.

    Science.gov (United States)

    Wood, Megan A; Bukowski, William M; Santo, Jonathan B

    2017-01-01

    A two-wave longitudinal study of 380 preadolescents (M age = 10.87) from largely middle-class schools in Montréal, Québec, Canada, assessed the hypothesis that friendship security, but not friendship intimacy, moderates the stability of anxiety during adolescence. This central but largely overlooked question about peer relations concerns which aspects of friendship account for the effects of friendship on emotional adjustment. Anxiety and friendship quality were measured via self-report questionnaires, employing the Network of Relationships Inventory for security and intimacy items. An index of friendship durability, which combined reciprocity and stability within first- and second-best friendship choices, was derived from sociometric measures. A latent variable path analysis examined with structural equation modeling showed that anxiety was less stable for children who perceived their friendships as secure. The moderating effect of intimacy was statistically nonsignificant. A follow-up analysis showed that the effects of security did not result from friendship durability. These findings provide support for the long-standing but previously unaddressed hypothesis that security, rather than intimacy, accounts for friendship's effect on anxiety reduction during early adolescence.

  14. SISTEM INVENTORI BARANG DENGAN TEKNOLOGI AJAX

    Directory of Open Access Journals (Sweden)

    Anna Fitriya

    2015-11-01

    Full Text Available ABSTRAK Sistem inventori barang pada pertokoan telah banyak dikembangkan untuk meningkatkan efektivitas dan efisiensi. Pada Toko Karya Indah, kegiatan yang berkaitan dengan inventori barang masih dilakukan secara manual sehingga pihak toko kesulitan untuk mengetahui data barang yang masih tersedia, habis, atau hampir habis. Selain itu, proses yang dilakukan membutuhkan waktu yang relatif lama. Oleh karena itu, diperlukan sistem inventori barang. Sistem dibangun dengan bahasa pemrograman PHP dan database MySQL. Sistem disertai teknologi AJAX (Asynchronous JavaScript And XML, khususnya AJAX autocomplete dan AJAX validasi. Hasil yang diperoleh adalah pengolahan data pada sistem inventori barang dengan menggunakan AJAX dapat dilakukan dengan lebih cepat dari pada tanpa AJAX. Kata kunci: sistem inventori, AJAX.

  15. Double shell tanks plutonium inventory assessment

    International Nuclear Information System (INIS)

    Tusler, L.A.

    1995-01-01

    This report provides an evaluation that establishes plutonium inventory estimates for all DSTs based on known tank history information, the DST plutonium inventory tracking system, tank characterization measurements, tank transfer records, and estimated average concentration values for the various types of waste. These estimates use data through December 31, 1994, and give plutonium estimates as of January 1, 1995. The plutonium inventory values for the DSTs are given in Section 31. The plutonium inventory estimate is 224 kg for the DSTs and 854 kg for the SSTs for a total of 1078 kg. This value compares favorably with the total plutonium inventory value of 981 kg obtained from the total plutonium production minus plutonium recovery analysis estimates

  16. 76 FR 70735 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2011-11-15

    ... identify potential national security concerns, criminality, and fraud to ensure that serious or complex... duplicate and related accounts and identify potential national security concerns, criminality, and fraud to... identify national security concerns, criminality, and fraud to ensure that serious or complex cases receive...

  17. 75 FR 82095 - Service Contracts Inventory

    Science.gov (United States)

    2010-12-29

    ... NUCLEAR REGULATORY COMMISSION [NRC-2010-0394] Service Contracts Inventory AGENCY: U.S. Nuclear...) is providing for public information its Inventory of Contracts for Services for Fiscal Year (FY) 2010. The inventory includes service contract actions over $25,000 that were awarded in FY 2010. ADDRESSES...

  18. 7 CFR 930.57 - Secondary inventory reserve.

    Science.gov (United States)

    2010-01-01

    ... shall retain control over the release of any cherries from the secondary inventory reserve. No cherries... 7 Agriculture 8 2010-01-01 2010-01-01 false Secondary inventory reserve. 930.57 Section 930.57... Handling Regulations § 930.57 Secondary inventory reserve. (a) In the event the inventory reserve...

  19. Student-Life Stress Inventory.

    Science.gov (United States)

    Gadzella, Bernadette M.; And Others

    The reliability of the Student-Life Stress Inventory of B. M. Gadzella (1991) was studied. The inventory consists of 51 items listed in 9 sections indicating different types of stressors (frustrations, conflicts, pressures, changes, and self-imposed stressors) and reactions to the stressors (physiological, emotional, behavioral, and cognitive) as…

  20. Uncertainties in emission inventories

    NARCIS (Netherlands)

    Aardenne, van J.A.

    2002-01-01

    Emission inventories provide information about the amount of a pollutant that is emitted to the atmosphere as a result of a specific anthropogenic or natural process at a given time or place. Emission inventories can be used for either policy or scientific purposes. For

  1. A Framework for the Governance of Information Security

    Science.gov (United States)

    Edwards, Charles K.

    2013-01-01

    Information security is a complex issue, which is very critical for success of modern businesses. It can be implemented with the help of well-tested global standards and best practices. However, it has been studied that the human aspects of information security compliance pose significant challenge to its practitioners. There has been significant…

  2. Hydro-hegemony or water security community? Collective action, cooperation and conflict in the SADC transboundary security complex

    CSIR Research Space (South Africa)

    Meissner, Richard

    2017-09-01

    Full Text Available In an anarchical global environment, the conflict potential of shared water resources has made rivers subject to high politics (i.e. security). While researchers and diplomats consider regional treaties as cooperation indicators (Wold 1995), unequal...

  3. Big sagebrush in pinyon-juniper woodlands: Using forest inventory and analysis data as a management tool for quantifying and monitoring mule deer habitat

    Science.gov (United States)

    Chris Witt; Paul L. Patterson

    2011-01-01

    We used Interior West Forest Inventory and Analysis (IW-FIA) data to identify conditions where pinyon-juniper woodlands provide security cover, thermal cover, and suitable amounts of big sagebrush (Artemisia tridentata spp.) forage to mule deer in Utah. Roughly one quarter of Utah's pinyon-juniper woodlands had a big sagebrush component in their understory....

  4. Smart grid security innovative solutions for a modernized grid

    CERN Document Server

    Skopik, Florian

    2015-01-01

    The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak power needs and improving efficiency of power delivery, the Smart Grid has also opened the way for information security breaches and other types of security breaches. Potential threats range from meter manipulation to directed, high-impact attacks on critical infrastructure that could bring down regi

  5. 27 CFR 19.464 - Denatured spirits inventories.

    Science.gov (United States)

    2010-04-01

    ... of Articles Inventories § 19.464 Denatured spirits inventories. Each proprietor shall take a physical inventory of all denatured spirits in the processing account at the close of each calendar quarter and at... inventories. 19.464 Section 19.464 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE...

  6. Projecting Timber Inventory at the Product Level

    Science.gov (United States)

    Lawrence Teeter; Xiaoping Zhou

    1999-01-01

    Current timber inventory projections generally lack information on inventory by product classes. Most models available for inventory projection and linked to supply analyses are limited to projecting aggregate softwood and hardwood. The research presented describes a methodology for distributing the volume on each FIA (USDA Forest Service Forest Inventory and Analysis...

  7. 7 CFR 984.21 - Handler inventory.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Handler inventory. 984.21 Section 984.21 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements... Regulating Handling Definitions § 984.21 Handler inventory. Handler inventory as of any date means all...

  8. 10 CFR 34.29 - Quarterly inventory.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Quarterly inventory. 34.29 Section 34.29 Energy NUCLEAR... RADIOGRAPHIC OPERATIONS Equipment § 34.29 Quarterly inventory. (a) Each licensee shall conduct a quarterly physical inventory to account for all sealed sources and for devices containing depleted uranium received...

  9. Denmark’s National Inventory Report 2012

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Mikkelsen, Mette Hjorth; Hoffmann, Leif

    This report is Denmark’s National Inventory Report 2012. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2010 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2......This report is Denmark’s National Inventory Report 2012. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2010 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2...

  10. As for the Question of the Relationship Between the Concepts of «Security» and «Transport Security»

    Directory of Open Access Journals (Sweden)

    Nikita S. Ryazanov

    2017-08-01

    Full Text Available This article examines the problems of determining transport security, the correlation of this category with a generic notion of security and its other types. This paper examines the formation and development of modern legislative model for transport security. Threats to the safe and sustainable functioning of the transport complex are indicated by their types are also analyzed. In addition, the Author explores the terms «transport security» and «transport safety», which, despite the similarity of language, are the different contents in the regulations, and, consequently, definition. On the results of the analysis of national legislation, the problems of legal regulation of transportation security pointed out are pointed out and suggestions are made on ways to minimize these problems. According to the results of the research, the Author develops a unified definition of transport security and its object, which is relevant today.

  11. The Coopersmith Self-Esteem Inventory: analysis and partial validation of a modified adult form.

    Science.gov (United States)

    Myhill, J; Lorr, M

    1978-01-01

    Determined the factor structure of an adult form of the Coopersmith Self-Esteem Inventory (SEI), tested several hypotheses related to its content, and assessed the utility of the five derived scores for differentiating psychiatric outpatients from normals. The modified Self-Esteem Inventory and six other scales were completed by 200 local-government employees. A principal components analysis of correlations among 58 SEI items and two marker variables revealed five factors. The rotated dimensions were labelled (1) anxiety; (2) defensiveness; (3) negative social attitude; (4) rejection of self; and (5) inadequacy of self. Fifty psychiatric outpatients were compared with 100 normals with respect to the five derived factor scores. Tests of significance indicated that the two groups differed significantly on all measures except the defensiveness or lie scale factor. It is concluded that the Coopersmith Inventory is complex and measures several characteristics in addition to self-esteem.

  12. Complex Relationships Among Masculine Norms and Health/Well-Being Outcomes: Correlation Patterns of the Conformity to Masculine Norms Inventory Subscales.

    Science.gov (United States)

    Gerdes, Zachary T; Levant, Ronald F

    2018-03-01

    The Conformity to Masculine Norms Inventory (CMNI) is a widely used multidimensional scale. Studies using the CMNI most often report only total scale scores, which are predominantly associated with negative outcomes. Various studies since the CMNI's inception in 2003 using subscales have reported both positive and negative outcomes. The current content analysis examined studies ( N = 17) correlating the 11 subscales with 63 criterion variables across 7 categories. Most findings were consistent with past research using total scale scores that reported negative outcomes. For example, conformity to masculine norms has been inversely related to help-seeking and positively correlated with concerning health variables, such as substance use. Nonetheless, past reliance on total scores has obscured the complexity of associations with the CMNI in that 30% of the findings in the present study reflected positive outcomes, particularly for health promotion. Subscales differed in their relationships with various outcomes: for one subscale they were predominantly positive, but six others were mostly negative. The situational and contextual implications of conformity to masculine norms and their relationships to positive and negative outcomes are discussed.

  13. Clean Lead Facility Inventory System user's manual

    International Nuclear Information System (INIS)

    Garcia, J.F.

    1994-12-01

    The purpose of this user's manual is to provide instruction and guidance needed to enter and maintain inventory information for the Clean Lead Facility (CLF), PER-612. Individuals responsible for maintaining and using the system should study and understand the information provided. The user's manual describes how to properly use and maintain the CLF Inventory System. Annual, quarterly, monthly, and current inventory reports may be printed from the Inventory System for reporting purposes. Profile reports of each shipment of lead may also be printed for verification and documentation of lead transactions. The CLF Inventory System was designed on Microsoft Access version 2.0. Similar inventory systems are in use at the Idaho National Engineering Laboratory (INEL) to facilitate site-wide compilations of mixed waste data. The CLF Inventory System was designed for inventorying the clean or non-radioactive contaminated lead stored at the CLF. This data, along with the mixed waste data, will be compiled into the Idaho Mixed Waste Information (IMWI) system for reporting to the Department of Energy Idaho Office, Department of Energy Headquarters, and/or the State of Idaho

  14. Denmark's National Inventory Report

    DEFF Research Database (Denmark)

    Illerup, J. B.; Lyck, E.; Winther, M.

    This report is Denmark's National Inventory Report reported to the Conference of the Parties under the United Nations Framework Convention on Climate Change (UNFCCC) due by 15 April 2001. The report contains information on Denmark's inventories for all years' from 1990 to 1999 for CO2, CH4, N2O, CO...

  15. Inventory Centralization Decision Framework for Spare Parts

    DEFF Research Database (Denmark)

    Gregersen, Nicklas; Herbert-Hansen, Zaza Nadja Lee

    2018-01-01

    Within the current literature, there is a lack of a holistic and multidisciplinary approach to managing spare parts and their inventory configuration. This paper addresses this research gap by examining the key contextual factors which influence the degree of inventory centralization and proposes...... a novel holistic theoretical framework, the Inventory Centralization Decision Framework (ICDF), useful for practitioners. Through an extensive review of inventory management literature, six contextual factors influencing the degree of inventory centralization have been identified. Using the ICDF...... practitioners can assess the most advantageous inventory configuration of spare parts. The framework is tested on a large global company which, as a result, today actively uses the ICDF; thus showing its practical applicability....

  16. DURAND NEIGHBOURHOOD HERITAGE INVENTORY: TOWARD A DIGITAL CITYWIDE SURVEY APPROACH TO HERITAGE PLANNING IN HAMILTON

    Directory of Open Access Journals (Sweden)

    V. Angel

    2017-08-01

    Full Text Available In the face of changing economies and patterns of development, the definition of heritage is diversifying, and the role of inventories in local heritage planning is coming to the fore. The Durand neighbourhood is a layered and complex area located in inner-city Hamilton, Ontario, Canada, and the second subject area in a set of pilot inventory studies to develop a new city-wide inventory strategy for the City of Hamilton,. This paper presents an innovative digital workflow developed to undertake the Durand Built Heritage Inventory project. An online database was developed to be at the centre of all processes, including digital documentation, record management, analysis and variable outputs. Digital tools were employed for survey work in the field and analytical work in the office, resulting in a GIS-based dataset that can be integrated into Hamilton’s larger municipal planning system. Together with digital mapping and digitized historical resources, the Durand database has been leveraged to produce both digital and static outputs to shape recommendations for the protection of Hamilton’s heritage resources.

  17. Durand Neighbourhood Heritage Inventory: Toward a Digital Citywide Survey Approach to Heritage Planning in Hamilton

    Science.gov (United States)

    Angel, V.; Garvey, A.; Sydor, M.

    2017-08-01

    In the face of changing economies and patterns of development, the definition of heritage is diversifying, and the role of inventories in local heritage planning is coming to the fore. The Durand neighbourhood is a layered and complex area located in inner-city Hamilton, Ontario, Canada, and the second subject area in a set of pilot inventory studies to develop a new city-wide inventory strategy for the City of Hamilton,. This paper presents an innovative digital workflow developed to undertake the Durand Built Heritage Inventory project. An online database was developed to be at the centre of all processes, including digital documentation, record management, analysis and variable outputs. Digital tools were employed for survey work in the field and analytical work in the office, resulting in a GIS-based dataset that can be integrated into Hamilton's larger municipal planning system. Together with digital mapping and digitized historical resources, the Durand database has been leveraged to produce both digital and static outputs to shape recommendations for the protection of Hamilton's heritage resources.

  18. Let's talk conflict: using mediation in healthcare security disputes.

    Science.gov (United States)

    Armstrong, Brad

    2013-01-01

    Healthcare security administrators face weekly, if not daily challenges and conflict. This article considers that security leaders must anticipate disputes in highly complex healthcare systems. When disputes cannot be resolved by organizational efforts, security administrators may be in a position to recommend or participate in mediation. Here the concept of mediation is introduced to healthcare security leaders as a viable means to resolve disputes with patients, visitors, and the community. This includes a description of the facilitative versus evaluative mediation processes, as well as pragmatic guidance when preparing for mediation.

  19. Evaluating policy-relevant emission inventories for transportation and electricity (Invited)

    Science.gov (United States)

    Holloway, T.; Meier, P.; Bickford, E. E.

    2013-12-01

    We explore the challenges and opportunities in evaluating bottom-up emission inventories for transportation and electricity. These anthropogenic emissions respond in complex ways to technology and activity changes. Thus, it is essential that inventories capture historic emissions consistent with observations, as well as future emissions consistent with policy scenarios. For transportation, we focus on freight-related trucking emissions, represented by the Wisconsin Inventory for Freight Emissions (WIFE), developed with activity data from the U.S. Federal Highway Administration Freight Analysis Framework and emission factors from the EPA MOVES model. Because WIFE is linked to commodity flows and roadway speeds, it offers a useful data set to evaluate policy changes such as truck-to-rail modal shifts and alternative fuel choices. However, the value of the inventory in assessing these scenarios depends on its skill in calculating frieght-related emissions. Satellite data of nitrogen dioxide (NO2) from the OMI instrument aboard the NASA Aura satellite is used to evaluate truck and rail NOx emissions, especially on rural highways away from ground-based monitors. For electricity, we use the MyPower electricity dispatch model to calculate emissions and power generation in response to policy and technology changes. These include renewable portfolio standards, conservation, increased natural gas, and response to building demand. To evaluate MyPower, we compare with the Clean Air Markets database, and 2007 calculated daily afternoon emissions with satellite-derived NO2 from OMI. Drawing on the results of these studies, we discuss strategies to meet the information demands of both historically correct air quality inputs and future-relevant policy scenarios.

  20. Inventory Data Package for Hanford Assessments

    Energy Technology Data Exchange (ETDEWEB)

    Kincaid, Charles T.; Eslinger, Paul W.; Aaberg, Rosanne L.; Miley, Terri B.; Nelson, Iral C.; Strenge, Dennis L.; Evans, John C.

    2006-06-01

    This document presents the basis for a compilation of inventory for radioactive contaminants of interest by year for all potentially impactive waste sites on the Hanford Site for which inventory data exist in records or could be reasonably estimated. This document also includes discussions of the historical, current, and reasonably foreseeable (1944 to 2070) future radioactive waste and waste sites; the inventories of radionuclides that may have a potential for environmental impacts; a description of the method(s) for estimating inventories where records are inadequate; a description of the screening method(s) used to select those sites and contaminants that might make a substantial contribution to impacts; a listing of the remedial actions and their completion dates for waste sites; and tables showing the best estimate inventories available for Hanford assessments.

  1. An Experience of Forest Inventory by Photo Interpretation Method Based on Advanced Firmware and Digital Aerial Photographs of New Generation

    Directory of Open Access Journals (Sweden)

    V. I. Arkhipov

    2014-10-01

    Full Text Available The main stages of the developed technology of forest inventory by interpretation method, named «From survey – to project», with the use of modern aerial survey data, special software and hardware are discussed in the paper. A need for development of high-end technology of forest inventory is due to increasing demands of state, business, and civil community for actual and correct information about forests. The tasks of research were: integration software and hardware into single technology, testing on the real object, and development of recommendations for introduction into production and forming of system of preparing specialists for forest interpretation. Positive results of experimental works by measurement and analytical forest interpretation in stereo regime on base of photogrammetric software were obtained by specialists from Russia, Croatia, Belarus, and Sweden. In the technology «From survey – to project», the following instruments are used: photogrammetric complex Vision Map A3, digital photogrammetric system Photomod, program «ESAUL», GIS ArcGIS, special hardware for stereo visualization. Results of testing this technology are shown on example of model territory. Comparison of results of forest inventory obtained by interpretation method and results of control inventory obtained by enumeration method demonstrated that errors of determination of main forest inventory characteristics do not exceed the norms. The advantages of practical use of the technology are shown. It has been noted that forest inventory by interpretation method is a complex psychophysiological process and it requires an attraction of specialists with high qualification on base of special training. It is indicated the necessity of forming system for training forest inventory specialists on interpretation method. The designed and prepared curriculums and training manuals for interpretation method in forestry are listed.

  2. Methods for Calculating Frequency of Maintenance of Complex Information Security System Based on Dynamics of Its Reliability

    Science.gov (United States)

    Varlataya, S. K.; Evdokimov, V. E.; Urzov, A. Y.

    2017-11-01

    This article describes a process of calculating a certain complex information security system (CISS) reliability using the example of the technospheric security management model as well as ability to determine the frequency of its maintenance using the system reliability parameter which allows one to assess man-made risks and to forecast natural and man-made emergencies. The relevance of this article is explained by the fact the CISS reliability is closely related to information security (IS) risks. Since reliability (or resiliency) is a probabilistic characteristic of the system showing the possibility of its failure (and as a consequence - threats to the protected information assets emergence), it is seen as a component of the overall IS risk in the system. As it is known, there is a certain acceptable level of IS risk assigned by experts for a particular information system; in case of reliability being a risk-forming factor maintaining an acceptable risk level should be carried out by the routine analysis of the condition of CISS and its elements and their timely service. The article presents a reliability parameter calculation for the CISS with a mixed type of element connection, a formula of the dynamics of such system reliability is written. The chart of CISS reliability change is a S-shaped curve which can be divided into 3 periods: almost invariable high level of reliability, uniform reliability reduction, almost invariable low level of reliability. Setting the minimum acceptable level of reliability, the graph (or formula) can be used to determine the period of time during which the system would meet requirements. Ideally, this period should not be longer than the first period of the graph. Thus, the proposed method of calculating the CISS maintenance frequency helps to solve a voluminous and critical task of the information assets risk management.

  3. Complete Fairness in Secure Two-Party Computation

    DEFF Research Database (Denmark)

    Gordon, S. Dov; Hazay, Carmit; Katz, Jonathan

    2011-01-01

    In the setting of secure two-party computation, two mutually distrusting parties wish to compute some function of their inputs while preserving, to the extent possible, various security properties such as privacy, correctness, and more. One desirable property is fairness which guarantees, informa...... for such functions must have round complexity super-logarithmic in the security parameter. Our results demonstrate that the question of completely fair secure computation without an honest majority is far from closed.......In the setting of secure two-party computation, two mutually distrusting parties wish to compute some function of their inputs while preserving, to the extent possible, various security properties such as privacy, correctness, and more. One desirable property is fairness which guarantees......-party setting. We demonstrate that this folklore belief is false by showing completely fair protocols for various nontrivial functions in the two-party setting based on standard cryptographic assumptions. We first show feasibility of obtaining complete fairness when computing any function over polynomial...

  4. Inventory estimation for nuclear fuel reprocessing systems

    International Nuclear Information System (INIS)

    Beyerlein, A.L.; Geldard, J.F.

    1987-01-01

    The accuracy of nuclear material accounting methods for nuclear fuel reprocessing facilities is limited by nuclear material inventory variations in the solvent extraction contactors, which affect the separation and purification of uranium and plutonium. Since in-line methods for measuring contactor inventory are not available, simple inventory estimation models are being developed for mixer-settler contactors operating at steady state with a view toward improving the accuracy of nuclear material accounting methods for reprocessing facilities. The authors investigated the following items: (1) improvements in the utility of the inventory estimation models, (2) extension of improvements to inventory estimation for transient nonsteady-state conditions during, for example, process upset or throughput variations, and (3) development of simple inventory estimation models for reprocessing systems using pulsed columns

  5. 26 CFR 1.1374-7 - Inventory.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 11 2010-04-01 2010-04-01 true Inventory. 1.1374-7 Section 1.1374-7 Internal... TAXES Small Business Corporations and Their Shareholders § 1.1374-7 Inventory. (a) Valuation. The fair market value of the inventory of an S corporation on the first day of the recognition period equals the...

  6. 27 CFR 24.266 - Inventory losses.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Inventory losses. 24.266... OF THE TREASURY LIQUORS WINE Losses of Wine § 24.266 Inventory losses. (a) General. The proprietor... reported as required by § 24.313. (b) Bulk wine losses. The physical inventory of bulk wine will determine...

  7. Denmark's National Inventory Report

    DEFF Research Database (Denmark)

    Illerup, J. B.; Lyck, E.; Winther, M.

    This report is Denmark's National Inventory Report reported to the Conference of the Parties under the United Nations Framework Convention on Climate Change (UNFCCC) due by 15 April 2001. The report contains information on Denmark's inventories for all years' from 1990 to 1999 for CO2, CH4, N2O, ......, NMVOC, SO2, HFCs, PFCs and SF6....

  8. The Politics of International Terrorism in the Security Complexes in ...

    African Journals Online (AJOL)

    sulaiman.adebowale

    2006-06-13

    Jun 13, 2006 ... International Relations and Security Studies, Department of Political Science and .... porary international relations in the Greater Horn of Africa. ..... In the case .... terrorist organisation, and all its sponsors and supporters as terrorist col- ... every act of violence to the label of terrorist, to the extent that public.

  9. A logical framework for ranking landslide inventory maps

    Science.gov (United States)

    Santangelo, Michele; Fiorucci, Federica; Bucci, Francesco; Cardinali, Mauro; Ardizzone, Francesca; Marchesini, Ivan; Cesare Mondini, Alessandro; Reichenbach, Paola; Rossi, Mauro; Guzzetti, Fausto

    2014-05-01

    Landslides inventory maps are essential for quantitative landslide hazard and risk assessments, and for geomorphological and ecological studies. Landslide maps, including geomorphological, event based, multi-temporal, and seasonal inventory maps, are most commonly prepared through the visual interpretation of (i) monoscopic and stereoscopic aerial photographs, (ii) satellite images, (iii) LiDAR derived images, aided by more or less extensive field surveys. Landslide inventory maps are the basic information for a number of different scientific, technical and civil protection purposes, such as: (i) quantitative geomorphic analyses, (ii) erosion studies, (iii) deriving landslide statistics, (iv) urban development planning (v) landslide susceptibility, hazard and risk evaluation, and (vi) landslide monitoring systems. Despite several decades of activity in landslide inventory making, still no worldwide-accepted standards, best practices and protocols exist for the ranking and the production of landslide inventory maps. Standards for the preparation (and/or ranking) of landslide inventories should indicate the minimum amount of information for a landslide inventory map, given the scale, the type of images, the instrumentation available, and the available ancillary data. We recently attempted at a systematic description and evaluation of a total of 22 geomorphological inventories, 6 multi-temporal inventories, 10 event inventories, and 3 seasonal inventories, in the scale range between 1:10,000 and 1:500,000, prepared for areas in different geological and geomorphological settings. All of the analysed inventories were carried out by using image interpretation techniques, or field surveys. Firstly, a detailed characterisation was performed for each landslide inventory, mainly collecting metadata related (i) to the amount of information used for preparing the landslide inventory (i.e. images used, instrumentation, ancillary data, digitalisation method, legend, validation

  10. Can we trust corporates GHG inventories? An investigation among Canada's large final emitters

    International Nuclear Information System (INIS)

    Talbot, David; Boiral, Olivier

    2013-01-01

    In the public sphere and the literature on climate strategies, the measurability of corporate GHG emissions tends to be taken for granted, and few empirical studies have examined the reliability of such data. The present case study, which was conducted among 10 Canadian companies considered as large final emitters and three auditing firms, focuses on the factors which could affect the perceived credibility of GHG inventories and the strategic implications of these. The qualitative, inductive study allows identifying three main factors which affect trust in business inventories: technical issues and complexity of GHG measurements, lack of transparency on the part of the companies and unreliability of verification mechanisms. The study also makes it possible to evaluate the implications of uncertainties concerning GHG inventories which are of strategic importance for companies and policy makers. While the reliability of GHG measurement is taken for granted at the political level, uncertainties in this area can in fact have a huge impact on the establishment of the cap and trade system. The study also contributes to the literature on carbon accounting by shedding light on underexplored ethical issues, including the lack of independence of auditors and its implications. - Highlights: • The complexity of GHG emission measurement is underestimated in the public sphère. • The data disclosed by companies to the different stakeholders lack transparency. • The auditors' lack of competence and independence undermine the credibility of audit reports

  11. Denmark's national inventory report 2005 - submitted under the United Nations frameword convention on climate change. 1990-2003. Emission Inventories

    International Nuclear Information System (INIS)

    Illerup, J.B.

    2005-01-01

    This report is Denmkark's National Inventory Report (NIR) due by 15 April 2005 to the United Nations Framework Convention on Climate Change (UNFCCC). the report contains information on Denmark's inventories for all years from 1990 to 2003. The structure of the report is in accordance with the UNFCCC Guidelines on reporting and review and the report includes detailed information on the inventories for all years from the base year to the year of the current annual inventory submission, in order to ensure the transparency of the inventory. (au)

  12. Periodic inventory system in cafeteria using linear programming

    Science.gov (United States)

    Usop, Mohd Fais; Ishak, Ruzana; Hamdan, Ahmad Ridhuan

    2017-11-01

    Inventory management is an important factor in running a business. It plays a big role of managing the stock in cafeteria. If the inventories are failed to be managed wisely, it will affect the profit of the cafeteria. Therefore, the purpose of this study is to find the solution of the inventory management in cafeteria. Most of the cafeteria in Malaysia did not manage their stock well. Therefore, this study is to propose a database system of inventory management and to develop the inventory model in cafeteria management. In this study, new database system to improve the management of the stock in a weekly basis will be provided using Linear Programming Model to get the optimal range of the inventory needed for selected categories. Data that were collected by using the Periodic Inventory System at the end of the week within three months period being analyzed by using the Food Stock-take Database. The inventory model was developed from the collected data according to the category of the inventory in the cafeteria. Results showed the effectiveness of using the Periodic Inventory System and will be very helpful to the cafeteria management in organizing the inventory. Moreover, the findings in this study can reduce the cost of operation and increased the profit.

  13. NERSC Cyber Security Challenges That Require DOE Development andSupport

    Energy Technology Data Exchange (ETDEWEB)

    Draney, Brent; Campbell, Scott; Walter, Howard

    2007-01-16

    Traditional security approaches do not adequately addressall the requirements of open, scientific computing facilities. Many ofthe methods used for more restricted environments, including almost allcorporate/commercial systems, do not meet the needs of today's science.Use of only the available "state of the practice" commercial methods willhave adverse impact on the ability of DOE to accomplish its sciencegoals, and impacts the productivity of the DOE Science community. Inparticular, NERSC and other high performance computing (HPC) centers havespecial security challenges that are unlikely to be met unless DOE fundsdevelopment and support of reliable and effective tools designed to meetthe cyber security needs of High Performance Science. The securitychallenges facing NERSC can be collected into three basic problem sets:network performance and dynamics, application complexity and diversity,and a complex user community that can have transient affiliations withactual institutions. To address these problems, NERSC proposes thefollowing four general solutions: auditing user and system activityacross sites; firewall port configuration in real time;cross-site/virtual organization identity management and access control;and detecting security issues in application middleware. Solutions arealsoproposed for three general long term issues: data volume,application complexity, and information integration.

  14. The Implementation of Vendor Managed Inventory In the Supply Chain with Simple Probabilistic Inventory Model

    Directory of Open Access Journals (Sweden)

    Anna Ika Deefi

    2016-01-01

    Full Text Available Numerous studies show that the implementation of Vendor Managed Inventory (VMI benefits all members of the supply chain. This research develops model to prove the benefits obtained from implementing VMI to supplier-buyer partnership analytically. The model considers a two-level supply chain which consists of a single supplier and a single buyer. The analytical model is developed to supply chain inventory with probabilistic demand which follows normal distribution. The model also incorporates lead time as a decision variable and investigates the impacts of inventory management before and after the implementation of the VMI. The result shows that the analytical model has the ability to reduce the supply chain expected cost, improve the service level and increase the inventory replenishment. Numerical examples are given to prove them.

  15. Danish emission inventory for particular matter (PM)

    Energy Technology Data Exchange (ETDEWEB)

    Nielsen, M; Winther, M; Illerup, J B; Hjort Mikkelsen, M

    2003-11-01

    The first Danish emission inventory that was reported in 2002 was a provisional-estimate based on data presently available. This report documents methodology, emission factors and references used for an improved Danish emission inventory for particulate matter. Further results of the improved emission inventory for the year 2000 are shown. The particulate matter emission inventory includes TSP, PM,, and PM, The report covers emission inventories for transport and stationary combustion. An appendix covering emissions from agriculture is also included. For the transport sector, both exhaust and non-exhaust emission such as tyre and break wear and road abrasion are included. (au)

  16. Cost-effectiveness of Security Measures: A model-based Framework

    NARCIS (Netherlands)

    Pieters, Wolter; Probst, Christian W.; Lukszo, Zofia; Montoya, L.; Tsiakis, Theodosios; Kargidis, Theodorus; Katsaros, Panagiotis

    Recently, cyber security has become an important topic on the agenda of many organisations. It is already widely acknowledged that attacks do happen, and decision makers face the problem of how to respond. As it is almost impossible to secure a complex system completely, it is important to have an

  17. ExpertiSZe, a tool for determining the effects of social security legislation

    NARCIS (Netherlands)

    Svensson, Jorgen S.; Kordelaar, P.J.M.; Kordelaar, P.J.M.; Wassink, J.G.J.; van 't Eind, G.J.; Grütters, C.A.F.M.

    1992-01-01

    Social security legislation plays an important role in the Dutch society. In view of this, the effects of social security legislation have to be analysed carefully before new legislation can be made. Due to the growing complexity of legislation on the social security domain, this analysis has become

  18. Analysis of decision procedures for a sequence of inventory periods

    International Nuclear Information System (INIS)

    Avenhaus, R.

    1982-07-01

    Optimal test procedures for a sequence of inventory periods will be discussed. Starting with a game theoretical description of the conflict situation between the plant operator and the inspector, the objectives of the inspector as well as the general decision theoretical problem will be formulated. In the first part the objective of 'secure' detection will be emphasized which means that only at the end of the reference time a decision is taken by the inspector. In the second part the objective of 'timely' detection will be emphasized which will lead to sequential test procedures. At the end of the paper all procedures will be summarized, and in view of the multitude of procedures available at the moment some comments about future work will be given. (orig./HP) [de

  19. CANDU radiotoxicity inventories estimation: A calculated experiment cross-check for data verification and validation

    International Nuclear Information System (INIS)

    Pavelescu, Alexandru Octavian; Cepraga, Dan Gabriel

    2007-01-01

    This paper is related to the Clearance Potential Index, Ingestion and Inhalation Hazard Factors of the nuclear spent fuel and radioactive wastes. This study required a complex activity that consisted of various phases such us: the acquisition, setting up, validation and application of procedures, codes and libraries. The paper reflects the validation phase of this study. Its objective was to compare the measured inventories of selected actinide and fission products radionuclides in an element from a Pickering CANDU reactor with inventories predicted using a recent version of the ORIGEN-ARP from SCALE 5 coupled with the time dependent cross sections library, CANDU 28.lib, produced by the sequence SAS2H of SCALE 4.4a. In this way, the procedures, codes and libraries for the characterization of radioactive material in terms of radioactive inventories, clearance, and biological hazard factors are being qualified and validated, in support for the safety management of the radioactive wastes. (authors)

  20. Fukushima Daiichi Radionuclide Inventories

    Energy Technology Data Exchange (ETDEWEB)

    Cardoni, Jeffrey N. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jankovsky, Zachary Kyle [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-09-01

    Radionuclide inventories are generated to permit detailed analyses of the Fukushima Daiichi meltdowns. This is necessary information for severe accident calculations, dose calculations, and source term and consequence analyses. Inventories are calculated using SCALE6 and compared to values predicted by international researchers supporting the OECD/NEA's Benchmark Study on the Accident at Fukushima Daiichi Nuclear Power Station (BSAF). Both sets of inventory information are acceptable for best-estimate analyses of the Fukushima reactors. Consistent nuclear information for severe accident codes, including radionuclide class masses and core decay powers, are also derived from the SCALE6 analyses. Key nuclide activity ratios are calculated as functions of burnup and nuclear data in order to explore the utility for nuclear forensics and support future decommissioning efforts.

  1. A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS

    Directory of Open Access Journals (Sweden)

    U. Latha

    2013-08-01

    Full Text Available The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints information. The proposed system comprised of three phases namely, fingerprint reconstruction, feature extraction and development of trigon based security protocol. In fingerprint reconstruction, the different crack variance level finger prints images are reconstructed by the M-band Dual Tree Complex Wavelet Transform (DTCWT. After that features are extracted by binarization. A set of finger print images are utilized to evaluate the performance of security protocol and the result from this process guarantees the healthiness of the proposed trigon based security protocol. The implementation results show the effectiveness of proposed trigon based security protocol in protecting the finger print information and the achieved improvement in image reconstruction and the security process.

  2. The USA Nr Inventory: Dominant Sources and Primary Transport Pathways

    Science.gov (United States)

    Sabo, R. D.; Clark, C.; Sobota, D. J.; Compton, J.; Cooter, E. J.; Schwede, D. B.; Bash, J. O.; Rea, A.; Dobrowolski, J. P.

    2016-12-01

    Efforts to mitigate the deleterious effects of excess reactive nitrogen (Nr) on human health and ecosystem goods and service while ensuring food, biofuel, and fiber availability, is one of the most pressing environmental management challenges of this century. Effective management of Nr requires up to date inventories that quantitatively characterize the sources, transport, and transformation of Nr through the environment. The inherent complexity of the nitrogen cycle, however, through multiple exchange points across air, water, and terrestrial media, renders such inventories difficult to compile and manage. Previous Nr Inventories are for 2002 and 2007, and used data sources that have since been improved. Thus, this recent inventory will substantially advance the methodology across many sectors of the inventory (e.g. deposition and biological fixation in crops and natural systems) and create a recent snapshot that is sorely needed for policy planning and trends analysis. Here we use a simple mass balance approach to estimate the input-output budgets for all United States Geologic Survey Hydrologic Unit Code-8 watersheds. We focus on a recent year (i.e. 2012) to update the Nr Inventory, but apply the analytical approach for multiple years where possible to assess trends through time. We also compare various sector estimates using multiple methodologies. Assembling datasets that account for new Nr inputs into watersheds (e.g., atmospheric NOy deposition, food imports, biologic N fixation) and internal fluxes of recycled Nr (e.g., manure, Nr emmissions/volatilization) provide an unprecedented, data driven computation of N flux. Input-output budgets will offer insight into 1) the dominant sources of Nr in a watershed (e.g., food imports, atmospheric N deposition, or fertilizer), 2) the primary loss pathways for Nr (e.g., crop N harvest, volatilization/emissions), and 3) what watersheds are net sources versus sinks of Nr. These insights will provide needed clarity for

  3. Modelling the System of Ensuring the Investment Security

    Directory of Open Access Journals (Sweden)

    Moroz Maxim O.

    2017-11-01

    Full Text Available The article explores approaches to modelling the system of ensuring the investment security. Necessity of observance of investment security of Ukraine has been substantiated. The author’s own vision of the modelling essentials has been provided. The eligibility for consideration of the system of ensuring the investment security of Ukraine in the functional, structural, process, formative, and factor aspects has been proved. The target setting and tasks of a functional model of the system of ensuring the investment security have been defined. The functions, subjects, organizational-economic mechanisms of the system of ensuring the investment security of Ukraine have been characterized. A structural model of the system of ensuring the investment security has been presented. Special attention has been given to the definition of objects of direct and indirect influence, control and controlled subsystems, aggregate of indicators, safe levels, principles of formation of the investment security system. The process and formative models of the system of ensuring the investment security, as well as the algorithm of the complex assessment of the level of investment security, were analyzed in detail. Measures to ensure the investment security of Ukraine have been defined.

  4. The complexity of an investment competition dynamical model with imperfect information in a security market

    International Nuclear Information System (INIS)

    Xin Baogui; Ma Junhai; Gao Qin

    2009-01-01

    We present a nonlinear discrete dynamical model of investment competition with imperfect information for N heterogeneous oligopolists in a security market. In this paper, our focus is on a given three-dimensional model which exhibits highly rich dynamical behaviors. Based on Wen's Hopf bifurcation criterion [Wen GL. Criterion to identify Hopf bifurcations in maps of arbitrary dimension. Phys Rev E 2005;72:026201-3; Wen GL, Xu DL, Han X. On creation of Hopf bifurcations in discrete-time nonlinear systems. Chaos 2002;12(2):350-5] and Kuznetsov's normal form theory [Kuznetsov YA. Elements of applied bifurcation theory. New York: Springer-Verlag; 1998. p. 125-37], we study the model's stability, criterion and direction of Neimark-Sacker bifurcation. Moreover, we numerically simulate a complexity evolution route: fixed point, closed invariant curve, double closed invariant curves, fourfold closed invariant curves, strange attractor, period-3 closed invariant curve, period-3 2-tours, period-4 closed invariant curve, period-4 2-tours.

  5. Effects of Inventory Bias on Landslide Susceptibility Calculations

    Science.gov (United States)

    Stanley, T. A.; Kirschbaum, D. B.

    2017-01-01

    Many landslide inventories are known to be biased, especially inventories for large regions such as Oregon's SLIDO or NASA's Global Landslide Catalog. These biases must affect the results of empirically derived susceptibility models to some degree. We evaluated the strength of the susceptibility model distortion from postulated biases by truncating an unbiased inventory. We generated a synthetic inventory from an existing landslide susceptibility map of Oregon, then removed landslides from this inventory to simulate the effects of reporting biases likely to affect inventories in this region, namely population and infrastructure effects. Logistic regression models were fitted to the modified inventories. Then the process of biasing a susceptibility model was repeated with SLIDO data. We evaluated each susceptibility model with qualitative and quantitative methods. Results suggest that the effects of landslide inventory bias on empirical models should not be ignored, even if those models are, in some cases, useful. We suggest fitting models in well-documented areas and extrapolating across the study region as a possible approach to modeling landslide susceptibility with heavily biased inventories.

  6. A Case Study on E - Banking Security – When Security Becomes Too Sophisticated for the User to Access Their Information

    OpenAIRE

    Aaron M. French

    2012-01-01

    While eBanking security continues to increase in sophistication to protect against threats, the usability of the eBanking decreases resulting in poor security behaviors by the users. The current research evaluates se curity risks and measures taken for eBanking solutions. A case study is presented describing how increased complexity decreases vulnerabilities online but increases vulnerabilities from internal threats and eBanking users

  7. A Secure Information Framework with APRQ Properties

    Science.gov (United States)

    Rupa, Ch.

    2017-08-01

    Internet of the things is the most trending topics in the digital world. Security issues are rampant. In the corporate or institutional setting, security risks are apparent from the outset. Market leaders are unable to use the cryptographic techniques due to their complexities. Hence many bits of private information, including ID, are readily available for third parties to see and to utilize. There is a need to decrease the complexity and increase the robustness of the cryptographic approaches. In view of this, a new cryptographic technique as good encryption pact with adjacency, random prime number and quantum code properties has been proposed. Here, encryption can be done by using quantum photons with gray code. This approach uses the concepts of physics and mathematics with no external key exchange to improve the security of the data. It also reduces the key attacks by generation of a key at the party side instead of sharing. This method makes the security more robust than with the existing approach. Important properties of gray code and quantum are adjacency property and different photons to a single bit (0 or 1). These can reduce the avalanche effect. Cryptanalysis of the proposed method shows that it is resistant to various attacks and stronger than the existing approaches.

  8. Inventory Investment and the Real Interest Rate

    OpenAIRE

    Junayed, Sadaquat; Khan, Hashmat

    2009-01-01

    The relationship between inventory investment and the real interest rate has been difficult to assess empirically. Recent work has proposed a linear-quadratic inventory model with time-varying discount factor to identify the effects of the real interest rate on inventory investment. The authors show that this framework does not separately identify the effects of real interest rate on inventory investment from variables that determine the expected marginal cost of production. In other words, t...

  9. INVENTORY MANAGEMENT IN THE ENTERPRISE THROUGH THE APPLICATION OF IFRS 2 INVENTORIES

    OpenAIRE

    Svetlozar Stefanov

    2016-01-01

    The focus in the article is on the issues of valuation and presentation of the inventories under the meaning on the International Accounting Standard 2 Inventories. The Standard provides guidance on the determination of costs of finished products and its recognition as and expense in the production and sale finished products, including guidance for determination of the net realizable value. The latter is defined as the estimated selling price less the estimated costs of complet...

  10. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    Science.gov (United States)

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  11. Safety Analysis Report for Packaging, Y-12 National Security Complex, Model ES-3100 Package with Bulk HEU Contents

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, James [Y-12 National Security Complex, Oak Ridge, TN (United States); Goins, Monty [Y-12 National Security Complex, Oak Ridge, TN (United States); Paul, Pran [Y-12 National Security Complex, Oak Ridge, TN (United States); Wilkinson, Alan [Y-12 National Security Complex, Oak Ridge, TN (United States); Wilson, David [Y-12 National Security Complex, Oak Ridge, TN (United States)

    2015-09-03

    This safety analysis report for packaging (SARP) presents the results of the safety analysis prepared in support of the Consolidated Nuclear Security, LLC (CNS) request for licensing of the Model ES-3100 package with bulk highly enriched uranium (HEU) contents and issuance of a Type B(U) Fissile Material Certificate of Compliance. This SARP, published in the format specified in the Nuclear Regulatory Commission (NRC) Regulatory Guide 7.9 and using information provided in UCID-21218 and NRC Regulatory Guide 7.10, demonstrates that the Y-12 National Security Complex (Y-12) ES-3100 package with bulk HEU contents meets the established NRC regulations for packaging, preparation for shipment, and transportation of radioactive materials given in Title 10, Part 71, of the Code of Federal Regulations (CFR) [10 CFR 71] as well as U.S. Department of Transportation (DOT) regulations for packaging and shipment of hazardous materials given in Title 49 CFR. To protect the health and safety of the public, shipments of adioactive materials are made in packaging that is designed, fabricated, assembled, tested, procured, used, maintained, and repaired in accordance with the provisions cited above. Safety requirements addressed by the regulations that must be met when transporting radioactive materials are containment of radioactive materials, radiation shielding, and assurance of nuclear subcriticality.

  12. Secure Web Developers Needed!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    You’re about to launch a new website? Cool!! With today’s web programming languages like PHP, Java, Python or Perl, complex websites can be created, easily fulfilling all your use cases. But hold on. Did you ever think about how easily this can be abused? Attackers today are already using automatic tools which can quickly and easily find and exploit vulnerable web applications.   Web applications often suffer from security vulnerabilities, i.e. design flaws or programming bugs that remained undetected during the whole software development cycle. In production these vulnerabilities become security holes, providing an opportunity for exploitation, and can pose immense security risks (and there is no reason to believe that CERN is immune to this). The costs associated with eliminating these bugs could be loosely described by the "1:10:100 rule", i.e. the relative costs for fixing are 1:10:100 for fixing them in the programming:testing:production phases. Thus, the...

  13. Assessment of complex dissociative disorder patients and simulated dissociation in forensic contexts.

    Science.gov (United States)

    Brand, Bethany L; Webermann, Aliya R; Frankel, A Steven

    Few assessors receive training in assessing dissociation and complex dissociative disorders (DDs). Potential differential diagnoses include anxiety, mood, psychotic, substance use, and personality disorders, as well as exaggeration and malingering. Individuals with DDs typically elevate on many clinical and validity scales on psychological tests, yet research indicates that they can be distinguished from DD simulators. Becoming informed about the testing profiles of DD individuals and DD simulators can improve the accuracy of differential diagnoses in forensic settings. In this paper, we first review the testing profiles of individuals with complex DDs and contrast them with DD simulators on assessment measures used in forensic contexts, including the Minnesota Multiphasic Personality Inventory-2 (MMPI-2), Personality Assessment Inventory (PAI), and the Structured Inventory of Reported Symptoms (SIRS), as well as dissociation-specific measures such as the Dissociative Experiences Scale (DES) and Structured Clinical Interview for DSM-IV Dissociative Disorders (SCID-D-R). We then provide recommendations for assessing complex trauma and dissociation through the aforementioned assessments. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. Accelerated secure GUI for virtualized mobile handsets

    OpenAIRE

    Danisevskis, Janis

    2017-01-01

    Mobile handsets, especially so-called smartphones, have become an indispensable commodity in day-to-day life. However, their growing versatility came at the cost of ever-increasing complexity, and this raises severe security concerns. This has come to be especially problematic for corporate IT infrastructures, because it is increasingly hard to reconcile personal user expectations with corporate security demands. A particular manifestation of this quandary is the bring-your-own-device (BYOD) ...

  15. Generic Adaptively Secure Searchable Phrase Encryption

    Directory of Open Access Journals (Sweden)

    Kissel Zachary A.

    2017-01-01

    Full Text Available In recent years searchable symmetric encryption has seen a rapid increase in query expressiveness including keyword, phrase, Boolean, and fuzzy queries. With this expressiveness came increasingly complex constructions. Having these facts in mind, we present an efficient and generic searchable symmetric encryption construction for phrase queries. Our construction is straightforward to implement, and is proven secure under adaptively chosen query attacks (CQA2 in the random oracle model with an honest-but-curious adversary. To our knowledge, this is the first encrypted phrase search system that achieves CQA2 security. Moreover, we demonstrate that our document collection preprocessing algorithm allows us to extend a dynamic SSE construction so that it supports phrase queries. We also provide a compiler theorem which transforms any CQA2-secure SSE construction for keyword queries into a CQA2-secure SSE construction that supports phrase queries.

  16. Improvement of economic security management system of municipalities with account of transportation system development: methods of assessment

    Science.gov (United States)

    Khe Sun, Pak; Vorona-Slivinskaya, Lubov; Voskresenskay, Elena

    2017-10-01

    The article highlights the necessity of a complex approach to assess economic security of municipalities, which would consider municipal management specifics. The approach allows comparing the economic security level of municipalities, but it does not describe parameter differences between compared municipalities. Therefore, there is a second method suggested: parameter rank order method. Applying these methods allowed to figure out the leaders and outsiders of the economic security among municipalities and rank all economic security parameters according to the significance level. Complex assessment of the economic security of municipalities, based on the combination of the two approaches, allowed to assess the security level more accurate. In order to assure economic security and equalize its threshold values, one should pay special attention to transportation system development in municipalities. Strategic aims of projects in the area of transportation infrastructure development in municipalities include the following issues: contribution into creating and elaborating transportation logistics and manufacture transport complexes, development of transportation infrastructure with account of internal and external functions of the region, public transport development, improvement of transport security and reducing its negative influence on the environment.

  17. 48 CFR 2907.300 - Availability of inventory.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Availability of inventory... PLANNING ACQUISITION PLANNING Contractor Versus Government Performance 2907.300 Availability of inventory. The Department of Labor's FAIR Act inventory of commercial activities performed by federal employees...

  18. Lawrence Livermore National Laboratory Safeguards and Security quarterly progress report ending March 31, 1996

    Energy Technology Data Exchange (ETDEWEB)

    Davis, B.; Davis, G.; Johnson, D.; Mansur, D.L.; Ruhter, W.D.; Strait, R.S.

    1996-04-01

    LLNL carries out safeguards and security activities for DOE Office of Safeguards and Security (OSS) and other organizations within and outside DOE. LLNL is supporting OSS in 6 areas: safeguards technology, safeguards and materials accountability, computer security--distributed systems, complex-wide access control, standardization of security systems, and information technology and security center. This report describes the activities in each of these areas.

  19. Safeguards and security benefits of project straight-line

    International Nuclear Information System (INIS)

    Jaeger, C.D.; Waddoups, I.G.

    1995-01-01

    As a result of a number of events the inventory of fissile materials no longer in nuclear weapons in the United States is increasing. This has led to a growing concern regarding the potential for theft and/or diversion and accountability of this material. Straight-Line is a project whose purpose is to demonstrate a site-independent system to monitor stored nuclear material (e.g. plutonium) and integrate the collection, processing and dissemination of information regarding this material. Safeguards and security (S ampersand S) goals of this project include data transfer of information on nuclear material to appropriate users to enhance S ampersand S, continuous on-line accountability, reduction of hands-on access to nuclear materials, incorporation of information security technologies, and early detection of tampering or unauthorized material movement. This paper addresses threat considerations, S ampersand S requirements, S ampersand S objectives, and issues for the Straight-Line project. S ampersand S features and benefits of this project are discussed with respect to existing item monitoring systems and/or other material tracking systems being developed

  20. Demand differentiation in inventory systems

    NARCIS (Netherlands)

    Kleijn, M.J.

    1998-01-01

    This book deals with inventory systems where customer demand is categorised into different classes. Most inventory systems do not take into account individual customer preferences for a given product, and therefore handle all demand in a similar way. Nowadays, market segmentation has become a

  1. Denmark's national inventory report 2006

    DEFF Research Database (Denmark)

    Illerup, Jytte Boll; Lyck, Erik; Nielsen, Ole-Kenneth

    This report is Denmark's National Inventory Report reported to the Conference of the Parties under the United Nations Framework Convention on Climate Change (UNFCCC) due by April 2006. The report contains information on Denmark's inventories for all years' from 1990 to 2004 for CO....

  2. Gridded National Inventory of U.S. Methane Emissions

    Science.gov (United States)

    Maasakkers, Joannes D.; Jacob, Daniel J.; Sulprizio, Melissa P.; Turner, Alexander J.; Weitz, Melissa; Wirth, Tom; Hight, Cate; DeFigueiredo, Mark; Desai, Mausami; Schmeltz, Rachel; hide

    2016-01-01

    We present a gridded inventory of US anthropogenic methane emissions with 0.1 deg x 0.1 deg spatial resolution, monthly temporal resolution, and detailed scale dependent error characterization. The inventory is designed to be onsistent with the 2016 US Environmental Protection Agency (EPA) Inventory of US Greenhouse Gas Emissionsand Sinks (GHGI) for 2012. The EPA inventory is available only as national totals for different source types. We use a widerange of databases at the state, county, local, and point source level to disaggregate the inventory and allocate the spatial and temporal distribution of emissions for individual source types. Results show large differences with the EDGAR v4.2 global gridded inventory commonly used as a priori estimate in inversions of atmospheric methane observations. We derive grid-dependent error statistics for individual source types from comparison with the Environmental Defense Fund (EDF) regional inventory for Northeast Texas. These error statistics are independently verified by comparison with the California Greenhouse Gas Emissions Measurement (CALGEM) grid-resolved emission inventory. Our gridded, time-resolved inventory provides an improved basis for inversion of atmospheric methane observations to estimate US methane emissions and interpret the results in terms of the underlying processes.

  3. Vendor Managed Inventory:Retail Industry Perspective of Malaysia

    OpenAIRE

    Madjlesi Taklimi, Zahra

    2011-01-01

    The concept of Vendor Managed Inventory (VMI) radically changes a traditional inventory management. Under the typical business model, the buyer or retailer is in total control of the timing and volume of the order, in order placing and managing the inventory plan. Whereas VMI is a supply chain initiative where the supplier is responsible for all decisions regarding inventories at the retailers, i.e. under VMI program the supplier is authorized to manage inventories of agreed-upon stock-keepin...

  4. Fusion program research materials inventory

    International Nuclear Information System (INIS)

    Roche, T.K.; Wiffen, F.W.; Davis, J.W.; Lechtenberg, T.A.

    1984-01-01

    Oak Ridge National Laboratory maintains a central inventory of research materials to provide a common supply of materials for the Fusion Reactor Materials Program. This will minimize unintended material variations and provide for economy in procurement and for centralized record keeping. Initially this inventory is to focus on materials related to first-wall and structural applications and related research, but various special purpose materials may be added in the future. The use of materials from this inventory for research that is coordinated with or otherwise related technically to the Fusion Reactor Materials Program of DOE is encouraged

  5. Data Driven Tuning of Inventory Controllers

    DEFF Research Database (Denmark)

    Huusom, Jakob Kjøbsted; Santacoloma, Paloma Andrade; Poulsen, Niels Kjølstad

    2007-01-01

    A systematic method for criterion based tuning of inventory controllers based on data-driven iterative feedback tuning is presented. This tuning method circumvent problems with modeling bias. The process model used for the design of the inventory control is utilized in the tuning...... as an approximation to reduce time required on experiments. The method is illustrated in an application with a multivariable inventory control implementation on a four tank system....

  6. 40 CFR 710.4 - Scope of the inventory.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Scope of the inventory. 710.4 Section... ACT TSCA CHEMICAL INVENTORY REGULATIONS General Provisions § 710.4 Scope of the inventory. (a... is extracted from air by any means, will automatically be included in the inventory under the...

  7. Solving a Novel Inventory Location Model with Stochastic Constraints and (R,s,S Inventory Control Policy

    Directory of Open Access Journals (Sweden)

    Guillermo Cabrera

    2013-01-01

    Full Text Available We solve a novel inventory-location model with a stochastic capacity constraint based on a periodic inventory control (ILM-PR policy. The ILM-PR policy implies several changes with regard to other previous models proposed in the literature, which consider continuous review as their inventory policy. One of these changes is the inclusion of the undershoot concept, which has not been considered in previous ILM models in the literature. Based on our model, we are able to design a distribution network for a two-level supply chain, addressing both warehouse location and customer assignment decisions, whilst taking into consideration several aspects of inventory planning, in particular, evaluating the impact of the inventory control review period on the network configuration and system costs. Because the model is a very hard-to solve combinatorial nonlinear optimisation problem, we implemented two heuristics to solve it, namely, Tabu Search and Particle Swarm Optimisation. These approaches were tested over small instances in which they were able to find the optimal solution in just a few seconds. Because the model is a new one, a set of medium-size instances is provided that can be useful as a benchmark in future research. The heuristics showed a good convergence rate when applied to those instances. The results confirm that decision making over the inventory control policy has effects on the distribution network design.

  8. Clarifying Resilience in the Context of Homeland Security

    Science.gov (United States)

    2013-03-01

    Resilience Is a Complex Adaptive System of Systems ( CASoS ) ....60 4. Resilience Is Experienced and Demonstrated in Different Ways ..60 5. Resilience Is...The inclusion of a resilience module into existing homeland security training programs broadens the practitioner’s knowledge base from a basic level...psychology offer several considerations for the homeland security practitioner. The first consideration maintains that a de -emphasis on the

  9. Risk-informed, performance-based safety-security interface

    International Nuclear Information System (INIS)

    Mrowca, B.; Eltawila, F.

    2012-01-01

    Safety-security interface is a term that is used as part of the commercial nuclear power security framework to promote coordination of the many potentially adverse interactions between plant security and plant safety. Its object is to prevent the compromise of either. It is also used to describe the concept of building security into a plant's design similar to the long standing practices used for safety therefore reducing the complexity of the operational security while maintaining or enhancing overall security. With this in mind, the concept of safety-security interface, when fully implemented, can influence a plant's design, operation and maintenance. It brings the approach use for plant security to one that is similar to that used for safety. Also, as with safety, the application of risk-informed techniques to fully implement and integrate safety and security is important. Just as designers and operators have applied these techniques to enhance and focus safety, these same techniques can be applied to security to not only enhance and focus the security but also to aid in the implementation of effective techniques to address the safety-security interfaces. Implementing this safety-security concept early within the design process can prevent or reduce security vulnerabilities through low cost solutions that often become difficult and expensive to retrofit later in the design and/or post construction period. These security considerations address many of the same issues as safety in ensuring that the response of equipment and plant personnel are adequate. That is, both safety and security are focused on reaching safe shutdown and preventing radiological release. However, the initiation of challenges and the progression of actions in response these challenges and even the definitions of safe shutdown can be considerably different. This paper explores the techniques and limitations that are employed to fully implement a risk-informed, safety-security interface

  10. Nuclear material inventory estimation in solvent extraction contactors

    International Nuclear Information System (INIS)

    Beyerlein, A.; Geldard, J.

    1986-06-01

    This report describes the development of simple nuclear material (uranium and plutonium) inventory relations for mixer-settler solvent extraction contactors used in reprocessing spent nuclear fuels. The relations are developed for light water reactor fuels where the organic phase is 30% tri-n-butylphosphate (TBP) by volume. For reprocessing plants using mixer-settler contactors as much as 50% of the nuclear material within the contactors is contained in A type (aqueous to organic extraction) contactors. Another very significant portion of the contactor inventory is in the partitioning contactors. The stripping contactors contain a substantial uranium inventory but contain a very small plutonium inventory (about 5 to 10% of the total contactor inventory). The simplified inventory relations developed in this work for mixer-settler contactors reproduce the PUBG databases within about a 5% standard deviation. They can be formulated to explicitly show the dependence of the inventory on nuclear material concentrations in the aqueous feed streams. The dependence of the inventory on contactor volumes, phase volume ratios, and acid and TBP concentrations are implicitly contained in parameters that can be calculated for a particular reprocessing plant from nominal flow sheet data. The terms in the inventory relations that represent the larger portion of the inventory in A type and partitioning contactors can be extended to pulsed columns virtually without change

  11. Managing the maintenance inventory of a cement manufacturer

    Directory of Open Access Journals (Sweden)

    Morne Eloff

    2013-11-01

    Full Text Available Inventory management is a crucial aspect of managing a company successfully. This is even more apparent in the case of maintenance inventories for production equipment, which impact directly on production equipment efficiency. This is a typical inventory management issue for a cement manufacturer that faces the problem of managing its maintenance inventories optimally when certain maintenance items have exceptionally long lead times (100 weeks and values in excess of R500 000. An assessment of the cement manufacturer’s approach to managing its maintenance inventories indicated various shortcomings, which have resulted in a significant level of obsolescence. One approach to managing maintenance inventories efficiently is to implement a classification of the inventory items in terms of their criticality to the cement production process. The critical nature of a component could be established through a risk-based approach (minimisation of the risk of production loss and taking into account the type of maintenance (planned vs unplanned that the component is required for. A risk-based approach should form the basis of the maintenance inventory management of the cement manufacturer as this would allow the cement manufacturer to utilise other inventory management methods effectively. In addition, it is important to ensure that employees are well versed in the different inventory management approaches utilised and that high levels of integration between departments are pursued.

  12. Concepts for inventory verification in critical facilities

    International Nuclear Information System (INIS)

    Cobb, D.D.; Sapir, J.L.; Kern, E.A.; Dietz, R.J.

    1978-12-01

    Materials measurement and inventory verification concepts for safeguarding large critical facilities are presented. Inspection strategies and methods for applying international safeguards to such facilities are proposed. The conceptual approach to routine inventory verification includes frequent visits to the facility by one inspector, and the use of seals and nondestructive assay (NDA) measurements to verify the portion of the inventory maintained in vault storage. Periodic verification of the reactor inventory is accomplished by sampling and NDA measurement of in-core fuel elements combined with measurements of integral reactivity and related reactor parameters that are sensitive to the total fissile inventory. A combination of statistical sampling and NDA verification with measurements of reactor parameters is more effective than either technique used by itself. Special procedures for assessment and verification for abnormal safeguards conditions are also considered. When the inspection strategies and inventory verification methods are combined with strict containment and surveillance methods, they provide a high degree of assurance that any clandestine attempt to divert a significant quantity of fissile material from a critical facility inventory will be detected. Field testing of specific hardware systems and procedures to determine their sensitivity, reliability, and operational acceptability is recommended. 50 figures, 21 tables

  13. Inventory Abstraction

    International Nuclear Information System (INIS)

    Leigh, C.

    2000-01-01

    The purpose of the inventory abstraction as directed by the development plan (CRWMS M and O 1999b) is to: (1) Interpret the results of a series of relative dose calculations (CRWMS M and O 1999c, 1999d). (2) Recommend, including a basis thereof, a set of radionuclides that should be modeled in the Total System Performance Assessment in Support of the Site Recommendation (TSPA-SR) and the Total System Performance Assessment in Support of the Final Environmental Impact Statement (TSPA-FEIS). (3) Provide initial radionuclide inventories for the TSPA-SR and TSPA-FEIS models. (4) Answer the U.S. Nuclear Regulatory Commission (NRC)'s Issue Resolution Status Report ''Key Technical Issue: Container Life and Source Term'' (CLST IRSR) (NRC 1999) key technical issue (KTI): ''The rate at which radionuclides in SNF [Spent Nuclear Fuel] are released from the EBS [Engineered Barrier System] through the oxidation and dissolution of spent fuel'' (Subissue 3). The scope of the radionuclide screening analysis encompasses the period from 100 years to 10,000 years after the potential repository at Yucca Mountain is sealed for scenarios involving the breach of a waste package and subsequent degradation of the waste form as required for the TSPA-SR calculations. By extending the time period considered to one million years after repository closure, recommendations are made for the TSPA-FEIS. The waste forms included in the inventory abstraction are Commercial Spent Nuclear Fuel (CSNF), DOE Spent Nuclear Fuel (DSNF), High-Level Waste (HLW), naval Spent Nuclear Fuel (SNF), and U.S. Department of Energy (DOE) plutonium waste. The intended use of this analysis is in TSPA-SR and TSPA-FEIS. Based on the recommendations made here, models for release, transport, and possibly exposure will be developed for the isotopes that would be the highest contributors to the dose given a release to the accessible environment. The inventory abstraction is important in assessing system performance because

  14. Safety and security of radioactive sources in Taiwan

    International Nuclear Information System (INIS)

    Tsay Yeousong; Guan Channan; Cheng Yungfu

    2008-01-01

    In Taiwan, the safety and security of radioactive sources is a high priority issue. Ionizing Radiation Protection Act (IRPA) and correlating regulations had been in place for effective control of the safety and security of radioactive sources since 2003. For increased control of sealed radioactive sources, Atomic Energy Council (AEC) established in March 2004 an online reporting system through the Internet, assisting source owners in reporting their sources every month. To conform to the Code of Conduct on the Safety and Security of Radioactive Sources and the Categorization of radioactive sources, published by the International Atomic Energy Agency (IAEA), AEC has taken the following actions: 1. Established an inventory of Categories 1 and 2 radioactive sources, and implemented the Import/Export Provisions of the Code. 2. Required that each licensee shall control access to Categories 1 and 2 radioactive sources, and AEC will conduct project inspection on Categories 1 and 2 radioactive sources. 3. Using a new radiation warning symbol by ISO for Categories 1 and 2 radioactive sources. The reinforcement of orphaned source control was implemented as early as 1995. All steel mills have installed radiation detectors to scan incoming metal scrap to prevent accidental smelting of radioactive sources. The results of this effort will be discussed in the paper. The above measures are examples for demonstrating AEC's commitment to reinforced control of radioactive sources. AEC will continue to protect public safety and security, ensuring that Taiwan's regulatory system in radiation protection conforms to international standards. (author)

  15. A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks

    Directory of Open Access Journals (Sweden)

    Shibo Luo

    2015-12-01

    Full Text Available Software-Defined Networking-based Mobile Networks (SDN-MNs are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.

  16. A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks.

    Science.gov (United States)

    Luo, Shibo; Dong, Mianxiong; Ota, Kaoru; Wu, Jun; Li, Jianhua

    2015-12-17

    Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.

  17. Automation of Space Inventory Management

    Science.gov (United States)

    Fink, Patrick W.; Ngo, Phong; Wagner, Raymond; Barton, Richard; Gifford, Kevin

    2009-01-01

    This viewgraph presentation describes the utilization of automated space-based inventory management through handheld RFID readers and BioNet Middleware. The contents include: 1) Space-Based INventory Management; 2) Real-Time RFID Location and Tracking; 3) Surface Acoustic Wave (SAW) RFID; and 4) BioNet Middleware.

  18. Concepts for reducing nuclear utility inventory carrying costs

    International Nuclear Information System (INIS)

    Graybill, R.E.; DiCola, F.E.; Solanas, C.H.

    1985-01-01

    Nuclear utilities are under pressure to reduce their operating and maintenance expenses such that the total cost of generating electricity through nuclear power remains an economically attractive option. One area in which expenses may be reduced is total inventory carrying cost. The total inventory carrying cost consists of financing an inventory, managing the inventory, assuring quality, engineering of acceptable parts specifications, and procuring initial and replenishment stock. Concepts and methodology must be developed to reduce the remaining expenses of a utility's total inventory carrying cost. Currently, two concepts exist: pooled inventory management system (PIMS), originally established by General Electric Company and a group of boiling water reactor owners, and Nuclear Parts Associates' (NUPA) shared inventory management program (SIMP). Both concepts share or pool parts and components among utilities. The SIMP program objectives and technical activities are summarized

  19. Using Project Complexity Determinations to Establish Required Levels of Project Rigor

    Energy Technology Data Exchange (ETDEWEB)

    Andrews, Thomas D.

    2015-10-01

    This presentation discusses the project complexity determination process that was developed by National Security Technologies, LLC, for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office for implementation at the Nevada National Security Site (NNSS). The complexity determination process was developed to address the diversity of NNSS project types, size, and complexity; to fill the need for one procedure but with provision for tailoring the level of rigor to the project type, size, and complexity; and to provide consistent, repeatable, effective application of project management processes across the enterprise; and to achieve higher levels of efficiency in project delivery. These needs are illustrated by the wide diversity of NNSS projects: Defense Experimentation, Global Security, weapons tests, military training areas, sensor development and testing, training in realistic environments, intelligence community support, sensor development, environmental restoration/waste management, and disposal of radioactive waste, among others.

  20. 27 CFR 46.203 - Record (book) inventory requirements.

    Science.gov (United States)

    2010-04-01

    ... quantities of articles actually on hand as if a physical inventory had taken place on April 1, 2009. See the... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Record (book) inventory... Cigarette Tubes Held for Sale on April 1, 2009 Inventories § 46.203 Record (book) inventory requirements. (a...

  1. Performance of a cognitive load inventory during simulated handoffs: Evidence for validity.

    Science.gov (United States)

    Young, John Q; Boscardin, Christy K; van Dijk, Savannah M; Abdullah, Ruqayyah; Irby, David M; Sewell, Justin L; Ten Cate, Olle; O'Sullivan, Patricia S

    2016-01-01

    Advancing patient safety during handoffs remains a public health priority. The application of cognitive load theory offers promise, but is currently limited by the inability to measure cognitive load types. To develop and collect validity evidence for a revised self-report inventory that measures cognitive load types during a handoff. Based on prior published work, input from experts in cognitive load theory and handoffs, and a think-aloud exercise with residents, a revised Cognitive Load Inventory for Handoffs was developed. The Cognitive Load Inventory for Handoffs has items for intrinsic, extraneous, and germane load. Students who were second- and sixth-year students recruited from a Dutch medical school participated in four simulated handoffs (two simple and two complex cases). At the end of each handoff, study participants completed the Cognitive Load Inventory for Handoffs, Paas' Cognitive Load Scale, and one global rating item for intrinsic load, extraneous load, and germane load, respectively. Factor and correlational analyses were performed to collect evidence for validity. Confirmatory factor analysis yielded a single factor that combined intrinsic and germane loads. The extraneous load items performed poorly and were removed from the model. The score from the combined intrinsic and germane load items associated, as predicted by cognitive load theory, with a commonly used measure of overall cognitive load (Pearson's r = 0.83, p load during handoffs may be measured via a self-report measure. Additional work is required to develop an adequate measure of extraneous load.

  2. Inventory Management and Its Effects on Customer Satisfaction

    Directory of Open Access Journals (Sweden)

    Mehfooz Ali

    2012-07-01

    Full Text Available This study examines how inventory management puts positive impact on customer satisfaction and how easily we can check the performance. It also helps retailers to put their inventories in proper order which tells them about demand and supply of their inventories. Proper inventory management system reduces the risk of short of inventories which reduce the cost of lost customers. The objective of the study is to minimize the risk of dissatisfaction of customers and found how to sustain customer satisfaction with the help of proper inventories system. This paper also outlines significant relationship between Customer needs, Quality with variable of prime interest. Poor association has been found between performance and customer satisfaction.

  3. Optimal Control Inventory Stochastic With Production Deteriorating

    Science.gov (United States)

    Affandi, Pardi

    2018-01-01

    In this paper, we are using optimal control approach to determine the optimal rate in production. Most of the inventory production models deal with a single item. First build the mathematical models inventory stochastic, in this model we also assume that the items are in the same store. The mathematical model of the problem inventory can be deterministic and stochastic models. In this research will be discussed how to model the stochastic as well as how to solve the inventory model using optimal control techniques. The main tool in the study problems for the necessary optimality conditions in the form of the Pontryagin maximum principle involves the Hamilton function. So we can have the optimal production rate in a production inventory system where items are subject deterioration.

  4. IT Security Support for the Spaceport Command Control Systems Development Ground Support Development Operations

    Science.gov (United States)

    Branch, Drew A.

    2014-01-01

    Security is one of the most if not the most important areas today. After the several attacks on the United States, security everywhere has heightened from airports to the communication among the military branches legionnaires. With advanced persistent threats (APT's) on the rise following Stuxnet, government branches and agencies are required, more than ever, to follow several standards, policies and procedures to reduce the likelihood of a breach. Attack vectors today are very advanced and are going to continue to get more and more advanced as security controls advance. This creates a need for networks and systems to be in an updated and secured state in a launch control system environment. FISMA is a law that is mandated by the government to follow when government agencies secure networks and devices. My role on this project is to ensure network devices and systems are in compliance with NIST, as outlined in FISMA. I will achieve this by providing assistance with security plan documentation and collection, system hardware and software inventory, malicious code and malware scanning, and configuration of network devices i.e. routers and IDS's/IPS's. In addition, I will be completing security assessments on software and hardware, vulnerability assessments and reporting, and conducting patch management and risk assessments. A guideline that will help with compliance with NIST is the SANS Top 20 Critical Controls. SANS Top 20 Critical Controls as well as numerous security tools, security software and the conduction of research will be used to successfully complete the tasks given to me. This will ensure compliance with FISMA and NIST, secure systems and a secured network. By the end of this project, I hope to have carried out the tasks stated above as well as gain an immense knowledge about compliance, security tools, networks and network devices, as well as policies and procedures.

  5. 26 CFR 1.1013-1 - Property included in inventory.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 11 2010-04-01 2010-04-01 true Property included in inventory. 1.1013-1 Section... inventory. The basis of property required to be included in inventory is the last inventory value of such property in the hands of the taxpayer. The requirements with respect to the valuation of an inventory are...

  6. TWO-PARAMETER IRT MODEL APPLICATION TO ASSESS PROBABILISTIC CHARACTERISTICS OF PROHIBITED ITEMS DETECTION BY AVIATION SECURITY SCREENERS

    Directory of Open Access Journals (Sweden)

    Alexander K. Volkov

    2017-01-01

    Full Text Available The modern approaches to the aviation security screeners’ efficiency have been analyzedand, certain drawbacks have been considered. The main drawback is the complexity of ICAO recommendations implementation concerning taking into account of shadow x-ray image complexity factors during preparation and evaluation of prohibited items detection efficiency by aviation security screeners. Х-ray image based factors are the specific properties of the x-ray image that in- fluence the ability to detect prohibited items by aviation security screeners. The most important complexity factors are: geometric characteristics of a prohibited item; view difficulty of prohibited items; superposition of prohibited items byother objects in the bag; bag content complexity; the color similarity of prohibited and usual items in the luggage.The one-dimensional two-parameter IRT model and the related criterion of aviation security screeners’ qualification have been suggested. Within the suggested model the probabilistic detection characteristics of aviation security screeners are considered as functions of such parameters as the difference between level of qualification and level of x-ray images com- plexity, and also between the aviation security screeners’ responsibility and structure of their professional knowledge. On the basis of the given model it is possible to consider two characteristic functions: first of all, characteristic function of qualifica- tion level which describes multi-complexity level of x-ray image interpretation competency of the aviation security screener; secondly, characteristic function of the x-ray image complexity which describes the range of x-ray image interpretation com- petency of the aviation security screeners having various training levels to interpret the x-ray image of a certain level of com- plexity. The suggested complex criterion to assess the level of the aviation security screener qualification allows to evaluate his or

  7. J&K Fitness Supply Company: Auditing Inventory

    Science.gov (United States)

    Clikeman, Paul M.

    2012-01-01

    This case provides auditing students with an opportunity to perform substantive tests of inventory using realistic-looking source documents. The learning objectives are to help students understand: (1) the procedures auditors perform in order to test inventory; (2) the source documents used in auditing inventory; and (3) the types of misstatements…

  8. 30 CFR 72.520 - Diesel equipment inventory.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Diesel equipment inventory. 72.520 Section 72... Mines § 72.520 Diesel equipment inventory. (a) The operator of each mine that utilizes diesel equipment underground, shall prepare and submit in writing to the District Manager, an inventory of diesel equipment...

  9. Secure Block Ciphers - Cryptanalysis and Design

    DEFF Research Database (Denmark)

    Tiessen, Tyge

    be applied to the AES can be transferred to this block cipher, albeit with a higher attack complexity. The second publication introduces a new block cipher family which is targeted for new applications in fully homomorphic encryption and multi-party computation. We demonstrate the soundness of the design...... is encrypted using so-called symmetric ciphers. The security of our digital infrastructure thus rests at its very base on their security. The central topic of this thesis is the security of block ciphers – the most prominent form of symmetric ciphers. This thesis is separated in two parts. The first part...... is an introduction to block ciphers and their cryptanalysis, the second part contains publications written and published during the PhD studies. The first publication evaluates the security of a modification of the AES in which the choice of S-box is unknown to the attacker. We find that some of the attacks that can...

  10. The secure reactors

    International Nuclear Information System (INIS)

    Hannerz, K.

    1987-01-01

    The principle of Process Inherent Ultimate Safety (PIUS) is a new approach to Light Water Reactor (LWR) safety that could represent a solution to the present problems of public distrust, regulatory maze and plant design complexity plaguing the nuclear industry in many countries. A unique thermohydraulic design of the primary system ensures core integrity, and thereby gurarantees freedom from significant releases of radioactive matter, in all credible emergencies. This is accomplished entirely without reliance on potentially failure prone engineered safety systems and with immunity to operator mistskes. The potential for human fallibility to cause accidents is thereby drastically reduced in an easily understood way. Plant design can be greatly simplified because redundant, diverse safety systems are no longer needed. The paper briefly describes the PIUS design principle and the two SECURE reactor designs based on it, i.e. SECURE-H for district heating and process steam and SECURE-P (usually known simply as PIUS) for electric power generation. Demonstration of simulated system over-all thermohydraulic function and transient response in a large electrically heated test loop is described and results from some component development work is given. (author)

  11. Social Security Number Protection Laws: State-by-State Summary Table

    Science.gov (United States)

    Data Quality Campaign, 2011

    2011-01-01

    As state policymakers implement statewide longitudinal data systems that collect, store, link and share student-level data, it is critical that they understand applicable privacy and data security standards and laws designed to ensure the privacy, security, and confidentiality of that data. To help state policymakers navigate this complex legal…

  12. Inventory of programs. Calculation of the isotope inventory after a hypothetical accident at the Cofrentes Nuclear power

    International Nuclear Information System (INIS)

    Albendea, M.

    2014-01-01

    Iberdrola is developing a new application to calculate the inventory of radiological material, then of a hypothetical accident, with the name of inventory. This application allows you to calculate the inventory isotopic, analysers and accurate thermal of all or part of the nucleus of the plant of Cofrentes, even of any single element, based on its history of irradiation and specific periods of decay, since the reactor at any time after the shutdown. (Author)

  13. Efficient Secure Multiparty Subset Computation

    Directory of Open Access Journals (Sweden)

    Sufang Zhou

    2017-01-01

    Full Text Available Secure subset problem is important in secure multiparty computation, which is a vital field in cryptography. Most of the existing protocols for this problem can only keep the elements of one set private, while leaking the elements of the other set. In other words, they cannot solve the secure subset problem perfectly. While a few studies have addressed actual secure subsets, these protocols were mainly based on the oblivious polynomial evaluations with inefficient computation. In this study, we first design an efficient secure subset protocol for sets whose elements are drawn from a known set based on a new encoding method and homomorphic encryption scheme. If the elements of the sets are taken from a large domain, the existing protocol is inefficient. Using the Bloom filter and homomorphic encryption scheme, we further present an efficient protocol with linear computational complexity in the cardinality of the large set, and this is considered to be practical for inputs consisting of a large number of data. However, the second protocol that we design may yield a false positive. This probability can be rapidly decreased by reexecuting the protocol with different hash functions. Furthermore, we present the experimental performance analyses of these protocols.

  14. Inventories in the Australian business cycle

    OpenAIRE

    Chindamo, Phillip

    2010-01-01

    This Economics Research Note examines inventories in the business cycle for Australia covering the period since the mid 1980s. The Australian Bureau of Statistics (ABS) defines inventories as all materials etc., work in progress and finished goods owned by a business, whether held at locations of the business or elsewhere. These items are usually held by businesses in anticipation of a product’s sale. Inventory investment is counted as an additional contribution to gross domestic product (...

  15. Deteriorating Inventory Model for Chilled Food

    OpenAIRE

    Yang, Ming-Feng; Tseng, Wei-Chung

    2015-01-01

    With many aspects that affect inventory policy, product perishability is a critical aspect of inventory policy. Most goods will deteriorate during storage and their original value will decline or be lost. Therefore, deterioration should be taken into account in inventory practice. Chilled food products are very common consumer goods that are, in fact, perishable. If the chilled food quality declines over time customers are less likely to buy it. The value the chilled food retains is, however,...

  16. Riparian Inventory

    Data.gov (United States)

    Kansas Data Access and Support Center — This dataset is a digital representation of the 1:24,000 Land Use Riparian Areas Inventory for the state of Kansas. The dataset includes a 100 foot buffer around all...

  17. 48 CFR 645.608 - Screening of contractor inventory.

    Science.gov (United States)

    2010-10-01

    ... inventory. 645.608 Section 645.608 Federal Acquisition Regulations System DEPARTMENT OF STATE CONTRACT MANAGEMENT GOVERNMENT PROPERTY Reporting, Redistribution, and Disposal of Contractor Inventory 645.608 Screening of contractor inventory. ...

  18. The homeland security enterprise where do we fit?

    OpenAIRE

    Marlowe, Kirk S.

    2009-01-01

    CHDS State/Local Homeland security is a responsibility to be shared across the nation. Resource demands, differing cultures, and varying motivations result in frustration and confusion that conflict with the nation's need to collaborate and cooperate. As such, the homeland security enterprise appears to be imploding from turf battles, suspicion, poor communication, competitive funding, and mistrust, which cause stakeholders to wonder where they fit in this complex, interdependent env...

  19. Performance comparison of secure comparison protocols

    NARCIS (Netherlands)

    Kerschbaum, F.; Biswas, D.; Hoogh, de S.J.A.

    2009-01-01

    Secure multiparty computation (SMC) has gained tremendous importance with the growth of the Internet and e-commerce, where mutually untrusted parties need to jointly compute a function of their private inputs. However, SMC protocols usually have very high computational complexities, rendering them

  20. KENDALI OPTIMAL DARI SISTEM INVENTORI DENGAN PENINGKATAN DAN PENURUNAN BARANG

    Directory of Open Access Journals (Sweden)

    P Affandi

    2016-03-01

    Full Text Available Terdapat banyak permasalahan yang melibatkan teori sistem dan teori kontrol serta aplikasinya. Contohnya, beberapa referensi teori  yang mengaplikasikan teori kontrol ke dalam masalah inventori. Masalah klasik dalam masalah inventori adalah bagaimana mengatur perubahan permintaan konsumen pada sebuah produk barang jadi. Selain mengalami penurunan yang disebabkan kerusakan dan kemerosotan, ternyata inventori juga bisa mengalami peningkatan. Biasanya, inventori yang mengalami peningkatan terjadi pada inventori yang melakukan proses produksi yang berlangsung secara terus menerus; Sedangkan permintaan sedikit juga terjadi pada inventori makhluk hidup yang mengalami perkembangbiakan. Selanjutnya, hal ini mengakibatkan terjadinya peningkatan jumlah inventori. Dapat disimpulkan bahwa secara teori, sistem Inventori dapat mengalami peningkatan dan penurunan. Masalah ini dapat dimodelkan dan diselesaikan dengan menggunakan teknik kontrol optimal, sehingga akan diperoleh nilai optimal tingkat inventori dan rata-rata produksi optimal.There are many problems involving the theory of systems, control theory and its application. For example, some reference theories apply control theory to the inventory problems. The classical problem in the inventory problem was how to manage changes in consumer demand in a finished product. Besides it declines caused by damage and deterioration, evidently inventory can also increase. Typically, inventories that increased were inventories have production process continues over time; While little demand also occurred in inventories of living beings who have breeding. evidently, this led to an increasing in the amount of inventory. It can be concluded that, in theory, inventory system can be increased and decreased. This problem can be modeled and solved using optimal control techniques, so it will be obtained an optimum value of inventory levels and the average optimal production.

  1. Safeguards and security considerations for automated and robotic systems

    Energy Technology Data Exchange (ETDEWEB)

    Jordan, S.E.; Jaeger, C.D.

    1994-09-01

    Within the reconfigured Nuclear Weapons Complex there will be a large number of automated and robotic (A&R) systems because of the many benefits derived from their use. To meet the overall security requirements of a facility, consideration must be given to those systems that handle and process nuclear material. Since automation and robotics is a relatively new technology, not widely applied to the Nuclear Weapons Complex, safeguards and security (S&S) issues related to these systems have not been extensively explored, and no guidance presently exists. The goal of this effort is to help integrate S&S into the design of future A&R systems. Towards this, the authors first examined existing A and R systems from a security perspective to identify areas of concern and possible solutions of these problems. They then were able to develop generalized S&S guidance and design considerations for automation and robotics.

  2. Secure Skyline Queries on Cloud Platform.

    Science.gov (United States)

    Liu, Jinfei; Yang, Juncheng; Xiong, Li; Pei, Jian

    2017-04-01

    Outsourcing data and computation to cloud server provides a cost-effective way to support large scale data storage and query processing. However, due to security and privacy concerns, sensitive data (e.g., medical records) need to be protected from the cloud server and other unauthorized users. One approach is to outsource encrypted data to the cloud server and have the cloud server perform query processing on the encrypted data only. It remains a challenging task to support various queries over encrypted data in a secure and efficient way such that the cloud server does not gain any knowledge about the data, query, and query result. In this paper, we study the problem of secure skyline queries over encrypted data. The skyline query is particularly important for multi-criteria decision making but also presents significant challenges due to its complex computations. We propose a fully secure skyline query protocol on data encrypted using semantically-secure encryption. As a key subroutine, we present a new secure dominance protocol, which can be also used as a building block for other queries. Finally, we provide both serial and parallelized implementations and empirically study the protocols in terms of efficiency and scalability under different parameter settings, verifying the feasibility of our proposed solutions.

  3. Chinese version of the separation-individuation inventory.

    Science.gov (United States)

    Tam, Wai-Cheong Carl; Shiah, Yung-Jong; Chiang, Shih-Kuang

    2003-08-01

    The importance of the separation-individuation process in object relations theory is well known in disciplines of psychology, counseling, and human development. Based on the Separation-Individuation Inventory of Christenson and Wilson, which measures the manifestations of disturbances in this process, a Chinese version of the inventory was developed. For college students Cronbach coefficient alpha was .89, and test-retest reliability over 28 days was .77. The scores of the inventory had positive correlations with both the number of borderline personality characteristics and the Individualism-Collectivism Scale, respectively. Also, the mean score on the inventory of patients diagnosed with borderline personality disorder was significantly higher than that of the two normal control groups (ns = 564). Thus the inventory possessed satisfactory construct validity. Cultural differences regarding the separation-individuation process need to be investigated further.

  4. Denmark's national inventory report 2005 - submitted under the United Nations frameword convention on climate change. 1990-2003. Emission Inventories

    Energy Technology Data Exchange (ETDEWEB)

    Illerup, J.B.

    2005-12-20

    This report is Denmkark's National Inventory Report (NIR) due by 15 April 2005 to the United Nations Framework Convention on Climate Change (UNFCCC). the report contains information on Denmark's inventories for all years from 1990 to 2003. The structure of the report is in accordance with the UNFCCC Guidelines on reporting and review and the report includes detailed information on the inventories for all years from the base year to the year of the current annual inventory submission, in order to ensure the transparency of the inventory. (au)

  5. A Broker Framework for Secure and Cost-Effective Business Process Deployment on Multiple Clouds

    OpenAIRE

    Goettelmann , Elio; Dahman , Karim; Gateau , Benjamin; Godart , Claude

    2014-01-01

    International audience; Security risk management on information systems provides security guarantees while controlling costs. But security risk assessments can be very complex, especially in a cloud context where data is dis-tributed over multiple environments. To prevent costs from becoming the only cloud selection factor, while disregarding security, we propose a method for performing multiple cloud security risk assessments. In this paper we present a broker framework for balancing costs a...

  6. 76 FR 64980 - Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving a Proposed...

    Science.gov (United States)

    2011-10-19

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65548; File No. SR-ISE-2011-39] Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving a Proposed Rule Change Relating to Complex Orders October 13, 2011. I. Introduction On July 1, 2011, the International Securities Exchange...

  7. Resolving inventory differences

    International Nuclear Information System (INIS)

    Weber, J.H.; Clark, J.P.

    1991-01-01

    Determining the cause of an inventory difference (ID) that exceeds warning or alarm limits should not only involve investigation into measurement methods and reexamination of the model assumptions used in the calculation of the limits, but also result in corrective actions that improve the quality of the accountability measurements. An example illustrating methods used by Savannah River Site (SRS) personnel to resolve an ID is presented that may be useful to other facilities faced with a similar problem. After first determining that no theft or diversion of material occurred and correcting any accountability calculation errors, investigation into the IDs focused on volume and analytical measurements, limit of error of inventory difference (LEID) modeling assumptions, and changes in the measurement procedures and methods prior to the alarm. There had been a gradual gain trend in IDs prior to the alarm which was reversed by the alarm inventory. The majority of the NM in the facility was stored in four large tanks which helped identify causes for the alarm. The investigation, while indicating no diversion or theft, resulted in changes in the analytical method and in improvements in the measurement and accountability that produced a 67% improvement in the LEID

  8. Intentional risk management through complex networks analysis

    CERN Document Server

    Chapela, Victor; Moral, Santiago; Romance, Miguel

    2015-01-01

    This book combines game theory and complex networks to examine intentional technological risk through modeling. As information security risks are in constant evolution,  the methodologies and tools to manage them must evolve to an ever-changing environment. A formal global methodology is explained  in this book, which is able to analyze risks in cyber security based on complex network models and ideas extracted from the Nash equilibrium. A risk management methodology for IT critical infrastructures is introduced which provides guidance and analysis on decision making models and real situations. This model manages the risk of succumbing to a digital attack and assesses an attack from the following three variables: income obtained, expense needed to carry out an attack, and the potential consequences for an attack. Graduate students and researchers interested in cyber security, complex network applications and intentional risk will find this book useful as it is filled with a number of models, methodologies a...

  9. Food and nutrition security indicators: A review

    OpenAIRE

    Pangaribowo, Evita Hanie; Gerber, Nicolas; Torero, Maximo

    2013-01-01

    As the problems of food and nutrition insecurity are currently more complex, identifying and choosing relevant indicators is crucial. This paper identifies the need to go beyond the state-of-the-art because current FNS indicators do not account for the short-term economic shocks which have been identified as key factors for food and nutrition security. As the nature of food and nutrition security status is different between short- term and long-term causes, there is a need to differentiate be...

  10. Shortening the Xerostomia Inventory

    Science.gov (United States)

    Thomson, William Murray; van der Putten, Gert-Jan; de Baat, Cees; Ikebe, Kazunori; Matsuda, Ken-ichi; Enoki, Kaori; Hopcraft, Matthew; Ling, Guo Y

    2011-01-01

    Objectives To determine the validity and properties of the Summated Xerostomia Inventory-Dutch Version in samples from Australia, The Netherlands, Japan and New Zealand. Study design Six cross-sectional samples of older people from The Netherlands (N = 50), Australia (N = 637 and N = 245), Japan (N = 401) and New Zealand (N = 167 and N = 86). Data were analysed using the Summated Xerostomia Inventory-Dutch Version. Results Almost all data-sets revealed a single extracted factor which explained about half of the variance, with Cronbach’s alpha values of at least 0.70. When mean scale scores were plotted against a “gold standard” xerostomia question, statistically significant gradients were observed, with the highest score seen in those who always had dry mouth, and the lowest in those who never had it. Conclusion The Summated Xerostomia Inventory-Dutch Version is valid for measuring xerostomia symptoms in clinical and epidemiological research. PMID:21684773

  11. Balancing flexibility and inventory in repair inventory systems

    NARCIS (Netherlands)

    Haas, de H.F.M.; Martin, H.H.

    1995-01-01

    In repair inventory systems, failed units are exchanged for serviceable units upon failure. The probability that serviceable units are available to support the exchange process can be used as a measure for the performance of the system. This measure is commonly called the expected fill rate. The

  12. Safety and security of radioactive materials - The Indian scenario

    International Nuclear Information System (INIS)

    Kumar, A.; Agarwal, S.P.; Tripathi, U.B.; Murthy, B.K.S.; Bhatt, B.C.

    2001-01-01

    spite of regulatory procedures and inventory control in force, there have been a few cases of accidents/incidents involving missing/lost sources which might have ended up as orphan sources. The probable causes of these incidents are: (a) unsecured temporary storage pending installation, (b) temporary suspension of the use of sources, (c) unsecured storage after decommissioning, (d) poor quality of labelling and marking on packages during their transport, (e) improper packages used for their transport, (f) temporary storage prior to disposal of sources, (g) illicit procurement of imported sources and (h) mobile/portable industrial radiography devices left unattended. The incidents which occurred during 1986-1999 in various applications of radioactive sources are presented in the following sections: Industrial Radiography, Nucleonic Gauges/Well Logging Devices, and Medical Brachytherapy Sources. A well-established regulatory infrastructure coupled with regular surveillance procedures and inventory of all the sources in use and disuse will minimise the incidents of orphan sources. Such an inventory should be updated constantly. Procedures should be devised for maintaining strict control in respect to safe and secure storage of radioactive material, specially when the sources are used in public domain e.g. industrial radiography. Regular training/awareness programmes for users, maintenance staff/administrators; periodical surveillance of practices and a regulatory procedure to obtain a periodic radiation safety status from the user, say once in 6/12 months, will go a long way in ensuring safety and security of the sources and minimising chances of their loss

  13. Price and inventory dynamics in petroleum product markets

    International Nuclear Information System (INIS)

    Considine, T.J.; Heo, Eunnyeong

    2000-01-01

    Unlike many studies of commodity inventory behavior, this paper estimates a model with endogenous spot and forward prices, inventories, production, and net imports. Our application involves markets for refined petroleum products in the United States. Our model is built around the supply and demand for storage. We estimate the model using Generalized Method of Moments and perform dynamic, simultaneous simulations to estimate the impacts of supply and demand shocks. Supply curves for the industry are inelastic and upward sloping. High inventory levels depress prices. Inventories fall in response to higher sales, consistent with production smoothing. Under higher input prices, refiners reduce their stocks of crude oil but increase their product inventories, consistent with cost smoothing. In some cases, imports of products are more variable than production or inventories. 25 refs

  14. CoC Housing Inventory Count Reports

    Data.gov (United States)

    Department of Housing and Urban Development — Continuum of Care (CoC) Homeless Assistance Programs Housing Inventory Count Reports are a snapshot of a CoC’s housing inventory, available at the national and state...

  15. The emerging architecture of a regional security complex in the Lake ...

    African Journals Online (AJOL)

    This article explores the emerging regional security architecture to fight terrorism and insurgency in the Lake Chad Basin (LCB). It diagnoses the evolution of the Lake Chad Basin Commission (LCBC) as a sub-regional organization that unites Chad, Cameroon, Niger and Nigeria. In particular, the article critically investigates ...

  16. Presentation and Analysis of a Worldwide Database of Earthquake-Induced Landslide Inventories : Earthquake-Induced Landslide Inventories

    NARCIS (Netherlands)

    Tanyas, Hakan; Van Westen, Cees J.; Allstadt, Kate E.; Anna Nowicki Jessee, M.; Görüm, Tolga; Jibson, Randall W.; Godt, Jonathan W.; Sato, Hiroshi P.; Schmitt, Robert G.; Marc, Odin; Hovius, Niels

    2017-01-01

    Earthquake‐induced landslide (EQIL) inventories are essential tools to extend our knowledge of the relationship between earthquakes and the landslides they can trigger. Regrettably, such inventories are difficult to generate and therefore scarce, and the available ones differ in terms of their

  17. Networked inventory management systems: materializing supply chain management

    NARCIS (Netherlands)

    Verwijmeren, M.A.A.P.; Vlist, van der P.; Donselaar, van K.H.

    1996-01-01

    Aims to explain the driving forces for networked inventory management. Discusses major developments with respect to customer requirements, networked organizations and networked inventory management. Presents high level specifications of networked inventory management information systems (NIMISs).

  18. Master planning for successful safeguard/security systems engineering

    International Nuclear Information System (INIS)

    Bruckner, D.G.

    1987-01-01

    The development and phased implementation of an overall master plan for weapons systems and facilities engaged in the complexities of high technology provides a logical road map for system accomplishment. An essential factor in such a comprehensive plan is development of an integrated systems security engineering plan. Some DOD programs use new military regulations and policy directives to mandate consideration of the safeguard/security disciplines be considered for weapons systems and facilities during the entire life cycle of the program. The emphasis is to make certain the weapon system and applicable facilities have complementary security features. Together they must meet the needs of the operational mission and, at the same time, provide the security forces practical solutions to their requirements. This paper discusses the process of meshing the safe- guards/security requirements with an overall the master plan and the challenges attendant to this activity

  19. Risk Analysis and Security Countermeasure Selection

    CERN Document Server

    Norman, Thomas L

    2009-01-01

    Explains how to evaluate the appropriateness of security countermeasures, from a cost-effectiveness perspective. This title guides readers from basic principles to complex processes in a step-by-step fashion, evaluating DHS-approved risk assessment methods, including CARVER, API/NPRA, RAMCAP, and various Sandia methodologies

  20. Cost-effectiveness of Security Measures: A model-based Framework

    DEFF Research Database (Denmark)

    Pieters, Wolter; Probst, Christian W.; Lukszo, Zofia

    2014-01-01

    Recently, cyber security has become an important topic on the agenda of many organisations. It is already widely acknowledged that attacks do happen, and decision makers face the problem of how to respond. As it is almost impossible to secure a complex system completely, it is important to have...... an adequate estimate of the effectiveness of security measures when making investment decisions. Risk concepts are known in principle, but estimating the effectiveness of countermeasure proves to be difficult and cannot be achieved by qualitative approaches only. In this chapter, the authors consider...... the question of how to guarantee cost-effectiveness of security measures. They investigate the possibility of using existing frameworks and tools, the challenges in a security context as opposed to a safety context, and directions for future research....

  1. Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations

    Directory of Open Access Journals (Sweden)

    Gill R. Tsouri

    2009-01-01

    Full Text Available A method of overloading subcarriers by multiple transmitters to secure OFDM in wireless time-varying channels is proposed and analyzed. The method is based on reverse piloting, superposition modulation, and joint decoding. It makes use of channel randomness, reciprocity, and fast decorrelation in space to secure OFDM with low overheads on encryption, decryption, and key distribution. These properties make it a good alternative to traditional software-based information security algorithms in systems where the costs associated with such algorithms are an implementation obstacle. A necessary and sufficient condition for achieving information theoretic security in accordance with channel and system parameters is derived. Security by complexity is assessed for cases where the condition for information theoretic security is not satisfied. In addition, practical means for implementing the method are derived including generating robust joint constellations, decoding data with low complexity, and mitigating the effects of imperfections due to mobility, power control errors, and synchronization errors.

  2. Nuclear safety and energy supply security: conflict or goal?

    International Nuclear Information System (INIS)

    Kutas, S.

    2006-01-01

    Energy generation and safety problems at the nuclear power plant have been analysed. Nuclear power plants are operated on the commercial basis in many countries today. Safety and security in energy generation and distribution is a complex problem. Energy supply reliability, security energy price and other issues should be co-ordinated and solved at the same time. Decentralisation and deregulation means new challenges for regulatory bodies and assurance of security. International co-operation in this field is very important. Western European Nuclear Regulators' Association (WENRA) consolidates efforts of regulatory bodies of European countries in order to harmonize approaches of nuclear safety. Nuclear Safety, and security of energy supply is the task and goal at the same time. (author)

  3. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  4. INVENTORY ABSTRACTION

    International Nuclear Information System (INIS)

    Ragan, G.

    2001-01-01

    The purpose of the inventory abstraction, which has been prepared in accordance with a technical work plan (CRWMS M andO 2000e for/ICN--02 of the present analysis, and BSC 2001e for ICN 03 of the present analysis), is to: (1) Interpret the results of a series of relative dose calculations (CRWMS M andO 2000c, 2000f). (2) Recommend, including a basis thereof, a set of radionuclides that should be modeled in the Total System Performance Assessment in Support of the Site Recommendation (TSPA-SR) and the Total System Performance Assessment in Support of the Final Environmental Impact Statement (TSPA-FEIS). (3) Provide initial radionuclide inventories for the TSPA-SR and TSPA-FEIS models. (4) Answer the U.S. Nuclear Regulatory Commission (NRC)'s Issue Resolution Status Report ''Key Technical Issue: Container Life and Source Term'' (CLST IRSR) key technical issue (KTI): ''The rate at which radionuclides in SNF [spent nuclear fuel] are released from the EBS [engineered barrier system] through the oxidation and dissolution of spent fuel'' (NRC 1999, Subissue 3). The scope of the radionuclide screening analysis encompasses the period from 100 years to 10,000 years after the potential repository at Yucca Mountain is sealed for scenarios involving the breach of a waste package and subsequent degradation of the waste form as required for the TSPA-SR calculations. By extending the time period considered to one million years after repository closure, recommendations are made for the TSPA-FEIS. The waste forms included in the inventory abstraction are Commercial Spent Nuclear Fuel (CSNF), DOE Spent Nuclear Fuel (DSNF), High-Level Waste (HLW), naval Spent Nuclear Fuel (SNF), and U.S. Department of Energy (DOE) plutonium waste. The intended use of this analysis is in TSPA-SR and TSPA-FEIS. Based on the recommendations made here, models for release, transport, and possibly exposure will be developed for the isotopes that would be the highest contributors to the dose given a release

  5. Unified Communications for Space Inventory Management

    Science.gov (United States)

    Gifford, Kevin K.; Fink, Patrick W.; Barton, Richard; Ngo, Phong H.

    2009-01-01

    To help assure mission success for long-duration exploration activities, NASA is actively pursuing wireless technologies that promote situational awareness and autonomy. Wireless technologies are typically extensible, offer freedom from wire tethers, readily support redundancy, offer potential for decreased wire weight, and can represent dissimilar implementation for increased reliability. In addition, wireless technologies can enable additional situational awareness that otherwise would be infeasible. For example, addition of wired sensors, the need for which might not have been apparent at the outset of a program, night be extremely costly due in part to the necessary routing of cables through the vehicle. RFID, or radio frequency identification, is a wireless technology with the potential for significant savings and increased reliability and safety in space operations. Perhaps the most obvious savings relate to the application of inventory management. A fully automated inventory management system is highly desirable for long-term sustaining operations in space environments. This assertion is evidenced by inventory activities on the International Space Station, which represents the most extensive inventory tracking experience base in the history of space operations. In the short tern, handheld RFID readers offer substantial savings owing to reduced crew time for inventory audits. Over the long term, a combination of improved RFID technology and operational concepts modified to fully utilize the technology should result in space based inventory management that is highly reliable and requires very little crew time. In addition to inventory management, RFID is likely to find space applications in real-time location and tracking systems. These could vary from coarse-resolution RFID portals to the high resolution afforded by ultra-wideband (UWB) RFID. Longer range RFID technologies that leverage passive surface acoustic wave (SAW) devices are being investigated to

  6. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  7. Technical Basis for PNNL Beryllium Inventory

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, Michelle Lynn

    2014-07-09

    The Department of Energy (DOE) issued Title 10 of the Code of Federal Regulations Part 850, “Chronic Beryllium Disease Prevention Program” (the Beryllium Rule) in 1999 and required full compliance by no later than January 7, 2002. The Beryllium Rule requires the development of a baseline beryllium inventory of the locations of beryllium operations and other locations of potential beryllium contamination at DOE facilities. The baseline beryllium inventory is also required to identify workers exposed or potentially exposed to beryllium at those locations. Prior to DOE issuing 10 CFR 850, Pacific Northwest Nuclear Laboratory (PNNL) had documented the beryllium characterization and worker exposure potential for multiple facilities in compliance with DOE’s 1997 Notice 440.1, “Interim Chronic Beryllium Disease.” After DOE’s issuance of 10 CFR 850, PNNL developed an implementation plan to be compliant by 2002. In 2014, an internal self-assessment (ITS #E-00748) of PNNL’s Chronic Beryllium Disease Prevention Program (CBDPP) identified several deficiencies. One deficiency is that the technical basis for establishing the baseline beryllium inventory when the Beryllium Rule was implemented was either not documented or not retrievable. In addition, the beryllium inventory itself had not been adequately documented and maintained since PNNL established its own CBDPP, separate from Hanford Site’s program. This document reconstructs PNNL’s baseline beryllium inventory as it would have existed when it achieved compliance with the Beryllium Rule in 2001 and provides the technical basis for the baseline beryllium inventory.

  8. Potential Causes of Significant Inventory Differences at Bulk Handling Facilities and the Importance of Inventory Difference Action Levels

    International Nuclear Information System (INIS)

    Homer, Alan; O’Hagan, Brendan

    2015-01-01

    Accountancy for nuclear material can be split into two categories. Firstly, where possible, accountancy should be in terms of items that can be transferred as discrete packages and their contents fixed at the time of their creation. All items must remain accounted for at all times, and a single missing item is considered significant. Secondly, where nuclear material is unconstrained, for example in a reprocessing plant where it can change form, there is an uncertainty that relates to the amount of material present in any location. Cumulatively, these uncertainties can be summed and provide a context for any estimate of material in a process. Any apparent loss or gain between what has been physically measured within a facility during its physical inventory take and what is reported within its nuclear material accounts is known as an inventory difference. The cumulative measurement uncertainties can be used to set an action level for the inventory difference so that if an inventory difference is observed outside of such action levels, the difference is classified as significant and an investigation to find the root cause(s) is required. The purpose of this paper is to explore the potential causes of significant inventory differences and to provide a framework within which an inventory difference investigation can be carried out.

  9. 48 CFR 245.608 - Screening of contractor inventory.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Screening of contractor inventory. 245.608 Section 245.608 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS... Disposal of Contractor Inventory 245.608 Screening of contractor inventory. ...

  10. The role of inventory management in Canadian economic fluctuations

    OpenAIRE

    Hung-Hay Lau

    1996-01-01

    Swings in inventory investment have traditionally played a major role in Canadian business cycles. However, advances in inventory-control techniques and the reduced uncertainty associated with lower inflation have enabled firms to manage their inventories much more tightly and effectively. This article examines recent developments in the management of non-farm business inventories in Canada at both the aggregate and the sectoral level and looks at implications for the role of inventories as a...

  11. Canada`s greenhouse gas emissions inventory

    Energy Technology Data Exchange (ETDEWEB)

    Jaques, A. [Environment Canada, Ottawa, ON (Canada)

    1998-09-01

    In 1994, Canada was the seventh largest global emitter of CO{sub 2}. The Kyoto Protocol has made it necessary to continue to improve methods for developing emissions inventories. An emissions inventory was defined as `a comprehensive account of air pollutant emissions and associated data from sources within the inventory area over a specified time frame that can be used to determine the effect of emissions on the environment`. The general approach is to compile large-scale emission estimates under averaged conditions for collective sources and sectors, using data that is available on a sectoral, provincial and national basis. Ideally, continuous emission monitors should be used to develop emissions inventories. Other needed improvements include additional research on emissions data, and increased support for international negotiations on reporting policies and related methodologies, verification procedures and adjustments. 1 ref., 5 figs.

  12. Being in Community: A Food Security Themed Approach to Public Scholarship

    Science.gov (United States)

    Harrison, Barbara; Nelson, Connie; Stroink, Mirella

    2013-01-01

    For six years the Food Security Research Network at Lakehead University, Canada, has been engaged in an interdisciplinary theme-based service-learning initiative focusing on food security. Informed by complexity theory, the contextual fluidity partnership model brings community partners, students, and faculty into a nexus through which new…

  13. Oil inventories should be based on margins, supply reliability

    International Nuclear Information System (INIS)

    Waguespack, K.; Cantor, B.D.

    1996-01-01

    US oil inventories have plummeted to their lowest recorded levels this year, leading industry observers to conclude that refiners have adopted new just-in-time (JIT) inventory policies. Total crude oil inventories are about 300 million bbl -- 8% below the 10-year average. Distillate inventories posted similar declines this year because of unusually cold winter temperatures and refiners' reluctance to build sufficient stocks in the autumn months. Gasoline stocks are 20% below the 10-year average at 200 million bbl, despite forecasts of record-high gasoline demand this summer. The sudden drop in crude and product inventories this year is widely considered a sign that refiners have implemented JIT, signaling a permanent shift to reduced stocks. The authors submit that the shift towards reduced oil inventories is not related to a concerted adoption of JIT by US refiners, and that oil inventory management decisions should instead be based on refining margins and supply reliability. The paper discusses the JIT revolution and the optimal-inventory model

  14. Safeguards and security considerations for automated and robotic systems

    International Nuclear Information System (INIS)

    Jordan, S.E.; Jaeger, C.D.

    1994-01-01

    Within the reconfigured Nuclear Weapons Complex there will be a large number of automated and robotic (A ampersand R) systems because of the many benefits derived from their use. To meet the overall security requirements of a facility, consideration must be given to those systems that handle and process nuclear material. Since automation and robotics is a relatively new technology, not widely applied to the Nuclear Weapons Complex, safeguards and security (S ampersand S) issues related to these systems have not been extensively explored, and no guidance presently exists. The goal of this effort is to help integrate S ampersand S into the design of future A ampersand R systems. Towards this, the authors first examined existing A and R systems from a security perspective to identify areas of concern and possible solutions of these problems. They then were able to develop generalized S ampersand S guidance and design considerations for automation and robotics

  15. Safeguards and security considerations for automated and robotic systems

    International Nuclear Information System (INIS)

    Jordan, S.E.; Jaeger, C.D.

    1994-01-01

    Within the reconfigured Nuclear Weapons Complex there will be a large number of automated and robotic (A ampersand R) systems because of the many benefits derived from their use. To meet the overall security requirements of a facility, consideration must be given to those systems that handle and process nuclear material. Since automation and robotics is a relatively new technology, not widely applied to the Nuclear Weapons Complex, safeguards and security (S ampersand S) issues related to these systems have not been extensively explored, and no guidance presently exists. The goal of this effort is to help integrate S ampersand S into the design of future A ampersand R systems. Towards this, we first examined existing A ampersand R systems from a security perspective to identify areas of concern and possible solutions to these problems. We then were able to develop generalized S ampersand S guidance and design considerations for automation and robotics

  16. Field nondestructive assay measurements as applied to process inventories

    International Nuclear Information System (INIS)

    Westsik, G.A.

    1979-08-01

    An annual process equipment holdup inventory measurement program for a plutonium processing plant was instituted by Rockwell Hanford Operations (Rockwell) at Richland, Washington. The inventories, performed in 1977 and 1978, were designed to improve plutonium accountability and control. The inventory method used field nondestructive assay (NDA) measurement techniques with portable electronics and sodium iodide detectors. Access to and movement of plutonium in work areas was curtailed during the inventory process using administrative controls. Comparison of the two annual inventories showed good reproducibility of results within the calculated error ranges. For items where no plutonium movement occurred and which contained greater than 20 grams plutonium, the average measurement difference between the two inventories was 22%. The procedures and equipment used and the operational experience from the inventories are described

  17. Interplay of a multiplicity of security features

    Science.gov (United States)

    Moser, Jean-Frederic

    2000-04-01

    The great variety of existing security features can cause difficulty in choosing the adequate set for a particular security document. Considering the cost/benefit aspects with respect to the overall protection performance requested, a choice has to be made, for example, between either few features of high-security value or numerous many, less- resistant features. Another choice is the high versus low complexity of one particular features. A study aimed at providing a decision basis is a challenging matter because it involves human factors. Attention, perception, physiology of seeing and habits - to name some of the factors - are intangibles and are subject to evaluations involving normally a great number of experiments, if they are to be representative. The opportunity was given for a case study with the introduction of new Swiss banknotes between 1995 and 1998, because the new banknotes represent a novelty in the sense of the multiplicity and interplay of its optical security features. We have analyzed 652 articles which appeared in the press media concerning the new banknotes, seeking especially for peoples' reaction towards the security features.

  18. Bandwidth Efficient Overlapped FSK Coded Secure Command Transmission for Medical Implant Communication Systems

    Directory of Open Access Journals (Sweden)

    Selman KULAÇ

    2018-06-01

    Full Text Available Nowadays, wireless communication systems are exploited in most health care systems. Implantable Medical Systems (IMS also have wireless communication capability. However, it is very important that secure wireless communication should be provided in terms of both patient rights and patient health. Therefore, wireless transmission systems of IMS should also be robust against to eavesdroppers and adversaries. In this study, a specific overlapped and coded frequency shift keying (FSK modulation technique is developed and security containing with low complexity is provided by this proposed technique. The developed method is suitable for wireless implantable medical systems since it provides low complexity and security as well as bandwidth efficiency.

  19. Human Security and the Governmentality of Neo-Liberal Mobility : A Feminist Perspective

    NARCIS (Netherlands)

    T-D. Truong (Thanh-Dam)

    2006-01-01

    textabstractTransnational migration and its implications for human security as a policy field constitute one of the most complex issues of our time. Current experiences of displacement and security spans between a cyber world characterized by hyper mobility of finance, technology, information and

  20. European perspectives on security research

    CERN Document Server

    2011-01-01

    Europe’s networked societies of today are shaped by a growing interconnection in almost all areas of life. The complexity of our infrastructures and the concurrent accessibility to means of destruction by terrorist groups and individual perpetrators call for innovative security solutions. However, such evolving innovations inevitably raise fundamental questions of concern in our societies. How do we balance the imperatives of securing our citizens and infrastructures on the one hand, and of protecting of our sacredly held civil liberties on the other? The topical network ‘Safety and Security’ of acatech – the German Academy of Science and Engineering – invited experts from the science academies of various European countries to share their perspectives on security research and the aspect of safety during a two-day workshop hosted by the Fraunhofer Institute for High-Speed Dynamics, Ernst-Mach-Institut in March 2010. This publication is a compilation of contributions made during the workshop.

  1. Do you write secure code?

    CERN Multimedia

    Computer Security Team

    2011-01-01

    At CERN, we are excellent at producing software, such as complex analysis jobs, sophisticated control programs, extensive monitoring tools, interactive web applications, etc. This software is usually highly functional, and fulfils the needs and requirements as defined by its author. However, due to time constraints or unintentional ignorance, security aspects are often neglected. Subsequently, it was even more embarrassing for the author to find out that his code flawed and was used to break into CERN computers, web pages or to steal data…   Thus, if you have the pleasure or task of producing software applications, take some time before and familiarize yourself with good programming practices. They should not only prevent basic security flaws in your code, but also improve its readability, maintainability and efficiency. Basic rules for good programming, as well as essential books on proper software development, can be found in the section for software developers on our security we...

  2. SPCC- Software Elements for Security Partition Communication Controller

    Science.gov (United States)

    Herpel, H. J.; Willig, G.; Montano, G.; Tverdyshev, S.; Eckstein, K.; Schoen, M.

    2016-08-01

    Future satellite missions like Earth Observation, Telecommunication or any other kind are likely to be exposed to various threats aiming at exploiting vulnerabilities of the involved systems and communications. Moreover, the growing complexity of systems coupled with more ambitious types of operational scenarios imply increased security vulnerabilities in the future. In the paper we will describe an architecture and software elements to ensure high level of security on-board a spacecraft. First the threats to the Security Partition Communication Controller (SPCC) will be addressed including the identification of specific vulnerabilities to the SPCC. Furthermore, appropriate security objectives and security requirements are identified to be counter the identified threats. The security evaluation of the SPCC will be done in accordance to the Common Criteria (CC). The Software Elements for SPCC has been implemented on flight representative hardware which consists of two major elements: the I/O board and the SPCC board. The SPCC board provides the interfaces with ground while the I/O board interfaces with typical spacecraft equipment busses. Both boards are physically interconnected by a high speed spacewire (SpW) link.

  3. Evaluating Global Emission Inventories of Biogenic Bromocarbons

    Science.gov (United States)

    Hossaini, Ryan; Mantle, H.; Chipperfield, M. P.; Montzka, S. A.; Hamer, P.; Ziska, F.; Quack, B.; Kruger, K.; Tegtmeier, S.; Atlas, E.; hide

    2013-01-01

    Emissions of halogenated very short-lived substances (VSLS) are poorly constrained. However, their inclusion in global models is required to simulate a realistic inorganic bromine (Bry) loading in both the troposphere, where bromine chemistry perturbs global oxidizing capacity, and in the stratosphere, where it is a major sink for ozone (O3). We have performed simulations using a 3-D chemical transport model (CTM) including three top-down and a single bottom-up derived emission inventory of the major brominated VSLS bromoform (CHBr3) and dibromomethane (CH2Br2). We perform the first concerted evaluation of these inventories, comparing both the magnitude and spatial distribution of emissions. For a quantitative evaluation of each inventory, model output is compared with independent long-term observations at National Oceanic and Atmospheric Administration (NOAA) ground-based stations and with aircraft observations made during the NSF (National Science Foundation) HIAPER Pole-to-Pole Observations (HIPPO) project. For CHBr3, the mean absolute deviation between model and surface observation ranges from 0.22 (38 %) to 0.78 (115 %) parts per trillion (ppt) in the tropics, depending on emission inventory. For CH2Br2, the range is 0.17 (24 %) to 1.25 (167 %) ppt. We also use aircraft observations made during the 2011 Stratospheric Ozone: Halogen Impacts in a Varying Atmosphere (SHIVA) campaign, in the tropical western Pacific. Here, the performance of the various inventories also varies significantly, but overall the CTM is able to reproduce observed CHBr3 well in the free troposphere using an inventory based on observed sea-to-air fluxes. Finally, we identify the range of uncertainty associated with these VSLS emission inventories on stratospheric bromine loading due to VSLS (Br(VSLS/y)). Our simulations show Br(VSLS/y) ranges from approximately 4.0 to 8.0 ppt depending on the inventory. We report an optimized estimate at the lower end of this range (approximately 4 ppt

  4. Valuation of inventories in systems with product recovery

    OpenAIRE

    Teunter, Ruud; Laan, Erwin

    2003-01-01

    textabstractValuation of inventories has different purposes, in particular accounting and decision making, and it is not necessary for a firm to use the same valuation method for both purposes. In fact, it is not uncommon to use accounting books as well as management books. In this chapter, we will only consider inventory values from the perspective of decision making. More specifically, we will analyze the effect of inventory valuation on inventory control decisions (and not the correspondin...

  5. Towards Soil and Sediment Inventories of Black Carbon

    Science.gov (United States)

    Masiello, C. A.

    2008-12-01

    A body of literature on black carbon (BC) concentrations in soils and sediments is rapidly accumulating, but as of yet, there are no global or regional inventories of BC in either reservoir. Soil and sediment BC inventories are badly needed for a range of fields. For example, in oceanography a global sediment BC inventory is crucial in understanding the role of biomass burning in the development of stable marine carbon reservoirs, including dissolved organic carbon and sedimentary organic carbon. Again in the marine environment, BC likely strongly impacts the fate and transport of anthropogenic pollutants: regional inventories of BC in sediments will help develop better environmental remediation strategies. In terrestrial systems well-constrained natural BC soil inventories would help refine ecological, agricultural, and soil biogeochemical studies. BC is highly sorptive of nutrients including nitrogen and phosphorous. The presence of BC in ecosystems almost certainly alters N and P cycling; however, without soil BC inventories, we cannot know where BC has a significant impact. BC's nutrient sorptivity and water-holding capacity make it an important component of agricultural soils, and some researchers have proposed artificially increasing soil BC inventories to improve soil fertility. Natural soil BC concentrations in some regions are quite high, but without a baseline inventory, it is challenging to predict when agricultural amendment will significantly exceed natural conditions. And finally, because BC is one of the most stable fractions of organic carbon in soils, understanding its concentration and regional distribution will help us track the dynamics of soil organic matter response to changing environmental conditions. Developing effective regional and global BC inventories is challenging both because of data sparsity and methodological intercomparison issues. In this presentation I will describe a roadmap to generating these valuable inventories.

  6. Security Culture in Physical Protection of Nuclear Material and Facility

    International Nuclear Information System (INIS)

    Susyanta-Widyatmaka; Koraag, Venuesiana-Dewi; Taswanda-Taryo

    2005-01-01

    In nuclear related field, there are three different cultures: safety, safeguards and security culture. Safety culture has established mostly in nuclear industries, meanwhile safeguards and security culture are relatively new and still developing. The latter is intended to improve the physical protection of material and nuclear facility. This paper describes concept, properties and factors affecting security culture and interactions among these cultures. The analysis indicates that anybody involving in nuclear material and facility should have strong commitment and awareness of such culture to establish it. It is concluded that the assessment of security culture outlined in this paper is still preliminary for developing and conduction rigorous security culture implemented in a much more complex facility such as nuclear power plant

  7. Cryptanalysis of a New Signal Security System for Multimedia Data Transmission

    Directory of Open Access Journals (Sweden)

    Li Shujun

    2005-01-01

    Full Text Available Recently, a new signal security system called TDCEA (two-dimensional circulation encryption algorithm was proposed for real-time multimedia data transmission. This paper gives a comprehensive analysis on the security of TDCEA. The following security problems are found: (1 there exist some essential security defects in TDCEA; (2 two known-plaintext attacks can break TDCEA; (3 the chosen-plaintext and chosen-ciphertext versions of the aforementioned two known-plaintext attacks can break TDCEA even with a smaller complexity and a better performance. Some experiments are given to show the security defects of TDCEA and the feasibility of the proposed known-plaintext attacks. As a conclusion, TDCEA is not suitable for applications that require a high level of security.

  8. Design options to minimize tritium inventories at Savannah River

    Energy Technology Data Exchange (ETDEWEB)

    Klein, J.E., E-mail: james.klein@srnl.doe.gov; Wilson, J.; Heroux, K.J.; Poore, A.S.; Babineau, D.W.

    2016-11-01

    Highlights: • La-Ni-Al alloys are used as tritium storage materials and retain He-3. • La-Ni-Al He-3 effects decrease useable process tritium inventory. • Use of Pd or depleted uranium beds decreases process tritium inventories. • Reduced inventory tritium facilities will lower public risk. - Abstract: Large quantities of tritium are stored and processed at the Savannah River Site (SRS) Tritium Facilities. In many design basis accidents (DBAs), it is assumed the entire tritium inventory of the in-process vessels are released from the facility and the site for inclusion in public radiological dose calculations. Pending changes in public dose calculation methodologies are driving the need for smaller in-process tritium inventories to be released during DBAs. Reducing the in-process tritium inventory will reduce the unmitigated source term for public dose calculations and will also reduce the production demand for a lower inventory process. This paper discusses process design options to reduce in-process tritium inventories. A Baseline process is defined to illustrate the impact of removing or replacing La-Ni-Al alloy tritium storage beds with palladium (Pd) or depleted uranium (DU) storage beds on facility in-process tritium inventories. Elimination of La-Ni-Al alloy tritium storage beds can reduce in-process tritium inventories by over 1.5 kg, but alternate process technologies may needed to replace some functions of the removed beds.

  9. Design options to minimize tritium inventories at Savannah River

    International Nuclear Information System (INIS)

    Klein, J.E.; Wilson, J.; Heroux, K.J.; Poore, A.S.; Babineau, D.W.

    2016-01-01

    Highlights: • La-Ni-Al alloys are used as tritium storage materials and retain He-3. • La-Ni-Al He-3 effects decrease useable process tritium inventory. • Use of Pd or depleted uranium beds decreases process tritium inventories. • Reduced inventory tritium facilities will lower public risk. - Abstract: Large quantities of tritium are stored and processed at the Savannah River Site (SRS) Tritium Facilities. In many design basis accidents (DBAs), it is assumed the entire tritium inventory of the in-process vessels are released from the facility and the site for inclusion in public radiological dose calculations. Pending changes in public dose calculation methodologies are driving the need for smaller in-process tritium inventories to be released during DBAs. Reducing the in-process tritium inventory will reduce the unmitigated source term for public dose calculations and will also reduce the production demand for a lower inventory process. This paper discusses process design options to reduce in-process tritium inventories. A Baseline process is defined to illustrate the impact of removing or replacing La-Ni-Al alloy tritium storage beds with palladium (Pd) or depleted uranium (DU) storage beds on facility in-process tritium inventories. Elimination of La-Ni-Al alloy tritium storage beds can reduce in-process tritium inventories by over 1.5 kg, but alternate process technologies may needed to replace some functions of the removed beds.

  10. MAC layer security issues in wireless mesh networks

    Science.gov (United States)

    Reddy, K. Ganesh; Thilagam, P. Santhi

    2016-03-01

    Wireless Mesh Networks (WMNs) have emerged as a promising technology for a broad range of applications due to their self-organizing, self-configuring and self-healing capability, in addition to their low cost and easy maintenance. Securing WMNs is more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic network topology and decentralized architecture. These vulnerable features expose the WMNs to several types of attacks in MAC layer. The existing MAC layer standards and implementations are inadequate to secure these features and fail to provide comprehensive security solutions to protect both backbone and client mesh. Hence, there is a need for developing efficient, scalable and integrated security solutions for WMNs. In this paper, we classify the MAC layer attacks and analyze the existing countermeasures. Based on attacks classification and countermeasures analysis, we derive the research directions to enhance the MAC layer security for WMNs.

  11. Mixed Waste Management Facility (MWMF) Old Burial Ground (OBG) source control technology and inventory study

    Energy Technology Data Exchange (ETDEWEB)

    Flach, G.P.; Rehder, T.E.; Kanzleiter, J.P.

    1996-10-02

    This report has been developed to support information needs for wastes buried in the Burial Ground Complex. Information discussed is presented in a total of four individual attachments. The general focus of this report is to collect information on estimated source inventories, leaching studies, source control technologies, and to provide information on modeling parameters and associated data deficiencies.

  12. Mixed Waste Management Facility (MWMF) Old Burial Ground (OBG) source control technology and inventory study

    International Nuclear Information System (INIS)

    Flach, G.P.; Rehder, T.E.; Kanzleiter, J.P.

    1996-01-01

    This report has been developed to support information needs for wastes buried in the Burial Ground Complex. Information discussed is presented in a total of four individual attachments. The general focus of this report is to collect information on estimated source inventories, leaching studies, source control technologies, and to provide information on modeling parameters and associated data deficiencies

  13. Radiation safety and inventory of sealed radiation sources in Pakistan

    International Nuclear Information System (INIS)

    Ali, M.; Mannan, A.

    2001-01-01

    Sealed radiation sources (SRS) of various types and activities are widely used in industry, medicine, agriculture, research and teaching in Pakistan. The proper maintenance of records of SRS is mandatory for users/licensees. Since 1956, more than 2000 radiation sources of different isotopes having activities of Bq to TBq have been imported. Of these, several hundred sources have been disposed of and some have been exported/returned to the suppliers. To ensure the safety and security of the sources and to control and regulate the safe use of radiation sources in various disciplines, the Directorate of Nuclear Safety and Radiation Protection (DNSRP), the implementing arm of the regulatory authority in the country, has introduced a system for notifying, registering and licensing the use of all types of SRS. In order to update the inventory of SRS used throughout the country, the DNSRP has developed a database. (author)

  14. 76 FR 33780 - Extension of Time for Inventory

    Science.gov (United States)

    2011-06-09

    ... DEPARTMENT OF THE INTERIOR National Park Service [2253-665] Extension of Time for Inventory AGENCY... inventories of Native American human remains and associated funerary objects in their possession or control. Recent regulations (43 CFR 10.13) provide deadlines for completing inventories of human remains and...

  15. High-performance secure multi-party computation for data mining applications

    DEFF Research Database (Denmark)

    Bogdanov, Dan; Niitsoo, Margus; Toft, Tomas

    2012-01-01

    Secure multi-party computation (MPC) is a technique well suited for privacy-preserving data mining. Even with the recent progress in two-party computation techniques such as fully homomorphic encryption, general MPC remains relevant as it has shown promising performance metrics in real...... operations such as multiplication and comparison. Secondly, the confidential processing of financial data requires the use of more complex primitives, including a secure division operation. This paper describes new protocols in the Sharemind model for secure multiplication, share conversion, equality, bit...

  16. Inventory transparency for agricultural produce through IOT

    Science.gov (United States)

    Srinivasan, S. P.; Sorna Shanthi, D.; Anand, Aashish V.

    2017-06-01

    Re-structuring the practices of traditional inventory management is becoming more essential to optimize the supply chain transparency and accuracy of agricultural produce. A flexible and transparent inventory management system is becoming the need of any agricultural commodity. It was noticed that the major setback for the farmers who are the suppliers of the farm produce is due to poor supply chain integration. The recent advent technologies and IT explosion can bring up a greater impact in the process of storing, tracking, distributing and monitoring perishable agriculture produce of day to day life. The primary focus of this paper is to integrate IoT into inventory management and other inbound logistics management of agriculture produce. The unique features of agricultural produce like a prediction of supply, demand, the location of warehouses, distribution and tracking of inventory can be integrated through IoT. This paper proposes a conceptual framework for inventory management transparency involved in the supply chain of agriculture produce.

  17. Activity based costing model for inventory valuation

    Directory of Open Access Journals (Sweden)

    Vineet Chouhan

    2017-03-01

    Full Text Available Activity-Based-Model (ABC is used for the purpose of significant improvement for overhead accounting systems by providing the best information required for managerial decision. This pa-per discusses implacability of ABC technique on inventory valuation as a management account-ing innovation. In order to prove the applicability of ABC for inventory control a material driven medium-sized and privately owned company from engineering (iron and steel industry is select-ed and by analysis of its production process and its material dependency and use of indirect in-ventory, an ABC model is explored for better inventory control. The case revealed that the ne-cessity of ABC in the area of inventory control is significant. The company is not only able to increase its quality of decision but also it can significantly analyze its cost of direct material cost, valuation of direct material and use its implications for better decision making.

  18. Preparing US community greenhouse gas inventories for climate action plans

    International Nuclear Information System (INIS)

    Blackhurst, Michael; Scott Matthews, H; Hendrickson, Chris T; Sharrard, Aurora L; Azevedo, Ines Lima

    2011-01-01

    This study illustrates how alternative and supplemental community-level greenhouse gas (GHG) inventory techniques could improve climate action planning. Eighteen US community GHG inventories are reviewed for current practice. Inventory techniques could be improved by disaggregating the sectors reported, reporting inventory uncertainty and variability, and aligning inventories with local organizations that could facilitate emissions reductions. The potential advantages and challenges of supplementing inventories with comparative benchmarks are also discussed. While GHG inventorying and climate action planning are nascent fields, these techniques can improve CAP design, help communities set more meaningful emission reduction targets, and facilitate CAP implementation and progress monitoring.

  19. Preparing US community greenhouse gas inventories for climate action plans

    Energy Technology Data Exchange (ETDEWEB)

    Blackhurst, Michael [Department of Civil, Architectural and Environmental Engineering, The University of Texas at Austin, 1 University Station C1752, Austin, TX 78712-0276 (United States); Scott Matthews, H; Hendrickson, Chris T [Department of Civil and Environmental Engineering, Carnegie Mellon University, 119 Porter Hall, Pittsburgh, PA 15213 (United States); Sharrard, Aurora L [Green Building Alliance, 333 East Carson Street, Suite 331, Pittsburgh, PA 15219 (United States); Azevedo, Ines Lima, E-mail: mblackhurst@gmail.com, E-mail: hsm@cmu.edu, E-mail: auroras@gbapgh.org, E-mail: cth@andrew.cmu.edu, E-mail: iazevedo@cmu.edu [Department of Engineering and Public Policy, Carnegie Mellon University, 119 Porter Hall, Pittsburgh, PA 15213 (United States)

    2011-07-15

    This study illustrates how alternative and supplemental community-level greenhouse gas (GHG) inventory techniques could improve climate action planning. Eighteen US community GHG inventories are reviewed for current practice. Inventory techniques could be improved by disaggregating the sectors reported, reporting inventory uncertainty and variability, and aligning inventories with local organizations that could facilitate emissions reductions. The potential advantages and challenges of supplementing inventories with comparative benchmarks are also discussed. While GHG inventorying and climate action planning are nascent fields, these techniques can improve CAP design, help communities set more meaningful emission reduction targets, and facilitate CAP implementation and progress monitoring.

  20. Ultra-fast secure communication with complex systems in classical channels (Conference Presentation)

    KAUST Repository

    Mazzone, Valerio; Di Falco, Andrea; Fratalocchi, Andrea

    2017-01-01

    Developing secure communications is a research area of growing interest. During the past years, several cryptographic schemes have been developed, with Quantum cryptography being a promising scheme due to the use of quantum effects, which make very

  1. Securities and banking: bridges and walls

    Directory of Open Access Journals (Sweden)

    Tommaso Padoa-Schioppa

    2002-09-01

    Full Text Available The paper examines the relationship between banking and securities activities in the light of financial market developments (securitisation, institutionalization of investment, emergence of complex financial instruments, conglomeration and consolidation, with particular reference to Europe. The enhanced links between banking and securitiesbusinesses have generated increased and new risks to financial institutions. However, banks' stability remains crucial for the stability of the financial system as a whole, because of their unique role as provider of liquidity. The paper also addresses the implications of the banking-securities combination for regulatory and supervisory arrangements. The exporting of prudential requirements traditional in banking (such as capital ratios into the securities field, and the importing of securities regulation (such as transparency requirements into the banking sector, can be deemed mutually beneficial. As regards supervision, there is a need to monitor the continued effectiveness of the current framework. This entails strengthening co-operation both at the national level and on a cross-border basis among sectoral supervisors in the micro-prudential field, and between them and central banks in the macro-prudential field.

  2. 7 CFR 984.471 - Reports of handler inventory.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Reports of handler inventory. 984.471 Section 984.471 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... Administrative Rules and Regulations Reports § 984.471 Reports of handler inventory. Reports of handler inventory...

  3. 7 CFR 457.163 - Nursery peak inventory endorsement.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Nursery peak inventory endorsement. 457.163 Section... CORPORATION, DEPARTMENT OF AGRICULTURE COMMON CROP INSURANCE REGULATIONS § 457.163 Nursery peak inventory endorsement. Nursery Crop Insurance Peak Inventory Endorsement This endorsement is not continuous and must be...

  4. Design of inventory pools in spare part support operation systems

    Science.gov (United States)

    Mo, Daniel Y.; Tseng, Mitchell M.; Cheung, Raymond K.

    2014-06-01

    The objective of a spare part support operation is to fulfill the part request order with different service contracts in the agreed response time. With this objective to achieve different service targets for multiple service contracts and the considerations of inventory investment, it is not only important to determine the inventory policy but also to design the structure of inventory pools and the order fulfilment strategies. In this research, we focused on two types of inventory pools: multiple inventory pool (MIP) and consolidated inventory pool (CIP). The idea of MIP is to maintain separated inventory pools based on the types of service contract, while CIP solely maintains a single inventory pool regardless of service contract. Our research aims to design the inventory pool analytically and propose reserve strategies to manage the order fulfilment risks in CIP. Mathematical models and simulation experiments would be applied for analysis and evaluation.

  5. The global security perspective on the effects of executive cognitive function on complex behavioral screening intervention and HIV/AIDS.

    Science.gov (United States)

    Kim, Suk-Hee

    2010-11-01

    The purpose of this quantitative study is to understand the global security perspective on the effects of executive cognitive function (ECF) on Complex Behavioral Screening Intervention and HIV/AIDS. The HIV/AIDS pandemic is as much a social, political, economic, and cultural problem as a biomedical one. HIV/AIDS is associated centrally with the collapse not just of communities and families but potentially of states, with some of the largest public health interventions ever and enormous questions about governance, a huge population of orphans, and deep questions about intergenerational relations and cultural transmission. This study also is to develop a screening instrument that improves quality of life for individuals with executive cognitive impairments and behavior problems in our communities and the global society.

  6. Experimental validation of pulsed column inventory estimators

    International Nuclear Information System (INIS)

    Beyerlein, A.L.; Geldard, J.F.; Weh, R.; Eiben, K.; Dander, T.; Hakkila, E.A.

    1991-01-01

    Near-real-time accounting (NRTA) for reprocessing plants relies on the timely measurement of all transfers through the process area and all inventory in the process. It is difficult to measure the inventory of the solvent contractors; therefore, estimation techniques are considered. We have used experimental data obtained at the TEKO facility in Karlsruhe and have applied computer codes developed at Clemson University to analyze this data. For uranium extraction, the computer predictions agree to within 15% of the measured inventories. We believe this study is significant in demonstrating that using theoretical models with a minimum amount of process data may be an acceptable approach to column inventory estimation for NRTA. 15 refs., 7 figs

  7. A Simulation for Managing Complexity in Sales and Operations Planning Decisions

    Science.gov (United States)

    DuHadway, Scott; Dreyfus, David

    2017-01-01

    Within the classroom it is often difficult to convey the complexities and intricacies that go into making sales and operations planning decisions. This article describes an in-class simulation that allows students to gain hands-on experience with the complexities in making forecasting, inventory, and supplier selection decisions as part of the…

  8. Validation of the Classroom Behavior Inventory

    Science.gov (United States)

    Blunden, Dale; And Others

    1974-01-01

    Factor-analytic methods were used toassess contruct validity of the Classroom Behavior Inventory, a scale for rating behaviors associated with hyperactivity. The Classroom Behavior Inventory measures three dimensions of behavior: Hyperactivity, Hostility, and Sociability. Significant concurrent validity was obtained for only one Classroom Behavior…

  9. Retail inventory management with lost sales

    NARCIS (Netherlands)

    Curseu - Stefanut, A.

    2012-01-01

    The inventory control problem of traditional store-based grocery retailers has several challenging features. Demand for products is stochastic, and is typically lost when no inventory is available on the shelves. As the consumer behavior studies reveal, only a small percentage of customers are

  10. Lost-sales inventory theory : A review

    NARCIS (Netherlands)

    Bijvank, Marco; Vis, Iris F. A.

    2011-01-01

    In classic inventory models it is common to assume that excess demand is backordered. However, studies analyzing customer behavior in practice show that most unfulfilled demand is lost or an alternative item/location is looked for in many retail environments. Inventory systems that include this

  11. National Emission Inventory

    Data.gov (United States)

    U.S. Environmental Protection Agency — The National Emission Inventory contains measured, modeled, and estimated data for emissions of all known source categories in the US (stationary sources, fires,...

  12. The nuclide inventory in SFR-1

    International Nuclear Information System (INIS)

    Ingemansson, Tor

    2001-10-01

    This report is an account for a project carried out on behalf of the Swedish Radiation Protection Authority (SSI): 'Nuclide inventory in SFR-1' (The Swedish underground disposal facility for low and intermediate level reactor waste). The project comprises the following five sub-projects: 1) Measuring methods for nuclides, difficult to measure, 2) The nuclide inventory in SFR-1, 3) Proposal for nuclide library for SFR-1 and ground disposal, 4) Nuclide library for exemption, and 5) Characterising of the nuclide inventory and documentation for SFL waste. In all five sub-projects long-lived activity, including Cl-36, has been considered

  13. A high-resolution regional emission inventory of atmospheric mercury and its comparison with multi-scale inventories: a case study of Jiangsu, China

    Directory of Open Access Journals (Sweden)

    H. Zhong

    2016-12-01

    Full Text Available A better understanding of the discrepancies in multi-scale inventories could give an insight into their approaches and limitations as well as provide indications for further improvements; international, national, and plant-by-plant data are primarily obtained to compile those inventories. In this study we develop a high-resolution inventory of Hg emissions at 0.05°  ×  0.05° for Jiangsu, China, using a bottom-up approach and then compare the results with available global/national inventories. With detailed information on individual sources and the updated emission factors from field measurements applied, the annual Hg emissions of anthropogenic origin in Jiangsu in 2010 are estimated at 39 105 kg, of which 51, 47, and 2 % were Hg0, Hg2+, and Hgp, respectively. This provincial inventory is thoroughly compared to three downscaled national inventories (NJU, THU, and BNU and two global ones (AMAP/UNEP and EDGARv4.tox2. Attributed to varied methods and data sources, clear information gaps exist in multi-scale inventories, leading to differences in the emission levels, speciation, and spatial distributions of atmospheric Hg. The total emissions in the provincial inventory are 28, 7, 19, 22, and 70 % larger than NJU, THU, BNU, AMAP/UNEP, and EDGARv4.tox2, respectively. For major sectors, including power generation, cement, iron and steel, and other coal combustion, the Hg contents (HgC in coals/raw materials, abatement rates of air pollution control devices (APCDs and activity levels are identified as the crucial parameters responsible for the differences in estimated emissions between inventories. Regarding speciated emissions, a larger fraction of Hg2+ is found in the provincial inventory than national and global inventories, resulting mainly from the results by the most recent domestic studies in which enhanced Hg2+ were measured for cement and iron and steel plants. Inconsistent information on large power and industrial plants is

  14. A Perishable Inventory Model with Return

    Science.gov (United States)

    Setiawan, S. W.; Lesmono, D.; Limansyah, T.

    2018-04-01

    In this paper, we develop a mathematical model for a perishable inventory with return by assuming deterministic demand and inventory dependent demand. By inventory dependent demand, it means that demand at certain time depends on the available inventory at that time with certain rate. In dealing with perishable items, we should consider deteriorating rate factor that corresponds to the decreasing quality of goods. There are also costs involved in this model such as purchasing, ordering, holding, shortage (backordering) and returning costs. These costs compose the total costs in the model that we want to minimize. In the model we seek for the optimal return time and order quantity. We assume that after some period of time, called return time, perishable items can be returned to the supplier at some returning costs. The supplier will then replace them in the next delivery. Some numerical experiments are given to illustrate our model and sensitivity analysis is performed as well. We found that as the deteriorating rate increases, returning time becomes shorter, the optimal order quantity and total cost increases. When considering the inventory-dependent demand factor, we found that as this factor increases, assuming a certain deteriorating rate, returning time becomes shorter, optimal order quantity becomes larger and the total cost increases.

  15. Asset Identification for Security Risk Assessment in Web Applications

    OpenAIRE

    Hisham M. Haddad; Brunil D. Romero

    2009-01-01

    As software applications become more complex they require more security, allowing them to reach an appropriate level of quality to manage information, and therefore achieving business objectives. Web applications represent one segment of software industry where security risk assessment is essential. Web engineering must address new challenges to provide new techniques and tools that guarantee high quality application development. This work focuses asset identification, the initial step in sec...

  16. 26 CFR 1.471-2 - Valuation of inventories.

    Science.gov (United States)

    2010-04-01

    ...-2 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY (CONTINUED) INCOME TAX (CONTINUED) INCOME TAXES Inventories § 1.471-2 Valuation of inventories. (a) Section 471 provides two tests...-5.) Any goods in an inventory which are unsalable at normal prices or unusable in the normal way...

  17. 10 CFR 34.69 - Records of quarterly inventory.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Records of quarterly inventory. 34.69 Section 34.69 Energy... INDUSTRIAL RADIOGRAPHIC OPERATIONS Recordkeeping Requirements § 34.69 Records of quarterly inventory. (a) Each licensee shall maintain records of the quarterly inventory of sealed sources and of devices...

  18. 7 CFR 984.71 - Reports of handler inventory.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Reports of handler inventory. 984.71 Section 984.71... Regulating Handling Reports, Books, and Other Records § 984.71 Reports of handler inventory. Each handler... or her inventory of inshell and shelled walnuts. [73 FR 11339, Mar. 3, 2008] ...

  19. two-level inventory optimization under probability event chain

    African Journals Online (AJOL)

    Journal of Modeling, Design and Management of Engineering Systems ... The paper introduces the concept of effective inventory level, which is used to evaluate the impact of upstream shortage on downstream inventory, models the inventory at warehouse and retailer under random lead time and demand, and makes the ...

  20. Asset Inventory Database

    Data.gov (United States)

    US Agency for International Development — AIDM is used to track USAID assets such as furniture, computers, and equipment. Using portable bar code readers, receiving and inventory personnel can capture...