WorldWideScience

Sample records for security culture enhancement

  1. Implementing Physical Protection Education for an Enhanced Nuclear Security Culture

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jeong Ho; Kim, Hyun Chul; Shin, Ick Hyun; Lee, Hyung Kyung; Choe, Kwan Kyoo [KINAC, Daejeon (Korea, Republic of)

    2013-10-15

    In this paper, we are going to outline our efforts and experiences at implementing physical protection education. KINAC (as the only designated educational institute) places great effort in delivering an effective and a high-quality education program for physical protection. We have also provided a way for nuclear operators to share the lessons they have gained through their own experiences. We made physical protection education an important communication channel, not only among nuclear operators but also between operators and a regulatory body. There is growing attention given to education and training on the subject of physical protection in order to enhance the nuclear security culture. The IAEA recommends that all personnel in organizations directly involved with the nuclear industry receive regularly education in physical protection according to the recently revised INFCIRC/225/Rev.5. The Korea Institute of Nuclear Nonproliferation and Control (KINAC) and the Nuclear Safety and Security Commission (NSSC), which are mainly responsible for the national nuclear security regime, have already recognized the importance of education and training in physical protection. The NSSC enacted its decree on physical protection education and training in 2010. KINAC was designated as the first educational institute in 2011 and implemented physical protection education as mandatory from 2012.

  2. Implementing Physical Protection Education for an Enhanced Nuclear Security Culture

    International Nuclear Information System (INIS)

    Lee, Jeong Ho; Kim, Hyun Chul; Shin, Ick Hyun; Lee, Hyung Kyung; Choe, Kwan Kyoo

    2013-01-01

    In this paper, we are going to outline our efforts and experiences at implementing physical protection education. KINAC (as the only designated educational institute) places great effort in delivering an effective and a high-quality education program for physical protection. We have also provided a way for nuclear operators to share the lessons they have gained through their own experiences. We made physical protection education an important communication channel, not only among nuclear operators but also between operators and a regulatory body. There is growing attention given to education and training on the subject of physical protection in order to enhance the nuclear security culture. The IAEA recommends that all personnel in organizations directly involved with the nuclear industry receive regularly education in physical protection according to the recently revised INFCIRC/225/Rev.5. The Korea Institute of Nuclear Nonproliferation and Control (KINAC) and the Nuclear Safety and Security Commission (NSSC), which are mainly responsible for the national nuclear security regime, have already recognized the importance of education and training in physical protection. The NSSC enacted its decree on physical protection education and training in 2010. KINAC was designated as the first educational institute in 2011 and implemented physical protection education as mandatory from 2012

  3. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    Energy Technology Data Exchange (ETDEWEB)

    Crawford,C.; de Boer,G.; De Castro, K; Landers, Ph.D., J; Rogers, E

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." This paper will describe some of the key elements of a comprehensive, sustainable nuclear security culture enhancement program and how implementation can mitigate the insider threat.

  4. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    Energy Technology Data Exchange (ETDEWEB)

    Rogers,E.; deBoer,G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." Gen. Eugene Habiger, a former "Assistant Secretary for Safeguards and Security" at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that "good security is 20% equipment and 80% people." Although eliminating the "human factor" is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  5. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    International Nuclear Information System (INIS)

    Rogers, E.; deBoer, G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-01-01

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC and A). Though MPC and A systems can significantly upgrade nuclear security, they do not eliminate the 'human factor.' Gen. Eugene Habiger, a former 'Assistant Secretary for Safeguards and Security' at the U.S. Department of Energy's (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that 'good security is 20% equipment and 80% people.' Although eliminating the 'human factor' is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  6. Overview of security culture

    International Nuclear Information System (INIS)

    Matulanya, M. A.

    2014-04-01

    Nuclear Security culture concept has been aggressively promoted over the past several years as a tool to improve the physical protection of the nuclear and radioactive materials due to growing threats of catastrophic terrorism and other new security challenges. It is obvious that, the scope of nuclear security and the associated cultures need to be extended beyond the traditional task of protecting weapons-usable materials. The role of IAEA is to strengthen the nuclear security framework globally and in leading the coordination of international activities in this field. Therefore all governments should work closely with the IAEA to take stronger measures to ensure the physical protection, the safety and security of the nuclear and radioactive materials. In the effort to reflect this new realities and concerns, the IAEA in 2008 came up with the document, the Nuclear Security Culture, Nuclear Security Series No. 7, Implementing Guide to the member states which urged every member state to take appropriate measures to promote security culture with respect to nuclear and radioactive materials. The document depicted this cultural approach as the way to protect individual, society and the environment. Among other things, the document defined nuclear security culture as characteristics and attitudes in organizations and of individuals which establishes that, nuclear security issues receives attention warranted by their significance. (au)

  7. Enhancing implementation security of QKD

    Science.gov (United States)

    Tamaki, Kiyoshi

    2017-10-01

    Quantum key distribution (QKD) can achieve information-theoretic security, which is a provable security against any eavesdropping, given that all the devices the sender and the receiver employ operate exactly as the theory of security requires. Unfortunately, however, it is difficult for practical devices to meet all such requirements, and therefore more works have to be done toward guaranteeing information-theoretic security in practice, i.e., implementation security. In this paper, we review our recent efforts to enhance implementation security. We also have a brief look at a flaw in security proofs and present how to fix it.

  8. Safety, Security and Safeguards (3S) Culture

    International Nuclear Information System (INIS)

    Mladineo, S.V.; Frazar, S.

    2013-01-01

    A meaningful discussion of Safety, Security, and Safeguards (3S) Culture requires a review of the concepts related to the culture of the three components. The concept of culture can be confusing, and so careful use of terminology is needed to enable a focused and constructive dialogue. To this end, this paper will use the concept of organizational culture as a backdrop for a broader discussion about how the three subcultures of safety, security and safeguards come together to enhance the mission of an organization. Since the accidents at Three Mile Island and Chernobyl, the nuclear industry has embraced the concept of safety culture. The work on safety culture has been used to develop programs and concepts in the culture of Material Protection, Control, and Accounting and Nuclear Security Culture. More recently, some work has been done on defining an International Safeguards Culture. Others have spoken about a 3S Culture, but there has been little rigorous consideration of the concept. This paper attempts to address 3S Culture, to begin to evaluate the merit of the concept, and to propose a definition. The paper is followed by the slides of the presentation. (authors)

  9. Radioactive source security: the cultural challenges

    International Nuclear Information System (INIS)

    Englefield, Chris

    2015-01-01

    Radioactive source security is an essential part of radiation protection. Sources can be abandoned, lost or stolen. If they are stolen, they could be used to cause deliberate harm and the risks are varied and significant. There is a need for a global security protection system and enhanced capability to achieve this. The establishment of radioactive source security requires 'cultural exchanges'. These exchanges include collaboration between: radiation protection specialists and security specialists; the nuclear industry and users of radioactive sources; training providers and regulators/users. This collaboration will facilitate knowledge and experience exchange for the various stakeholder groups, beyond those already provided. This will promote best practice in both physical and information security and heighten security awareness generally. Only if all groups involved are prepared to open their minds to listen to and learn from, each other will a suitable global level of control be achieved. (authors)

  10. Security culture for nuclear facilities

    Science.gov (United States)

    Gupta, Deeksha; Bajramovic, Edita

    2017-01-01

    Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.

  11. Peace, Security, Globalisation & Cultural Diplomacy

    Directory of Open Access Journals (Sweden)

    Ashok Natarajan

    2017-06-01

    Full Text Available This article argues for a positive, comprehensive conception of peace that goes beyond the mere absence of war and a more integrated conception of human security that encompasses a wider range of issues than threats of physical violence. Education is one of humanity’s most effective social institutions for redirecting the violent physical energies of destruction into higher avenues of civilization and culture as an instrument of conscious social evolution. Organization is knowledge of higher accomplishment. Organization has the power to vastly accelerate and multiply the potentials of education for the promotion of peace and security. Peace and Security have a mutually reinforcing effect on each other in the sense that peace results in security while security results in peace. Physical violence eventually led to the development of the knowledge needed for the avoidance of violence by means of diplomacy, trade and cultural exchanges, marking the beginning of the transition from the physical to the mental level of evolution. Trade requires travel, transport, human interaction, exchange, trust with respect to products, and reliable mechanisms for the exchange of a stable currency that can only be effectively founded on an enduring peace that generates confidence among the traders. Isolated communities evolve a communal consciousness as they mature into organized social units founded on shared customs and culture, which later develop into a common legal framework. What began as diplomacy so many centuries ago has now evolved into a near universal recognition of fundamental human rights and the rule of law. The evolution of diplomacy in previous centuries is the foundation for the remarkable betterment of human life witnessed in recent times. The world is in the process of evolving a unifying global culture founded on universal values and recognition of the rich contributions of different cultures to humanity’s progress. As physical force once

  12. Enhancing QR Code Security

    OpenAIRE

    Zhang, Linfan; Zheng, Shuang

    2015-01-01

    Quick Response code opens possibility to convey data in a unique way yet insufficient prevention and protection might lead into QR code being exploited on behalf of attackers. This thesis starts by presenting a general introduction of background and stating two problems regarding QR code security, which followed by a comprehensive research on both QR code itself and related issues. From the research a solution taking advantages of cloud and cryptography together with an implementation come af...

  13. Safeguards Culture: Analogies from Safety Culture and Security Culture

    International Nuclear Information System (INIS)

    Naito, K.

    2013-01-01

    The terminology of 'safeguards culture' has been used loosely by safeguards experts as an essential element for establishing an organizational environment of stakeholders for the effective and efficient implementation of international safeguards. However, unlike the other two triplet brothers/ sisters of 3S's (Safety, Security, Safeguards), there is no formally established definition of safeguards culture. In the case of safety culture, INSAG (the International Nuclear Safety Advisory Group) has extensively dealt with its concept, elaborating its definition and key characteristics, and published its report, INSAG-4, as the IAEA Safety Series 75. On the other hand, security culture has also been defined by AdSec (the Advisory Group on Nuclear Security). In this paper, a provisional definition of safeguards culture is made on the analogies of safety culture and security culture, and an effort is made to describe essential elements of safeguards culture. It is proposed for SAGSI (the Standing Advisory Group on Safeguards Implementation) to formally consider the definition of safeguards culture and its characteristics. The paper is followed by the slides of the presentation. (author)

  14. Analyzing Security-Enhanced Linux Policy Specifications

    National Research Council Canada - National Science Library

    Archer, Myla

    2003-01-01

    NSA's Security-Enhanced (SE) Linux enhances Linux by providing a specification language for security policies and a Flask-like architecture with a security server for enforcing policies defined in the language...

  15. Formation of nuclear security culture in Ukraine

    Directory of Open Access Journals (Sweden)

    V. I. Gavryliuk

    2014-06-01

    Full Text Available Issues of nuclear security culture formation are considered in the article. Information on establishing and ac-tivity of Working Group for formation and development of nuclear security culture being held during 2010 – 2013 is given. An issue of regulation of activity on formation and development of nuclear security culture is il-lustrated. Analysis of the survey results regarding efficiency assessment of the work aimed to form and develop of nuclear security culture of nuclear facilities is carried out. The results show that the nuclear security culture of the most of nuclear facilities in Ukraine has been formed and is at the stage of development.

  16. Formation of nuclear security culture in Ukraine

    International Nuclear Information System (INIS)

    Gavrilyuk, V.Yi.; Gavrilyuk-Burakova, A.V.; Drapej, S.S.; Parkhomenko, V.V.; Proskuryin, D.V.; Romanova, O.P.

    2014-01-01

    Issues of nuclear security culture formation are considered in the article. Information on establishing and activity of Working Group for formation and development of nuclear security culture being held during 2010 - 2013 is given. An issue of regulation of activity on formation and development of nuclear security culture is illustrated. Analysis of the survey results regarding efficiency assessment of the work aimed to form and develop of nuclear security culture of nuclear facilities is carried out. The results show that the nuclear security culture of the most of nuclear facilities in Ukraine has been formed and is at the stage of development

  17. Radioactive source security: the cultural challenges.

    Science.gov (United States)

    Englefield, Chris

    2015-04-01

    Radioactive source security is an essential part of radiation protection. Sources can be abandoned, lost or stolen. If they are stolen, they could be used to cause deliberate harm and the risks are varied and significant. There is a need for a global security protection system and enhanced capability to achieve this. The establishment of radioactive source security requires 'cultural exchanges'. These exchanges include collaboration between: radiation protection specialists and security specialists; the nuclear industry and users of radioactive sources; training providers and regulators/users. This collaboration will facilitate knowledge and experience exchange for the various stakeholder groups, beyond those already provided. This will promote best practice in both physical and information security and heighten security awareness generally. Only if all groups involved are prepared to open their minds to listen to and learn from, each other will a suitable global level of control be achieved. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  18. Nuclear security culture: a generic model for universal application

    International Nuclear Information System (INIS)

    Khripunov, I.

    2005-01-01

    Full text: Nuclear security culture found its way into professional parlance several years ago, but still lacks an agreed-upon definition and description. The February 2005 U.S.-Russian Joint Statement, issued at the presidential summit meeting in Bratislava, referred specifically to security culture, focusing renewed attention on the concept. Numerous speakers at the March 2005 International Atomic Energy Agency's (IAEA) international conference on nuclear security referred to security culture, but their visions and interpretations were often at odds with one another. Clearly, there is a need for a generic model of nuclear security culture with universal applicability. Internationally acceptable standards in this area would be invaluable for evaluation, comparison, cooperation, and assistance. They would also help international bodies better manage their relations with the nuclear sectors in various countries. This paper will develop such a model. It will use the IAEA definition of nuclear security, and then apply Edgar Schein's model of organizational culture to security culture at a generic nuclear facility. A cultural approach to physical protection involves determining what attitudes and beliefs need to be established in an organization, how these attitudes and beliefs manifest themselves in the behavior of assigned personnel, and how desirable attitudes and beliefs can be transcribed into formal working methods to produce good outcomes, i.e., effective protection. The security-culture mechanism I will propose is broken into four major units: facility leadership, proactive policies and procedures, personnel performance, and learning and professional improvement. The paper will amplify on the specific traits characteristic of each of these units. Security culture is not a panacea. In a time of mounting terrorist threats, it should nonetheless be looked upon as a necessary organizational tool that enhances the skills of nuclear personnel and ensures that

  19. Three Modes of Thinking and Policy Orientation of Cultural Security

    Institute of Scientific and Technical Information of China (English)

    LIU Yuejin; Wang Xuege

    2016-01-01

    Three types of relations are entangled nowadays in dealing with issues conceming national cultural security on both the theoretical and practical levels:(1) the relation between one's own culture and that of other ethnic groups;(2) the relation between advanced and underdeveloped parts of culture;(3) the relation between one's ethnic culture and so-called foreign advanced culture as related to the previous two.Accordingly,three modes of thinking are likely adopted in handling issues concerning national cultural security:to antagonize one's own culture with that of other ethnic groups,that is,taking the "me or you" attitude;to dualize cultures as the "advanced" and the "underdeveloped",that is,believing things to be good if not bad,or vice versa;and to assert that the ethnic are the advanced,that is,taking the "only-megood" stance.It is a very demanding job to maintain national culture and to pursue cultural development at the same time.Only when cultures are grouped into those without distinction between the advanced and the underdeveloped and those with such distinction can the relation between the ethnic and the advanced be properly handled.With the former,it is essential to maintain the ethnicity of one's own culture before the cultural security is safeguarded.With the latter,however,the pursuit of advanced cultures and the advocacy of the advanced part of a particular culture is a key to ensuring and safeguarding the national cultural security.Hence,it is important to enhance the public awareness of cultural security,and more essentially for the government to offer scientifically appropriate orientation towards cultural security and to frame related policies.

  20. A study on the development of national guide for implementing nuclear security culture in ROK

    International Nuclear Information System (INIS)

    Koh, Moonsung; Lee, Youngwook; Yoo, Hosik

    2014-01-01

    Among the extended concepts, a remarkable thing is that nuclear security began to be focused on the human factor as well as technical factors (hardware and software system) because most security lapses at nuclear power facilities result from human failings such as low motivation, miscalculation, or malice. Nuclear Security Culture (NSC) is designed to improve the performance of the human factor and to make its interface with security technology and regulations more effective and smooth. There is a need to develop a variety of more efficient tools for achieving sustainable nuclear security culture. We studied for the implementing guide to establish and enhance the nuclear security culture. We have developed the Nuclear Security Culture Implementing Guidelines for licensees in order to enhance nuclear security culture. Licensees have separately established a separate code of conduct on nuclear security culture for their daily business based on such Implementing Guidelines. The Nuclear Security Culture Implementing Guidelines were developed with sufficient consideration of both the IAEA Security Series on nuclear security culture and the Korean circumstances. In all, the Korean government and licensees have timely established and applied the Implementing Guidelines and code of conduct and consequently paved the way for further improvements of the Korean nuclear security regime. The nuclear security culture will facilitate and optimize the human aspects in our nuclear security programs

  1. A study on the development of national guide for implementing nuclear security culture in ROK

    Energy Technology Data Exchange (ETDEWEB)

    Koh, Moonsung; Lee, Youngwook; Yoo, Hosik [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2014-05-15

    Among the extended concepts, a remarkable thing is that nuclear security began to be focused on the human factor as well as technical factors (hardware and software system) because most security lapses at nuclear power facilities result from human failings such as low motivation, miscalculation, or malice. Nuclear Security Culture (NSC) is designed to improve the performance of the human factor and to make its interface with security technology and regulations more effective and smooth. There is a need to develop a variety of more efficient tools for achieving sustainable nuclear security culture. We studied for the implementing guide to establish and enhance the nuclear security culture. We have developed the Nuclear Security Culture Implementing Guidelines for licensees in order to enhance nuclear security culture. Licensees have separately established a separate code of conduct on nuclear security culture for their daily business based on such Implementing Guidelines. The Nuclear Security Culture Implementing Guidelines were developed with sufficient consideration of both the IAEA Security Series on nuclear security culture and the Korean circumstances. In all, the Korean government and licensees have timely established and applied the Implementing Guidelines and code of conduct and consequently paved the way for further improvements of the Korean nuclear security regime. The nuclear security culture will facilitate and optimize the human aspects in our nuclear security programs.

  2. Development and analysis of security policies in security enhanced Android

    OpenAIRE

    Rimando, Ryan A.

    2012-01-01

    Approved for public release; distribution is unlimited. This thesis examines Security Enhanced Android. Both its policy and its additional security features are explored. The policy is examined in depth, providing a better understanding of the security provided by SE Android. We analyze the default SE Android policy. We identify a potential weakness and change the policy to facilitate control over communication channels. A proof-of-concept set of applications is developed to demonstrate ho...

  3. Evaluation of the nuclear security culture

    International Nuclear Information System (INIS)

    Spitalnik, Jorge

    2003-01-01

    The security culture of an organization resides in its workers and it is expressed by the way the personnel that works in a particular organization practice daily its activities. The security culture can be practice in a high or in a low level, but it always exists and it can always be improved. It is based on the security condition and procedures that have been established in the planning phase and in the implementation of a project. After its implantation, in order to avoid deterioration, basically it is necessary to maintain and to bring updated those conditions and procedures through strategies of follow up and control. This process establishes the basis of a program of maintenance and improvement of the Security Culture. Many self-evaluations that have been accomplished at nuclear organizations based on workers perception concerning working conditions and management environment, have permitted objectively determine if the security doctrine, which the organization assure to follow rigorously into its dally activities, is really so (LS)

  4. CAR SECURITY ENHANCEMENT IN PARKING AREAS

    OpenAIRE

    NANYONGA BERINDA; AYESIGA LINDSEY PATRA; BYEKWASO FAISAL; NATULINDA LADAN

    2017-01-01

    Over time, car thefts have been reported within Kampala parking areas. This has been majorly due to inefficient security measures of the available parking systems which focus mainly on the car and not the driver, making parking management a challenge. The focus of this survey was to explore the requirements of a new system called Car to Driver Matching Security System to enhance security of cars in Kampala, in particular, from the experience of 15 people. The data collected was then analyzed ...

  5. Enhanced security in the nuclear industry

    International Nuclear Information System (INIS)

    Frappier, G.

    2007-01-01

    This article describes the security in the nuclear industry. After 9/11, Canada's nuclear regulator - the Canadian Nuclear Safety Commission (CNSC) - determined that the entire industry (including its own organization) faced a need for significant enhancements in their approach to security.

  6. Strategy to Enhance International Supply Chain Security

    National Research Council Canada - National Science Library

    2007-01-01

    .... at 1901, 1903, October 13, 2006) which require the development of a strategic plan to enhance the security of the international supply chain, including protocols for the expeditious resumption of the flow of trade following...

  7. European Union security policy through strategic culture

    Directory of Open Access Journals (Sweden)

    Beriša Hatidža

    2014-01-01

    Full Text Available In this paper, we shall pay attention to the security policy of the European Union, through the strategic culture, starting from the existing various options for cooperation in the field of security and defense. Our goal is to look at the implementation of the Strategic Culture of the European Union (EU SK, research ways to improve the international position of the Union and its impact on policy cooperation and trust with other collectives. Analysis of flexible cooperation between the European Union, as well as access to special procedures in the field of security and defense policy, we will follow the ambition and capacity in implementing the same. Paper aims to introduce the idea of the European Union, which allows its members to rationally consider and check the box of options available to decision makers. In this regard, the EU seeks to build its own armed forces to protect the association of interests-investment terms. Reviewing and understanding the strategic culture of the EU by countries that are not its members can be seen as reasons for strengthening the capacity of the Union for the realization of the impact of the global security as well as predicting its future steps.

  8. Civil-military relations : enhancing international security

    OpenAIRE

    Fekete, Florian

    2003-01-01

    Approved for public release; distribution is unlimited The thesis describes how civil-military relations at the international level enhance international security, in particular, the way of development of international society in trying to orient its progress towards international peace, security and sustainable development. It focuses upon civil-military relationships in the League of Nations and the United Nations, the North Atlantic Treaty Organization, The International Committee of Re...

  9. A study on the promotion of nuclear security culture

    International Nuclear Information System (INIS)

    Tamai, Hiroshi; Tazaki, Makiko; Kokaji, Lisa; Shimizu, Ryo; Suda, Kazunori

    2015-01-01

    In recent years the promotion of nuclear security culture aiming at strengthening nuclear security is extensively mentioned, however, awareness of nuclear security culture seems to be not much high compared to the permeation of nuclear safety culture. As a world's leading country of peaceful nuclear use, permeation of nuclear security culture into various social classes must be one of important issues in Japan. Learning from the TEPCO Fukushima Daiichi nuclear power plant accident, complementarity between nuclear safety and nuclear security in the aspect of both protection measures has been profoundly recognised. Therefore, it will be natural to promote nuclear security culture modelled on the preceding nuclear safety culture. On this standpoint, the paper examines an approach for the promotion of nuclear security culture which, for example, consists of awareness cultivation, attitude progress, permeation assessment, and resulting in the establishment of PDCA Cycle. (author)

  10. An Enhanced Vigenere Cipher For Data Security

    Directory of Open Access Journals (Sweden)

    Aized Amin Soofi

    2015-08-01

    Full Text Available In todays world the amount of data that is exchanged has increased in the last few years so securing the information has become a crucial task. Cryptography is an art of converting plain text message into unreadable message. Encryption algorithms play an important role in information security systems. Encryption is considered as one of the most powerful tool for secure transmission of data over the communication network. Vigenere technique is an example of polyalphabetic stream cipher it has various limitations such as Kasiski and Friedman attack to find the length of encryption key. In this paper an enhanced version of traditional vigenere cipher has been proposed that eliminates the chances of Kaisiski and Friedman attack. Proposed technique also provides better security against cryptanalysis and pattern prediction.

  11. Needs for Development of Nuclear Security Culture in Korea

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yoo, Ho Sik; Kwack, Sung Woo; Lee, Ho Jin; Lee, Jong Uk

    2005-01-01

    Over the past several years, the growing international threat of terrorism has necessitated strengthening of physical protection and security of nuclear materials and facilities. A number of countries have made efforts in improving their physical protection system especially in the field of hardware such as security equipment. While security hardware is important, the efficient use of the equipment is yet another important issue, which depends on the operating personnel and their attitudes in performing their duties. Therefore, Security experts said that the nuclear security would not be completed without security culture. However, Nuclear Security Culture has not been introduced and developed in Korea. This paper introduces the concept and model of Nuclear Security Culture and raises awareness of the needs to develop the Nuclear Security Culture in Korea

  12. Security Culture in Physical Protection of Nuclear Material and Facility

    International Nuclear Information System (INIS)

    Susyanta-Widyatmaka; Koraag, Venuesiana-Dewi; Taswanda-Taryo

    2005-01-01

    In nuclear related field, there are three different cultures: safety, safeguards and security culture. Safety culture has established mostly in nuclear industries, meanwhile safeguards and security culture are relatively new and still developing. The latter is intended to improve the physical protection of material and nuclear facility. This paper describes concept, properties and factors affecting security culture and interactions among these cultures. The analysis indicates that anybody involving in nuclear material and facility should have strong commitment and awareness of such culture to establish it. It is concluded that the assessment of security culture outlined in this paper is still preliminary for developing and conduction rigorous security culture implemented in a much more complex facility such as nuclear power plant

  13. Modeling Security-Enhanced Linux Policy Specifications for Analysis (Preprint)

    National Research Council Canada - National Science Library

    Archer, Myla; Leonard, Elizabeth; Pradella, Matteo

    2003-01-01

    Security-Enhanced (SE) Linux is a modification of Linux initially released by NSA in January 2001 that provides a language for specifying Linux security policies and, as in the Flask architecture, a security server...

  14. Embedding security messages in existing processes: a pragmatic and effective approach to information security culture change

    CERN Document Server

    Lopienski, Sebastian

    Companies and organizations world-wide depend more and more on IT infrastructure and operations. Computer systems store vital information and sensitive data; computing services are essential for main business processes. This high dependency comes with a number of security risks, which have to be managed correctly on technological, organizational and human levels. Addressing the human aspects of information security often boils down just to procedures, training and awareness raising. On the other hand, employees and collaborators do not adopt security attitude and habits simply when told to do so – a real change in behaviour requires an established security culture. But how to introduce a security culture? This thesis outlines the need of developing or improving security culture, and discusses how this can be done. The proposed approach is to gradually build security knowledge and awareness, and influence behaviours. The way to achieve this is to make security communication pervasive by embedding security me...

  15. Enhancement of Email Security in Nuclear Malaysia

    International Nuclear Information System (INIS)

    Mohd Fauzi Haris; Raja Murzaferi Raja Moktar; Saaidi Ismail; Mohd Dzul Aiman Aslan; Mohamad Safuan Sulaiman

    2013-01-01

    Task to protect network and data security is not simple and easy. The more advance ICT technology available in the market, the more dependability to the knowledge, skills and appropriate tools would be in order one to cater these threats. Cyber security threats can be considered almost impossible to be demolished or at least to be avoided totally and what we really need is technical capabilities that may include appropriate knowledge and tools to reduce the cyber threats in the organization. Email is one of the important today's application that is being used by many people all around the globe either they are in corporate organizations, government bodies, students and teachers. The total number of worldwide email accounts is expected to increase from 3.3 billion accounts in 2012 to over 4.3 billion accounts by year-end 2016. This represents an average annual growth rate of 6% over the next four years [1]. Parallel with the increment of the usage, number of abusive and misuse of the email is also reported either in the form of spamming, delivery of malicious file attachments, phishing and others. These show the importance to tighten up the security of the email. This paper will discuss and share actions that have been taken by IT Center to enhance the security of official email application. (author)

  16. Safeguarding cultural properties security for museums, libraries, parks, and zoos

    CERN Document Server

    Layne, Stevan P

    2014-01-01

    Safeguarding Cultural Properties is a step-by-step guide for creating and maintaining a comprehensive security program in any cultural facility or public institution. Author Stevan P. Layne, the leading expert in the field of cultural property protection, draws from his many years of experience providing protection training and planning to more than 350 cultural and public institutions around the world. Designed especially for those with limited security budgets, the book provides a proven and effective program for hiring the right security personnel, selecting the appropriate electronic s

  17. Enhancing regional security agreements through cooperative monitoring

    International Nuclear Information System (INIS)

    Pregenzer, A.L.

    1995-05-01

    This paper proposes that strengthening regional capabilities for formulating and implementing arms control and confidence-building measures is a tangible method of enhancing regional security. It discusses the importance of developing a regional infrastructure for arms control and confidence building and elucidates the role of technology in facilitating regional arms control and confidence-building agreements. In addition, it identifies numerous applications for regional cooperative monitoring in the areas of arms control, resource management, international commerce and disaster response. The Cooperative Monitoring Center at Sandia National Laboratories, whose aim is to help individual countries and regions acquire the tools they need to develop their own solutions to regional problems, is discussed briefly. The paper ends with recommendations for establishing regional cooperative monitoring centers

  18. Building Nuclear Safety and Security Culture Within Regulatory Body

    International Nuclear Information System (INIS)

    Huda, K.

    2016-01-01

    To achieve a higher level of nuclear safety and security, it needs to develop the safety and security culture not only in the facility but also in the regulatory body. The regulatory body, especially needs to develop the safety and security culture within the organization, because it has a function to promote and oversee the culture in the facilities. In this sense, the regulatory body should become a role model. Development of the nuclear safety and security culture should be started by properly understanding its concept and awakening the awareness of individual and organization on the importance of nuclear safety and security. For effectiveness of the culture development in the regulatory body, the following steps are suggested to be taken: setting up of the regulatory requirements, self-assessment, independent assessment review, communication with the licensee, oversight of management system implementation, and integration with regulatory activities. The paper discusses those steps in the framework of development of nuclear safety and security culture in the regulatory body, as well as some important elements in building of the culture in the nuclear facilities. (author)

  19. Information security as part of the nuclear safety culture

    Energy Technology Data Exchange (ETDEWEB)

    Sitnica, A., E-mail: demetrkj@westinghouse.com [Westinghouse Electric Co., 1000 Westinghouse Drive, Cranberry Township, PA 16066 (United States)

    2016-09-15

    No industry, organization, individual or even the government is immune to the information security risks which are associated with nuclear power. It can no longer be ignored, delayed or treated as unimportant. Nuclear safety is paramount to our industry, and cyber security must be woven into the fabric of our safety culture in order to succeed. Achieving this in an environment which has remained relatively unchanged and conservative prior to digitalisation demands a shift in behavior and culture. (Author)

  20. Information security as part of the nuclear safety culture

    International Nuclear Information System (INIS)

    Sitnica, A.

    2016-09-01

    No industry, organization, individual or even the government is immune to the information security risks which are associated with nuclear power. It can no longer be ignored, delayed or treated as unimportant. Nuclear safety is paramount to our industry, and cyber security must be woven into the fabric of our safety culture in order to succeed. Achieving this in an environment which has remained relatively unchanged and conservative prior to digitalisation demands a shift in behavior and culture. (Author)

  1. A case for societal digital security culture

    NARCIS (Netherlands)

    Ben Othmane, L.; Weffers, H.T.G.; Ranchal, R.; Angin, P.; Bhargava, B.; Mohamad, M.M.; Janczewski, L.J.; Wolfe, H.B.; Shenoi, S.

    2013-01-01

    Information and communication technology systems, such as remote health care monitoring and smart mobility applications, have become indispensable parts of our lives. Security vulnerabilities in these systems could cause financial losses, privacy/safety compromises, and operational interruptions.

  2. Enhancing Parliamentary Oversight for Effective Security Sector ...

    African Journals Online (AJOL)

    2015-06-09

    Jun 9, 2015 ... transition from violent conflict or prolonged authoritarian rule. .... State whose primary interest was to secure his regime and prevent ... June 12, 1993 presidential elections triggered the emergence of violent non-state security.

  3. Enhancing Food Security through Information and Communication ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... national food security, and prior approval of the government's National Food Security and Nutrition Policy 2006-2015. In alignment with these governmental commitments, this project will enable researchers to provide policymakers with practical and sustainable solutions that directly respond to national food security goals ...

  4. Security culture: One for all, and all for one

    International Nuclear Information System (INIS)

    Gaspar, Milos

    2016-01-01

    Preventing the theft of nuclear material and attacks and sabotage against nuclear installations is a challenge that governments, nuclear regulators and operators around the world are increasingly facing. “Terrorism is a real threat that exists around the world and also in Indonesia. And it can affect nuclear security,” said Khairul Khairul, a senior nuclear security officer at Indonesia’s National Nuclear Energy Agency (BATAN), which operates three research reactors. “We need to strengthen the notion of nuclear security in our entire workforce by developing a strong nuclear security culture.”

  5. National security through the preservation and development of cultural sphere

    Directory of Open Access Journals (Sweden)

    Malakshinova N.Sh.

    2016-10-01

    Full Text Available matters of national security in the context of the inextricable interrelationship and interdependence of national security and socio-economic development are presented in the article. The particular attention is paid to the legislative consolidation of security categories, the system of national security elements, and changes in the domestic legislation updates. Therefore, safety, a list of national interests, highlighted by long-term perspective, and questions about the means of implementation of strategic national priorities, including the named culture as a sphere of life are very important. Sphere of culture as a national priority and an important factor in the quality of life growth and harmonization of public relations, collateral dynamic socio-economic development and the preservation of a common cultural space and sovereignty of Russia are studied more detailed.

  6. Security-Enhanced Autonomous Network Management

    Science.gov (United States)

    Zeng, Hui

    2015-01-01

    Ensuring reliable communication in next-generation space networks requires a novel network management system to support greater levels of autonomy and greater awareness of the environment and assets. Intelligent Automation, Inc., has developed a security-enhanced autonomous network management (SEANM) approach for space networks through cross-layer negotiation and network monitoring, analysis, and adaptation. The underlying technology is bundle-based delay/disruption-tolerant networking (DTN). The SEANM scheme allows a system to adaptively reconfigure its network elements based on awareness of network conditions, policies, and mission requirements. Although SEANM is generically applicable to any radio network, for validation purposes it has been prototyped and evaluated on two specific networks: a commercial off-the-shelf hardware test-bed using Institute of Electrical Engineers (IEEE) 802.11 Wi-Fi devices and a military hardware test-bed using AN/PRC-154 Rifleman Radio platforms. Testing has demonstrated that SEANM provides autonomous network management resulting in reliable communications in delay/disruptive-prone environments.

  7. Nuclear security culture in comparison with nuclear safety culture. Resemblances and differences

    International Nuclear Information System (INIS)

    Kawata, Norio

    2015-01-01

    Since the terrorist attacks on the U.S. on September 11th, 2001, Nuclear Security has been focused on and treated as a global issue in the international community and it has also been discussed as a real and serious threat to nuclear power plants in the world since 'The Great East Japan Earthquake' in March, 2011. The International Atomic Energy Agency (IAEA) issued a document including Nuclear Security Recommendations (INFCIRC/225/Rev.5) (NSS 13) in the Nuclear Security Series and emphasized the necessity of fostering Nuclear Security Culture. Nuclear Security Culture has been frequently discussed at various kinds of seminars and events. Since the officials in charge of Nuclear Security are familiar with the area of Nuclear Safety, the relationships between Nuclear Safety Culture and Nuclear Security Culture have been the point in controversy. This paper clarifies relevance between Nuclear Safety and Security, considers resemblances and differences of their concepts and lessons learned for each culture from nuclear power plant accidents, and promotes deeper understanding of Nuclear Safety and Nuclear Security Culture. (author)

  8. Parliamentary control of security information agency in terms of security culture: State and problems

    Directory of Open Access Journals (Sweden)

    Radivojević Nenad

    2013-01-01

    Full Text Available Even though security services have the same function as before, today they have different tasks and significantly more work than before. Modern security problems of the late 20th and early 21st century require states to reorganize their security services, adapting them to the new changes. The reorganization involves, among other things, giving wider powers of the security services, in order to effectively counter the growing and sophisticated security threats, which may also lead to violations of human rights and freedoms. It is therefore necessary to define the right competence, organization, authority and control of these services. In democratic countries, there are several institutions with different levels of control of security services. Parliament is certainly one of the most important institutions in that control, both in the world and in our country. Powers, finance, the use of special measures and the nature and scope of work of the Security Information Agency are certainly object of the control of the National Assembly. What seems to be the problem is achieving a balance between the need for control of security services and security services to have effective methods for combating modern security problems. This paper presents the legal framework related to the National Assembly control of the Security Intelligence Agency, as well as the practical problems associated with this type of control. We analyzed the role of security culture as one of the factors of that control. In this regard, it provides guidance for the practical work of the members of parliament who control the Security Intelligence Agency, noting in particular the importance of and the need for continuous improvement of security culture representatives.

  9. Survey Analysis on Nuclear Security Culture Recognition of Nuclear Facility in 2014

    International Nuclear Information System (INIS)

    Hong, Yunjeong; Lee, Jeongho; Kim, Jaekwang

    2015-01-01

    All organizations involved in implementing physical protection should give due priority to the security culture, to its development and maintenance necessary to ensure its effective implementation in the entire organization. In this context, Korea Institute of Non-proliferation and Control(KINAC) confirms recognition about protection of people who work in nuclear field and developed questionnaire for utilizing fundamental data for nuclear security culture enhancement activity and conducted a survey. As a result, systematic education needs to employees. Choosing differentiated topic is required to consider employees because recognition level of age, position and division is different. And a variety of education technology as obligatory education such as filling the course time or the one-off thing has limitation. And taking complementary measures needs since there were many opinions that employees feel difficult to understand papers such as regulation and guidelines and so on related security. Finally, we hope to make fundament available to evaluate nuclear security culture recognition level based on the existing questionnaire would be changed to realistic and enhancement in recognition survey for future nuclear security culture

  10. Survey Analysis on Nuclear Security Culture Recognition of Nuclear Facility in 2014

    Energy Technology Data Exchange (ETDEWEB)

    Hong, Yunjeong; Lee, Jeongho; Kim, Jaekwang [Korea Institute of Nonproliferation and Control International Nuclear Security Academy, Daejeon (Korea, Republic of)

    2015-05-15

    All organizations involved in implementing physical protection should give due priority to the security culture, to its development and maintenance necessary to ensure its effective implementation in the entire organization. In this context, Korea Institute of Non-proliferation and Control(KINAC) confirms recognition about protection of people who work in nuclear field and developed questionnaire for utilizing fundamental data for nuclear security culture enhancement activity and conducted a survey. As a result, systematic education needs to employees. Choosing differentiated topic is required to consider employees because recognition level of age, position and division is different. And a variety of education technology as obligatory education such as filling the course time or the one-off thing has limitation. And taking complementary measures needs since there were many opinions that employees feel difficult to understand papers such as regulation and guidelines and so on related security. Finally, we hope to make fundament available to evaluate nuclear security culture recognition level based on the existing questionnaire would be changed to realistic and enhancement in recognition survey for future nuclear security culture.

  11. Communications and Integration Enhancements to Improve Homeland Security

    National Research Council Canada - National Science Library

    Sando, Terrance W

    2007-01-01

    .... Homeland Security responses. These technology enhancements and processes combined with the force capabilities that the National Guard has recently created, when integrated with other national capabilities, will greatly improve...

  12. Enhancing Parliamentary Oversight for Effective Security Sector ...

    African Journals Online (AJOL)

    The provision of the most essential public good – security in accordance with the will of the people is very germane to the consolidation of democratic governance. Though, the Nigerian state is set to inaugurate her 8th National Assembly on 9th June, 2015, the capacity of the nation's parliamentary body (National Assembly) ...

  13. Enhancement of nuclear safety culture

    International Nuclear Information System (INIS)

    Anderson, Stanley J.

    1996-01-01

    Throughout the 40-year history of the commercial nuclear power industry, improvements have continually been made in the design of nuclear power plants and the equipment in them. In one sense, we have reached an enviable point -- in most plants, equipment failures have become relatively rare. Yet events continue to occur. Regardless of how much the plants are improved, that equipment is operated by people -- highly motivated, well-trained people -- but people nonetheless. And people occasionally make mistakes. By setting the right climate and by setting high standards, good plant management can reduce the number of mistakes made ? and also reduce their potential consequences. Another way to say this is that the proper safety culture must be established and continually improved upon in our nuclear plants. Safety culture is defined by the International Atomic Energy Agency as 'that assembly of characteristics and attitudes in organizations and individuals which establishes that, as an overriding priority, nuclear plant safety issues receive the attention that, as an overriding priority, nuclear plant safety issues receive the attention warranted by their significance.' In short, we must make safety our top priority

  14. Entanglement enhances security in quantum communication

    International Nuclear Information System (INIS)

    Demkowicz-Dobrzanski, Rafal; Sen, Aditi; Sen, Ujjwal; Lewenstein, Maciej

    2009-01-01

    Secret sharing is a protocol in which a 'boss' wants to send a classical message secretly to two 'subordinates', such that none of the subordinates is able to know the message alone, while they can find it if they cooperate. Quantum mechanics is known to allow for such a possibility. We analyze tolerable quantum bit error rates in such secret sharing protocols in the physically relevant case when the eavesdropping is local with respect to the two channels of information transfer from the boss to the two subordinates. We find that using entangled encoding states is advantageous to legitimate users of the protocol. We therefore find that entanglement is useful for secure quantum communication. We also find that bound entangled states with positive partial transpose are not useful as a local eavesdropping resource. Moreover, we provide a criterion for security in secret sharing--a parallel of the Csiszar-Koerner criterion in single-receiver classical cryptography.

  15. Enhancing Security and Stability in Afghanistan

    Science.gov (United States)

    2015-12-01

    Helmand and Kandahar, were as expected, but the ANDSF were also forced to confront insecurity at a higher level than expected in other parts of the...creating a sense of insecurity that undercuts perceptions of the Afghan government’s ability to provide security. The increase in violence over the...able to defeat the ANDSF on the battlefield in 2016, countering insurgent propaganda will remain a challenge as the insurgents advertise the perceived

  16. Good Manufacturing Practices (GMP) / Good Laboratory Practices (GLP) Review and Applicability for Chemical Security Enhancements

    Energy Technology Data Exchange (ETDEWEB)

    Iveson, Steven W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). International Chemical Security Threat Reduction

    2014-11-01

    Global chemical security has been enhanced through the determined use and integration of both voluntary and legislated standards. Many popular standards contain components that specifically detail requirements for the security of materials, facilities and other vital assets. In this document we examine the roll of quality management standards and how they affect the security culture within the institutions that adopt these standards in order to conduct business within the international market place. Good manufacturing practices and good laboratory practices are two of a number of quality management systems that have been adopted as law in many nations. These standards are designed to protect the quality of drugs, medicines, foods and analytical test results in order to provide the world-wide consumer with safe and affective products for consumption. These standards provide no established security protocols and yet manage to increase the security of chemicals, materials, facilities and the supply chain via the effective and complete control over the manufacturing, the global supply chains and testing processes. We discuss the means through which these systems enhance security and how nations can further improve these systems with additional regulations that deal specifically with security in the realm of these management systems. We conclude with a discussion of new technologies that may cause disruption within the industries covered by these standards and how these issues might be addressed in order to maintain or increase the level of security within the industries and nations that have adopted these standards.

  17. Developing the security culture at the SEISMED Reference Centres.

    Science.gov (United States)

    Fowler, J

    1996-01-01

    The paper gives a brief summary of the SEISMED project and the particular role played by the Reference Centres. Details are given of the hardware and application systems in use in the Royal Hospitals (NHS) Trust (RHT), one of the SEISMED Reference Centres. It proposes, without verification, a definition of a Security Culture based on three criteria. These are suggested to be the "Awareness" the "Acceptance" and the "Actions" of the management and staff to improve Information Systems Security throughout the RHT. The way that "Awareness" was increased is shown by the specific initiatives commenced as a result of a CRAMM Risk Analysis and the management and staff training programmes. The specific initiatives mentioned include, an Information Systems Security Policy, a contingency and disaster recovery plan, improvements in the physical protection of equipment and changes to the method of access control. The "Acceptance" by the staff of these measures is considered and the success or failure of "Developing A Security Culture" examined. The role of SEISMED in this process is assessed.

  18. Laboratory research irradiators with enhanced security features

    International Nuclear Information System (INIS)

    Srivastava, Piyush

    2016-01-01

    Over the years BRIT has developed state of art technology for laboratory research irradiators which are suited most for carrying out research and development works in the fields of radiation processing. These equipment which house radioactive sources up to 14 kCi are having a number of features to meet users requirements. They are manufactured as per the national and International standards of safety codes. The paper deals with design, development and application aspects of laboratory research irradiator called Gamma Chamber and also the new security features planned for incorporation in the equipment. Equipment are being regularly manufactured, supplied and installed by BRIT in India and Abroad. There is a number of such equipment in use at different institutions and are found to be very useful. (author)

  19. Laboratory research irradiators with enhanced security features

    International Nuclear Information System (INIS)

    Srivastava, Piyush

    2014-01-01

    Over the years BRIT has developed state of art technology for laboratory research irradiators which are suited most for carrying out research and development works in the fields of radiation processing. These equipment which house radioactive sources up to 14 kCi are having a number of features to meet users requirements. They are manufactured as per the national and International standards of safety codes. The paper deals with design, development and application aspects of laboratory research irradiator called Gamma Chamber and also the new security features planned for incorporation in the equipment. Equipment are being regularly manufactured, supplied and installed by BRIT in India and Abroad. There are a number of such equipment in use at different institutions and are found to be very useful. (author)

  20. Self-Assessment of Nuclear Security Culture in Facilities and Activities. Technical Guidance

    International Nuclear Information System (INIS)

    2017-01-01

    The IAEA has developed a comprehensive methodology for evaluating nuclear security culture. When implemented by a State, this methodology will help to make nuclear security culture sustainable. It will also promote cooperation and the sharing of good practices related to nuclear security culture. This publication is the first guidance for assessing nuclear security culture and analysing its strengths and weaknesses within a facility or activity, or an organization. It reflects, within the context of assessment, the nuclear security culture model, principles and criteria set out in the Implementing Guide, IAEA Nuclear Security Series No. 7. This guidance will be useful for organizations and operating facilities in conducting the self-assessment of nuclear security culture by providing practical methods and tools. It will also help regulatory bodies and other competent authorities to understand the self-assessment methodology used by operators, encourage operators to start the self-assessment process or, if appropriate, conduct independent assessments of nuclear security culture.

  1. Study on Enhancing nuclear security cooperation in Northeast Asia

    International Nuclear Information System (INIS)

    Lee, Jounghoon; Heo, Chul

    2015-01-01

    Regional and global cooperation in nuclear security was urged. Nevertheless, it is hard to seek a successful example of regional cooperation in nuclear security, with the exception of EURATOM. Northeast Asia which includes China, Russia, Japan, ROK and, DPRK has many nuclear issues. For example, the concerns of the international community were raised when the DPRK has conducted three nuclear tests. Countries in this region also possess many nuclear power plants and materials. However, there has been no attempt at creating a community or organization for multinational security in this region. In this paper, we discuss various ways of enhancing nuclear security cooperation in Northeast Asia. We begin with an examination of current global, regional and national nuclear security cooperation efforts. We then discuss directions and strategies for nuclear security cooperation in Northeast Asia, and offer some detailed cooperation agendas to be considers. Northeast Asia countries have tried to cooperate in many areas such as energy, environment, economy, and policy. However, nuclear security issues have not been discussed seriously. We need to start cooperating on nuclear security issues, because a nuclear security event may affect several countries. One country may not be able to respond to such an event independently. In order to gain cooperate in nuclear security, we have to be able to suggest pertinent agendas to Northeast Asia countries. R and D, education and training of nuclear security may be a good suggestion for starting cooperation. And more practical and detailed agendas such as joint response and information sharing may be suggested for cooperation strengthening

  2. Study on Enhancing nuclear security cooperation in Northeast Asia

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jounghoon; Heo, Chul [Korea Institute of Nuclear Non-proliferation and Control, Daejeon (Korea, Republic of)

    2015-10-15

    Regional and global cooperation in nuclear security was urged. Nevertheless, it is hard to seek a successful example of regional cooperation in nuclear security, with the exception of EURATOM. Northeast Asia which includes China, Russia, Japan, ROK and, DPRK has many nuclear issues. For example, the concerns of the international community were raised when the DPRK has conducted three nuclear tests. Countries in this region also possess many nuclear power plants and materials. However, there has been no attempt at creating a community or organization for multinational security in this region. In this paper, we discuss various ways of enhancing nuclear security cooperation in Northeast Asia. We begin with an examination of current global, regional and national nuclear security cooperation efforts. We then discuss directions and strategies for nuclear security cooperation in Northeast Asia, and offer some detailed cooperation agendas to be considers. Northeast Asia countries have tried to cooperate in many areas such as energy, environment, economy, and policy. However, nuclear security issues have not been discussed seriously. We need to start cooperating on nuclear security issues, because a nuclear security event may affect several countries. One country may not be able to respond to such an event independently. In order to gain cooperate in nuclear security, we have to be able to suggest pertinent agendas to Northeast Asia countries. R and D, education and training of nuclear security may be a good suggestion for starting cooperation. And more practical and detailed agendas such as joint response and information sharing may be suggested for cooperation strengthening.

  3. Secure Handshake in Wi-Fi Connection (A Secure and Enhanced Communication Protocol)

    OpenAIRE

    Ranbir Sinha; Nishant Behar; Devendra Singh

    2012-01-01

    This paper presents a concept of enhancing the security in wireless communication. A Computer Network is an interconnected group of autonomous computing nodes, which use a well-defined, mutually agreed set of rules and conventions known as protocols, interact with one-another meaningfully and allow resource sharing preferably in a predictable and controllable manner. Communication has a major impact on today’s business. It is desired to communicate data with high security. These days wireless...

  4. Migration, citizenship and cultural security: Case of Polish Immigrants in Reykjavik

    Directory of Open Access Journals (Sweden)

    Monika Nowicka

    2014-06-01

    Full Text Available The aim of this article is to analyze cultural security from the micro and meso perspective of immigrants. The paper covers following issues: cultural security in migration context, cultural citizenship, description of Polish diaspora in Reykjavik in the context of cultural activities and Icelandic support for immigrants’ cultural security. The article is based on researches carried out in Reykjavik in 2010 and in 2014 and on a desk research carried out in May 2014.

  5. Enhancing QKD security with weak measurements

    Science.gov (United States)

    Farinholt, Jacob M.; Troupe, James E.

    2016-10-01

    Publisher's Note: This paper, originally published on 10/24/2016, was replaced with a corrected/revised version on 11/8/2016. If you downloaded the original PDF but are unable to access the revision, please contact SPIE Digital Library Customer Service for assistance. In the late 1980s, Aharonov and colleagues developed the notion of a weak measurement of a quantum observable that does not appreciably disturb the system.1, 2 The measurement results are conditioned on both the pre-selected and post-selected state of the quantum system. While any one measurement reveals very little information, by making the same measurement on a large ensemble of identically prepared pre- and post-selected (PPS) states and averaging the results, one may obtain what is known as the weak value of the observable with respect to that PPS ensemble. Recently, weak measurements have been proposed as a method of assessing the security of QKD in the well-known BB84 protocol.3 This weak value augmented QKD protocol (WV-QKD) works by additionally requiring the receiver, Bob, to make a weak measurement of a particular observable prior to his strong measurement. For the subset of measurement results in which Alice and Bob's measurement bases do not agree, the weak measurement results can be used to detect any attempt by an eavesdropper, Eve, to correlate her measurement results with Bob's. Furthermore, the well-known detector blinding attacks, which are known to perfectly correlate Eve's results with Bob's without being caught by conventional BB84 implementations, actually make the eavesdropper more visible in the new WV-QKD protocol. In this paper, we will introduce the WV-QKD protocol and discuss its generalization to the 6-state single qubit protocol. We will discuss the types of weak measurements that are optimal for this protocol, and compare the predicted performance of the 6- and 4-state WV-QKD protocols.

  6. Nuclear Regulatory Systems in Africa: Improving Safety and Security Culture Through Education and Training

    International Nuclear Information System (INIS)

    Kazadi Kabuya, F.

    2016-01-01

    The purpose of this paper is to address the important issue of supporting safety and security culture through an educational and training course program designed both for regulatory staff and licensees. Enhancing the safety and security of nuclear facilities may involve assessing the overall effectiveness of the organization's safety culture. Safety Culture implies steps such as identifying and targeting areas requiring attention, putting emphasis on organizational strengths and weaknesses, human attitudes and behaviours that may positively impact an organization's safety culture, resulting in improving workplace safety and developing and maintaining a high level of awareness within these facilities. Following the terrorist attacks of September 11, 2001, international efforts were made towards achieving such goals. This was realized through meetings, summits and training courses events, with main aim to enhance security at facilities whose activities, if attacked, could impact public health and safety. During regulatory oversight inspections undertaken on some licensee's premises, violations of security requirements were identified. They mostly involved inadequate management oversight of security, lack of a questioning attitude, complacency and mostly inadequate training in both security and safety issues. Using training and education approach as a support to raise awareness on safety and security issues in the framework of improving safety and security culture, a tentative training program in nuclear and radiological safety was started in 2002 with the main aim of vulgarizing the regulatory framework. Real first needs for a training course program were identified among radiographers and radiologists with established working experience but with limited knowledge in radiation safety. In the field of industrial uses of radiation the triggering events for introducing and implementing a training program were: the loss of a radioactive source in a mining

  7. Enhanced Security for Online Exams Using Group Cryptography

    Science.gov (United States)

    Jung, I. Y.; Yeom, H. Y.

    2009-01-01

    While development of the Internet has contributed to the spread of online education, online exams have not been widely adopted. An online exam is defined here as one that takes place over the insecure Internet, and where no proctor is in the same location as the examinees. This paper proposes an enhanced secure online exam management environment…

  8. Transportation Security : federal action needed to enhance security efforts : statement of Peter Guerrero, Director, Physical Infrastructure Issues

    Science.gov (United States)

    2003-09-09

    Mr. Guerrero's testimony examines (1) challenges in securing the nation's transportation system; (2) actions transportation operators, as well as state and local governments, have taken since September 11 to enhance security; (3) the federal role in ...

  9. Nuclear safety and security culture - an integrated approach to regulatory oversight

    International Nuclear Information System (INIS)

    Tronea, M.; Ciurea Ercau, C.

    2013-01-01

    The paper presents the development and implementation of regulatory guidelines for the oversight of safety and security culture within licensees organizations. CNCAN (the National Commission for Nuclear Activities of Romania) has used the International Atomic Energy Agency (IAEA) attributes for a strong safety culture as the basis for its regulatory guidelines providing support to the reviewers and inspectors for recognizing and gathering information relevant to safety culture. These guidelines are in process of being extended to address also security culture, based on the IAEA Nuclear Security Series No. 7 document Nuclear Security Culture: Implementing Guide. Recognizing that safety and security cultures coexist and need to reinforce each other because they share the common objective of limiting risk and that similar regulatory review and inspection processes are in place for nuclear security oversight, an integrated approach is considered justified, moreover since the common elements of these cultures outweigh the differences. (authors)

  10. An empirical investigation to analysis the dimensions of cultural security: A case study of educational system

    Directory of Open Access Journals (Sweden)

    Elyas Nouraei

    2013-02-01

    Full Text Available The purpose of this study is to explore the concept of cultural security and its practical implications in a case study of educational system. There are several definitions of culture, which describe different aspects of cultural security. In fact, cultural security tends to show various behaviors, thinking, beliefs and other people’s perspectives in a society, which represents the overall circumstances. Cultural security and its issues make it possible to have a clear image of a society or community. This paper aims to identify the important dimensions of cultural security in terms of basic components of cultural security identified in a framework. Therefore, after identifying the components, using a questionnaire, required data are gathered from the universities of the city of Ilam, Iran and they are analyzed by SPSS18.0 software and its appropriate statistical tests.

  11. Security Enhancement for Data Migration in the Cloud

    Directory of Open Access Journals (Sweden)

    Jean Raphael Ngnie Sighom

    2017-06-01

    Full Text Available In today’s society, cloud computing has significantly impacted nearly every section of our lives and business structures. Cloud computing is, without any doubt, one of the strategic directions for many companies and the most dominating infrastructure for enterprises as long as end users. Instead of buying IT equipment (hardware and/or software and managing it themselves, many organizations today prefer to buy services from IT service providers. The number of service providers increase dramatically and the cloud is becoming the tools of choice for more cloud storage services. However, as more personal information and data are moved to the cloud, into social media sites, DropBox, Baidu WangPan, etc., data security and privacy issues are questioned. Daily, academia and industry seek to find an efficient way to secure data migration in the cloud. Various solution approaches and encryption techniques have been implemented. In this work, we will discuss some of these approaches and evaluate the popular ones in order to find the elements that affect system performance. Finally, we will propose a model that enhances data security and privacy by combining Advanced Encryption Standard-256, Information Dispersal Algorithms and Secure Hash Algorithm-512. Our protocol achieves provable security assessments and fast execution times for medium thresholds.

  12. Security-Enhanced Push Button Configuration for Home Smart Control.

    Science.gov (United States)

    Han, Junghee; Park, Taejoon

    2017-06-08

    With the emergence of smart and converged home services, the need for the secure and easy interplay of various devices has been increased. Push Button Configuration (PBC) is one of the technologies proposed for easy set-up of a secure session between IT and consumer devices. Although the Wi-Fi Direct specification explicitly states that all devices must support the PBC method, its applicability is very limited. This is because the security vulnerability of PBC can be maliciously exploited so that attackers can make illegitimate sessions with consumer devices. To address this problem, this paper proposes a novel Security-enhanced PBC (SePBC) scheme with which we can uncover suspicious or malicious devices. The proposed mechanism has several unique features. First, we develop a secure handshake distance measurement protocol by preventing an adversary sitting outside the region from maliciously manipulating its distance to be fake. Second, it is compatible with the original Wi-Fi PBC without introducing a brand-new methodology. Finally, SePBC uses lightweight operations without CPU-intensive cryptography computation and employs inexpensive H/W. Moreover, it needs to incur little overhead when there is no attack. This paper also designs and implements the proposed SePBC in the real world. Our experimental results and analysis show that the proposed SePBC scheme effectively defeats attacks on PBC while minimizing the modification of the original PBC equipment.

  13. Enhancing water security in a rapidly developing shale gas region

    Directory of Open Access Journals (Sweden)

    Shannon Holding

    2017-06-01

    New hydrological insights for the region: Initiatives and tools enhancing water security in the region include strategic partnerships and stakeholder collaborations, policy and regulation development, and data collection and distribution efforts. The contributions and limitations of each of these are discussed. A vulnerability mapping framework is presented which addresses data gaps and provides a tool for decision-making surrounding risk to water quality from various hazards. An example vulnerability assessment was conducted for wastewater transport along pipeline and trucking corridors.

  14. Microsoft Windows Server 2003: Security Enhancements and New Features

    National Research Council Canada - National Science Library

    Montehermoso, Ronald

    2004-01-01

    .... Windows NT and Windows 2000 were known to have numerous security vulnerabilities; hence Microsoft focused on improving security by making Windows Server 2003 secure by design, secure by default, secure in deployment...

  15. Windows Vista Kernel-Mode: Functions, Security Enhancements and Flaws

    Directory of Open Access Journals (Sweden)

    Mohammed D. ABDULMALIK

    2008-06-01

    Full Text Available Microsoft has made substantial enhancements to the kernel of the Microsoft Windows Vista operating system. Kernel improvements are significant because the kernel provides low-level operating system functions, including thread scheduling, interrupt and exception dispatching, multiprocessor synchronization, and a set of routines and basic objects.This paper describes some of the kernel security enhancements for 64-bit edition of Windows Vista. We also point out some weakness areas (flaws that can be attacked by malicious leading to compromising the kernel.

  16. Culture, Structure and Leadership Impacts on Gender Inclusion in the Security Sector

    Science.gov (United States)

    2017-09-01

    Culture, structure and leadership impacts on gender inclusion in the security sector 1 DANIEL K. INOUYE ASIA PACIFIC CENTER FOR SECURITY...STUDIES OCCASIONAL PAPER, SEPTEMBER 2017 Culture, structure and leadership impacts on gender inclusion in the security sector Canyon DV Abstract...Depending on your perspective, the primary challenge to gender inclusion is either culture, structure or leadership . The good news is that they are all

  17. The role of national security culture in crisis management : the case of Kardak crisis

    OpenAIRE

    Savaş, Özlem

    2008-01-01

    Ankara : The Department of International Relations, Bilkent University, 2008. Thesis (Master's) -- Bilkent University, 2008. Includes bibliographical references leaves 94-103. This thesis analyzes the role of national security culture in crisis management. The use and significance of national security culture in the management of a crisis is the main concern discussed throughout this study. It is assumed that national security culture serves as the main guideline of states d...

  18. Electronuclear's safety culture assessment and enhancement program

    International Nuclear Information System (INIS)

    Selvatici, E.; Diaz-Francisco, J.M.; Diniz de Souza, V.

    2002-01-01

    The present paper describes the Eletronuclear's safety culture assessment and enhancement program. The program was launched by the company's top management one year after the creation of Eletronuclear in 1997, from the merging of two companies with different organizational cultures, the design and engineering company Nuclen and the nuclear directorate of the Utility Furnas, Operator of the Angra1 NPP. The program consisted of an assessment performed internally in 1999 with the support and advice of the IAEA. This assessment, performed with the help of a survey, pooled about 80% of the company's employees. The overall result of the assessment was that a satisfactory level of safety culture existed; however, a number of points with a considerable margin for improvement were also identified. These points were mostly related with behavioural matters such as motivation, stress in the workplace, view of mistakes, handling of conflicts, and last but not least a view by a considerable number of employees that a conflict between safety and production might exist. An Action Plan was established by the company managers to tackle these weak points. This Plan was issued as company guideline by the company's Directorate. The subsequent step was to detail and implement the different actions of the Plan, which is the phase that we are at present. In the detailing of the Action Plan, special care was taken to sum up efforts, avoiding duplication of work or competition with already existing programs. In this process it was identified that the company had a considerable number of initiatives directly related to organizational and safety culture improvement, already operational. These initiatives have been integrated in the detailed Action Plan. A new assessment, for checking the effectiveness of the undertaken actions, is planned for 2003. (author)

  19. Application of the Concept of Intrusion Tolerant System for Evaluating Cyber Security Enhancements

    International Nuclear Information System (INIS)

    Lee, Chanyoung; Seong, Poong Hyun

    2016-01-01

    One of the major problems is that nuclear industry is in very early stage in dealing with cyber security issues. It is because that cyber security has received less attention compared to other safety problems. In addition, late adoption of digital I and C systems has resulted in lower level of cyber security advancements in nuclear industry than ones in other industries. For the cyber security of NPP I and C systems, many regulatory documents, guides and standards were already published. These documents include cyber security plans, methods for cyber security assessments and comprehensive set of security controls. However, methods which can help assess how much security is improved if a specific security control is applied are not included in these documents. Hence, NPP I and C system designers may encounter difficulties when trying to apply security controls with limited structure and cost. In order to provide useful information about cyber security issues including cyber security enhancements, this paper suggests a framework to evaluate how much cyber security is improved when a specific cyber security enhancement is applied in NPPs. In order to provide useful information about cyber security issues including cyber security enhancements, this paper suggests a framework to evaluate how much cyber security is improved when a specific cyber security enhancement is applied in NPPs. The extent of cyber security improvement caused by security enhancement was defined as reduction ratio of the failure probability to secure the system from cyber-attack as Eq.1. The concept of 'intrusion tolerant system' was applied to not only prevent cyber-attacks but also limit the extent of damage in this study. For applying the concept of intrusion tolerant system to NPP, the event tree was constructed with some assumptions. Cyber security improvement caused by cyber security enhancement can be estimated as Eq.3. By comparing current system to the enhanced system, it is possible to

  20. Application of the Concept of Intrusion Tolerant System for Evaluating Cyber Security Enhancements

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Chanyoung; Seong, Poong Hyun [KAIST, Daejeon (Korea, Republic of)

    2016-10-15

    One of the major problems is that nuclear industry is in very early stage in dealing with cyber security issues. It is because that cyber security has received less attention compared to other safety problems. In addition, late adoption of digital I and C systems has resulted in lower level of cyber security advancements in nuclear industry than ones in other industries. For the cyber security of NPP I and C systems, many regulatory documents, guides and standards were already published. These documents include cyber security plans, methods for cyber security assessments and comprehensive set of security controls. However, methods which can help assess how much security is improved if a specific security control is applied are not included in these documents. Hence, NPP I and C system designers may encounter difficulties when trying to apply security controls with limited structure and cost. In order to provide useful information about cyber security issues including cyber security enhancements, this paper suggests a framework to evaluate how much cyber security is improved when a specific cyber security enhancement is applied in NPPs. In order to provide useful information about cyber security issues including cyber security enhancements, this paper suggests a framework to evaluate how much cyber security is improved when a specific cyber security enhancement is applied in NPPs. The extent of cyber security improvement caused by security enhancement was defined as reduction ratio of the failure probability to secure the system from cyber-attack as Eq.1. The concept of 'intrusion tolerant system' was applied to not only prevent cyber-attacks but also limit the extent of damage in this study. For applying the concept of intrusion tolerant system to NPP, the event tree was constructed with some assumptions. Cyber security improvement caused by cyber security enhancement can be estimated as Eq.3. By comparing current system to the enhanced system, it is

  1. USign--a security enhanced electronic consent model.

    Science.gov (United States)

    Li, Yanyan; Xie, Mengjun; Bian, Jiang

    2014-01-01

    Electronic consent becomes increasingly popular in the healthcare sector given the many benefits it provides. However, security concerns, e.g., how to verify the identity of a person who is remotely accessing the electronic consent system in a secure and user-friendly manner, also arise along with the popularity of electronic consent. Unfortunately, existing electronic consent systems do not pay sufficient attention to those issues. They mainly rely on conventional password based authentication to verify the identity of an electronic consent user, which is far from being sufficient given that identity theft threat is real and significant in reality. In this paper, we present a security enhanced electronic consent model called USign. USign enhances the identity protection and authentication for electronic consent systems by leveraging handwritten signatures everyone is familiar with and mobile computing technologies that are becoming ubiquitous. We developed a prototype of USign and conducted preliminary evaluation on accuracy and usability of signature verification. Our experimental results show the feasibility of the proposed model.

  2. The Importance of the Security Culture in SMEs as Regards the Correct Management of the Security of Their Assets

    Directory of Open Access Journals (Sweden)

    Antonio Santos-Olmo

    2016-07-01

    Full Text Available The information society is increasingly more dependent on Information Security Management Systems (ISMSs, and the availability of these kinds of systems is now vital for the development of Small and Medium-Sized Enterprises (SMEs. However, these companies require ISMSs that have been adapted to their special features, and which are optimized as regards the resources needed to deploy and maintain them. This article shows how important the security culture within ISMSs is for SMEs, and how the concept of security culture has been introduced into a security management methodology (MARISMA is a Methodology for “Information Security Management System in SMEs” developed by the Sicaman Nuevas Tecnologías Company, Research Group GSyA and Alarcos of the University of Castilla-La Mancha. for SMEs. This model is currently being directly applied to real cases, thus allowing a steady improvement to be made to its implementation.

  3. Strengthening Safety Culture as an Overriding Priority, in Achieving Global Nuclear Security Approach

    International Nuclear Information System (INIS)

    Kolundzija, V.

    2006-01-01

    In the IAEA glossary safety culture is defined as the assembly of characteristics and attitudes in organizations and individuals, which establishes that, as an overriding priority, protection and safety issues receive the attention warranted by their significance. It has been observed that a safety culture, as a part of both security and safety, possesses a few obstacles that should be noticed: safety culture cannot be directly regulated; variation in national cultures means that what constitutes as a good approach to enhancing safety culture in one country may not be the best approach in another. Three stages have been identified in developing and strengthening safety culture: 1 A technical issue (rules and regulations)/ first stage 2 Good safety performance (primarily in terms of safety targets or goals)/ second stage 3 A continuing process of improvement to which everyone can contribute/ third stage There are several key issues in safety culture, such as: a commitment, use of procedures, a conservative decision making (STAR) a reporting culture. Organizations and individuals should have attention on these. Overall common goals are to achieve and maintain a high level of safety and security of radioactive sources as well as facilities. Measures that are concerned on safeguards restrict access to the radioactive sources, conditioning and/or recycling of sources, and systems for detection the passage of the radioactive sources at strategic points, have gained main support. The main partners in implementation these measures are: IAEA, USA, Russian Federation, G8- Global Partnership, and European Union The member states of the IAEA have at their disposal internationally agreed standards. Current differences in applying standards in the IAEA member states are mainly related to state preparedness to cope with demands. Developing and less developed countries with small and medium nuclear programmes have difficulties to accept rules and regulations, to establish

  4. The Globalization of Higher Education as a Societal and Cultural Security Problem

    Science.gov (United States)

    Samier, Eugenie A.

    2015-01-01

    In this article, I propose a theory of the globalization of higher education as societal and cultural security problems for many regions of the world. The first section examines the field of security studies for theoretical frameworks appropriate to critiquing globalized higher education, including critical human, societal and cultural security…

  5. On China’s Social Security System and Traditional Chinese Culture

    Institute of Scientific and Technical Information of China (English)

    谢浙

    2017-01-01

    This paper explores the interrelation between China’s social security system and traditional Chinese culture, pointing out the meaning of the study, and that China’s social security system is a carrier and representation of traditional Chinese culture and

  6. Methodology for considering environments and culture in developing information security systems

    OpenAIRE

    Mwakalinga, G Jeffy; Kowalski, Stewart; Yngström, Louise

    2009-01-01

    In this paper, we describe a methodology for considering culture of users and environments when developing information security systems. We discuss the problem of how researchers and developers of security for information systems have had difficulties in considering culture of users and environments when they develop information security systems. This has created environments where people serve technology instead of technology serving people. Users have been considered just as any other compo...

  7. Enhancing energy security in Malayia: the challenges towards sustainable environment

    International Nuclear Information System (INIS)

    Sahid, E J M; Peng, L Y; Siang, C Ch

    2013-01-01

    Energy is known as one of the essential ingredients for economic development and security of energy supply is crucial in ensuring continuous economic development of a country. Malaysia's proven domestic oil reserves are estimated to last for another 25 years, while that of gas for another 39 years as of 2011. Despite the depleting indigenous energy resources, the primary energy demand has continued to grow robustly, at an annual rate of 6.3 percent per year from 1990 to 2010, while the primary energy import has grown 7.2% per year and the primary energy export has grown at a slower rate of 1.9% per year. This worrying trend is further compounded by the faster rate of primary oil import averaging 10.5% per year while the primary energy export has shrink at a rate of 1.4% per year. This paper has identified two main concerns namely overdependence on fossil fuel and increasing energy import dependency in creating a precarious position towards energy self-sufficiency. The study will analyse the energy security of the country and explore possible options and challenges in enhancing the energy supply security toward sustainable environment.

  8. Security Enhancement of Wireless Sensor Networks Using Signal Intervals

    Directory of Open Access Journals (Sweden)

    Jaegeun Moon

    2017-04-01

    Full Text Available Various wireless technologies, such as RF, Bluetooth, and Zigbee, have been applied to sensor communications. However, the applications of Bluetooth-based wireless sensor networks (WSN have a security issue. In one pairing process during Bluetooth communication, which is known as simple secure pairing (SSP, the devices are required to specify I/O capability or user interference to prevent man-in-the-middle (MITM attacks. This study proposes an enhanced SSP in which a nonce to be transferred is converted to a corresponding signal interval. The quantization level, which is used to interpret physical signal intervals, is renewed at every connection by the transferred nonce and applied to the next nonce exchange so that the same signal intervals can represent different numbers. Even if attackers eavesdrop on the signals, they cannot understand what is being transferred because they cannot determine the quantization level. Furthermore, the proposed model does not require exchanging passkeys as data, and the devices are secure in the case of using a fixed PIN. Subsequently, the new quantization level is calculated automatically whenever the same devices attempt to connect with each other. Therefore, the pairing process can be protected from MITM attacks and be convenient for users.

  9. Security Enhancement of Wireless Sensor Networks Using Signal Intervals.

    Science.gov (United States)

    Moon, Jaegeun; Jung, Im Y; Yoo, Jaesoo

    2017-04-02

    Various wireless technologies, such as RF, Bluetooth, and Zigbee, have been applied to sensor communications. However, the applications of Bluetooth-based wireless sensor networks (WSN) have a security issue. In one pairing process during Bluetooth communication, which is known as simple secure pairing (SSP), the devices are required to specify I/O capability or user interference to prevent man-in-the-middle (MITM) attacks. This study proposes an enhanced SSP in which a nonce to be transferred is converted to a corresponding signal interval. The quantization level, which is used to interpret physical signal intervals, is renewed at every connection by the transferred nonce and applied to the next nonce exchange so that the same signal intervals can represent different numbers. Even if attackers eavesdrop on the signals, they cannot understand what is being transferred because they cannot determine the quantization level. Furthermore, the proposed model does not require exchanging passkeys as data, and the devices are secure in the case of using a fixed PIN. Subsequently, the new quantization level is calculated automatically whenever the same devices attempt to connect with each other. Therefore, the pairing process can be protected from MITM attacks and be convenient for users.

  10. The enhancement of security in healthcare information systems.

    Science.gov (United States)

    Liu, Chia-Hui; Chung, Yu-Fang; Chen, Tzer-Shyong; Wang, Sheng-De

    2012-06-01

    With the progress and the development of information technology, the internal data in medical organizations have become computerized and are further established the medical information system. Moreover, the use of the Internet enhances the information communication as well as affects the development of the medical information system that a lot of medical information is transmitted with the Internet. Since there is a network within another network, when all networks are connected together, they will form the "Internet". For this reason, the Internet is considered as a high-risk and public environment which is easily destroyed and invaded so that a relevant protection is acquired. Besides, the data in the medical network system are confidential that it is necessary to protect the personal privacy, such as electronic patient records, medical confidential information, and authorization-controlled data in the hospital. As a consequence, a medical network system is considered as a network requiring high security that excellent protections and managerial strategies are inevitable to prevent illegal events and external attacks from happening. This study proposes secure medical managerial strategies being applied to the network environment of the medical organization information system so as to avoid the external or internal information security events, allow the medical system to work smoothly and safely that not only benefits the patients, but also allows the doctors to use it more conveniently, and further promote the overall medical quality. The objectives could be achieved by preventing from illegal invasion or medical information being stolen, protecting the completeness and security of medical information, avoiding the managerial mistakes of the internal information system in medical organizations, and providing the highly-reliable medical information system.

  11. Safety Culture Enhancement Project. Final Report. A Field Study on Approaches to Enhancement of Safety Culture

    International Nuclear Information System (INIS)

    Lowe, Andrew; Hayward, Brent

    2006-08-01

    This report documents a study with the objective of enhancing safety culture in the Swedish nuclear power industry. A primary objective of this study was to ensure that the latest thinking on human factors principles was being recognised and applied by nuclear power operators as a means of ensuring optimal safety performance. The initial phase of the project was conducted as a pilot study, involving the senior management group at one Swedish nuclear power-producing site. The pilot study enabled the project methodology to be validated after which it was repeated at other Swedish nuclear power industry sites, providing a broad-ranging analysis of opportunities across the industry to enhance safety culture. The introduction to this report contains an overview of safety culture, explains the background to the project and sets out the project rationale and objectives. The methodology used for understanding and analysing the important safety culture issues at each nuclear power site is then described. This section begins with a summary of the processes used in the information gathering and data analysis stage. The six components of the Management Workshops conducted at each site are then described. These workshops used a series of presentations, interactive events and group exercises to: (a) provide feedback to site managers on the safety culture and safety leadership issues identified at their site, and (b) stimulate further safety thinking and provide 'take-away' information and leadership strategies that could be applied to promote safety culture improvements. Section 3, project Findings, contains the main observations and output from the project. These include: - a brief overview of aspects of the local industry operating context that impinge on safety culture; - a summary of strengths or positive attributes observed within the safety culture of the Swedish nuclear industry; - a set of identified opportunities for further improvement; - the aggregated results of the

  12. Safety Culture Enhancement Project. Final Report. A Field Study on Approaches to Enhancement of Safety Culture

    Energy Technology Data Exchange (ETDEWEB)

    Lowe, Andrew; Hayward, Brent (Dedale Asia Pacific, Albert Park VIC 3206 (Australia))

    2006-08-15

    This report documents a study with the objective of enhancing safety culture in the Swedish nuclear power industry. A primary objective of this study was to ensure that the latest thinking on human factors principles was being recognised and applied by nuclear power operators as a means of ensuring optimal safety performance. The initial phase of the project was conducted as a pilot study, involving the senior management group at one Swedish nuclear power-producing site. The pilot study enabled the project methodology to be validated after which it was repeated at other Swedish nuclear power industry sites, providing a broad-ranging analysis of opportunities across the industry to enhance safety culture. The introduction to this report contains an overview of safety culture, explains the background to the project and sets out the project rationale and objectives. The methodology used for understanding and analysing the important safety culture issues at each nuclear power site is then described. This section begins with a summary of the processes used in the information gathering and data analysis stage. The six components of the Management Workshops conducted at each site are then described. These workshops used a series of presentations, interactive events and group exercises to: (a) provide feedback to site managers on the safety culture and safety leadership issues identified at their site, and (b) stimulate further safety thinking and provide 'take-away' information and leadership strategies that could be applied to promote safety culture improvements. Section 3, project Findings, contains the main observations and output from the project. These include: - a brief overview of aspects of the local industry operating context that impinge on safety culture; - a summary of strengths or positive attributes observed within the safety culture of the Swedish nuclear industry; - a set of identified opportunities for further improvement; - the aggregated

  13. Breaching cultural silence: enhancing resilience among Ugandan ...

    African Journals Online (AJOL)

    Cultural silence is frequently the outcome of deep-seated taboos regarding adults talking to children about sex and death. This paper examines the impact of cultural silence on the resilience of children orphaned by AIDS in Uganda. Cultural silence is often linked with denial. This article explores the complexities of cultural ...

  14. A case for avoiding security-enhanced HTTP tools to improve security for Web-based applications

    Energy Technology Data Exchange (ETDEWEB)

    Wood, B.

    1996-03-01

    This paper describes some of the general weaknesses of the current popular Hypertext Transmission Protocol (HTTP) security standards and products in an effort to show that these standards are not appealing for many applications. The author will then show how one can treat HTTP browsers and servers as untrusted elements in the network so that one can rely on other mechanisms to achieve better overall security than can be attained through today`s security-enhanced HTTP tools.

  15. Considerations on a concept of nuclear security culture and its development

    International Nuclear Information System (INIS)

    Miyamoto, Naoki

    2013-01-01

    In March 2012, domestic regulations regarding physical protection measures of nuclear facilities were amended to strengthen those measures. By these amendments, nuclear operators were requested to stipulate their corporate system to develop nuclear security culture on their physical protection plans, and therefore, attention has been drawn on a concept of nuclear security culture and its development. In the light of these situations, this presentation will consider the concept of nuclear security culture and its development. Firstly, focusing attention on 'culture', a concept of 'corporate culture' which is emphasized in corporate management will be analyzed. Then, with reference to 'safety culture', elements that seems to correspond to the concept of nuclear security culture will be extracted. Secondly, particularizing a 'corporate system to develop nuclear security culture', by reviewing a notion of 'Corporate Social Responsibility (CSR)' which attracts lots of attention recent years in terms of corporate sustainable development, results of examination regarding commitment structure of corporate chief executive and corporate risk management framework, which are considered to be efficient for the development of nuclear security culture, will be reported. (author)

  16. [The comparative evaluation of level of security culture in medical organizations].

    Science.gov (United States)

    Roitberg, G E; Kondratova, N V; Galanina, E V

    2016-01-01

    The study was carried out on the basis of clinic “Medicine” in 2014-2015 concerning security culture. The sampling included 465 filled HSPSC questionnaires. The comparative analysis of received was implemented. The “Zubovskaia district hospital” Having no accreditation according security standards and group of clinics from USA functioning for many years in the system of patient security support were selected as objects for comparison. The evaluation was implemented concerning dynamics of security culture in organization at implementation of strategies of security of patients during 5 years and comparison of obtained results with USA clinics was made. The study results demonstrated that in conditions of absence of implemented standards of security in medical organization total evaluation of security remains extremely low. The study of security culture using HSPSC questionnaire is an effective tool for evaluating implementation of various strategies of security ofpatient. The functioning in the system of international standards of quality, primarily JCI standards, permits during several years to achieve high indices of security culture.

  17. Exploring undergraduate midwifery students' readiness to deliver culturally secure care for pregnant and birthing Aboriginal women.

    Science.gov (United States)

    Thackrah, Rosalie D; Thompson, Sandra C; Durey, Angela

    2015-04-16

    Culturally secure health care settings enhance accessibility by Aboriginal Australians and improve their satisfaction with service delivery. A culturally secure health service recognises and responds to the legitimate cultural rights of the recipients of care. Focus is upon the health care system as well as the practice and behaviours of the individuals within it. In an attempt to produce culturally secure practitioners, the inclusion of Aboriginal content in health professional programs at Australian universities is now widespread. Studies of medical students have identified the positive impact of this content on knowledge and attitudes towards Aboriginal people but relatively little is known about the responses of students in other health professional education programs. This study explored undergraduate midwifery students' knowledge and attitudes towards Aboriginal people, and the impact of Aboriginal content in their program. The study surveyed 44 students who were in their first, second and third years of a direct entry, undergraduate midwifery program at a Western Australian (WA) university. The first year students were surveyed before and after completion of a compulsory Aboriginal health unit. Second and third year students who had already completed the unit were surveyed at the end of their academic year. Pre- and post-unit responses revealed a positive shift in first year students' knowledge and attitudes towards Aboriginal people and evidence that teaching in the unit was largely responsible for this shift. A comparison of post-unit responses with those from students in subsequent years of their program revealed a significant decline in knowledge about Aboriginal issues, attitudes towards Aboriginal people and the influence of the unit on their views. Despite this, all students indicated a strong interest in more clinical exposure to Aboriginal settings. The inclusion of a unit on Aboriginal health in an undergraduate midwifery program has been shown to

  18. Secure and privacy enhanced gait authentication on smart phone.

    Science.gov (United States)

    Hoang, Thang; Choi, Deokjai

    2014-01-01

    Smart environments established by the development of mobile technology have brought vast benefits to human being. However, authentication mechanisms on portable smart devices, particularly conventional biometric based approaches, still remain security and privacy concerns. These traditional systems are mostly based on pattern recognition and machine learning algorithms, wherein original biometric templates or extracted features are stored under unconcealed form for performing matching with a new biometric sample in the authentication phase. In this paper, we propose a novel gait based authentication using biometric cryptosystem to enhance the system security and user privacy on the smart phone. Extracted gait features are merely used to biometrically encrypt a cryptographic key which is acted as the authentication factor. Gait signals are acquired by using an inertial sensor named accelerometer in the mobile device and error correcting codes are adopted to deal with the natural variation of gait measurements. We evaluate our proposed system on a dataset consisting of gait samples of 34 volunteers. We achieved the lowest false acceptance rate (FAR) and false rejection rate (FRR) of 3.92% and 11.76%, respectively, in terms of key length of 50 bits.

  19. Secure and Privacy Enhanced Gait Authentication on Smart Phone

    Directory of Open Access Journals (Sweden)

    Thang Hoang

    2014-01-01

    Full Text Available Smart environments established by the development of mobile technology have brought vast benefits to human being. However, authentication mechanisms on portable smart devices, particularly conventional biometric based approaches, still remain security and privacy concerns. These traditional systems are mostly based on pattern recognition and machine learning algorithms, wherein original biometric templates or extracted features are stored under unconcealed form for performing matching with a new biometric sample in the authentication phase. In this paper, we propose a novel gait based authentication using biometric cryptosystem to enhance the system security and user privacy on the smart phone. Extracted gait features are merely used to biometrically encrypt a cryptographic key which is acted as the authentication factor. Gait signals are acquired by using an inertial sensor named accelerometer in the mobile device and error correcting codes are adopted to deal with the natural variation of gait measurements. We evaluate our proposed system on a dataset consisting of gait samples of 34 volunteers. We achieved the lowest false acceptance rate (FAR and false rejection rate (FRR of 3.92% and 11.76%, respectively, in terms of key length of 50 bits.

  20. Distributed fiber optic sensing enhances pipeline safety and security

    Energy Technology Data Exchange (ETDEWEB)

    Frings, Jochen; Walk, Tobias [ILF Consulting Engineers, Munich (Germany)

    2011-09-15

    Pipelines are efficient, highly reliable and safe means of transportation. However, despite intensive right of way surveillance by foot, car and out of the air, pipeline leaks and illegal tappings are a reality - sometimes with catastrophic results. These events show a gap in real-time monitoring caused by the highly distributed nature of pipelines. Parts of this gap now can be closed with distributed fiber optic sensing technology. Using various physical effects this technology is apt to detect temperature, strain, vibrations and sound with very good localization over spans up to 50 km with a single sensor cable. Various field tested applications like leakage detection, third party activity monitoring and intrusion detection or ground movement detection as well as integrity monitoring proof that distributed fiber optic sensing can enhance pipeline safety and security. (orig.)

  1. Culture of socio-economic security of Ukraine: Challenges in XXIst Century

    Directory of Open Access Journals (Sweden)

    Olesya Ihorivna Datsko

    2015-12-01

    Full Text Available It is argued, that the culture of social- economic security has impact on the socio-economic development of state. It is formed at several levels of human interaction: with oneself, other people, work, environment, community groups, state, world, God. It is proved that low level of culture of socio-economic security of Ukraine's population, especially state leaders has a destructive effect on the economic development, labour potential, and increasing level of corruption. The necessity to develop a culture of social- economic security in the state economic policy is proved.

  2. Enhanced infectivity of bluetongue virus in cell culture by centrifugation.

    OpenAIRE

    Sundin, D R; Mecham, J O

    1989-01-01

    The effects of centrifugation of the infection of cell culture with bluetongue virus (BTV) were investigated. Baby hamster kidney cells were infected with BTV with or without centrifugation. Viral antigen was detected by immunofluorescence at 24 h in both centrifuged and noncentrifuged cultures. However, after 24 h of infection, the production of PFU in centrifuged cell cultures was 10- to 20-fold greater than that seen in cultures not centrifuged. In addition, centrifugation enhanced the dir...

  3. Culturing Security System of Chemical Laboratory in Indonesia

    Directory of Open Access Journals (Sweden)

    Eka Dian Pusfitasari

    2017-04-01

    Full Text Available Indonesia has experiences on the lack of chemical security such as: a number of bombing terrors and hazardous chemicals found in food. Bomb used in terror is a homemade bomb made from chemicals which are widely spread in the research laboratories such as a mixture of pottasium chlorate, sulphur, and alumunium. Therefore, security of chemicals should be implemented to avoid the misused of the chemicals. Although it has experienced many cases of the misuse of chemicals, and many regulations and seminars related to chemical security have been held, but the implementation of chemical security is still a new thing for Indonesian citizens. The evident is coming from the interviews conducted in this study. Questions asked in this interview/survey included: the implementation of chemical safety and chemical security in laboratory; chemical inventory system and its regulation; and training needed for chemical security implementation. Respondents were basically a researcher from Government Research Institutes, University laboratories, senior high school laboratories, and service laboratories were still ambiguous in distinguishing chemical safety and chemical security. Because of this condition, most Indonesia chemical laboratories did not totally apply chemical security system. Education is very important step to raise people awareness and address this problem. Law and regulations should be sustained by all laboratory personnel activities to avoid chemical diversion to be used for harming people and environment. The Indonesia Government could also develop practical guidelines and standards to be applied to all chemical laboratories in Indonesia. These acts can help Government’s efforts to promote chemical security best practices which usually conducted by doing seminars and workshop.

  4. Nuclear Safety and Security Culture Within the Regulatory Body in Romania

    International Nuclear Information System (INIS)

    Tronea, M.

    2016-01-01

    The paper (poster) presents the activities implemented in the Nuclear Fuel Cycle Division of CNCAN (National Commission for Nuclear Activities Control) for promoting nuclear safety and security culture. (author)

  5. Culture: protection, safety and security connections toward good practices

    International Nuclear Information System (INIS)

    Rozental, Jose Julio

    2005-01-01

    This paper discusses concepts and connections on Protection, Safety and Security, considering many IAEA recent documents and international congress on the subject and basic regulation recommendation to developing countries toward the establishment of adequate capacity to deal with

  6. The Path to a Culturally Relevant National Security Strategy

    National Research Council Canada - National Science Library

    Frappler, John

    2008-01-01

    .... In an attempt to remain ahead of its enemies in the prosecution of the GWOT, the United States has proceeded with an extensive review of its National Security Strategy and an historic transformation...

  7. Culturing Security System of Chemical Laboratory in Indonesia

    OpenAIRE

    Pusfitasari, Eka Dian

    2017-01-01

    Indonesia has experiences on the lack of chemical security such as: a number of bombing terrors and hazardous chemicals found in food. Bomb used in terror is a homemade bomb made from chemicals which are widely spread in the research laboratories such as a mixture of pottasium chlorate, sulphur, and alumunium. Therefore, security of chemicals should be implemented to avoid the misused of the chemicals. Although it has experienced many cases of the misuse of chemicals, and many regulations and...

  8. Considerations to Enhance the Florida Domestic Security Strategic Plan

    Science.gov (United States)

    2011-03-01

    security strategies. vi THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. INTRODUCTION ...Thank you all. xvi THIS PAGE INTENTIONALLY LEFT BLANK 1 I. INTRODUCTION A. PROBLEM STATEMENT After the terrorist attacks of September 11, 2001...State Homeland Security Strategy (Nebraska Emergency Mangement Agency, 2009) • Vermont Homeland Security Strategy (Vermont Department of Public

  9. Critical Conversations and the Role of Dialogue in Delivering Meaningful Improvements in Safety and Security Culture

    International Nuclear Information System (INIS)

    Brissette, S.

    2016-01-01

    Significant scholarship has been devoted to research into safety culture assessment methodologies. These focus on the development, delivery and interpretations of safety culture surveys and other assessment techniques to assure reliable outcomes that provide insights into the safety culture of an organization across multiple dimensions. The lessons from this scholarship can be applied to the emerging area of security culture assessments as the nuclear industry broadens its focus on this topic. The aim of this paper is to discuss the value of establishing mechanisms, immediately after an assessment and regularly between assessments, to facilitate a structured dialogue among leaders around insights derived from an assessment, to enable ongoing improvements in safety and security culture. The leader’s role includes both understanding the current state of culture, the “what is”, and creating regular, open and informed dialogue around their role in shaping the culture to achieve “what should be”.

  10. cultural differences in coordination decisions within interdependent security context

    OpenAIRE

    ju, linlin

    2009-01-01

    Abstract The purpose of this study is to investigate cultural differences in coordination decisions in a coordination game with considering IDS context. IDS context is introduced into a coordination game since it recently draws more and more people’s attention. The concepts of individualism/collectivism as the key aspects of culture variability are introduced into the cultural differences study. It is assumed that Chinese people are more collectivistic and more likely to coordinate each ot...

  11. Enhancing Global Health Security: US Africa Command's Disaster Preparedness Program.

    Science.gov (United States)

    Morton Hamer, Melinda J; Reed, Paul L; Greulich, Jane D; Beadling, Charles W

    2018-03-07

    US Africa Command's Disaster Preparedness Program (DPP), implemented by the Center for Disaster and Humanitarian Assistance Medicine, partnered with US Government agencies and international organizations to promote stability and security on the African continent by engaging with African Partner Nations' (PN) civil and military authorities to improve disaster management capabilities. From 2008 to 2015, DPP conducted disaster preparedness and response programming with 17 PNs. DPP held a series of engagements with each, including workshops, strategic planning, developing preparedness and response plans, tabletop exercises, and prioritizing disaster management capability gaps identified through the engagements. DPP partners collected data for each PN to further capacity building efforts. Thus far, 9 countries have completed military pandemic plans, 10 have developed national pandemic influenza plans, 9 have developed military support to civil authorities plans, and 11 have developed disaster management strategic work plans. There have been 20 national exercises conducted since 2009. DPP was cited as key in implementation of Ebola response plans in PNs, facilitated development of disaster management agencies in DPP PNs, and trained nearly 800 individuals. DPP enhanced PNs' ability to prepare and respond to crises, fostering relationships between international agencies, and improving civil-military coordination through both national and regional capacity building. (Disaster Med Public Health Preparedness. 2018;page 1 of 11).

  12. 77 FR 25188 - Extension of Agency Information Collection Activity Under OMB Review: Enhanced Security...

    Science.gov (United States)

    2012-04-27

    ... general aviation (GA) aircraft operators who wish to fly into and/or out of Ronald Reagan Washington.... Information Collection Requirement Title: Enhanced Security Procedures at Ronald Reagan Washington National...] Extension of Agency Information Collection Activity Under OMB Review: Enhanced Security Procedures at Ronald...

  13. Enhancing cultural competence in medical education

    DEFF Research Database (Denmark)

    Sorensen, Janne; Norredam, Marie; Dogra, Nisha

    2017-01-01

    the project Culturally Competent in Medical Education involving 13 partners from 11 countries.4 The project aimed to support the implementation of CC in medical curricula. First, a Delphi Study involving 34 experts was conducted to develop a framework of core cultural competencies for medical school teachers...... stage of the project was a survey conducted to identify the strengths, gaps, and limitations of CC in the programmes of the 13 medical school project partners. Based on the Delphi study and survey findings, we created guidelines for the development and delivery of CC training at medical schools.4...... The proposed guidelines were presented in September 2015 in Amsterdam at a workshop entitled: “How to integrate cultural competence in medical education”. A range of participants attended the workshop, including the project partners, deans and faculty members of Dutch medical schools, physicians, and students...

  14. Novel Approaches to Enhance Mobile WiMAX Security

    Directory of Open Access Journals (Sweden)

    Taeshik Shon

    2010-01-01

    Full Text Available The IEEE 802.16 Working Group on Broadband Wireless Access Standards released IEEE 802.16-2004 which is a standardized technology for supporting broadband and wireless communication with fixed and nomadic access. After the IEEE 802.16-2004 standard, a new advanced and revised standard was released as the IEEE 802.16e-2005 amendment which is foundation of Mobile WiMAX network supporting handover and roaming capabilities. In the area of security aspects, compared to IEEE 802.16-2004, IEEE 802.16e, called Mobile WiMAX, adopts improved security architecture—PKMv2 which includes EAP authentication, AES-based authenticated encryption, and CMAC or HMAC message protection. However, there is no guarantee that PKMv2-based Mobile WiMAX network will not have security flaws. In this paper, we investigate the current Mobile WiMAX security architecture focusing mainly on pointing out new security vulnerabilities such as a disclosure of security context in network entry, a lack of secure communication in network domain, and a necessity of efficient handover supporting mutual authentication. Based on the investigation results, we propose a novel Mobile WiMAX security architecture, called RObust and Secure MobilE WiMAX (ROSMEX, to prevent the new security vulnerabilities.

  15. Banana Musa tissue culture plants enhanced by endophytic fungi

    African Journals Online (AJOL)

    Mo

    Merging biotechnology with biological control: Banana Musa tissue culture plants enhanced by endophytic .... While working in the laminar flow cabinet, sterile filter papers were placed in ..... University of Bonn, Bonn, Germany. Niere, B., 2001.

  16. Enhancement of Diosgenin Production in Plantlet and Cell Cultures ...

    African Journals Online (AJOL)

    Enhancement of Diosgenin Production in Plantlet and Cell Cultures of Dioscorea zingiberensis by Palmarumycin C13 from the Endophytic fungus, Berkleasmium sp. Dzf12. Y Mou, K Zhou, D Xu, R Yu, J Li, C Yin, L Zhou ...

  17. Rotary culture enhances pre-osteoblast aggregation and mineralization.

    Science.gov (United States)

    Facer, S R; Zaharias, R S; Andracki, M E; Lafoon, J; Hunter, S K; Schneider, G B

    2005-06-01

    Three-dimensional environments have been shown to enhance cell aggregation and osteoblast differentiation. Thus, we hypothesized that three-dimensional (3D) growth environments would enhance the mineralization rate of human embryonic palatal mesenchymal (HEPM) pre-osteoblasts. The objective of this study was to investigate the potential use of rotary cell culture systems (RCCS) as a means to enhance the osteogenic potential of pre-osteoblast cells. HEPM cells were cultured in a RCCS to create 3D enviroments. Tissue culture plastic (2D) cultures served as our control. 3D environments promoted three-dimensional aggregate formations. Increased calcium and phosphorus deposition was significantly enhanced three- to 18-fold (P < 0.001) in 3D cultures as compared with 2D environments. 3D cultures mineralized in 1 wk as compared with the 2D cultures, which took 4 wks, a decrease in time of nearly 75%. In conclusion, our studies demonstrated that 3D environments enhanced osteoblast cell aggregation and mineralization.

  18. Enhancing the Safety and Security of Radioactive Sources

    International Nuclear Information System (INIS)

    Hickey, J.

    2004-01-01

    The NRC initiatives to improve safety and security of sources began before 091101 and include both international and domestic activities. They supported the development and implementation of the IAEA Code of Conduct, which provides categorization of sources of concern, based on risk, improvement of regulatory programs of all member countries and improvement of safety and security of sources. International activities include the IAEA International Conference on Security of Sources (Vienna, Austria, March, 2003), the trilateral cooperation with Canada and Mexico, the assistance to individual countries to improve security and the proposed rule on export and import of radioactive material. The domestic initiatives are to issue the security orders and advisories to licensees, issue the panoramic irradiator orders (June 2003), issue the manufacturer orders (January 2004), complete the interim national source inventory, develop the national source tracking system, maintain the orphan source registration and retrieval program and upgrade the emergency preparedness

  19. Security enhancement of double random phase encoding using rear-mounted phase masking

    Science.gov (United States)

    Chen, Junxin; Zhang, Yu; Li, Jinchang; Zhang, Li-bo

    2018-02-01

    In this paper, a security enhancement for double random phase encoding (DRPE) by introducing a rear-mounted phase masking procedure is presented. Based on exhaustively studying the cryptanalysis achievements of DRPE and its variants, invalidation of the second lens, which plays a critical role in cryptanalyzing processes, is concluded. The improved system can exploit the security potential of the second lens and consequently strengthen the security of DRPE. Experimental results and security analyses are presented in detail to demonstrate the security potential of the proposed cryptosystem.

  20. Results of nuclear security culture survey on personnel at nuclear power plants

    International Nuclear Information System (INIS)

    Yoo, Hosik; Lee, Jeong-Ho

    2015-01-01

    Highlights: • A new surveying questionnaire for evaluating the security awareness of personnel was developed. • The developed surveying tools consist of four categories and 44 questions in total. • The surveying tools developed in this study can be used in other countries. - Abstract: A survey to evaluate awareness of the nuclear security culture of personnel at nuclear facilities was developed. The survey was made up of a series of questionnaires that were divided into four categories, beliefs and attitude, operating systems, leadership behaviors and staff behaviors. Each category contained six to 16 questions. The category on beliefs and attitude was composed of questions that asked plant workers on how much consideration facility personnel give to issues of security when doing his/her work. The section pertaining to operating systems for nuclear security consisted of questions on guidance documents, information security, and education and training. The questions on leadership behaviors were separated into two parts, one for managers and another for staff. These include questions relating to communication between management and staff, surveillance work related to nuclear security and the sharing of information. The last category of questions concerned staff behaviors. It consisted of questions on knowledge, procedures and implementation related to nuclear security. A survey was conducted on 858 people who worked at nuclear power plants using the questionnaire that was developed in this study. The survey was performed between October 7 to 17, 2014. The survey results were collected and analyzed. A numerical value was given to each question, so that the results of the survey were represented as a score. The data revealed that awareness of the nuclear security culture increased with age. This increase stopped when staff members entered their 50s. It is believed that a person in his/her 50s has a greater degree of experience and passion for their work than

  1. Biometric Enhancement of Home and Office Security to Reduce ...

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    Biometrics security technology uses the physiological and ... verification and authentication methodology to verify how facial screening explores the different ... mouth, nose etc and stores the bio-information extracted from the face of every ...

  2. A Cyber Federal Deposit Insurance Corporation Achieving Enhanced National Security

    Science.gov (United States)

    2017-12-21

    machine is being bridged by wearables, augmented reality (AR), and artificial intelligence (AI). In this near-future the uncanny valley no longer...and security represent key pol- icy, security, and business tradeoffs, connectivity and national cybersecurity are similarly dialectical choices. On...Consumer Electronics Show (CES), is at once the digital sycophant’s dream and the cybersecurity hermit’s nightmare, as each connected gewgaw and

  3. Enhancing Financial Security in Agricultural Business: Financial and Property Aspects

    OpenAIRE

    Yuliya Bezdushna

    2014-01-01

    The article provides the analysis of information support for the developing agrarian businesses financial security activities. The impact of financial statements on financial security has been proved through generalization procedure of such calculating indicators as operating margin, return on assets, total liquidity ratio and financial autonomy ratio. A causal effect between mass underestimation of operating fixed assets in accounting and inflated profitability rates in agribusinesses operat...

  4. Using the competing values framework (CVF to investigate organisational culture in a major private security company

    Directory of Open Access Journals (Sweden)

    D Kokt

    2011-06-01

    Full Text Available The proliferation of crime, especially in the South African context, has placed considerable emphasis on the private security industry.  This has also increased fierce competition in the private security domain with both national and international private security companies infiltrating the South African market.  Like public policing private security has an important role to play in combating crime and other transgressions, with the exception that private security owes its existence to paying customers.  By using the Competing Values Framework (CVF as conceptual guide, the researchers are able to provide the managers of the company under investigation with insight on how their cultural orientation affects their functioning and ultimately their competitive advantage.

  5. Enhancing China’s energy security: Determining influential factors and effective strategic measures

    International Nuclear Information System (INIS)

    Ren, Jingzheng; Sovacool, Benjamin K.

    2014-01-01

    Highlights: • The most influential factors affecting China’s energy security are identified. • Fuzzy AHP is used to quantify the importance of influential factors. • Strategic measures for enhancing China’s energy security are prioritized. • Fuzzy AHP is used to determine the priorities of the strategic measures. - Abstract: This study investigates the most influential factors affecting China’s energy security. It also identifies the most effective strategic measures for enhancing it. Fuzzy AHP has been used to determine weights for ranking the importance of Chinese energy security factors, and it has also been used to determine the priorities of the strategic measures with respect to enhancing those same factors. The study argues that a low proportion of renewable energy penetration is the most severe factor threatening China’s energy security, and that conducting research and development on energy technologies and improving energy efficiency is the most salient, positive, and necessary strategic measure

  6. Viability of Hydrogen Pathways that Enhance Energy Security: A Comparison of China and Denmark

    DEFF Research Database (Denmark)

    Ren, Jingzheng; Andreasen, Kristian Peter; Sovacool, Benjamin

    2014-01-01

    When designed and built properly, hydrogen energy systems can enhance energy security through technological diversification and minimizing dependence on foreign imports of energy fuels. However, hydrogen can be produced from different feedstocks according to separate pathways, and these different...... pathways create particular consequences on a nation's overall energy security. The objective of this study is to investigate the superiorities and inferiorities of hydrogen pathways from the perspective of China and Denmark, and to determine which pathways best contribute to national energy security...

  7. Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2015-07-01

    Full Text Available Information technology (IT security has become a major concern due to the growing demand for information and massive development of client/server applications for various types of applications running on modern IT infrastructure. How has security been taken into account and which paradigms are necessary to minimize security issues while increasing efficiency, reducing the influence on transmissions, ensuring protocol independency and achieving substantial performance? We have found cryptography to be an absolute security mechanism for client/server architectures, and in this study, a new security design was developed with the MODBUS protocol, which is considered to offer phenomenal performance for future development and enhancement of real IT infrastructure. This study is also considered to be a complete development because security is tested in almost all ways of MODBUS communication. The computed measurements are evaluated to validate the overall development, and the results indicate a substantial improvement in security that is differentiated from conventional methods.

  8. Cultures differ in the ability to enhance affective neural responses.

    Science.gov (United States)

    Varnum, Michael E W; Hampton, Ryan S

    2017-10-01

    The present study (N = 55) used an event-related potential paradigm to investigate whether cultures differ in the ability to upregulate affective responses. Using stimuli selected from the International Affective Picture System, we found that European-Americans (N = 29) enhanced central-parietal late positive potential (LPP) (400-800 ms post-stimulus) responses to affective stimuli when instructed to do so, whereas East Asians (N = 26) did not. We observed cultural differences in the ability to enhance central-parietal LPP responses for both positively and negativelyvalenced stimuli, and the ability to enhance these two types of responses was positively correlated for Americans but negatively for East Asians. These results are consistent with the notion that cultural variations in norms and values regarding affective expression and experiences shape how the brain regulates emotions.

  9. Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. Paramasivan

    2014-01-01

    Full Text Available Mobile ad hoc networks (MANETs are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  10. Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.

    Science.gov (United States)

    Paramasivan, B; Kaliappan, M

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  11. Enhancing MISP with Fast Mobile IPv6 Security

    Directory of Open Access Journals (Sweden)

    Ilsun You

    2011-01-01

    Full Text Available The Mobile Broadband Association has developed the MIS and MISAUTH protocols as link-layer fast authentication protocols. A combination of MIS and MISAUTH protocols, called as MISP, provides secure and fast connection for a wireless access network, but it has been reported that MISP creates a weak session key and suffers from a denial-of-service attack. In addition, a transaction with an authentication server that is required for every authentication is considered as a delay factor during handovers. In this paper, we present an improvement of MISP that utilizes the fast handover approach of Fast Mobile IPv6 and minimizes an involvement of the authentication server while eliminating identified security drawbacks of MISP. The formal security analysis is performed to verify the correctness of the proposed scheme. Moreover, the handover performance of the proposed scheme is compared with an existing scheme.

  12. Enhancement of erythroid colony growth in culture by hemin

    International Nuclear Information System (INIS)

    Porter, P.N.; Meints, R.H.; Mesner, K.

    1979-01-01

    Hemin was found to enhance the growth of murine erythroid colonies in culture. In the presence of 100 mU/ml erythropoietin (EPO), the addition of hemin (0.05-0.2 mM) resulted in the growth of twice as many colonies as were obtained with EPO alone. Hemin also significantly increased erythroid colony formation in culture in the absence of added EPO. Hemoblobin synthesis as measured by the incorporation of 59 Fe into cyclohexanone extractable heme was augmented in culture by hemin. Neither Δ-aminolevulinic acid, a hemin precursor, nor FeCl 3 increased colony number. (author)

  13. Enhancing security of DICOM images during storage and ...

    Indian Academy of Sciences (India)

    Brain tumour Image is in DICOM standard (Rosslyn 1996) in which the patient informa- tion including name, birth date, gender, history are included in object classes. This information is sensitive to the patient and important for radiologist diagnosis. Data security becomes an important issue when brain tumour images are ...

  14. Managing climatic risks for enhanced food security: Key information capabilities

    NARCIS (Netherlands)

    Balaghi, R.; Badjeck, M.C.; Bakari, D.; Pauw, de E.D.; Wit, de A.J.W.; Defourny, P.; Donato, S.; Gommes, R.; Jlibene, M.; Ravelo, A.C.; Sivakumar, M.V.K.; Telahigue, N.; Tychon, B.

    2010-01-01

    Food security is expected to face increasing challenges from climatic risks that are more and more exacerbated by climate change, especially in the developing world. This document lists some of the main capabilities that have been recently developed, especially in the area of operational

  15. Enhanced ATM Security using Biometric Authentication and Wavelet Based AES

    Directory of Open Access Journals (Sweden)

    Sreedharan Ajish

    2016-01-01

    Full Text Available The traditional ATM terminal customer recognition systems rely only on bank cards, passwords and such identity verification methods are not perfect and functions are too single. Biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. This paper presents a highly secured ATM banking system using biometric authentication and wavelet based Advanced Encryption Standard (AES algorithm. Two levels of security are provided in this proposed design. Firstly we consider the security level at the client side by providing biometric authentication scheme along with a password of 4-digit long. Biometric authentication is achieved by considering the fingerprint image of the client. Secondly we ensure a secured communication link between the client machine to the bank server using an optimized energy efficient and wavelet based AES processor. The fingerprint image is the data for encryption process and 4-digit long password is the symmetric key for the encryption process. The performance of ATM machine depends on ultra-high-speed encryption, very low power consumption, and algorithmic integrity. To get a low power consuming and ultra-high speed encryption at the ATM machine, an optimized and wavelet based AES algorithm is proposed. In this system biometric and cryptography techniques are used together for personal identity authentication to improve the security level. The design of the wavelet based AES processor is simulated and the design of the energy efficient AES processor is simulated in Quartus-II software. Simulation results ensure its proper functionality. A comparison among other research works proves its superiority.

  16. Socio-Cultural Impediments to Food Security in South-East Agro ...

    African Journals Online (AJOL)

    Against the background of the precarious food security situation in parts of Africa, this paper highlights aspects of Nigeria's culture that impinge on agricultural practice and food habits and consequently, undermine efforts to achieve the agrarian and rural development policy objectives of the federal and state governments of ...

  17. Do needs for security and certainty predict cultural and economic conservatism? A cross-national analysis

    NARCIS (Netherlands)

    Malka, A.; Soto, C.J.; Inzlicht, M.; Lelkes, Y.

    2014-01-01

    We examine whether individual differences in needs for security and certainty predict conservative (vs. liberal) position on both cultural and economic political issues and whether these effects are conditional on nation-level characteristics and individual-level political engagement. Analyses with

  18. Maternal Sensitivity and Child Secure Base Use in Early Childhood: Studies in Different Cultural Contexts

    Science.gov (United States)

    Posada, German; Trumbell, Jill; Noblega, Magaly; Plata, Sandra; Peña, Paola; Carbonell, Olga A.; Lu, Ting

    2016-01-01

    This study tested whether maternal sensitivity and child security are related during early childhood and whether such an association is found in different cultural and social contexts. Mother-child dyads (N = 237) from four different countries (Colombia, Mexico, Peru, and the United States) were observed in naturalistic settings when children were…

  19. Enhancing China’s Energy Security: Determining Influential Factors and Effective Strategic Measures

    DEFF Research Database (Denmark)

    Ren, Jingzheng; Sovacool, Benjamin

    2014-01-01

    This study investigates the most influential factors affecting China’s energy security. It also identifies the most effective strategic measures for enhancing it. Fuzzy AHP has been used to determine weights for ranking the importance of Chinese energy security factors, and it has also been used...... to determine the priorities of the strategic measures with respect to enhancing those same factors. The study argues that a low proportion of renewable energy penetration is the most severe factor threatening China’s energy security, and that conducting research and development on energy technologies...

  20. Remote monitoring in safeguards: Security of information and enhanced cooperation

    International Nuclear Information System (INIS)

    Galdoz, Erwin; Calzetta, Osvaldo; Fernández Moreno, Sonia; Llacer, Carlos; Díaz, Gustavo; Vigile, Sebastián; Brunhuber, Christoph

    2011-01-01

    Unattended systems with remote transmission capabilities (RM) have the potential to improve safeguards efficiency. Moreover, the evolution of technology and the steady growing of nuclear materials subject to control, lead modern safeguards increasingly utilizing unattended equipment with the capability to store relevant data for long periods of time coupled with the option of being remotely accessed and checked. Remote inspection is still a concept under development, but it may end to be a powerful more efficient verification modality in medium term future. An important part of drawing meaningful safeguards conclusions rests on authenticity and reliability of the information on nuclear material and facilities acquired through the various verification activities and measures applied by IAEA and regional safeguards organizations, like ABACC. The increasing utilization of such technology to further optimize safeguards responds to a multifaceted environment where security of information for all relevant parties is of utmost importance. From the point of view of the IAEA and ABACC, the use of any technology for safeguards application, and specially the use of RM, requires to ensure the security of data collected to guarantee the validity and veracity of such information throughout the whole process (e.g., from collecting to reviewing). This is also valid to the SSAC involved in the process. Information security is also relevant for States and Operators. Assurance should be given that the information could not be withdrawn by non-authorized entities and that facility data is also fully secured. Another important aspect related to RM that may also fall in the security aspect of safeguards relevant information that merits further consideration, is the sharing of information between organizations like ABACC and the IAEA as well as the possibility to make this data available for States authorities purposes. This paper discusses three main themes related to RM: (i) the extent

  1. Safety culture in nuclear installations. Guidance for the use in enhancement of safety culture

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-12-01

    IAEA Assessment of the Safety Culture in Organizations Team (ASCOT) activities, significant work has been done with respect to indicators to determine the effectiveness of safety culture. IAEA-TECDOC-860, ASCOT Guidelines, issued in 1996, proposed key indicators for the different areas that need to be considered when assessing safety culture. A number of other INSAG reports and Safety Series reports have been published by the IAEA to provide information that will be helpful to organizations that are interested in developing or enhancing their safety culture. Recently the IAEA perspective on safety culture has broadened even further with attention focused on obtaining a deeper understanding of the actual concept of culture and particularly organizational culture. The approach supplements the IAEA previous efforts to promote a better understanding of safety culture, but does not replace them. It can be argued that the IAEA perspective of safety culture has evolved in stages. The first stage was associated with the definition of safety culture; the second stage with how to assess it; the third stage on how to enhance it; and the fourth and current stage on obtaining a deeper understanding of the actual concept of culture. The hope is that the more sophisticated understanding obtained in the fourth stage will lead to improved ways of assessing safety culture, and also increase our ability to detect changes in safety culture at an early point in time. This ability will enable corrective actions to be taken to avoid the consequences of a deteriorating safety culture.

  2. Safety culture in nuclear installations. Guidance for the use in enhancement of safety culture

    International Nuclear Information System (INIS)

    2002-12-01

    IAEA Assessment of the Safety Culture in Organizations Team (ASCOT) activities, significant work has been done with respect to indicators to determine the effectiveness of safety culture. IAEA-TECDOC-860, ASCOT Guidelines, issued in 1996, proposed key indicators for the different areas that need to be considered when assessing safety culture. A number of other INSAG reports and Safety Series reports have been published by the IAEA to provide information that will be helpful to organizations that are interested in developing or enhancing their safety culture. Recently the IAEA perspective on safety culture has broadened even further with attention focused on obtaining a deeper understanding of the actual concept of culture and particularly organizational culture. The approach supplements the IAEA previous efforts to promote a better understanding of safety culture, but does not replace them. It can be argued that the IAEA perspective of safety culture has evolved in stages. The first stage was associated with the definition of safety culture; the second stage with how to assess it; the third stage on how to enhance it; and the fourth and current stage on obtaining a deeper understanding of the actual concept of culture. The hope is that the more sophisticated understanding obtained in the fourth stage will lead to improved ways of assessing safety culture, and also increase our ability to detect changes in safety culture at an early point in time. This ability will enable corrective actions to be taken to avoid the consequences of a deteriorating safety culture

  3. Enhanced casein kinase II activity in human tumour cell cultures

    DEFF Research Database (Denmark)

    Prowald, K; Fischer, H; Issinger, O G

    1984-01-01

    Casein kinase II (CKII) activity is enhanced as much as 2-3 fold in established and 4-5-fold in transformed human cell lines when compared to that of fibroblasts and primary human tumour cell cultures where CKII activity never exceeded a basic level. The high activity of CKII in transformed cells...

  4. Organisational Culture and Technology-Enhanced Innovation in Higher Education

    Science.gov (United States)

    Zhu, Chang

    2015-01-01

    Higher education institutions are evolving and technology often plays a central role in their transformations. Educational changes benefit from a supportive environment. The study examines the relationship between organisational culture and teachers' perceptions of and responses to technology-enhanced innovation among Chinese universities. A…

  5. Trust Model to Enhance Security and Interoperability of Cloud Environment

    Science.gov (United States)

    Li, Wenjuan; Ping, Lingdi

    Trust is one of the most important means to improve security and enable interoperability of current heterogeneous independent cloud platforms. This paper first analyzed several trust models used in large and distributed environment and then introduced a novel cloud trust model to solve security issues in cross-clouds environment in which cloud customer can choose different providers' services and resources in heterogeneous domains can cooperate. The model is domain-based. It divides one cloud provider's resource nodes into the same domain and sets trust agent. It distinguishes two different roles cloud customer and cloud server and designs different strategies for them. In our model, trust recommendation is treated as one type of cloud services just like computation or storage. The model achieves both identity authentication and behavior authentication. The results of emulation experiments show that the proposed model can efficiently and safely construct trust relationship in cross-clouds environment.

  6. An Enhanced Erasure Code-Based Security Mechanism for Cloud Storage

    Directory of Open Access Journals (Sweden)

    Wenfeng Wang

    2014-01-01

    Full Text Available Cloud computing offers a wide range of luxuries, such as high performance, rapid elasticity, on-demand self-service, and low cost. However, data security continues to be a significant impediment in the promotion and popularization of cloud computing. To address the problem of data leakage caused by unreliable service providers and external cyber attacks, an enhanced erasure code-based security mechanism is proposed and elaborated in terms of four aspects: data encoding, data transmission, data placement, and data reconstruction, which ensure data security throughout the whole traversing into cloud storage. Based on the mechanism, we implement a secure cloud storage system (SCSS. The key design issues, including data division, construction of generator matrix, data encoding, fragment naming, and data decoding, are also described in detail. Finally, we conduct an analysis of data availability and security and performance evaluation. Experimental results and analysis demonstrate that SCSS achieves high availability, strong security, and excellent performance.

  7. Intelligent data analysis for e-learning enhancing security and trustworthiness in online learning systems

    CERN Document Server

    Miguel, Jorge; Xhafa, Fatos

    2016-01-01

    Intelligent Data Analysis for e-Learning: Enhancing Security and Trustworthiness in Online Learning Systems addresses information security within e-Learning based on trustworthiness assessment and prediction. Over the past decade, many learning management systems have appeared in the education market. Security in these systems is essential for protecting against unfair and dishonest conduct-most notably cheating-however, e-Learning services are often designed and implemented without considering security requirements. This book provides functional approaches of trustworthiness analysis, modeling, assessment, and prediction for stronger security and support in online learning, highlighting the security deficiencies found in most online collaborative learning systems. The book explores trustworthiness methodologies based on collective intelligence than can overcome these deficiencies. It examines trustworthiness analysis that utilizes the large amounts of data-learning activities generate. In addition, as proc...

  8. Security enhanced BioEncoding for protecting iris codes

    Science.gov (United States)

    Ouda, Osama; Tsumura, Norimichi; Nakaguchi, Toshiya

    2011-06-01

    Improving the security of biometric template protection techniques is a key prerequisite for the widespread deployment of biometric technologies. BioEncoding is a recently proposed template protection scheme, based on the concept of cancelable biometrics, for protecting biometric templates represented as binary strings such as iris codes. The main advantage of BioEncoding over other template protection schemes is that it does not require user-specific keys and/or tokens during verification. Besides, it satisfies all the requirements of the cancelable biometrics construct without deteriorating the matching accuracy. However, although it has been shown that BioEncoding is secure enough against simple brute-force search attacks, the security of BioEncoded templates against more smart attacks, such as record multiplicity attacks, has not been sufficiently investigated. In this paper, a rigorous security analysis of BioEncoding is presented. Firstly, resistance of BioEncoded templates against brute-force attacks is revisited thoroughly. Secondly, we show that although the cancelable transformation employed in BioEncoding might be non-invertible for a single protected template, the original iris code could be inverted by correlating several templates used in different applications but created from the same iris. Accordingly, we propose an important modification to the BioEncoding transformation process in order to hinder attackers from exploiting this type of attacks. The effectiveness of adopting the suggested modification is validated and its impact on the matching accuracy is investigated empirically using CASIA-IrisV3-Interval dataset. Experimental results confirm the efficacy of the proposed approach and show that it preserves the matching accuracy of the unprotected iris recognition system.

  9. The ASEAN Political-Security Community: Enhancing Defense Cooperation

    Science.gov (United States)

    2015-12-01

    Yoong Lee, ASEAN Matters: Reflecting on the Association of Southeast Asian Nations (Singapore; Hackensack, NJ: World Scientific., 2011), i, http...from becoming overpopulated —by moving Javanese to low-density islands: Kalimantan, Sumatera, Papua, and Sulawesi. 58 Collins, Security and Southeast...In the mid-2000s, the increasing number of piracy and armed robbery activities in the Malacca Straits attracted world attention and attributed to the

  10. Nuclear non-proliferation and security culture within EDF nuclear fleet

    International Nuclear Information System (INIS)

    Debes, M.

    2013-01-01

    This document describes the nuclear non-proliferation strategy and the safety culture of EDF. The author lists all the mandatory rules and regulations at international and national levels EDF has to comply with. All these requirements are applied in EDF nuclear facilities through adequate procedures that assure a nuclear material accountancy, a follow-up of any item containing nuclear material in the facility, and internal controls. External independent controls are also performed. The EDF security policy goal is to protect human, material and knowledge assets, and to preserve operational capacity, competitiveness and public confidence, within national regulatory framework and regulation on 'vital importance facilities'. The treatment of events or incident (detection, analysis, lessons drawn, experience feedback) is a tool to progress, along with reporting, internal control process and audits. The security requirements cover the different related domains important to EDF industrial assets: security of employees against assaults; security of data according to their sensibility level; security of the information system and telecom; awareness and training of employees; relations with external suppliers or contractors; business premises; security of staff and projects abroad. For industrial facilities and grids (facilities of 'vital importance'...), the defense in depth principles are applied against the different threat scenarios. Security measures are studied at the design stage in a consistent way with nuclear safety measures, while taking into account the protective means deployed by public authorities. These risk analysis are periodically reassessed. The paper is followed by the slides of the presentation. (A.C.)

  11. Enhancing Access to Primary Cultural Heritage Materials of India

    Science.gov (United States)

    Scharf, Peter M.; Hyman, Malcolm

    This chapter is about enhancing access to primary cultural heritage materials of India housed in academic libraries by integrating them with machine-readable texts, lexical resources, and linguistic software in a digital library. Integrating primary cultural materials with a digital library can enable broad use of Indic collections for research and education. For the purposes of illustrating this procedure, we outline here the development of a prototype using the collections of Sanskrit manuscripts in the libraries at Brown University and the University of Pennsylvania and integrating them with The Sanskrit Library. The result is extendable to collections of Indic materials throughout the world and can serve as a model for digitization projects of cultural materials in other major culture-bearing languages such as Greek, Latin, Arabic, Persian, and Chinese.

  12. Maternal sensitivity and infant attachment security in Korea: cross-cultural validation of the Strange Situation.

    Science.gov (United States)

    Jin, Mi Kyoung; Jacobvitz, Deborah; Hazen, Nancy; Jung, Sung Hoon

    2012-01-01

    The present study sought to analyze infant and maternal behavior both during the Strange Situation Procedure (SSP) and a free play session in a Korean sample (N = 87) to help understand whether mother-infant attachment relationships are universal or culture-specific. Distributions of attachment classifications in the Korean sample were compared with a cross-national sample. Behavior of mothers and infants following the two separation episodes in the SSP, including mothers' proximity to their infants and infants' approach to the caregiver, was also observed, as was the association between maternal sensitivity observed during free play session and infant security. The percentage of Korean infants classified as secure versus insecure mirrored the global distribution, however, only one Korean baby was classified as avoidant. Following the separation episodes in the Strange Situation, Korean mothers were more likely than mothers in Ainsworth's Baltimore sample to approach their babies immediately and sit beside them throughout the reunion episodes, even when their babies were no longer distressed. Also, Korean babies less often approached their mothers during reunions than did infants in the Baltimore sample. Finally, the link between maternal sensitivity and infant security was significant. The findings support the idea that the basic secure base function of attachment is universal and the SSP is a valid measure of secure attachment, but cultural differences in caregiving may result in variations in how this function is manifested.

  13. Do needs for security and certainty predict cultural and economic conservatism? A cross-national analysis.

    Science.gov (United States)

    Malka, Ariel; Soto, Christopher J; Inzlicht, Michael; Lelkes, Yphtach

    2014-06-01

    We examine whether individual differences in needs for security and certainty predict conservative (vs. liberal) position on both cultural and economic political issues and whether these effects are conditional on nation-level characteristics and individual-level political engagement. Analyses with cross-national data from 51 nations reveal that valuing conformity, security, and tradition over self-direction and stimulation (a) predicts ideological self-placement on the political right, but only among people high in political engagement and within relatively developed nations, ideologically constrained nations, and non-Eastern European nations, (b) reliably predicts right-wing cultural attitudes and does so more strongly within developed and ideologically constrained nations, and (c) on average predicts left-wing economic attitudes but does so more weakly among people high in political engagement, within ideologically constrained nations, and within non-Eastern European nations. These findings challenge the prevailing view that needs for security and certainty organically yield a broad right-wing ideology and that exposure to political discourse better equips people to select the broad ideology that is most need satisfying. Rather, these findings suggest that needs for security and certainty generally yield culturally conservative but economically left-wing preferences and that exposure to political discourse generally weakens the latter relation. We consider implications for the interactive influence of personality characteristics and social context on political attitudes and discuss the importance of assessing multiple attitude domains, assessing political engagement, and considering national characteristics when studying the psychological origins of political attitudes.

  14. Enhanced way of securing automated teller machine to track the misusers using secure monitor tracking analysis

    Science.gov (United States)

    Sadhasivam, Jayakumar; Alamelu, M.; Radhika, R.; Ramya, S.; Dharani, K.; Jayavel, Senthil

    2017-11-01

    Now a days the people's attraction towards Automated Teller Machine(ATM) has been increasing even in rural areas. As of now the security provided by all the bank is ATM pin number. Hackers know the way to easily identify the pin number and withdraw money if they haven stolen the ATM card. Also, the Automated Teller Machine is broken and the money is stolen. To overcome these disadvantages, we propose an approach “Automated Secure Tracking System” to secure and tracking the changes in ATM. In this approach, while creating the bank account, the bank should scan the iris known (a part or movement of our eye) and fingerprint of the customer. The scanning can be done with the position of the eye movements and fingerprints identified with the shortest measurements. When the card is swiped then ATM should request the pin, scan the iris and recognize the fingerprint and then allow the customer to withdraw money. If somebody tries to break the ATM an alert message is given to the nearby police station and the ATM shutter is automatically closed. This helps in avoiding the hackers who withdraw money by stealing the ATM card and also helps the government in identifying the criminals easily.

  15. Privacy-Enhancing Security Protocol in LTE Initial Attack

    Directory of Open Access Journals (Sweden)

    Uijin Jang

    2014-12-01

    Full Text Available Long-Term Evolution (LTE is a fourth-generation mobile communication technology implemented throughout the world. It is the communication means of smartphones that send and receive all of the private date of individuals. M2M, IOT, etc., are the base technologies of mobile communication that will be used in the future cyber world. However, identification parameters, such as International Mobile Subscriber Identity (IMSI, Radio Network Temporary Identities (RNTI, etc., in the initial attach section for accessing the LTE network are presented with the vulnerability of being exposed as clear text. Such vulnerability does not end in a mere identification parameter, but can lead to a secondary attack using the identification parameter, such as replication of the smartphone, illegal use of the mobile communication network, etc. This paper proposes a security protocol to safely transmit identification parameters in different cases of the initial attach. The proposed security protocol solves the exposed vulnerability by encrypting the parameters in transmission. Using an OPNET simulator, it is shown that the average rate of delay and processing ratio are efficient in comparison to the existing process.

  16. Enhancing Safety Culture in Complex Nuclear Industry Projects

    International Nuclear Information System (INIS)

    Gotcheva, N.

    2016-01-01

    This paper presents an on-going research project “Management principles and safety culture in complex projects” (MAPS), supported by the Finnish Research Programme on Nuclear Power Plant Safety 2015-2018. The project aims at enhancing safety culture and nuclear safety by supporting high quality execution of complex projects in the nuclear industry. Safety-critical industries are facing new challenges, related to increased outsourcing and complexity in technology, work tasks and organizational structures (Milch and Laumann, 2016). In the nuclear industry, new build projects, as well as modernisation projects are temporary undertakings often carried out by networks of companies. Some companies may have little experience in the nuclear industry practices or consideration of specific national regulatory requirements. In large multinational subcontractor networks, the challenge for assuring nuclear safety arises partly from the need to ensure that safety and quality requirements are adequately understood and fulfilled by each partner. Deficient project management practices and unsatisfactory nuclear safety culture in project networks have been recognised as contributing factors to these challenges (INPO, 2010). Prior evidence indicated that many recent major projects have experienced schedule, quality and financial challenges both in the nuclear industry (STUK, 2011) and in the non-nuclear domain (Ahola et al., 2014; Brady and Davies, 2010). Since project delays and quality issues have been perceived mainly as economic problems, project management issues remain largely understudied in safety research. However, safety cannot be separated from other performance aspects if a systemic view is applied. Schedule and quality challenges may reflect deficiencies in coordination, knowledge and competence, distribution of roles and responsibilities or attitudes among the project participants. It is increasingly understood that the performance of the project network in all

  17. Power system security enhancement with unified power flow controller under multi-event contingency conditions

    Directory of Open Access Journals (Sweden)

    S. Ravindra

    2017-03-01

    Full Text Available Power system security analysis plays key role in enhancing the system security and to avoid the system collapse condition. In this paper, a novel severity function is formulated using transmission line loadings and bus voltage magnitude deviations. The proposed severity function and generation fuel cost objectives are analyzed under transmission line(s and/or generator(s contingency conditions. The system security under contingency conditions is analyzed using optimal power flow problem. An improved teaching learning based optimization (ITLBO algorithm has been presented. To enhance the system security under contingency conditions in the presence of unified power flow controller (UPFC, it is necessary to identify an optimal location to install this device. Voltage source based power injection model of UPFC, incorporation procedure and optimal location identification strategy based on line overload sensitivity indexes are proposed. The entire proposed methodology is tested on standard IEEE-30 bus test system with supporting numerical and graphical results.

  18. Security Enhanced EMV-Based Mobile Payment Protocol

    Directory of Open Access Journals (Sweden)

    Ming-Hour Yang

    2014-01-01

    Full Text Available Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant’s reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. The protocol is able to resist impersonation attacks and to avoid the security threats in EMV. In offline transactions, our scheme requires a user to apply for a temporary offline certificate in advance. With the certificate, banks no longer need to lower customer’s credits for risk control, and users can have online-equivalent credits in offline transactions.

  19. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    Directory of Open Access Journals (Sweden)

    Feng Tao

    2017-01-01

    Full Text Available Tor (The Second Onion Router is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was used to prevent the behaviors of attackers from inserting controlled nodes and conspiring to make DDos attacks. The integrated security of Tor system was enhanced in our scheme. In addition we have proved the scheme.

  20. Safety culture enhancement through the implementation of IAEA guidelines

    International Nuclear Information System (INIS)

    Mengolini, A.; Debarberis, L.

    2007-01-01

    This paper presents the methodology applied and the results achieved in adapting and implementing the IAEA guidelines on safety culture to a research reactor as a step towards supporting its Life Management Program. The background is presented together with the effort undertaken to develop awareness on safety culture and the enhancement programme hereafter developed. The present study shows how issues of safety culture, management awareness and commitment deserve attention and can be of fundamental relevance also for research reactors. The study presents how guidelines developed specifically for nuclear power installations (NPPs) can be adapted to meet the needs and peculiarities of other nuclear installations. Moreover, the difficulties met during the implementation of the guidelines are discussed and important information and lessons can be learnt for the nuclear industry in general

  1. Mechanisms for training security inspectors to enhance human performance

    International Nuclear Information System (INIS)

    Burkhalter, H.E.; Sessions, J.C.

    1988-01-01

    The Department of Energy (DOE) has established qualification standards for protective force personnel employed at nuclear facilities [10 CFR Part 1046 (Federal Register)]. Training mechanisms used at Los Alamos to enhance human performance in meeting DOE standards include, but are not limited to, the following: for cardio-respiratory training, they utilize distance running, interval training, sprint training, pacing, indoor aerobics and circuit training; for muscular strength, free weights, weight machines, light hand weights, grip strength conditioners, and calistenics are employed; for muscular endurance, participants do high repetitions (15 - 40) using dumbbells, flex weights, resistive rubber bands, benches, and calisthenics; for flexibility, each training session devotes specific times to stretch the muscles involved for a particular activity. These training mechanisms with specific protocols can enhance human performance

  2. The Impact of Organizational Culture on the Sharing of Homeland Security Information

    Science.gov (United States)

    2008-04-04

    transform an organization through 8 U.S. Government Accountability Office, “Homeland Security: Efforts...www.whitehouse.gov/omb/ egov /documents/FEA_Practice_Guidance.pdf (accessed September 23, 2007), 4-1. 10 U.S. Government Accountability Office, GAO-04-777, 12...between the federal government and the state and local governments , and the transformation of disparate cultures into a new executive department – the

  3. A Taxonomy for Enhancing Usability, Flexibility, and Security of User Authentication

    Directory of Open Access Journals (Sweden)

    Susan Gottschlich

    2017-12-01

    Full Text Available Two technology trends – a move toward software defined capabilities and toward networked devices – support both unprecedented innovations and requirements for security. A fundamental aspect of security is user authentication, which allows devices and software applications to establish their user’s identity and identity is in turn used to establish which of its capabilities the user is authorized to access. While multiple authentication steps, known as multifactor authentication, are being used more widely throughout the military, government, businesses, and consumer sectors, the selection and implementation of which authentication factors to require is typically defined by security policy. Security policy is in turn typically established by a security organization that may have no formal metrics or means to guide its selection of authentication factors. This paper will present a taxonomy for describing authentication factors including important attributes that characterize authentication robustness to aid in the selection of factors that are consistent with the user’s mission. One particular authentication factor that I have developed will be discussed in the context of this taxonomy to motivate the need to broaden current definitions and security policies. The ultimate goal of this paper is to inspire the development of standards for authentication technologies to both support mission aware authentication innovation and to inform decision making about security policies concerning user authentication and authorization. Further, this paper aims to demonstrate that such an approach will fundamentally enhance both security and usability of increasingly networked, software-defined devices, equipment and software applications.

  4. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks

    Science.gov (United States)

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-01

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes. PMID:29324719

  5. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks.

    Science.gov (United States)

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-11

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes.

  6. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-03-21

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al's method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.

  7. Using digital watermarking to enhance security in wireless medical image transmission.

    Science.gov (United States)

    Giakoumaki, Aggeliki; Perakis, Konstantinos; Banitsas, Konstantinos; Giokas, Konstantinos; Tachakra, Sapal; Koutsouris, Dimitris

    2010-04-01

    During the last few years, wireless networks have been increasingly used both inside hospitals and in patients' homes to transmit medical information. In general, wireless networks suffer from decreased security. However, digital watermarking can be used to secure medical information. In this study, we focused on combining wireless transmission and digital watermarking technologies to better secure the transmission of medical images within and outside the hospital. We utilized an integrated system comprising the wireless network and the digital watermarking module to conduct a series of tests. The test results were evaluated by medical consultants. They concluded that the images suffered no visible quality degradation and maintained their diagnostic integrity. The proposed integrated system presented reasonable stability, and its performance was comparable to that of a fixed network. This system can enhance security during the transmission of medical images through a wireless channel.

  8. Application of Evolutionary Mechanisms of Enhancers for Development Effective Artificial Intelligence Systems for Providing Data Security

    Directory of Open Access Journals (Sweden)

    M. L. Garanina

    2010-06-01

    Full Text Available This article describes the base approaches of the methods of evolutionary mechanisms (special type of genes — enhancers for parameterizations of AI systems genotype. This method can help in increasing adaptability of AI systems for providing data security.

  9. Cultures, Conditions, and Cognitive Closure: Breaking Intelligence Studies’ Dependence on Security Studies

    Directory of Open Access Journals (Sweden)

    Matthew Crosston

    2015-09-01

    Full Text Available This paper is about how the conceptualization of ‘culture’ in intelligence studies has taken on too powerful a role, one that has become too restrictive in its impact on thinking about other intelligence communities, especially non-Western ones. This restriction brings about unintentional cognitive closure that damages intelligence analysis. The argument leans heavily in many ways on the fine work of Desch and Johnston in the discipline of Security Studies, who cogently brought to light over fifteen years ago how ultra-popular cultural theories were best utilized as supplements to traditional realist approaches, but were not in fact capable of supplanting or replacing realist explanations entirely. The discipline of Intelligence Studies today needs a similar ‘intellectual intervention’ as it has almost unknowingly advanced in the post-Cold War era on the coattails of Security Studies but has largely failed to apply the same corrective measures. This effort may be best accomplished by going back to Snyder in the 1970s who warned that culture should be used as the explanation of last resort for Security Studies.

  10. Information security knowledge sharing in organizations : Investigating the effect of behavioral information security governance and national culture

    OpenAIRE

    Rocha Flores, Waldo; Antonsen, Egil; Ekstedt, Mathias

    2014-01-01

    This paper presents an empirical investigation on what behavioral information security governance factors drives the establishment of information security knowledge sharing in organizations. Data was collected from organizations located in different geographic regions of the world, and the amount of data collected from two countries – namely, USA and Sweden – allowed us to investigate if the effect of behavioral information security governance factors on the establishment of security knowledg...

  11. Enhancement of security using structured phase masked in optical image encryption on Fresnel transform domain

    Science.gov (United States)

    Yadav, Poonam Lata; Singh, Hukum

    2018-05-01

    To enhance the security in optical image encryption system and to protect it from the attackers, this paper proposes new digital spiral phase mask based on Fresnel Transform. In this cryptosystem the Spiral Phase Mask (SPM) used is a hybrid of Fresnel Zone Plate (FZP) and Radial Hilbert Mask (RHM) which makes the key strong and enhances the security. The different keys used for encryption and decryption purposed make the system much more secure. Proposed scheme uses various structured phase mask which increases the key space also it increases the number of parameters which makes it difficult for the attackers to exactly find the key to recover the original image. We have also used different keys for encryption and decryption purpose to make the system much more secure. The strength of the proposed cryptosystem has been analyzed by simulating on MATLAB 7.9.0(R2008a). Mean Square Errors (MSE) and Peak Signal to Noise Ratio (PSNR) are calculated for the proposed algorithm. The experimental results are provided to highlight the effectiveness and sustainability of proposed cryptosystem and to prove that the cryptosystem is secure for usage.

  12. Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes

    Directory of Open Access Journals (Sweden)

    Qinghe Du

    2018-01-01

    Full Text Available The Internet of Things (IoT is expected to accommodate every object which exists in this world or likely to exist in the near future. The enormous scale of the objects is challenged by big security concerns, especially for common information dissemination via multicast services, where the reliability assurance for multiple multicast users at the cost of increasing redundancy and/or retransmissions also benefits eavesdroppers in successfully decoding the overheard signals. The objective of this work is to address the security challenge present in IoT multicast applications. Specifically, with the presence of the eavesdropper, an adaptive fountain code design is proposed in this paper to enhance the security for multicast in IoT. The main novel features of the proposed scheme include two folds: (i dynamical encoding scheme which can effectively decrease intercept probability at the eavesdropper; (ii increasing the transmission efficiency compared with the conventional nondynamical design. The analysis and simulation results show that the proposed scheme can effectively enhance information security while achieving higher transmission efficiency with a little accredited complexity, thus facilitating the secured wireless multicast transmissions over IoT.

  13. Enhancing maternal sensitivity and infant attachment security with video feedback: an exploratory study in Italy.

    Science.gov (United States)

    Cassibba, Rosalinda; Castoro, Germana; Costantino, Elisabetta; Sette, Giovanna; Van Ijzendoorn, Marinus H

    2015-01-01

    This study aims to explore whether a short-term and attachment-based video-feedback intervention, the Video-Feedback Intervention to Promote Positive Parenting With Discussions on the Representational Level (VIPP-R; F. Juffer, M.J. Bakermans-Kranenburg, & M.H. van IJzendoorn, 2008), might be effective in enhancing maternal sensitivity and in promoting infants' attachment security in an Italian sample of dyads with primiparous mothers. Moreover, we explore whether the effectiveness of VIPP-R might be different for parents with insecure attachment representations who might be most in need of preventive intervention, as compared to parents who already have a more balanced and secure state of mind. Thirty-two infants (40% female) and their mothers participated in the study. The sample was divided into an intervention group (n = 16) and a comparison group (n = 16). At 6 and 13 months of age, the Adult Attachment Interview (AAI; M. Main, N. Kaplan, & J. Cassidy, 1985) was administered. Moreover, a 30-min mother-infant play situation was videotaped and coded for maternal sensitivity with the Emotional Availability Scales (Z. Biringen, J. Robinson, & R.N. Emde, 2000). At 13 months of age, the Strange Situation Procedure (M.D.S. Ainsworth, M.D. Blehar, E. Waters, & S. Wall, 1978) was used to assess the security of mother-infant attachment. Results revealed a significant interaction effect between intervention and AAI security for infant attachment security; moreover, main effects of AAI security and intervention for maternal sensitivity were found. The VIPP-R appears effective in enhancing maternal sensitivity and infant attachment security, although only mothers with an insecure attachment representation may benefit from the intervention. © 2014 Michigan Association for Infant Mental Health.

  14. International Conference on Nuclear Security: Enhancing Global Efforts. Summary of an International Conference

    International Nuclear Information System (INIS)

    2014-01-01

    The International Conference on Nuclear Security: Enhancing Global Efforts was organized by the IAEA and held in Vienna on 1-5 July 2013. The conference was organized in cooperation with the following organizations and initiatives: the European Union; the Global Initiative to Combat Nuclear Terrorism (GICNT); the International Criminal Police Organization (INTERPOL); the Institute of Nuclear Materials Management (INMM); the Nuclear Threat Initiative (NTI); the Organization for Security and Co-operation in Europe (OSCE); the Partnership for Global Security; the Police Community of the Americas (AMERIPOL); the United Nations Interregional Crime and Justice Research Institute (UNICRI); the United Nations Office on Drugs and Crime (UNODC); the World Institute for Nuclear Security (WINS); the World Nuclear Association (WNA); and the World Nuclear Transport Institute (WNTI). A total of 34 ministers participated in the ministerial session of the conference. Altogether, the conference attracted more than 1300 registered participants from 125 IAEA Member States and 21 organizations. The aim of the conference was to review the international community's experience and achievements to date in strengthening nuclear security, to enhance the understanding of current approaches to nuclear security worldwide and identify trends, and to provide a global forum for ministers, policymakers and senior officials to formulate views on future directions and priorities for nuclear security. This book contains the President's Summary of the conference and a summary of the ministerial session, the full text of the ministerial declaration adopted by the conference and summaries of the main conference sessions. The attached CD-ROM contains the full conference programme, the list of conference participants, the national statements from the ministerial session and a selection of papers

  15. SecMAS: Security Enhanced Monitoring and Analysis Systems for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ding Chao

    2016-01-01

    Full Text Available The monitoring, control, and security guarantee for the communication in the wireless sensor networks (WSNs are currently treated as three independent issues and addressed separately through specialized tools. However, most cases of WSNs applications requires the network administrator change the network configuration in a very short time to response to the change of observed phenomenon with security guarantee. To meet this requirement, we propose a security enhanced monitoring and control platform named SecMAS for WSNs, which provides the real-time visualization about network states and online reconfiguration of the network properties and behaviours in a resource-efficient way. Besides, basic cryptographic primitives and part of the anomaly detection functionalities are implemented in SecMAS to enabling the secure communication in WSNs. Furthermore, we conduct experiments to evaluate the performance of SecMAS in terms of the latency, throughput, communication overhead, and the security capacity. The experimental results demonstrate that the SecMAS system achieves stable, efficient and secure data collection with lightweight quick-response network control.

  16. Short communication: Lactose enhances bile tolerance of yogurt culture bacteria.

    Science.gov (United States)

    Mena, Behannis; Aryana, Kayanush

    2018-03-01

    Lactose is an energy source for culture bacteria. Bile tolerance is an important probiotic property. Our aim was to elucidate the effect of lactose on bile tolerance of yogurt starter culture Lactobacillus bulgaricus LB-12 and Streptococcus thermophilus ST-M5. Bile tolerance of pure cultures was determined using 0.3% oxgall in MRS THIO broth (Difco, Becton Dickinson, Sparks, MD) for L. bulgaricus and 0.3% oxgall in M17 broth (Oxoid, Basingstoke, UK) for Strep. thermophilus. Lactose was added to both broths at 0 (control), 1, 3, and 5% (wt/vol) broth. Dilutions were plated hourly for 12 h. Experiments were replicated 3 times. At 2, 4, and 12 h of incubation, lactose incorporated at all amounts, 1, 3, and 5% (wt/vol), showed higher counts of Strep. thermophilus ST-M5 compared with the control. Lactose use at 5% (wt/vol) significantly enhanced bile tolerance of both L. bulgaricus and Strep. thermophilus compared with control. Copyright © 2018 American Dairy Science Association. Published by Elsevier Inc. All rights reserved.

  17. A framework to enhance security of physically unclonable functions using chaotic circuits

    Science.gov (United States)

    Chen, Lanxiang

    2018-05-01

    As a new technique for authentication and key generation, physically unclonable function (PUF) has attracted considerable attentions, with extensive research results achieved already. To resist the popular machine learning modeling attacks, a framework to enhance the security of PUFs is proposed. The basic idea is to combine PUFs with a chaotic system of which the response is highly sensitive to initial conditions. For this framework, a specific construction which combines the common arbiter PUF circuit, a converter, and the Chua's circuit is given to implement a more secure PUF. Simulation experiments are presented to further validate the framework. Finally, some practical suggestions for the framework and specific construction are also discussed.

  18. A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform

    Directory of Open Access Journals (Sweden)

    Srinivas Koppu

    2017-01-01

    Full Text Available An enhanced secure image chaotic cryptosystem has been proposed based on hybrid CMT-Lanczos algorithm. We have achieved fast encryption and decryption along with privacy of images. The pseudorandom generator has been used along with Lanczos algorithm to generate root characteristics and eigenvectors. Using hybrid CMT image, pixels are shuffled to accomplish excellent randomness. Compared with existing methods, the proposed method had more robustness to various attacks: brute-force attack, known cipher plaintext, chosen-plaintext, security key space, key sensitivity, correlation analysis and information entropy, and differential attacks. Simulation results show that the proposed methods give better result in protecting images with low-time complexity.

  19. Trustworthy reconfigurable systems enhancing the security capabilities of reconfigurable hardware architectures

    CERN Document Server

    Feller, Thomas

    2014-01-01

    ?Thomas Feller sheds some light on trust anchor architectures fortrustworthy reconfigurable systems. He is presenting novel concepts enhancing the security capabilities of reconfigurable hardware.Almost invisible to the user, many computer systems are embedded into everyday artifacts, such as cars, ATMs, and pacemakers. The significant growth of this market segment within the recent years enforced a rethinking with respect to the security properties and the trustworthiness of these systems. The trustworthiness of a system in general equates to the integrity of its system components. Hardware-b

  20. National programs for the development and development of the culture of Security in the nuclear activities in Cuba

    International Nuclear Information System (INIS)

    Ferro Fernandez, R.; Guillen Campos, A.; Arnau Fernandez, A.

    2003-01-01

    From their appearance, as a result of the investigations of the accident in the Nuclear Power station of Chernobyl, the term Culture of Security has been considered a key element to achieve a elevated level of security in the nuclear facilities, becoming a basic principle of security, grateful internationally. The Organ Cuban Regulator understood from very early the importance of to promote and to develop attitudes and characteristic in the organizations and the personnel linked to the nuclear sector that you/they reflected a high culture of security, for to propitiate a bigger involvement of all in the topics of security and in that way to contribute significantly to the prevention of accidents in the nuclear facilities. Although the Program Nuclear Cuban suffered serious reductions in the decade of the years 90, the Organ Regulator has continuous working in this address, assimilating all the international experience for its application in their strategies of development of the culture of security in the nuclear activities that today they are executed in the country. The present work picks up the Cuban experience in the conformation of a National Program for the development and development of the Culture of Security

  1. Legal Analysis of Constructing Network Security System --View of Network Security Culture%建立网络安全保障体系的法律思考——以网络安全文化为视角

    Institute of Scientific and Technical Information of China (English)

    王铁占; 安海兴

    2011-01-01

    The information network movement system frequency suffers the destruction, has the value information to steal repeatedly, is main threat which the current network security faces. Under the network security culture frame, through legislation, establishes the stan perfect network security legal li government by law function and be an urgent matter. the enhancement networking legislation and the safety control administration dard network security service industry development the legal framework, the ability system, raises the network user safety idea, the display morals in the so on, the establishment should to the threat network security safeguard system%信息网络运行系统频遭破坏导致有价值信息屡被窃取,是当前网络安全面临的主要威胁。在网络安全文化框架下,通过加强网络技术立法与安全管理行政立法,建立规范网络安全服务业发展的法律体系,完善网络安全法律责任制度,培养网络用户安全理念,发挥道德在法治中的作用,建立应对威胁的网络安全保障体系是当务之急。

  2. Enhancing Security by System-Level Virtualization in Cloud Computing Environments

    Science.gov (United States)

    Sun, Dawei; Chang, Guiran; Tan, Chunguang; Wang, Xingwei

    Many trends are opening up the era of cloud computing, which will reshape the IT industry. Virtualization techniques have become an indispensable ingredient for almost all cloud computing system. By the virtual environments, cloud provider is able to run varieties of operating systems as needed by each cloud user. Virtualization can improve reliability, security, and availability of applications by using consolidation, isolation, and fault tolerance. In addition, it is possible to balance the workloads by using live migration techniques. In this paper, the definition of cloud computing is given; and then the service and deployment models are introduced. An analysis of security issues and challenges in implementation of cloud computing is identified. Moreover, a system-level virtualization case is established to enhance the security of cloud computing environments.

  3. Unequal Probability Marking Approach to Enhance Security of Traceback Scheme in Tree-Based WSNs.

    Science.gov (United States)

    Huang, Changqin; Ma, Ming; Liu, Xiao; Liu, Anfeng; Zuo, Zhengbang

    2017-06-17

    Fog (from core to edge) computing is a newly emerging computing platform, which utilizes a large number of network devices at the edge of a network to provide ubiquitous computing, thus having great development potential. However, the issue of security poses an important challenge for fog computing. In particular, the Internet of Things (IoT) that constitutes the fog computing platform is crucial for preserving the security of a huge number of wireless sensors, which are vulnerable to attack. In this paper, a new unequal probability marking approach is proposed to enhance the security performance of logging and migration traceback (LM) schemes in tree-based wireless sensor networks (WSNs). The main contribution of this paper is to overcome the deficiency of the LM scheme that has a higher network lifetime and large storage space. In the unequal probability marking logging and migration (UPLM) scheme of this paper, different marking probabilities are adopted for different nodes according to their distances to the sink. A large marking probability is assigned to nodes in remote areas (areas at a long distance from the sink), while a small marking probability is applied to nodes in nearby area (areas at a short distance from the sink). This reduces the consumption of storage and energy in addition to enhancing the security performance, lifetime, and storage capacity. Marking information will be migrated to nodes at a longer distance from the sink for increasing the amount of stored marking information, thus enhancing the security performance in the process of migration. The experimental simulation shows that for general tree-based WSNs, the UPLM scheme proposed in this paper can store 1.12-1.28 times the amount of stored marking information that the equal probability marking approach achieves, and has 1.15-1.26 times the storage utilization efficiency compared with other schemes.

  4. Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    2014-06-01

    Full Text Available Wireless sensor networks (WSNs consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC for WSNs. However, it turned out that Yeh et al.’s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.’s protocol. However, Shi et al.’s improvement introduces other security weaknesses. In this paper, we show that Shi et al.’s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.

  5. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography.

    Science.gov (United States)

    Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho

    2014-06-10

    Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.

  6. Prioritizing low-carbon energy sources to enhance China’s energy security

    International Nuclear Information System (INIS)

    Ren, Jingzheng; Sovacool, Benjamin K.

    2015-01-01

    Highlights: • Four dimensions and ten metrics are used for energy security assessment. • Both qualitative and quantitative metrics are considered for energy security. • AHP has been used to quantify qualitative metrics. • TOPSIS method has been used for prioritize the low-carbon energy sources. • Sensitivity analysis and integrated ranking have been carried out. - Abstract: This paper explores how low-carbon systems compare to each other in terms of their net effect on Chinese energy security, and how they ought to be ranked and strategized into an optimal and integrated resource plan. The paper utilizes Analytic Hierarchy Process (AHP) to first determine the relative performances of hydroelectricity, wind energy, solar energy, biomass energy, and nuclear power with respect to the energy security dimensions of availability, affordability, accessibility, and acceptability. Both qualitative and quantitative metrics are considered. It relies on AHP to calculate the relative weights of the qualitative metrics attached to these dimensions of energy security for each of our five low carbon energy sources. Then, energy security performance is determined by aggregating multiple, weighted metrics into a generic index based on the method of TOPSIS and then tweaked with a sensitivity analysis. Finally, an integrated method has been developed to rank the low-carbon energy systems from most to least important, with major implications for Chinese decision-makers and stakeholders. We conclude that hydroelectricity and wind power are the two low-carbon energy sources with the most potential to enhance China’s energy security. By contrast, nuclear and solar power have the least potential

  7. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    Full Text Available With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  8. Physical Layer Built-In Security Analysis and Enhancement Algorithms for CDMA Systems

    Directory of Open Access Journals (Sweden)

    Li Tongtong

    2007-01-01

    Full Text Available Historically developed for secure communication and military use, CDMA has been identified as a major modulation and multiple-access technique for 3G systems and beyond. In addition to the wide bandwidth and low power-spectrum density which make CDMA signals robust to narrowband jamming and easy to be concealed within the noise floor, the physical layer built-in information privacy of CDMA system is provided by pseudorandom scrambling. In this paper, first, security weakness of the operational and proposed CDMA airlink interfaces is analyzed. Second, based on the advanced encryption standard (AES, we propose to enhance the physical layer built-in security of CDMA systems through secure scrambling. Performance analysis demonstrates that while providing significantly improved information privacy, CDMA systems with secure scrambling have comparable computational complexity and overall system performance with that of conventionally scrambled systems. Moreover, it is shown that by scrambling the training sequence and the message sequence separately with two independent scrambling sequences, both information privacy and system performance can be further improved. The proposed scheme can readily be applied to 3G systems and beyond.

  9. Security enhanced multi-factor biometric authentication scheme using bio-hash function

    Science.gov (United States)

    Lee, Youngsook; Moon, Jongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. PMID:28459867

  10. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    Science.gov (United States)

    Choi, Younsung; Lee, Youngsook; Moon, Jongho; Won, Dongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  11. Enhancing Experiment Central Service Reliability: from delivery to security and virtualization

    CERN Document Server

    Donno, Flavia; Buzykaev, Alexey; Saiz Santos, Maria Dolores

    2011-01-01

    The four LHC experiments rely on experiment specific services running on machines mainly located at CERN. Some of these services have been rated by the experiments as very critical: any loss or degradation of performance has a major impact on the experiment's production and analysis activities. It is therefore important to provide a reliable and robust operational environment. In this work we describe the strategy based on service deployment, security and virtualization adopted to enhance the reliability of ATLAS and CMS central services.

  12. The Importance of the Study of Cognitive Performance Enhancement for U.S. National Security.

    Science.gov (United States)

    Malish, Richard G

    2017-08-01

    The American military is embarking on the 'Third Offset'-a strategy designed to produce seismic shifts in the future of warfare. Central to the approach is the conjoining of humans, technology, and machines to deliver a decisive advantage on the battlefield. Because technology will spread rapidly and globally, tactical overmatch will occur when American operators possess a competitive edge in cognition. Investigation of cognitive enhancing therapeutics is not widely articulated as an adjunct to the Third Offset, yet failure to study promising agents could represent a strategic vulnerability. Because of its legacy of research into therapeutic agents to enhance human-machine interplay, the aerospace medical community represents a front-running candidate to perform this work. Notably, there are strong signals emanating from gambling, academic, and video-gaming enterprises that already-developed stimulants and other agents provide cognitive benefits. These agents should be studied not only for reasons of national security, but also because cognitive enhancement may be a necessary step in the evolution of humankind. To illustrate these points, this article will assert that: 1) the need to preserve and enhance physical and cognitive health will become more and more important over the next century; 2) aeromedical specialists are in a position to take the lead in the endeavor to enhance cognition; 3) signals of enhancement of the type useful to both military and medical efforts exist aplenty in today's society; and 4) the aeromedical community should approach human enhancement research deliberately but carefully.Malish RG. The importance of the study of cognitive performance enhancement for U.S. national security. Aerosp Med Hum Perform. 2017; 88(8):773-778.

  13. Status and determinants of small farming households' food security and role of market access in enhancing food security in rural Pakistan.

    Directory of Open Access Journals (Sweden)

    Umar Ijaz Ahmed

    Full Text Available In most of the developing countries, lack of resources and little market accessibility are among the major factors that affect small farming household food security. This study aims to investigate the status of small farming households' food security, and its determinants including the role of market accessibility factors in enhancing food security at household level. In addition, this study also determines the households' perception about different kinds of livelihoods risks. This study is based on a household survey of 576 households conducted through face-to-face interviews using structured interviews in Punjab, Pakistan. Food security status is calculated using dietary intake method. The study findings show that one-fourth of the households are food insecure. The study findings reveal that farm households perceive increase in food prices, crop diseases, lack of irrigation water and increase in health expenses as major livelihood risks. Further, the results of logistic regression show that family size, monthly income, food prices, health expenses and debt are main factors influencing the food security status of rural households. Furthermore, the market accessibility factors (road distance and transportation cost do significantly affect the small farming household food security. The results suggest that local food security can be enhanced by creating off-farm employment opportunities, improved transportation facilities and road infrastructure.

  14. The Potential Use of Agroforestry Community Gardens as a Sustainable Import-Substitution Strategy for Enhancing Food Security in Subarctic Ontario, Canada

    Directory of Open Access Journals (Sweden)

    Maren Oelbermann

    2013-09-01

    Full Text Available The high prevalence of food insecurity experienced by northern First Nations partially results from dependence on an expensive import-based food system that typically lacks nutritional quality and further displaces traditional food systems. In the present study, the feasibility of import substitution by Agroforestry Community Gardens (AFCGs as socio-ecologically and culturally sustainable means of enhancing food security was explored through a case study of Fort Albany First Nation in subarctic Ontario, Canada. Agroforestry is a diverse tree-crop agricultural system that has enhanced food security in the tropics and subtropics. Study sites were selected for long-term agroforestry research to compare Salix spp. (willow-dominated AFCG plots to a “no tree” control plot in Fort Albany. Initial soil and vegetative analysis revealed a high capacity for all sites to support mixed produce with noted modifications, as well as potential competitive and beneficial willow-crop interactions. It is anticipated that inclusion of willow trees will enhance the long-term productive capacity of the AFCG test plots. As an adaptable and dynamic system, AFCGs have potential to act as a more reliable local agrarian system and a refuge for culturally significant plants in high-latitude First Nation socio-ecological systems, which are particularly vulnerable to rapid cultural, climatic, and ecological change.

  15. ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6

    Science.gov (United States)

    You, Ilsun; Lee, Jong-Hyouk; Sakurai, Kouichi; Hori, Yoshiaki

    Fast Handover for Hierarchical Mobile IPv6 (F-HMIPv6) that combines advantages of Fast Handover for Mobile IPv6 (FMIPv6) and Hierarchical Mobile IPv6 (HMIPv6) achieves the superior performance in terms of handover latency and signaling overhead compared with previously developed mobility protocols. However, without being secured, F-HMIPv6 is vulnerable to various security threats. In 2007, Kang and Park proposed a security scheme, which is seamlessly integrated into F-HMIPv6. In this paper, we reveal that Kang-Park's scheme cannot defend against the Denial of Service (DoS) and redirect attacks while largely relying on the group key. Then, we propose an Enhanced Security Scheme for F-HMIPv6 (ESS-FH) that achieves the strong key exchange and the key independence as well as addresses the weaknesses of Kang-Park's scheme. More importantly, it enables fast handover between different MAP domains. The proposed scheme is formally verified based on BAN-logic, and its handover latency is analyzed and compared with that of Kang-Park's scheme.

  16. Microbial culture collection for enhancement of microbial biotechnology

    International Nuclear Information System (INIS)

    Jong Bor Chyan; Pauline Liew Woan Ying; Goh Chee Meng; Mat Rasol Awang

    2007-01-01

    A bacterial culture collection was established in Agrotechnology and Biosciences Division since 2004. The culture collection was named MINT Bacterial Culture Collection (MBCC). The main objective is to preserve the indigenous bacterial cultures isolated from various environments. Later, the collection was extended to commercially available plasmids, recombinant clones and selected PCR products. This paper describes the importance of culture collection, the experience and the difficulties encountered. (Author)

  17. FOREIGN EXPERIENCE OF THE FORMATION OF INFORMATION SECURITY CULTURE IN SOCIETY

    Directory of Open Access Journals (Sweden)

    A. A. Malyuk

    2016-12-01

    Full Text Available In the context of ever increasing information dependence of all spheres of activity of the company reliability and dependability of information and communication technologies (ICT, quality of information, which is used by members of the information society, saving secrets is of paramount importance. Users must trust all information services they use. Otherwise, the consequences for society and each individual can be simply disastrous. Thus, one of the main problems of the development of the information society is to ensure the information security of the individual, society and state. In order to successfully resist the flow of threats and challenges, each member of the information society must have a certain minimum knowledge, culture and appropriate information to be prepared for an active struggle for the purity of the various types of ICT cyber-hawks, cybercriminals, cyber-terrorists and just cyber-bullies. At the same time, as shown by statistics and sociological research, while rapidly increasing the level of the use of global information and communication networks the level of information literacy of users and their information culture is extremely low. Only about 10 percent of people are more or less aware of the dangers they face while working on the Internet, or they (unwillingly is subjected to its correspondents. Thus, today the key issue of the Information Society becomes the formation of information culture of users and, above all, raising their awareness in this area. Analysis of approaches and expertise to solve this problem (especially overseas is the subject of this article. The conceptual and substantive plans for the material of the article is based on a UN General Assembly resolution that approved in December 2002 the principles of formation of global culture of cybersecurity

  18. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    Science.gov (United States)

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  19. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    2014-01-01

    Full Text Available An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user’s biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen’s scheme.

  20. An enhanced performance through agent-based secure approach for mobile ad hoc networks

    Science.gov (United States)

    Bisen, Dhananjay; Sharma, Sanjeev

    2018-01-01

    This paper proposes an agent-based secure enhanced performance approach (AB-SEP) for mobile ad hoc network. In this approach, agent nodes are selected through optimal node reliability as a factor. This factor is calculated on the basis of node performance features such as degree difference, normalised distance value, energy level, mobility and optimal hello interval of node. After selection of agent nodes, a procedure of malicious behaviour detection is performed using fuzzy-based secure architecture (FBSA). To evaluate the performance of the proposed approach, comparative analysis is done with conventional schemes using performance parameters such as packet delivery ratio, throughput, total packet forwarding, network overhead, end-to-end delay and percentage of malicious detection.

  1. Security-enhanced chaos communication with time-delay signature suppression and phase encryption.

    Science.gov (United States)

    Xue, Chenpeng; Jiang, Ning; Lv, Yunxin; Wang, Chao; Li, Guilan; Lin, Shuqing; Qiu, Kun

    2016-08-15

    A security-enhanced chaos communication scheme with time delay signature (TDS) suppression and phase-encrypted feedback light is proposed, in virtue of dual-loop feedback with independent high-speed phase modulation. We numerically investigate the property of TDS suppression in the intensity and phase space and quantitatively discuss security of the proposed system by calculating the bit error rate of eavesdroppers who try to crack the system by directly filtering the detected signal or by using a similar semiconductor laser to synchronize the link signal and extract the data. The results show that TDS embedded in the chaotic carrier can be well suppressed by properly setting the modulation frequency, which can keep the time delay a secret from the eavesdropper. Moreover, because the feedback light is encrypted, without the accurate time delay and key, the eavesdropper cannot reconstruct the symmetric operation conditions and decode the correct data.

  2. Enhancing the Safety, Security and Resilience of ICT and Scada Systems Using Action Research

    Science.gov (United States)

    Johnsen, Stig; Skramstad, Torbjorn; Hagen, Janne

    This paper discusses the results of a questionnaire-based survey used to assess the safety, security and resilience of information and communications technology (ICT) and supervisory control and data acquisition (SCADA) systems used in the Norwegian oil and gas industry. The survey identifies several challenges, including the involvement of professionals with different backgrounds and expertise, lack of common risk perceptions, inadequate testing and integration of ICT and SCADA systems, poor information sharing related to undesirable incidents and lack of resilience in the design of technical systems. Action research is proposed as a process for addressing these challenges in a systematic manner and helping enhance the safety, security and resilience of ICT and SCADA systems used in oil and gas operations.

  3. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Directory of Open Access Journals (Sweden)

    Dongwoo Kang

    Full Text Available The Proxy Mobile IPv6 (PMIPv6 is a network-based mobility management protocol that allows a Mobile Node(MN connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG. As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  4. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Science.gov (United States)

    Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick; Won, Dongho

    2017-01-01

    The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  5. Enhanced Secure Trusted AODV (ESTA Protocol to Mitigate Blackhole Attack in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dilraj Singh

    2015-09-01

    Full Text Available The self-organizing nature of the Mobile Ad hoc Networks (MANETs provide a communication channel anywhere, anytime without any pre-existing network infrastructure. However, it is exposed to various vulnerabilities that may be exploited by the malicious nodes. One such malicious behavior is introduced by blackhole nodes, which can be easily introduced in the network and, in turn, such nodes try to crumble the working of the network by dropping the maximum data under transmission. In this paper, a new protocol is proposed which is based on the widely used Ad hoc On-Demand Distance Vector (AODV protocol, Enhanced Secure Trusted AODV (ESTA, which makes use of multiple paths along with use of trust and asymmetric cryptography to ensure data security. The results, based on NS-3 simulation, reveal that the proposed protocol is effectively able to counter the blackhole nodes in three different scenarios.

  6. A study on the promotion of Japan's Nuclear Security Culture. Based on the Implementing Guide of IAEA and actually-occurred threat cases

    International Nuclear Information System (INIS)

    Inamura, Tomoaki

    2014-01-01

    The ministerial ordinance relating to the Nuclear Reactor Regulation Law, revised in 2012, requires licensees of nuclear facilities to establish a system to foster Nuclear Security Culture. However, such measures are introduced without thorough consideration of essentials of Nuclear Security Culture. This report aims to provide deeper understanding of the concept and raise issues relating to implementation of nuclear security measures by reviewing the Implementing Guide of Nuclear Security Culture published by International Atomic Energy Agency and related documents, as well as analyzing security threats that actually happened recently. The results are summarized as follows: 1) Two beliefs, namely, 'a credible threat exists' and 'nuclear security is important', form the basis of Nuclear Security Culture. Nuclear Security Culture bears a high degree of resemblance to Nuclear Safety Culture because the both assume the same organizational culture model. The differences between the two are derived from whether the malevolence of adversaries should be taken into consideration or not. As the questioning attitude plays an important role to implant the two beliefs, a proper management system of Nuclear Security Culture is necessary to cultivate it. 2) Based on the related documents and an analysis of the cases of actual threats, the following viewpoints should be made clear: (a) the role of the actors of Nuclear Security Culture, (b) flexible sensitivity to share the same understanding about the credible threat, (c) systematic revision of the related regulation about sensitive information management and security clearance of the personnel, and complementary measures such as hotline, (d) measures to encourage the positive action of the personnel, (e) how to construct continuous cycle of improvement of Nuclear Security Culture at state level. (author)

  7. Enhancing Reflective Practice in Multicultural Counseling through Cultural Auditing

    Science.gov (United States)

    Collins, Sandra; Arthur, Nancy; Wong-Wylie, Gina

    2010-01-01

    Counselors work in an increasingly complex cultural milieu where every encounter with a client must be considered multicultural in nature. Reflective practice is a central component of professional competence and necessarily involves attention to culture. The cultural auditing model provides an effective and flexible reflective process for…

  8. Cultural diversity in organizations : Enhancing identification by valuing differences

    NARCIS (Netherlands)

    Luijters, Kyra; van der Zee, Karen I.; Otten, Sabine

    The present research investigated the role of perceived similarity in cultural values (associated with diversity in cultural backgrounds) and an intercultural group climate in predicting identification with both the organization and the work team. The relevance of perceived similarity in cultural

  9. Quantum-Enhanced Cyber Security: Experimental Computation on Quantum-Encrypted Data

    Science.gov (United States)

    2017-03-02

    AFRL-AFOSR-UK-TR-2017-0020 Quantum-Enhanced Cyber Security: Experimental Computation on Quantum- Encrypted Data Philip Walther UNIVERSITT WIEN Final...on Quantum- Encrypted Data 5a.  CONTRACT NUMBER 5b.  GRANT NUMBER FA9550-16-1-0004 5c.  PROGRAM ELEMENT NUMBER 61102F 6. AUTHOR(S) Philip Walther 5d...1010 AT 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) EOARD Unit 4515 APO AE 09421-4515 10

  10. Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards.

    Science.gov (United States)

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.

  11. Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards

    Directory of Open Access Journals (Sweden)

    Younghwa An

    2012-01-01

    Full Text Available Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das’s authentication scheme, and we have shown that Das’s authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das’s authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.

  12. 78 FR 53790 - Public Forum-Safety Culture: Enhancing Transportation Safety

    Science.gov (United States)

    2013-08-30

    ... NATIONAL TRANSPORTATION SAFETY BOARD Public Forum--Safety Culture: Enhancing Transportation Safety On Tuesday and Wednesday, September 10-11, 2013, the National Transportation Safety Board (NTSB) will convene a forum titled, ``Safety Culture: Enhancing Transportation Safety.'' The forum will begin at 9:00...

  13. Security enhancement mechanism based on contextual authentication and role analysis for 2G-RFID systems.

    Science.gov (United States)

    Tang, Wan; Chen, Min; Ni, Jin; Yang, Ximin

    2011-01-01

    The traditional Radio Frequency Identification (RFID) system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID) system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC) by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system.

  14. Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems

    Directory of Open Access Journals (Sweden)

    Ximin Yang

    2011-06-01

    Full Text Available The traditional Radio Frequency Identification (RFID system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system.

  15. Enhancing Oceanography Classrooms with "Captive and Cultured" Ocean Experiences

    Science.gov (United States)

    Macko, S. A.; Tuite, M.; O'Connell, M.

    2012-04-01

    Students in oceanography classes often request more direct exposure to actual ocean situations or field trips. During regular session (13 week) or shorter term (4 week) summer classes such long trips are logistically difficult owing to large numbers of students involved or timing. This new approach to such a course supplement addresses the requests by utilizing local resources and short field trips for a limited number of students (20) to locations in which Ocean experiences are available, and are often supported through education and outreach components. The vision of the class was a mixture of classroom time, readings, along with paper and actual laboratories. In addition short day-long trips to locations where the ocean was "captured" were also used to supplement the experience as well as speakers involved with aquaculture ("cultivated") . Central Virginia is a fortunate location for such a class, with close access for "day travel" to the Chesapeake Bay and numerous field stations, museums with ocean-based exhibits (the Smithsonian and National Zoo) that address both extant and extinct Earth history, as well as national/state aquaria in Baltimore, Washington and Virginia Beach. Furthermore, visits to local seafood markets at local grocery stores, or larger city markets) enhance the exposure to productivity in the ocean, and viability of the fisheries sustainability. The course could then address not only the particulars of the marine science, but also aspects of ethics, including keeping animals in captivity or overfishing of particular species and the special difficulties that arise from captive or culturing ocean populations. In addition, the class was encouraged to post web-based journals of experiences in order to share opinions of observations in each of the settings.

  16. Power system security enhancement through direct non-disruptive load control

    Science.gov (United States)

    Ramanathan, Badri Narayanan

    The transition to a competitive market structure raises significant concerns regarding reliability of the power grid. A need to build tools for security assessment that produce operating limit boundaries for both static and dynamic contingencies is recognized. Besides, an increase in overall uncertainty in operating conditions makes corrective actions at times ineffective leaving the system vulnerable to instability. The tools that are in place for stability enhancement are mostly corrective and suffer from lack of robustness to operating condition changes. They often pose serious coordination challenges. With deregulation, there have also been ownership and responsibility issues associated with stability controls. However, the changing utility business model and the developments in enabling technologies such as two-way communication, metering, and control open up several new possibilities for power system security enhancement. This research proposes preventive modulation of selected loads through direct control for power system security enhancement. Two main contributions of this research are the following: development of an analysis framework and two conceptually different analysis approaches for load modulation to enhance oscillatory stability, and the development and study of algorithms for real-time modulation of thermostatic loads. The underlying analysis framework is based on the Structured Singular Value (SSV or mu) theory. Based on the above framework, two fundamentally different approaches towards analysis of the amount of load modulation for desired stability performance have been developed. Both the approaches have been tested on two different test systems: CIGRE Nordic test system and an equivalent of the Western Electric Coordinating Council test system. This research also develops algorithms for real-time modulation of thermostatic loads that use the results of the analysis. In line with some recent load management programs executed by utilities, two

  17. Energy and water tradeoffs in enhancing food security: A selective international assessment

    International Nuclear Information System (INIS)

    Mushtaq, Shahbaz; Maraseni, Tek Narayan; Maroulis, Jerry; Hafeez, Mohsin

    2009-01-01

    Rice is the major staple food in most Asian countries. However, with rapidly growing populations, sustained high productivity and yields through improving water productivity is critically important. Increasingly complex energy-agriculture relationships require an in-depth understanding of water and energy tradeoffs. This study contributes to energy and food policies by analysing the complex energy, water and economics dynamics across a selection of major rice growing countries. The results show that tradeoffs exist between yield and energy inputs with high yield attributed to higher levels of energy input. The selected developed countries show higher energy productivity, relative to all other energy inputs, compared to the selected developing counties, owing to enhanced mechanisation, on-farm technology and improved farm management. Among all countries, China has the highest water productivity due to water-saving irrigation practices. These practices offer opportunities for developed and developing countries to increase water productivity at the same time taking advantage of economic and energy benefits of reduced pumping. Sustained production from agriculture is vital to food security. Improved irrigation practices can offset environmental footprints in the short run but their large-scale implementation remains an issue. In the long run, investments are needed to buffer the negative impacts of food production on the environment. Investments to boost water productivity and improved energy use efficiency in crop production are two pathways to reduce energy dependency, enhanced natural resource sustainability and ensuring future food security.

  18. Strengthening leadership as a catalyst for enhanced patient safety culture

    DEFF Research Database (Denmark)

    Kristensen, Solvejg; Christensen, Karl Bang; Jaquet, Annette

    2016-01-01

    OBJECTIVES: Current literature emphasises that clinical leaders are in a position to enable a culture of safety, and that the safety culture is a performance mediator with the potential to influence patient outcomes. This paper aims to investigate staff's perceptions of patient safety culture...... in a Danish psychiatric department before and after a leadership intervention. METHODS: A repeated cross-sectional experimental study by design was applied. In 2 surveys, healthcare staff were asked about their perceptions of the patient safety culture using the 7 patient safety culture dimensions...... in the Safety Attitudes Questionnaire. To broaden knowledge and strengthen leadership skills, a multicomponent programme consisting of academic input, exercises, reflections and discussions, networking, and action learning was implemented among the clinical area level leaders. RESULTS: In total, 358 and 325...

  19. A TALE OF TWO CULTURES: BREXIT AND THE FUTURE OF UK-EUROPEAN SECURITY COOPERATION

    Science.gov (United States)

    2017-06-01

    states were particularly sensitive to this issue given the lack of clear UN Security Council authorization and the fact that the purpose of intervention ...Finnemore, The Purpose of Intervention : Changing Beliefs About the Use of Force (Cornell Studies in Security Affairs) (Cornell University Press, 2004...position in all other international organizations, including within the UN Security Council as appropriate. Furthermore, Title V establishes a

  20. An enhanced security solution for electronic medical records based on AES hybrid technique with SOAP/XML and SHA-1.

    Science.gov (United States)

    Kiah, M L Mat; Nabi, Mohamed S; Zaidan, B B; Zaidan, A A

    2013-10-01

    This study aims to provide security solutions for implementing electronic medical records (EMRs). E-Health organizations could utilize the proposed method and implement recommended solutions in medical/health systems. Majority of the required security features of EMRs were noted. The methods used were tested against each of these security features. In implementing the system, the combination that satisfied all of the security features of EMRs was selected. Secure implementation and management of EMRs facilitate the safeguarding of the confidentiality, integrity, and availability of e-health organization systems. Health practitioners, patients, and visitors can use the information system facilities safely and with confidence anytime and anywhere. After critically reviewing security and data transmission methods, a new hybrid method was proposed to be implemented on EMR systems. This method will enhance the robustness, security, and integration of EMR systems. The hybrid of simple object access protocol/extensible markup language (XML) with advanced encryption standard and secure hash algorithm version 1 has achieved the security requirements of an EMR system with the capability of integrating with other systems through the design of XML messages.

  1. A Framework for Enhancing and Assessing Cultural Competency Training

    Directory of Open Access Journals (Sweden)

    Désirée Lie

    2009-09-01

    Full Text Available The globalization of medical practice using accepted evidence-based approaches is matched by a growing trend for shared curricula in medicine and other health professions across international boundaries. Interest in the common challenges of curricular design, delivery and assessment is expressed in conferences and dialogues focused on topics such as teaching of professionalism, humanism, integrative medicine, bioethics and cultural competence. The spirit of collaboration, sharing, acknowledgment and mutual respect is a guiding principle in cross-cultural teaching. This paper uses the Tool for Assessing Cultural Competency Training to explore methods for designing and implementing cultural competency curricula. The intent is to identify elements shared across institutional, national and cross-cultural borders and derive common principles for the assessment of learners and the curricula. Two examples of integrating new content into existing clerkships are provided to guide educators interested in an integrated and learner-centered approach to assimilate cultural competency teaching into existing required courses, clerkships and elective experiences. The paper follows an overarching principle that “every patient–doctor encounter is a cross-cultural encounter”, whether based on ethnicity, age, socioeconomic status, sex, religious values, disability, sexual orientation or other differences; and whether the differences are explicit or implicit.

  2. An assessment of the effectiveness of fuel cycle technologies for the national energy security enhancement in the electricity sector

    International Nuclear Information System (INIS)

    Kim, Hyun Jun; Jun, Eunju; Chang, Soon Heung; Kim, Won Joon

    2009-01-01

    Energy security, in the 21st century, draws significant attention in most countries worldwide, because the national security and sustainable development depend largely on energy security. The anticipated fossil energy depletion and the instability of their supply drive many countries to consider nuclear energy as their alternative energy source for the enhancement of their national energy security. In this study, indicators measuring the level of energy security in the electric power sector are developed and applied for the assessment of the effectiveness of four electric power system schemes which deploy different nuclear fuel cycle technologies, with consideration for the diversification of the energy markets and the vulnerability to economic disruption. Results show that the contribution of the closed fuel cycle scheme is larger than the once-through fuel cycle scheme in the perspective of energy security. In addition, the completely closed fuel cycle with the spent fuel recycling enhances the national energy security to the maximum extent compared to all other fuel cycle schemes. Since a completely closed fuel cycle is hardly affected by the uranium price changes, this scheme is found to be the most favorable scheme, ensuring the stable profit of utilities and stabilizing the electricity tariff. In addition, the completely closed fuel cycle scheme provides the best enhancement of national energy security with respect to energy supply, under reasonable price conditions. The indicators developed in this study can be utilized as a useful instrument for the measurement of the level of the energy security, especially by the countries importing energy resources for the generation of electric power.

  3. Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce.

    Science.gov (United States)

    Mishra, Dheerendra; Mukhopadhyay, Sourav; Kumari, Saru; Khan, Muhammad Khurram; Chaturvedi, Ankita

    2014-05-01

    Telecare medicine information systems (TMIS) present the platform to deliver clinical service door to door. The technological advances in mobile computing are enhancing the quality of healthcare and a user can access these services using its mobile device. However, user and Telecare system communicate via public channels in these online services which increase the security risk. Therefore, it is required to ensure that only authorized user is accessing the system and user is interacting with the correct system. The mutual authentication provides the way to achieve this. Although existing schemes are either vulnerable to attacks or they have higher computational cost while an scalable authentication scheme for mobile devices should be secure and efficient. Recently, Awasthi and Srivastava presented a biometric based authentication scheme for TMIS with nonce. Their scheme only requires the computation of the hash and XOR functions.pagebreak Thus, this scheme fits for TMIS. However, we observe that Awasthi and Srivastava's scheme does not achieve efficient password change phase. Moreover, their scheme does not resist off-line password guessing attack. Further, we propose an improvement of Awasthi and Srivastava's scheme with the aim to remove the drawbacks of their scheme.

  4. Image Encryption Using Stream Cipher Based on Nonlinear Combination Generator with Enhanced Security

    Directory of Open Access Journals (Sweden)

    Belmeguenaï Aîssa

    2013-03-01

    Full Text Available The images are very largely used in our daily life; the security of their transfer became necessary. In this work a novel image encryption scheme using stream cipher algorithm based on nonlinear combination generator is developed. The main contribution of this work is to enhance the security of encrypted image. The proposed scheme is based on the use the several linear feedback shifts registers whose feedback polynomials are primitive and of degrees are all pairwise coprimes combined by resilient function whose resiliency order, algebraic degree and nonlinearity attain Siegenthaler’s and Sarkar, al.’s bounds. This proposed scheme is simple and highly efficient. In order to evaluate performance, the proposed algorithm was measured through a series of tests. These tests included visual test and histogram analysis, key space analysis, correlation coefficient analysis, image entropy, key sensitivity analysis, noise analysis, Berlekamp-Massey attack, correlation attack and algebraic attack. Experimental results demonstrate the proposed system is highly key sensitive, highly resistance to the noises and shows a good resistance against brute-force, statistical attacks, Berlekamp-Massey attack, correlation attack, algebraic attack and a robust system which makes it a potential candidate for encryption of image.

  5. Genetic engineering of crops: a ray of hope for enhanced food security.

    Science.gov (United States)

    Gill, Sarvajeet Singh; Gill, Ritu; Tuteja, Renu; Tuteja, Narendra

    2014-01-01

    Crop improvement has been a basic and essential chase since organized cultivation of crops began thousands of years ago. Abiotic stresses as a whole are regarded as the crucial factors restricting the plant species to reach their full genetic potential to deliver desired productivity. The changing global climatic conditions are making them worse and pointing toward food insecurity. Agriculture biotechnology or genetic engineering has allowed us to look into and understand the complex nature of abiotic stresses and measures to improve the crop productivity under adverse conditions. Various candidate genes have been identified and transformed in model plants as well as agriculturally important crop plants to develop abiotic stress-tolerant plants for crop improvement. The views presented here are an attempt toward realizing the potential of genetic engineering for improving crops to better tolerate abiotic stresses in the era of climate change, which is now essential for global food security. There is great urgency in speeding up crop improvement programs that can use modern biotechnological tools in addition to current breeding practices for providing enhanced food security.

  6. A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qiang Zhou

    2014-04-01

    Full Text Available Data aggregation is an important technique for reducing the energy consumption of sensor nodes in wireless sensor networks (WSNs. However, compromised aggregators may forge false values as the aggregated results of their child nodes in order to conduct stealthy attacks or steal other nodes’ privacy. This paper proposes a Secure-Enhanced Data Aggregation based on Elliptic Curve Cryptography (SEDA-ECC. The design of SEDA-ECC is based on the principles of privacy homomorphic encryption (PH and divide-and-conquer. An aggregation tree disjoint method is first adopted to divide the tree into three subtrees of similar sizes, and a PH-based aggregation is performed in each subtree to generate an aggregated subtree result. Then the forged result can be identified by the base station (BS by comparing the aggregated count value. Finally, the aggregated result can be calculated by the BS according to the remaining results that have not been forged. Extensive analysis and simulations show that SEDA-ECC can achieve the highest security level on the aggregated result with appropriate energy consumption compared with other asymmetric schemes.

  7. ENTNEA: A concept for enhancing regional atomic energy cooperation for securing nuclear transparency in northeast Asia

    Energy Technology Data Exchange (ETDEWEB)

    Shin, S. T. [Korea Institute for Defence Analyses, Seoul (Korea)

    2000-11-01

    Nuclear energy continues to be a strong and growing component of economic development in Northeast Asia. A broad range of nuclear energy systems already exists across the region and vigorous growth is projected. Associated with these capabilities and plans are various concerns about operational safety, environmental protection, and accumulation of spent fuel and other nuclear materials. We consider cooperative measures that might address these concerns. The confidence building measures suggested here center on the sharing of information to lessen concerns about nuclear activities or to solve technical problems. These activities are encompassed by an Enhanced Nuclear Transparency in Northeast Asia (ENTNEA) concept that would be composed of near-term, information-sharing activities and an eventual regional institution. The near-term activities would address specific concerns and build a tradition of cooperation; examples include radiation measurements for public safety and emergency response, demonstration of safe operations at facilities and in transportation, and material security in the back end of the fuel cycle. Linkages to existing efforts and organizations would be sought to maximize the benefits of cooperation. In the longer term, the new cooperative tradition might evolve into an ENTNEA institution. In institutional form, ENTNEA could combine the near-term activities and new cooperative activities, which might require an institutional basis, for the mutual benefit and security of regional parties. 28 refs., 23 figs., 5 tabs. (Author)

  8. Collaborative eHealth Meets Security: Privacy-Enhancing Patient Profile Management.

    Science.gov (United States)

    Sanchez-Guerrero, Rosa; Mendoza, Florina Almenarez; Diaz-Sanchez, Daniel; Cabarcos, Patricia Arias; Lopez, Andres Marin

    2017-11-01

    Collaborative healthcare environments offer potential benefits, including enhancing the healthcare quality delivered to patients and reducing costs. As a direct consequence, sharing of electronic health records (EHRs) among healthcare providers has experienced a noteworthy growth in the last years, since it enables physicians to remotely monitor patients' health and enables individuals to manage their own health data more easily. However, these scenarios face significant challenges regarding security and privacy of the extremely sensitive information contained in EHRs. Thus, a flexible, efficient, and standards-based solution is indispensable to guarantee selective identity information disclosure and preserve patient's privacy. We propose a privacy-aware profile management approach that empowers the patient role, enabling him to bring together various healthcare providers as well as user-generated claims into an unique credential. User profiles are represented through an adaptive Merkle Tree, for which we formalize the underlying mathematical model. Furthermore, performance of the proposed solution is empirically validated through simulation experiments.

  9. A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.

    Science.gov (United States)

    Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Li, Fagen

    2016-01-01

    Patient medication safety is an important issue in patient medication systems. In order to prevent medication errors, integrating Radio Frequency Identification (RFID) technology into automated patient medication systems is required in hospitals. Based on RFID technology, such systems can provide medical evidence for patients' prescriptions and medicine doses, etc. Due to the mutual authentication between the medication server and the tag, RFID authentication scheme is the best choice for automated patient medication systems. In this paper, we present a RFID mutual authentication scheme based on elliptic curve cryptography (ECC) to enhance patient medication safety. Our scheme can achieve security requirements and overcome various attacks existing in other schemes. In addition, our scheme has better performance in terms of computational cost and communication overhead. Therefore, the proposed scheme is well suitable for patient medication systems.

  10. Available transfer capability evaluation and enhancement using various FACTS controllers: Special focus on system security

    Directory of Open Access Journals (Sweden)

    M. Venkateswara Rao

    2016-03-01

    Full Text Available Nowadays, because of the deregulation of the power industry the continuous increase of the load increases the necessity of calculation of available transfer capability (ATC of a system to analyze the system security. With this calculation, the scheduling of generator can be decided to decrease the system severity. Further, constructing new transmission lines, new substations are very cost effective to meet the increasing load and to increase the transfer capability. Hence, an alternative way to increase the transfer capability is use of flexible ac transmission system (FACTS controllers. In this paper, SSSC, STACOM and UPFC are considered to show the effect of these controllers in enhancing system ATC. For this, a novel current based modeling and optimal location strategy of these controllers are presented. The proposed methodology is tested on standard IEEE-30 bus and IEEE-57 bus test systems with supporting numerical and graphical results.

  11. Enhancing Security and Privacy in Video Surveillance through Role-Oriented Access Control Mechanism

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim

    sensitive regions, e.g. faces, from the videos. However, very few research efforts have focused on addressing the security aspects of video surveillance data and on authorizing access to this data. Interestingly, while PETs help protect the privacy of individuals, they may also hinder the usefulness....... Pervasive usage of such systems gives substantial powers to those monitoring the videos and poses a threat to the privacy of anyone observed by the system. Aside from protecting privacy from the outside attackers, it is equally important to protect the privacy of individuals from the inside personnel...... involved in monitoring surveillance data to minimize the chances of misuse of the system, e.g. voyeurism. In this context, several techniques to protect the privacy of individuals, called privacy enhancing techniques (PET) have therefore been proposed in the literature which detect and mask the privacy...

  12. The Use of Culture Portfolio Project in a Korean Culture Classroom: Evaluating Stereotypes and Enhancing Cross-Cultural Awareness

    Science.gov (United States)

    Byon, Andrew Sangpil

    2007-01-01

    This paper investigates a case of designing, implementing, and evaluating a semester-long culture portfolio project in a Korean culture class in an American university setting. The paper addresses the following four issues: (1) How does the project help the students gain insights into a particular aspect of Korean culture and encourage them to…

  13. African fermented dairy products - Overview of predominant technologically important microorganisms focusing on African Streptococcus infantarius variants and potential future applications for enhanced food safety and security.

    Science.gov (United States)

    Jans, Christoph; Meile, Leo; Kaindi, Dasel Wambua Mulwa; Kogi-Makau, Wambui; Lamuka, Peter; Renault, Pierre; Kreikemeyer, Bernd; Lacroix, Christophe; Hattendorf, Jan; Zinsstag, Jakob; Schelling, Esther; Fokou, Gilbert; Bonfoh, Bassirou

    2017-06-05

    Milk is a major source of nutrients, but can also be a vehicle for zoonotic foodborne diseases, especially when raw milk is consumed. In Africa, poor processing and storage conditions contribute to contamination, outgrowth and transmission of pathogens, which lead to spoilage, reduced food safety and security. Fermentation helps mitigate the impact of poor handling and storage conditions by enhancing shelf life and food safety. Traditionally-fermented sour milk products are culturally accepted and widely distributed in Africa, and rely on product-specific microbiota responsible for aroma, flavor and texture. Knowledge of microbiota and predominant, technologically important microorganisms is critical in developing products with enhanced quality and safety, as well as sustainable interventions for these products, including Africa-specific starter culture development. This narrative review summarizes current knowledge of technologically-important microorganisms of African fermented dairy products (FDP) and raw milk, taking into consideration novel findings and taxonomy when re-analyzing data of 29 publications covering 25 products from 17 African countries. Technologically-important lactic acid bacteria such as Lactococcus lactis and Streptococcus infantarius subsp. infantarius (Sii), Lactobacillus spp. and yeasts predominated in raw milk and FDP across Africa. Re-analysis of data also suggests a much wider distribution of Sii and thus a potentially longer history of use than previously expected. Therefore, evaluating the role and safety of African Sii lineages is important when developing interventions and starter cultures for FDP in Africa to enhance food safety and food security. In-depth functional genomics, epidemiologic investigations and latest identification approaches coupled with stakeholder involvement will be required to evaluate the possibility of African Sii lineages as novel food-grade Streptococcus lineage. Copyright © 2017 The Authors. Published by

  14. Political-Security, Economy, and Culture within the Dynamics of Geopolitics and Migration: On Philippine Territory and the Filipino People

    OpenAIRE

    John X. LAMBINO

    2015-01-01

    The paper considers the interaction of the dual elements of the nation-state: territory and people. Particularly, it discusses the interaction of geopolitics and migration, i.e. the non-mobile territory and the mobile people, from the perspectives of political-security, economy, and culture, and how the interactions influence government policy focusing on the case of the Philippines.The paper ferrets-out the major factors in the geopolitical transformation of the Philippine Is-lands into the ...

  15. Novel security enhancement technique against eavesdropper for OCDMA system using 2-D modulation format with code switching scheme

    Science.gov (United States)

    Singh, Simranjit; Kaur, Ramandeep; Singh, Amanvir; Kaler, R. S.

    2015-03-01

    In this paper, security of the spectrally encoded-optical code division multiplexed access (OCDMA) system is enhanced by using 2-D (orthogonal) modulation technique. This is an effective approach for simultaneous improvement of the system capacity and security. Also, the results show that the hybrid modulation technique proved to be a better option to enhance the data confidentiality at higher data rates using minimum utilization of bandwidth in a multiuser environment. Further, the proposed system performance is compared with the current state-of-the-art OCDMA schemes.

  16. An Initial Framework for Enhancing Cultural Competency: The Science of Cultural Readiness

    Science.gov (United States)

    2007-01-01

    Social constructionism : a theoretical approach that has much in common with relativism. It challenges the notion of fixed and universal truths in the...1.2: Basic triadic representation of human culture. It is easy to try to identify these latter divisions as physical and social culture...formation is necessary. Harris (1979) describes culture as existing at three levels known as infrastructure, social structure, and superstructure. As

  17. The United States Culture Collection Network (USCCN): Enhancing Microbial Genomics Research through Living Microbe Culture Collections

    Science.gov (United States)

    Boundy-Mills, Kyria; Hess, Matthias; Bennett, A. Rick; Ryan, Matthew; Kang, Seogchan; Nobles, David; Eisen, Jonathan A.; Inderbitzin, Patrik; Sitepu, Irnayuli R.; Torok, Tamas; Brown, Daniel R.; Cho, Juliana; Wertz, John E.; Mukherjee, Supratim; Cady, Sherry L.

    2015-01-01

    The mission of the United States Culture Collection Network (USCCN; http://usccn.org) is “to facilitate the safe and responsible utilization of microbial resources for research, education, industry, medicine, and agriculture for the betterment of human kind.” Microbial culture collections are a key component of life science research, biotechnology, and emerging global biobased economies. Representatives and users of several microbial culture collections from the United States and Europe gathered at the University of California, Davis, to discuss how collections of microorganisms can better serve users and stakeholders and to showcase existing resources available in public culture collections. PMID:26092453

  18. Enhancing the Quality of Life through Cultural Events

    DEFF Research Database (Denmark)

    Liburd, Janne J.

    2008-01-01

    . The present research recognizes the articulated aims of the festival and investigates how a cultural event influences participants' quality of life (QOL). The study adopts a twofold approach to examine organizers' expectations as well as the impacts on participants' short-term subjective well being...

  19. Disrupting the Dissertation: Linked Data, Enhanced Publication and Algorithmic Culture

    Science.gov (United States)

    Tracy, Frances; Carmichael, Patrick

    2017-01-01

    This article explores how the three aspects of Striphas' notion of algorithmic culture (information, crowds and algorithms) might influence and potentially disrupt established educational practices. We draw on our experience of introducing semantic web and linked data technologies into higher education settings, focussing on extended student…

  20. Learning Analytics to Understand Cultural Impacts on Technology Enhanced Learning

    Science.gov (United States)

    Mittelmeier, Jenna; Tempelaar, Dirk; Rienties, Bart; Nguyen, Quan

    2016-01-01

    In this empirical study, we investigate the role of national cultural dimensions as distal antecedents of the use intensity of e-tutorials, which constitute the digital component within a blended learning course. Profiting from the context of a dispositional learning analytics application, we investigate cognitive processing strategies and…

  1. Study Abroad: Enhanced Learning Experience in Cultural Diversity

    Science.gov (United States)

    Jaoko, Japheth

    2010-01-01

    This paper examines how a study abroad experiential learning course in diversity provided a cultural immersion experience for a group of social work students from a small private university in central Kentucky. The students participated in a three-week international education experience in Kenya and reported this experience helped them become more…

  2. Examining the Relationship of Business Operations and the Information Security Culture in the United States

    Science.gov (United States)

    Wynn, Cynthia L.

    2017-01-01

    An increase in information technology has caused and increased in threats towards information security. Threats are malware, viruses, sabotage from employees, and hacking into computer systems. Organizations have to find new ways to combat vulnerabilities and threats of internal and external threats to protect their information security and…

  3. Vulnerabilities as monsters: the cultural foundations of computer security (extended abstract)

    NARCIS (Netherlands)

    Pieters, Wolter; Consoli, L.

    2006-01-01

    This paper is part of a project to investigate the philosophical aspects of the scientific discipline of information security. This eld of research investigates the means to protect information systems against attacks, typically by modelling the system according to a certain security model, and

  4. Ficus Deltoidea Enhance Glucose Uptake Activity in Cultured Muscle Cells

    International Nuclear Information System (INIS)

    Zainah Adam; Shafii Khamis; Amin Ismail; Muhajir Hamid

    2015-01-01

    Ficus deltoidea or locally known as Mas cotek is one of the common medicinal plants used in Malaysia. Our previous studies showed that this plant have blood glucose lowering effect. Glucose uptake into muscle and adipocytes cells is one of the known mechanisms of blood glucose lowering effect. This study was performed to evaluate the effect of Ficus deltoidea on glucose uptake activity into muscle cells. The cells were incubated with Ficus deltoidea extracts either alone or combination with insulin. Amount of glucose uptake by L6 myotubes was determined using glucose tracer, 2-deoxy-(1- 3 H 1 )-glucose. The results showed that Ficus deltoidea extracts at particular doses enhanced basal or insulin-mediated glucose uptake into muscle cells significantly. Hot aqueous extract enhanced glucose uptake at the low concentration (10 μg/ ml) whereas methanolic extract enhanced glucose uptake at low and high concentrations. Methanolic extract also mimicked insulin activity during enhancing glucose uptake into L^ muscle cells. Glucose uptake activity of Ficus deltoidea could be attributed by the phenolic compound presence in the plant. This study had shown that Ficus deltoidea has the ability to enhance glucose uptake into muscle cells which is partly contributed the antidiabetic activity of this plant. (author)

  5. Challenges and Enhancements to the Safety Culture of the Regulatory Body

    International Nuclear Information System (INIS)

    Niel, Jean-Christophe; Chevet, Pierre Franck; Sheron, Brian; Boyd, Michael; Carlsson, Lennart; Tiippana, Petteri; Burns, Stephen; Jamieson, Terry; Fuketa, Toyoshi; Rzentkowski, Greg; Weiss, Frank Peter; Le Guen, Bernard

    2015-06-01

    The workshop opened with presentations by both the NEA Director-General and the chair of the three committees directly involved with the safety culture of the regulatory body (SCRB). The opening session set the scene and gave an overview of the SCRB together with presentations and discussions on priorities and challenges. The main session focused on the principles of the SCRB, its implementation and the challenges and enhancements that are being raised and considered. The workshop concluded with a session that looked at findings and conclusions, the way forward and an agreed position on the SCRB. This document brings together the available presentations (slides) given at the workshop: 1 - Introduction: Challenges and Enhancements to the Safety Culture of the Regulatory Body (J-C. Niel); 2 - Thoughts on Safety Culture from a CSNI Perspective (B. Sheron); 3 - Radiological Protection Culture: CRPPH Work (M. Boyd); 4 - Challenges and Enhancements to Safety Culture of the Regulatory Body (L. Carlsson); 5 - Principles for the safety culture of the regulatory body (P. Tiippana); 6 - NRC's Internal Safety Culture: Successes, Challenges, and the Path Forward (S.G. Burns); 7 - Insights on the Canadian Nuclear Safety Commission's Safety Culture Journey (T. Jamieson); 8 - Lessons Learned from the Fukushima Dai-ichi Accident regarding Safety Culture of Regulatory Body (T. Fuketa); 9 - Challenges to Regulatory Bodies' safety culture (P-F. Chevet); 10 - Regulatory Safety Culture: International Perspective (G. Rzentkowski); 11 - Integration of Safety Research into Safety Culture Concepts (F-P. Weiss); 12 - Radiation Protection and Emergency Management Aspects: Culture drawn up by RP professionals (B. Le Guen); 13 - Closing session panel (L. Carlsson)

  6. Evolutionary engineering to enhance starter culture performance in food fermentations.

    Science.gov (United States)

    Bachmann, Herwig; Pronk, Jack T; Kleerebezem, Michiel; Teusink, Bas

    2015-04-01

    Microbial starter cultures are essential for consistent product quality and functional properties such as flavor, texture, pH or the alcohol content of various fermented foods. Strain improvement programs to achieve desired properties in starter cultures are diverse, but developments in next-generation sequencing lead to an increased interest in evolutionary engineering of desired phenotypes. We here discuss recent developments of strain selection protocols and how computational approaches can assist such experimental design. Furthermore the analysis of evolved phenotypes and possibilities with complex consortia are highlighted. Studies carried out with mainly yeast and lactic acid bacteria demonstrate the power of evolutionary engineering to deliver strains with novel phenotypes as well as insight into underlying mechanisms. Copyright © 2014 Elsevier Ltd. All rights reserved.

  7. Enhancement of color and clarity in topaz and diamonds by nuclear radiation, safety and security concerns

    International Nuclear Information System (INIS)

    Shamshad Ahmed

    2009-01-01

    Inducement of color and clarity in gemstone Topaz, otherwise devoid of these attributes, has been achieved by synergistic utilization of neutron irradiation, electron beam irradiation and heat. The transformation of the colorless, cheaply available topaz into desirable deep blue topaz is a significant value addition, not achievable by other contending techniques .Likewise colorless and unclear diamonds, available in trade at throw away price, have been transformed by neutron irradiation into colored diamonds, known as fancy diamonds. The enhanced gems may possess stable or unstable colors depending on the nature of the color centers produced. In the case of blue topaz and fancy diamonds the colors produced were stable and heating at elevated temperatures can only lead to fading of colors. The enhancement of gems by neutron irradiation is commercially viable provided appropriate equipment and tools are used .In the paper are described the processes of the enhancement of topaz and diamonds along with the instrumentation involved. However, in view of the radioactivity generated as a result of the exposure of gems to the neutrons, and the likelihood of undue exposure of the users, operators etc to the radioactive gems, safety aspects command serious attention. In the paper, the strategies to avoid or to mitigate the radioactivity generated have been discussed. Also documented are the methodologies and the controls to ensure that the radioactive gems are not released before ensuring that the radioactivity, if any, in the irradiated materials is not above the permissible levels in conformity with the international standards. Safety, security and safeguard of these materials are thus appropriately addressed. (Authors)

  8. Fewer can be More: Nuclear Safety and Security Culture Self-Assessment in the Hungarian Public Ltd. for Radioactive Waste Management

    International Nuclear Information System (INIS)

    Horváth, K.; Solymosi, M.; Vass, G.

    2016-01-01

    The Hungarian regulator and operators show strong commitment towards robust nuclear safety and security culture. The paper discusses the evolution and the basis of the regulation of Hungarian safety and security culture. Because of security considerations nuclear safety incidents have always received and for sure will receive more publicity than malicious acts. That is probably the main reason behind that mostly nuclear safety incidents influence the common beliefs. This kind of primacy is noticeable as well in regulations and also in practice. Although there is a strong connection nuclear safety and security culture, their relationship has not been researched for a long time. The paper also presents an already achieved, combined nuclear safety and security culture survey type assessment. Survey is a well known type of organizational culture self assessment. The applied methods, relationship between these two cultures and of course some difficulties of the process are summarized. The presented method is appropriate to combine different guidance and characteristics to measure different attitude in a single survey. The method in practice is shown through the nuclear safety and security culture assessment conducted at Hungarian Public Ltd. Of Radioactive Waste Management. (author)

  9. Exploring Hardware-Based Primitives to Enhance Parallel Security Monitoring in a Novel Computing Architecture

    National Research Council Canada - National Science Library

    Mott, Stephen

    2007-01-01

    This research explores how hardware-based primitives can be implemented to perform security-related monitoring in real-time, offer better security, and increase performance compared to software-based approaches...

  10. Enhancing Sustainable Food Cultures by Experience Based Learning in Tourism

    DEFF Research Database (Denmark)

    Holm, Jesper

    The paper describes the results and niche forming methodology used in the commercial and in the R&D parts along the product-service chain of regional tourism. Obstacles and window of opportunities for further sustaining the tourism trade by enhancing the experience part of the business....

  11. Enhancing the Security Cooperation Marine Air Ground Task Force to Satisfy the Needs of the Uncertain Global Security Environment

    Science.gov (United States)

    2009-06-12

    and 2004 National Military Strategy (NMS) continue to germinate . Discussions surrounding the spread of effective democracies and alternate...additional civil-military operation capabilities such as enhanced engineering, additional medical and dental support, and transportation tailored for

  12. Agriculture in Bangladesh : A Note on Food Security by Enhancing Productivity

    OpenAIRE

    World Bank

    2009-01-01

    Awami League's Election Manifesto 2008 appropriately recognizes the importance of ensuring food security for all in Bangladesh. Food Security requires increasing agricultural growth which in turn is a key factor in reducing poverty in the country. Food security also requires increasing agricultural production and protecting consumers. Sustained production increases, in turn, require tec...

  13. Physical and Cross-Layer Security Enhancement and Resource Allocation for Wireless Networks

    Science.gov (United States)

    Bashar, Muhammad Shafi Al

    2011-01-01

    In this dissertation, we present novel physical (PHY) and cross-layer design guidelines and resource adaptation algorithms to improve the security and user experience in the future wireless networks. Physical and cross-layer wireless security measures can provide stronger overall security with high efficiency and can also provide better…

  14. Edutainment, cultural innovation and social inclusion. Fort360, a project for cultural heritage enhancement

    Directory of Open Access Journals (Sweden)

    Paolo Di Pietro Martinelli

    2016-12-01

    Full Text Available   Fort360 project is a cultural initiative that receives the main directives of edutainment processes, trying to provide an answer to the necessity of a capillary system of information and awareness about the dismissing cultural heritage. The proposed study – carried out in the Fort Bravetta, Rome – presents a video where the educational aspect, related to the historical and architectural site contents, is strictly connected with the playful and emotional quality, resulted from a VR interaction with a panoramic video. This first case study focuses on the use of low-cost digital instrumentation and tries to improve the value of culture from the bottom, proposing an alternative way of cultural heritage enjoyment, based on participation and on interdisciplinarity of the proposed contents.

  15. Enhancing cross-cultural participation through creative visual exploration

    DEFF Research Database (Denmark)

    Rodil, Kasper; Winschiers-Theophilus, Heike; Jensen, Kasper L

    2012-01-01

    Designers, like artists, fuse learned skills with intuition formed over their past experiences to unfold their creativity. Continuous interactions between the designers, their creations, and their informing and receiving environment lead to alignment and harmonisation. However, we observe...... that the 3D graphics visualisation has significantly increased participation and facilitated co-creation of meaning at the interface of different cultures rather than just being an end product. Not only do we he have to learn to ‘see’ what the village Elders see but also experience a paradigm shift in design...

  16. Is the Secure Base Phenomenon Evident Here, There, and Anywhere? A Cross-Cultural Study of Child Behavior and Experts' Definitions

    Science.gov (United States)

    Posada, German; Lu, Ting; Trumbell, Jill; Kaloustian, Garene; Trudel, Marcel; Plata, Sandra J.; Peña, Paola P.; Perez, Jennifer; Tereno, Susana; Dugravier, Romain; Coppola, Gabrielle; Constantini, Alessandro; Cassibba, Rosalinda; Kondo-Ikemura, Kiyomi; Nóblega, Magaly; Haya, Ines M.; Pedraglio, Claudia; Verissimo, Manuela; Santos, Antonio J.; Monteiro, Ligia; Lay, Keng-Ling

    2013-01-01

    The evolutionary rationale offered by Bowlby implies that secure base relationships are common in child-caregiver dyads and thus, child secure behavior observable across diverse social contexts and cultures. This study offers a test of the universality hypothesis. Trained observers in nine countries used the Attachment Q-set to describe the…

  17. Integration of the advanced transparency framework to advanced nuclear systems : enhancing Safety, Operations, Security and Safeguards (SOSS)

    International Nuclear Information System (INIS)

    Mendez, Carmen Margarita; Rochau, Gary Eugene; Cleary, Virginia D.

    2008-01-01

    The advent of the nuclear renaissance gives rise to a concern for the effective design of nuclear fuel cycle systems that are safe, secure, nonproliferating and cost-effective. We propose to integrate the monitoring of the four major factors of nuclear facilities by focusing on the interactions between Safeguards, Operations, Security, and Safety (SOSS). We proposed to develop a framework that monitors process information continuously and can demonstrate the ability to enhance safety, operations, security, and safeguards by measuring and reducing relevant SOSS risks, thus ensuring the safe and legitimate use of the nuclear fuel cycle facility. A real-time comparison between expected and observed operations provides the foundation for the calculation of SOSS risk. The automation of new nuclear facilities requiring minimal manual operation provides an opportunity to utilize the abundance of process information for monitoring SOSS risk. A framework that monitors process information continuously can lead to greater transparency of nuclear fuel cycle activities and can demonstrate the ability to enhance the safety, operations, security and safeguards associated with the functioning of the nuclear fuel cycle facility. Sandia National Laboratories (SNL) has developed a risk algorithm for safeguards and is in the process of demonstrating the ability to monitor operational signals in real-time though a cooperative research project with the Japan Atomic Energy Agency (JAEA). The risk algorithms for safety, operations and security are under development. The next stage of this work will be to integrate the four algorithms into a single framework

  18. Security-enhanced phase encryption assisted by nonlinear optical correlation via sparse phase

    International Nuclear Information System (INIS)

    Chen, Wen; Chen, Xudong; Wang, Xiaogang

    2015-01-01

    We propose a method for security-enhanced phase encryption assisted by a nonlinear optical correlation via a sparse phase. Optical configurations are established based on a phase retrieval algorithm for embedding an input image and the secret data into phase-only masks. We found that when one or a few phase-only masks generated during data hiding are sparse, it is possible to integrate these sparse masks into those phase-only masks generated during the encoding of the input image. Synthesized phase-only masks are used for the recovery, and sparse distributions (i.e., binary maps) for generating the incomplete phase-only masks are considered as additional parameters for the recovery of secret data. It is difficult for unauthorized receivers to know that a useful phase has been sparsely distributed in the finally generated phase-only masks for secret-data recovery. Only when the secret data are correctly verified can the input image obtained with valid keys be claimed as targeted information. (paper)

  19. Social Milieu Oriented Routing: A New Dimension to Enhance Network Security in WSNs.

    Science.gov (United States)

    Liu, Lianggui; Chen, Li; Jia, Huiling

    2016-02-19

    In large-scale wireless sensor networks (WSNs), in order to enhance network security, it is crucial for a trustor node to perform social milieu oriented routing to a target a trustee node to carry out trust evaluation. This challenging social milieu oriented routing with more than one end-to-end Quality of Trust (QoT) constraint has proved to be NP-complete. Heuristic algorithms with polynomial and pseudo-polynomial-time complexities are often used to deal with this challenging problem. However, existing solutions cannot guarantee the efficiency of searching; that is, they can hardly avoid obtaining partial optimal solutions during a searching process. Quantum annealing (QA) uses delocalization and tunneling to avoid falling into local minima without sacrificing execution time. This has been proven a promising way to many optimization problems in recently published literatures. In this paper, for the first time, with the help of a novel approach, that is, configuration path-integral Monte Carlo (CPIMC) simulations, a QA-based optimal social trust path (QA_OSTP) selection algorithm is applied to the extraction of the optimal social trust path in large-scale WSNs. Extensive experiments have been conducted, and the experiment results demonstrate that QA_OSTP outperforms its heuristic opponents.

  20. Enhancing the NFLs Counter-Terrorism Efforts: Is the Leagues Security Scheme Able to Effectively Thwart Terrorist Attacks

    Science.gov (United States)

    2016-09-01

    24  3.  Legal and Cultural Concerns of WBS Technologies in Aviation...Rudolph, author of the Atlanta bombings, was an “antigovernment fanatic” whose “grievance was anti- abortion ” based.10 Dzhokhar and Tamerlan Tsarnaev...1012690211433479. 16 Richard H. Fallon et al., “Panel I: Legal Issues in Sports Security,” Fordham Intellectual Property, Media and Entertainment Law Journal 13

  1. OneDHS: The Department of Homeland Security’s Organizational Culture

    Science.gov (United States)

    2012-04-27

    success stories. The first concerns New York City in the 1990s and the second highlights the Walt Disney Company and its chain of excellence. Both...difference that other actions were unable to produce. Walt Disney Company In contrast to a culture that has evolved over a number of years is a culture...designed from day one and constantly reinforced day in and day out for the last ninety years. The Walt Disney Company is an example of a culture

  2. Understanding the cultures of fishing communities: a key to fisheries management and food security

    National Research Council Canada - National Science Library

    McGoodwin, James R

    2001-01-01

    .... The paper suggests methods that might help fisheries managers to obtain reliable information about fishing cultures in an ethical manner, including the rapid acquisition of important information...

  3. Using RFID to Enhance Security in Off-Site Data Storage

    Science.gov (United States)

    Lopez-Carmona, Miguel A.; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R.

    2010-01-01

    Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system’s benefits in terms of efficiency and failure prevention. PMID:22163638

  4. Using RFID to enhance security in off-site data storage.

    Science.gov (United States)

    Lopez-Carmona, Miguel A; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R

    2010-01-01

    Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system's benefits in terms of efficiency and failure prevention.

  5. National Security Cutter: Enhanced Oversight Needed to Ensure Problems Discovered during Testing and Operations Are Addressed

    Science.gov (United States)

    2016-01-01

    May Lead to NSCs and Future DHS Assets Deploying without Having Demonstrated Full Capabilities 22 Performance Issues Discovered Outside of IOT &E...Examples of National Security Cutter Critical Operational Issues and Key Performance Parameters 10 Table 3: National Security Cutter Major...Cutter IOT &E Initial Operational Test and Evaluation KPP Key Performance Parameter LRI-II Long-Range Interceptor II NSC National Security Cutter

  6. Enhancing Cyber Security for SME organizations through self-assessments : How self-assessment raises awareness

    OpenAIRE

    Hassinen, Tarmo

    2017-01-01

    This thesis primarily studied the importance of self-assessment in increasing business organizations’ cyber security awareness of their ICT environment. The secondary studied item was the relevance of self-assessment in detecting new business potential while understanding ICT environment changes. The self-assessment is based on FINCS, the Finnish basic level cyber security certificate launched in December 2016. FINCSC consists of physical and management security, ICT service and system securi...

  7. Regulating edible insects: the challenge of adressing food security, nature conservation, and the erosion of traditional food culture

    DEFF Research Database (Denmark)

    Halloran, Afton Marina Szasz; Vantomme, Paul; Hanboonsong, Y.

    2015-01-01

    Entomophagy is a common practice in many regions of the world but there are few examples of national regulations that govern insects for human consumption. Where entomophagy is not common, the current regulatory discourse focuses primarily on food safety and consumer protection. In countries where...... species, they do not appear explicitly in dietary guidelines. Although food safety is a major concern, it can undermine the importance of nature conservation, traditional food culture, food security, and potential economic development. Thus, entomophagy should be viewed holistically and development...

  8. Walk the Talk: Progress in Building a Supply Chain Security Culture

    Energy Technology Data Exchange (ETDEWEB)

    Hund, Gretchen [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-08-31

    Pacific Northwest National Laboratory (PNNL) has engaged industry to “go beyond compliance” for over a decade in controlling and securing their supply chains to ensure their goods are not diverted to nuclear weapons programs. This work has focused on dual-use industries that manufacture products that can be used in both commercial applications and in the development of a nuclear weapon. The team encourages industry to self-regulate to reduce proliferation risks. As part of that work, PNNL interviewed numerous companies about their compliance practices to understand their business and to build awareness around best practices to ensure security of goods, technology, and information along their supply chains. From conducting this work, PNNL identified indicators that a company can adopt as part of its commitment to nonproliferation ideals with a focus on supply chain security.

  9. Walk the Talk: Progress in Building a Supply Chain Security Culture

    International Nuclear Information System (INIS)

    Hund, Gretchen

    2016-01-01

    Pacific Northwest National Laboratory (PNNL) has engaged industry to ''go beyond compliance'' for over a decade in controlling and securing their supply chains to ensure their goods are not diverted to nuclear weapons programs. This work has focused on dual-use industries that manufacture products that can be used in both commercial applications and in the development of a nuclear weapon. The team encourages industry to self-regulate to reduce proliferation risks. As part of that work, PNNL interviewed numerous companies about their compliance practices to understand their business and to build awareness around best practices to ensure security of goods, technology, and information along their supply chains. From conducting this work, PNNL identified indicators that a company can adopt as part of its commitment to nonproliferation ideals with a focus on supply chain security.

  10. Exploring the Educational Effectiveness of Culturally-enhanced Serious Game in Education

    Directory of Open Access Journals (Sweden)

    Mohd Ariffin Mazeyanti

    2017-01-01

    Full Text Available The main objective of this study is to explore the efficiency of utilizing a culturally - enhanced serious game in education particularly in Information Technology course. To attain this objective, the academic achievement of 61 participants was measured by using quantitative Quasi- Experimental research design approach. Sets of pre- and post-test questions were administered to all participants, where descriptive analysis and hypothesis evaluation were performed to the collected data. The finding revealed that there were significant increase on the mean values of participants who played culturally-enhanced serious game as compared to those who played contemporary serious game (M = 3.00. Therefore, the study suggested that culturally-enhanced serious game has potential to support education particularly in Information Technology course.

  11. Is the secure base phenomenon evident here, there, and anywhere? A cross-cultural study of child behavior and experts' definitions.

    Science.gov (United States)

    Posada, German; Lu, Ting; Trumbell, Jill; Kaloustian, Garene; Trudel, Marcel; Plata, Sandra J; Peña, Paola P; Perez, Jennifer; Tereno, Susana; Dugravier, Romain; Coppola, Gabrielle; Constantini, Alessandro; Cassibba, Rosalinda; Kondo-Ikemura, Kiyomi; Nóblega, Magaly; Haya, Ines M; Pedraglio, Claudia; Verissimo, Manuela; Santos, Antonio J; Monteiro, Ligia; Lay, Keng-Ling

    2013-01-01

    The evolutionary rationale offered by Bowlby implies that secure base relationships are common in child-caregiver dyads and thus, child secure behavior observable across diverse social contexts and cultures. This study offers a test of the universality hypothesis. Trained observers in nine countries used the Attachment Q-set to describe the organization of children's behavior in naturalistic settings. Children (N = 547) were 10-72 months old. Child development experts (N = 81) from all countries provided definitions of optimal child secure base use. Findings indicate that children from all countries use their mother as a secure base. Children's organization of secure base behavior was modestly related to each other both within and across countries. Experts' descriptions of the optimally attached child were highly similar across cultures. © 2013 The Authors. Child Development © 2013 Society for Research in Child Development, Inc.

  12. Psychological culture of a class teacher as the foundation of modern schoolchildren’s psychological security

    Directory of Open Access Journals (Sweden)

    Tatyana I. Kulikova

    2012-01-01

    Full Text Available This article discusses the role that psychological culture of class teacher plays in theestablishment and maintenance of psychological safety in a modern schoolchild.The problem of protection against psychological abuse within the educational environmentof a school is particularly important in the current socio-cultural realm.The article analyzes many pedagogical and psychological studies regarding theproblem of psychological education of teachers. It discusses contradiction betweenthe objective need to create a psychologically safe learning environmentand the unwillingness of teachers to work on it due to low own level of psychologicalculture. The author introduced the original structural model of psychologicalculture of a class teacher, representing the integration of the three main components:the culture of pedagogical refl ection, emotional culture and culture ofpedagogical infl uence.

  13. Use of polyethyleneimine polymer in cell culture as attachment factor and lipofection enhancer

    OpenAIRE

    Vancha, Ajith R; Govindaraju, Suman; Parsa, Kishore VL; Jasti, Madhuri; González-García, Maribel; Ballestero, Rafael P

    2004-01-01

    Abstract Background Several cell lines and primary cultures benefit from the use of positively charged extracellular matrix proteins or polymers that enhance their ability to attach to culture plates. Polyethyleneimine is a positively charged polymer that has gained recent attention as a transfection reagent. A less known use of this cationic polymer as an attachment factor was explored with several cell lines. Results Polyethyleneimine compared favorably to traditional attachment factors suc...

  14. Enhanced chondrocyte culture and growth on biologically inspired nanofibrous cell culture dishes.

    Science.gov (United States)

    Bhardwaj, Garima; Webster, Thomas J

    2016-01-01

    Chondral and osteochondral defects affect a large number of people in which treatment options are currently limited. Due to its ability to mimic the natural nanofibrous structure of cartilage, this current in vitro study aimed at introducing a new scaffold, called XanoMatrix™, for cartilage regeneration. In addition, this same scaffold is introduced here as a new substrate onto which to study chondrocyte functions. Current studies on chondrocyte functions are limited due to nonbiologically inspired cell culture substrates. With its polyethylene terephthalate and cellulose acetate composition, good mechanical properties and nanofibrous structure resembling an extracellular matrix, XanoMatrix offers an ideal surface for chondrocyte growth and proliferation. This current study demonstrated that the XanoMatrix scaffolds promote chondrocyte growth and proliferation as compared with the Corning and Falcon surfaces normally used for chondrocyte cell culture. The XanoMatrix scaffolds also have greater hydrophobicity, three-dimensional surface area, and greater tensile strength, making them ideal candidates for alternative treatment options for chondral and osteochondral defects as well as cell culture substrates to study chondrocyte functions.

  15. Enhancement effect of shikonin in cell suspension culture and transfermanant culture by radiation application

    International Nuclear Information System (INIS)

    Kim, Jae Sung; Lee, Young Keun; Chung, Byung Yeoup; Lee, Young Bok; Hwang Hye Yeon

    2004-10-01

    The cell lines 679, 679-29 and 622-46 of L. erythrorhizon could be selected on LS agar medium for the production shikonin in cell suspension culture. The shikonin was increased moderately in suspension culture of cell line 622-46 in LS liquid medium containing BA 2 mg·L -1 and IAA 0.2 mg·L -1 in the dark, and was increased by adding 1 μM Cu 2+ and 100 μM methyl jasmonate The accumulation of shikonin in the liquid medium was increased significantly by 2 Gy irradiation to callus of cell line 622-46 and culture in LS liquid medium containing BA 2 mg·L -1 and IAA 0.2 mg·L -1 in the dark and shikonin in cell debris was higher by 16 Gy irradiation. The activity of p-hydroxybenzoate geranyltransferase was increased by irradiation of 2 Gy and 16 Gy of γ radiation. Seedling hypocotyles of L. erythrorhizon were infected with Agrogacterium rhizogenes strain 15834 harboring a binary vector with an intron bearing the GUS (β-glucuronidase) gene driven by cauliflower mosaic virus (CaMV) 35S promotor as well as the HPT (hygromycin phosphotransferase) gene as the selection marker. Hairy roots isolated were hygromycin resistant and had integrated GUS gene in DNA. The root tip grown on M-9 medium showed normal pigment production pattern in border cells and root hairs

  16. Understanding Information Security Culture in an Organization: An Interpretive Case Study

    Science.gov (United States)

    Bess, Donald Arlo

    2012-01-01

    Information systems are considered to be a critical and strategic part of most organizations today. Because of this it has become increasingly important to ensure that there is an effective information security program in place protecting those information systems. It has been well established by researchers that the success of an information…

  17. Design and Development of Layered Security: Future Enhancements and Directions in Transmission

    Science.gov (United States)

    Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang

    2016-01-01

    Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack. PMID:26751443

  18. Design and Development of Layered Security: Future Enhancements and Directions in Transmission

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2016-01-01

    Full Text Available Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3 design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.

  19. Food safety security: a new concept for enhancing food safety measures.

    Science.gov (United States)

    Iyengar, Venkatesh; Elmadfa, Ibrahim

    2012-06-01

    The food safety security (FSS) concept is perceived as an early warning system for minimizing food safety (FS) breaches, and it functions in conjunction with existing FS measures. Essentially, the function of FS and FSS measures can be visualized in two parts: (i) the FS preventive measures as actions taken at the stem level, and (ii) the FSS interventions as actions taken at the root level, to enhance the impact of the implemented safety steps. In practice, along with FS, FSS also draws its support from (i) legislative directives and regulatory measures for enforcing verifiable, timely, and effective compliance; (ii) measurement systems in place for sustained quality assurance; and (iii) shared responsibility to ensure cohesion among all the stakeholders namely, policy makers, regulators, food producers, processors and distributors, and consumers. However, the functional framework of FSS differs from that of FS by way of: (i) retooling the vulnerable segments of the preventive features of existing FS measures; (ii) fine-tuning response systems to efficiently preempt the FS breaches; (iii) building a long-term nutrient and toxicant surveillance network based on validated measurement systems functioning in real time; (iv) focusing on crisp, clear, and correct communication that resonates among all the stakeholders; and (v) developing inter-disciplinary human resources to meet ever-increasing FS challenges. Important determinants of FSS include: (i) strengthening international dialogue for refining regulatory reforms and addressing emerging risks; (ii) developing innovative and strategic action points for intervention {in addition to Hazard Analysis and Critical Control Points (HACCP) procedures]; and (iii) introducing additional science-based tools such as metrology-based measurement systems.

  20. Enhanced kefiran production by mixed culture of Lactobacillus kefiranofaciens and Saccharomyces cerevisiae.

    Science.gov (United States)

    Cheirsilp, Benjamas; Shimizu, Hiroshi; Shioya, Suteaki

    2003-01-09

    In a batch mixed culture of Lactobacillus kefiranofaciens and Saccharomyces cerevisiae, which could assimilate lactic acid, cell growth and kefiran production rates of L. kefiranofaciens significantly increased, compared with those in pure cultures. The kefiran production rate was 36 mg l(-1) h(-1) in the mixed culture under the anaerobic condition, which was greater than that in the pure culture (24 mg l(-1) h(-1)). Under the aerobic condition, a more intensive interaction between these two strains was observed and higher kefiran production rate (44 mg l(-1) h(-1)) was obtained compared with that under the anaerobic condition. Kefiran production was further enhanced by an addition of fresh medium in the fed-batch mixed culture. In the fed-batch mixed culture, a final kefiran concentration of 5.41 g l(-1) was achieved at 87 h, thereby attaining the highest productivity at 62 mg l(-1) h(-1). Simulation study considered the reduction of lactic acid in pure culture was performed to estimate the additional effect of coculture with S. cerevisiae. Slightly higher cell growth and kefiran production rates in the mixed culture than those expected from pure culture by simulation were observed. These results suggest that coculture of L. kefiranofaciens and S. cerevisiae not only reduces the lactic acid concentration by consumption but also stimulates cell growth and kefiran production of L. kefiranofaciens.

  1. Influence of culture and language sensitive physics on science attitude enhancement

    Science.gov (United States)

    Morales, Marie Paz E.

    2015-12-01

    The study critically explored how culture and language sensitive curriculum materials in physics improve Pangasinan learners' attitude towards science. Their cultural dimensions, epistemological beliefs, and views on integration of culture and language in the teaching and learning process determined their cultural preference or profile. Design and development of culture and language sensitive curriculum materials in physics were heavily influenced by these learners' cultural preference or profile. Pilot-study using interviews and focus group discussions with natives of Pangasinan and document analysis were conducted to identify the culture, practices, and traditions integrated in the lesson development. Comparison of experimental participants' pretest and posttest results on science attitude measure showed significant statistical difference. Appraisal of science attitude enhancement favored the experimental group over the control group. Qualitative data deduced from post implementation interviews, focus group discussions, and journal log entries showed the same trend in favor of the experimental participants. The study revealed that culture and language integration in the teaching and learning process of physics concepts enabled students to develop positive attitude to science, their culture, and native language.

  2. Exploring the Impact of Culture- and Language-Influenced Physics on Science Attitude Enhancement

    Science.gov (United States)

    Morales, Marie Paz E.

    2016-02-01

    "Culture," a set of principles that trace and familiarize human beings within their existential realities, may provide an invisible lens through which reality could be discerned. Critically explored in this study is how culture- and language-sensitive curriculum materials in physics improve Pangasinan learners' attitude toward science. Their cultural preference or profile defined their cultural dimensions, epistemological beliefs, and views on integration of culture and language in the teaching and learning processes. The culture- and language-influenced curriculum materials in physics were heavily influenced by Pangasinan learners' cultural preference or profile. Results of the experimental participants' pretest and posttest on science attitude measure, when compared, showed significant statistical difference. Assessment of science attitude enhancement favored the experimental group over the control group. Qualitative data gathered from postimplementation interviews, focus group discussions, and journal log entries indicated the same trend in favor of the experimental participants. The study yielded that culture and language integration in the teaching and learning processes of physics concepts allowed students to develop positive attitude to science, their culture, and native language.

  3. Russian Oil and Natural Gas: Strategic Culture and Security Implications of European Dependence

    National Research Council Canada - National Science Library

    Phillips, William M

    2007-01-01

    .... The first section looks into the past actions and strategic culture of Russia to determine if there exists a threat that Russia will deny energy resources to European countries for political or economic gain...

  4. An Evaluation Method for Team Competencies to Enhance Nuclear Safety Culture

    International Nuclear Information System (INIS)

    Hang, S. M.; Seong, P. H.; Kim, A. R.

    2016-01-01

    Safety culture has received attention in safety-critical industries, including nuclear power plants (NPPs), due to various prominent accidents such as concealment of a Station Blackout (SBO) of Kori NPP unit 1 in 2012, the Sewol ferry accident in 2014, and the Chernobyl accident in 1986. Analysis reports have pointed out that one of the major contributors to the cause of the accidents is ‘the lack of safety culture’. The term, nuclear safety culture, was firstly defined after the Chernobyl accident by the IAEA in INSAG report no. 4, as follows “Safety culture is that assembly of characteristics and attitudes in organizations and individuals which establishes that, as an overriding priority, nuclear plant safety issues receive the attention warranted their significance.” Afterwards, a wide consensus grew among researchers and nuclear-related organizations, that safety culture should be evaluated and managed in a certain manner. Consequently, each nuclear-related organization defined and developed their own safety culture definitions and assessment methods. However, none of these methods provides a way for an individual or a team to enhance the safety culture of an organization. Especially for a team, which is the smallest working unit in NPPs, team members easily overlook their required practices to improve nuclear safety culture. Therefore in this study, we suggested a method to estimate nuclear safety culture of a team, by approaching with the ‘competency’ point of view. The competency is commonly focused on individuals, and defined as, “underlying characteristics of an individual that are causally related to effective or superior performance in a job.” Similar to safety culture, the definition of competency focuses on characteristics and attitudes of individuals. Thus, we defined ‘safety culture competency’ as “underlying characteristics and outward attitudes of individuals that are causally related to a healthy and strong nuclear safety

  5. Walk the Talk: How PNNL is developing a Supply Chain Security Culture

    Energy Technology Data Exchange (ETDEWEB)

    Hund, Gretchen [Pacific Northwest National Lab. (PNNL), Richland, WA (United States). Center for Global Security

    2015-09-30

    For the past decade, a team at the Pacific Northwest National Laboratory (PNNL) has engaged industry to “go beyond compliance” in controlling and securing their supply chains to ensure their goods are not diverted to nuclear weapons programs. This work has focused on dual-use industries that manufacture products that can be used in both commercial applications and in the development of a nuclear weapon. The team encourages industry to self-regulate to reduce proliferation risks. As part of that work, PNNL interviewed numerous companies about their compliance practices in order to understand their business and to build awareness around best practices to ensure security of goods and information along their supply chains. As a result, PNNL has identified seven indicators that a company can adopt as part of their commitment to nonproliferation ideals.

  6. Walk the Talk: How PNNL is developing a Supply Chain Security Culture

    International Nuclear Information System (INIS)

    Hund, Gretchen

    2015-01-01

    For the past decade, a team at the Pacific Northwest National Laboratory (PNNL) has engaged industry to ''go beyond compliance'' in controlling and securing their supply chains to ensure their goods are not diverted to nuclear weapons programs. This work has focused on dual-use industries that manufacture products that can be used in both commercial applications and in the development of a nuclear weapon. The team encourages industry to self-regulate to reduce proliferation risks. As part of that work, PNNL interviewed numerous companies about their compliance practices in order to understand their business and to build awareness around best practices to ensure security of goods and information along their supply chains. As a result, PNNL has identified seven indicators that a company can adopt as part of their commitment to nonproliferation ideals.

  7. Material security, life history, and moralistic religions: A cross-cultural examination

    Science.gov (United States)

    Ross, Cody T.; Apicella, Coren; Atkinson, Quentin D.; Cohen, Emma; McNamara, Rita Anne; Willard, Aiyana K.; Xygalatas, Dimitris; Norenzayan, Ara; Henrich, Joseph

    2018-01-01

    Researchers have recently proposed that “moralistic” religions—those with moral doctrines, moralistic supernatural punishment, and lower emphasis on ritual—emerged as an effect of greater wealth and material security. One interpretation appeals to life history theory, predicting that individuals with “slow life history” strategies will be more attracted to moralistic traditions as a means to judge those with “fast life history” strategies. As we had reservations about the validity of this application of life history theory, we tested these predictions with a data set consisting of 592 individuals from eight diverse societies. Our sample includes individuals from a wide range of traditions, including world religions such as Buddhism, Hinduism and Christianity, but also local traditions rooted in beliefs in animism, ancestor worship, and worship of spirits associated with nature. We first test for the presence of associations between material security, years of formal education, and reproductive success. Consistent with popular life history predictions, we find evidence that material security and education are associated with reduced reproduction. Building on this, we then test whether or not these demographic factors predict the moral concern, punitiveness, attributed knowledge-breadth, and frequency of ritual devotions towards two deities in each society. Here, we find no reliable evidence of a relationship between number of children, material security, or formal education and the individual-level religious beliefs and behaviors. We conclude with a discussion of why life-history theory is an inadequate interpretation for the emergence of factors typifying the moralistic traditions. PMID:29513766

  8. Wireless Sensor Network Security Enhancement Using Directional Antennas: State of the Art and Research Challenges.

    Science.gov (United States)

    Curiac, Daniel-Ioan

    2016-04-07

    Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to various types of security attacks. A possible solution to reduce the security risks is to use directional antennas instead of omnidirectional ones or in conjunction with them. Due to their increased complexity, higher costs and larger sizes, directional antennas are not traditionally used in wireless sensor networks, but recent technology trends may support this method. This paper surveys existing state of the art approaches in the field, offering a broad perspective of the future use of directional antennas in mitigating security risks, together with new challenges and open research issues.

  9. Strategic Culture and Energy Security Policy of South Korea: The Case of Nuclear Energy

    International Nuclear Information System (INIS)

    Kim, Taehyun

    2012-01-01

    The U. S. - ROK Civil Nuclear Cooperation Agreement highlights the dilemma of contemporary international non-proliferation regime. Non-Proliferation Treaty has represented an awkward balance between the ideal of nuclear energy and the reality of nuclear weapons. It is neither complete nor effective. It is not complete because it does not cover all the issues with respect to nuclear energy, which have become increasingly complex. Nuclear security, for example, is not an issue that it addresses, and it is precisely why President Obama called for the unprecedented Nuclear Security Summit. It is not effective. It has failed in preventing proliferation of nuclear weapons states, India, Israel, Pakistan and North Korea, who remain outside of the regime. An international regime is defined as 'a set of principles, norms, rules, and decision-procedures around which actors' expectations converge. The extents to which actors' expectations converge and forceful measures in the name of international community against any violation are justified will measure its effectiveness. NPT regime is sub-par on that. The world is in dire need of a comprehensive and integrated regime for nuclear energy regime, where proliferation, security, and safety concern are effectively addressed. South Korea, if it truly wants to become a key player in the field, has to be one of its architects. The ability to meet the challenge of revising Civil Nuclear Cooperation Agreement will show if it is a qualified architect

  10. Undergraduate Students' Opinions with Regard to Ubiquitous MOOC for Enhancing Cross-Cultural Competence

    Science.gov (United States)

    Plangsorn, Boonrat; Na-Songkhla, Jaitip; Luetkehans, Lara M.

    2016-01-01

    The purpose of this study was to study undergraduate students' opinions with regard to the ubiquitous massive open online course (MOOC) for enhancing cross-cultural competence. This descriptive research applied a survey method. The survey data were collected by using survey questionnaires and online questionnaires from 410 undergraduate students…

  11. Internal Quality Assurance--Enhancing Quality Culture. ENQA Workshop Report 16

    Science.gov (United States)

    ENQA (European Association for Quality Assurance in Higher Education), 2010

    2010-01-01

    The European Association for Quality Assurance in Higher Education (ENQA), in cooperation with the Quality Assurance Agency (QAA, UK), organised a seminar on theme "Internal Quality Assurance--Enhancing quality culture" which was held on 8-9 June, 2010 in London, United Kingdom. The seminar marked the fourth annual meeting of the ENQA…

  12. Development of Education Programs in Mountainous Regions to Enhance the Culture and Knowledge of Minority Nationalities.

    Science.gov (United States)

    Wei, Shiyuan; Zhou, Guangda

    1989-01-01

    Describes the historical development of educational programs which could enhance the culture and knowledge of minorities in the mountainous regions of China. Identifies current major problems in minority education and lists statistical information for the school population. Provides guidelines for developing a minority education program. (KO)

  13. Enhancing food security in Northern Ghana through smallholder small ruminant production and marketing

    NARCIS (Netherlands)

    Amankwah, K.

    2013-01-01

    Key words

    Livestock markets, technical and institutional constraints, innovation systems, veterinary services; smallholder farmers; structural adjustment, scaling out, co-learning, supplementary feeding, herd growth, food security, positive deviants, commercialization,

  14. Exploring Hardware-Based Primitives to Enhance Parallel Security Monitoring in a Novel Computing Architecture

    National Research Council Canada - National Science Library

    Mott, Stephen

    2007-01-01

    .... In doing this, we propose a novel computing architecture, derived from a contemporary shared memory architecture, that facilitates efficient security-related monitoring in real-time, while keeping...

  15. Enhanced Security and Pairing-free Handover Authentication Scheme for Mobile Wireless Networks

    Science.gov (United States)

    Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun

    2017-10-01

    With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.

  16. Enhancing food security through a multi-stakeholder process: the global agenda for sustainable livestock

    NARCIS (Netherlands)

    Breeman, G.E.; Dijkman, J.; Termeer, C.J.A.M.

    2015-01-01

    Feeding the world is not only a complex technical matter, but also a demanding governance issue. As food security has all the characteristics of a wicked problem (variety of problem definitions, conflicting interests, interconnectedness across scales, inherent uncertainties), conventional governance

  17. Defining safety culture and the nexus between safety goals and safety culture. 4. Enhancing Safety Culture Through the Establishment of Safety Goals

    International Nuclear Information System (INIS)

    Tateiwa, Kenji; Miyata, Koichi; Yahagi, Kimitoshi

    2001-01-01

    Safety culture is the perception of each individual and organization of a nuclear power plant that safety is the first priority, and at Tokyo Electric Power Company (TEPCO), we have been practicing it in everyday activities. On the other hand, with the demand for competitiveness of nuclear power becoming even more intense these days, we need to pursue efficient management while maintaining the safety level at the same time. Below, we discuss how to achieve compatibility between safety culture and efficient management as well as enhance safety culture. Discussion at Tepco: safety culture-nurturing activities such as the following are being implemented: 1. informing the employees of the 'Declaration of Safety Promotion' by handing out brochures and posting it on the intranet home page; 2. publishing safety culture reports covering stories on safety culture of other industry sectors, recent movements on safety culture, etc.; 3. conducting periodic questionnaires to employees to grasp how deeply safety culture is being established; 4. carrying out educational programs to learn from past cases inside and outside the nuclear industry; 5. committing to common ownership of information with the public. The current status of safety culture in Japan sometimes seems to be biased to the quest of ultimate safety; rephrasing it, there have been few discussions regarding the sufficiency of the quantitative safety level in conjunction with the safety culture. Safety culture is one of the most crucial foundations guaranteeing the plant's safety, and for example, the plant safety level evaluated by probabilistic safety assessment (PSA) could be said to be valid only on the ground that a sound and sufficient safety culture exists. Although there is no doubt that the safety culture is a fundamental and important attitude of an individual and organization that keeps safety the first priority, the safety culture in itself should not be considered an obstruction to efforts to implement

  18. Strategies to enhance biologically active-secondary metabolites in cell cultures of Artemisia - current trends.

    Science.gov (United States)

    Ali, Mohammad; Abbasi, Bilal Haider; Ahmad, Nisar; Khan, Haji; Ali, Gul Shad

    2017-11-01

    The genus Artemisia has been utilized worldwide due to its immense potential for protection against various diseases, especially malaria. Artemisia absinthium, previously renowned for its utilization in the popular beverage absinthe, is gaining resurgence due to its extensive pharmacological activities. Like A. annua, this species exhibits strong biological activities like antimalarial, anticancer and antioxidant. Although artemisinin was found to be the major metabolite for its antimalarial effects, several flavonoids and terpenoids are considered to possess biological activities when used alone and also to synergistically boost the bioavailability of artemisinin. However, due to the limited quantities of these metabolites in wild plants, in vitro cultures were established and strategies have been adopted to enhance medicinally important secondary metabolites in these cultures. This review elaborates on the traditional medicinal uses of Artemisia species and explains current trends to establish cell cultures of A. annua and A. absinthium for enhanced production of medicinally important secondary metabolites.

  19. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    OpenAIRE

    Feng Tao; Zhao Ming-Tao

    2017-01-01

    Tor (The Second Onion Router) is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was use...

  20. Science, Technology, Engineering, and Mathematics (STEM) Education Reform to Enhance Security of the Global Cyberspace

    Science.gov (United States)

    2014-05-01

    towards cloud computing technologies and capabilities demand needs for developing new tools that work in ensemble to handle security challenges. A...programs with the schools and/or hire from their pool of students. Therefore, no real STEM standards exist at the tertiary and beyond levels of education ...successful in cyber operations and network security related jobs much early on into the new STEM education model pipeline. Subjects such as computer

  1. Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach.

    Science.gov (United States)

    Sanchez-Iborra, Ramon; Sánchez-Gómez, Jesús; Pérez, Salvador; Fernández, Pedro J; Santa, José; Hernández-Ramos, José L; Skarmeta, Antonio F

    2018-06-05

    Luckily, new communication technologies and protocols are nowadays designed considering security issues. A clear example of this can be found in the Internet of Things (IoT) field, a quite recent area where communication technologies such as ZigBee or IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) already include security features to guarantee authentication, confidentiality and integrity. More recent technologies are Low-Power Wide-Area Networks (LP-WAN), which also consider security, but present initial approaches that can be further improved. An example of this can be found in Long Range (LoRa) and its layer-two supporter LoRa Wide Area Network (LoRaWAN), which include a security scheme based on pre-shared cryptographic material lacking flexibility when a key update is necessary. Because of this, in this work, we evaluate the security vulnerabilities of LoRaWAN in the area of key management and propose different alternative schemes. Concretely, the application of an approach based on the recently specified Ephemeral Diffie⁻Hellman Over COSE (EDHOC) is found as a convenient solution, given its flexibility in the update of session keys, its low computational cost and the limited message exchanges needed. A comparative conceptual analysis considering the overhead of different security schemes for LoRaWAN is carried out in order to evaluate their benefits in the challenging area of LP-WAN.

  2. Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach

    Directory of Open Access Journals (Sweden)

    Ramon Sanchez-Iborra

    2018-06-01

    Full Text Available Luckily, new communication technologies and protocols are nowadays designed considering security issues. A clear example of this can be found in the Internet of Things (IoT field, a quite recent area where communication technologies such as ZigBee or IPv6 over Low power Wireless Personal Area Networks (6LoWPAN already include security features to guarantee authentication, confidentiality and integrity. More recent technologies are Low-Power Wide-Area Networks (LP-WAN, which also consider security, but present initial approaches that can be further improved. An example of this can be found in Long Range (LoRa and its layer-two supporter LoRa Wide Area Network (LoRaWAN, which include a security scheme based on pre-shared cryptographic material lacking flexibility when a key update is necessary. Because of this, in this work, we evaluate the security vulnerabilities of LoRaWAN in the area of key management and propose different alternative schemes. Concretely, the application of an approach based on the recently specified Ephemeral Diffie–Hellman Over COSE (EDHOC is found as a convenient solution, given its flexibility in the update of session keys, its low computational cost and the limited message exchanges needed. A comparative conceptual analysis considering the overhead of different security schemes for LoRaWAN is carried out in order to evaluate their benefits in the challenging area of LP-WAN.

  3. Using RFID to Enhance Security in Off-Site Data Storage

    Directory of Open Access Journals (Sweden)

    Enrique de la Hoz

    2010-08-01

    Full Text Available Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system’s benefits in terms of efficiency and failure prevention.

  4. Cross Cultural Awareness in International Military Operation: International Security Assistance Force in Afghanistan

    Directory of Open Access Journals (Sweden)

    Jowita Brudnicka

    2015-12-01

    Full Text Available Multiculturalism defined as a multitude of cultures can be typified as a major trend in international relations, what is a chellenge for every participant of global affairs. The phenomen of multiculturalism is absolutely nothing new, but under conditions of progresive globalisation mechanism its importance has been appreciated.In practise multinational forces have to operate in culturally heterogeneous environment in an array of tasks to combat threats of mostly a non-military transnational nature. All the time there are a highly complex relations within coalition personnel, in cuturally diverse society living in the theatre of operation and between all them mutually.

  5. INPO Perspectives and Activities to Enhance Supplier Human Performance and Safety Culture

    International Nuclear Information System (INIS)

    Duncan, R. J.

    2016-01-01

    Within their own organizations, utilities have made significant improvements in human performance and safety culture, supported by a strong community of practice through INPO and WANO. In recent years, utilities have been making increasing use of suppliers for design, construction, inspection and maintenance services in support of their NPPs. Many of these suppliers do not have the benefit of being members of a community of practice when it comes to human performance and safety culture. To help the supplier community make improvements similar to what the utilities have achieved, INPO has recently expanded its Supplier Participant program to address the issue of human performance and safety culture in the supplier community. The intent of this paper will be to share the INPO’s perspectives and activities in helping suppliers of services and products to NPPs enhance their human performance and safety culture. (author)

  6. The Ultimate Cookbook for Cultural Managers : Social Security in International Context

    NARCIS (Netherlands)

    D. Molenaar (Dick)

    2017-01-01

    markdownabstractActivities of artists are rarely limited to their own country. Nowadays artists (and other cultural professionals) are very mobile and easily accept a job offer or an activity abroad. All these situations show a vibrant and highly mobile sector that is not defined by borders.

  7. Evaluating U.S. and Chinese Cyber Security Strategies Within a Cultural Framework

    Science.gov (United States)

    2016-04-01

    analysis of Chinese culture in warfare studies. They find that Chinese convention “respects inaction”28 and the teachings of Sun Tzu , thus favoring the...15 Bibliography ...AY16 16 Bibliography Ehsan Ahrari. “Transformation of America’s Military and Asymmetric War.” Comparative Strategy 29, no. 3 (2010): 223-244

  8. Cyber Culture and Personnel Security: Report 2 - Ethnographic Analysis of Second Life

    Science.gov (United States)

    2011-07-01

    concept of cultural relativism . This principle states that an individual or group’s behaviors and beliefs should be interpreted through the lens of...behaviors. Residents view cyber sexual relations as being less morally compromising than real-life sex, because they lack “I can say that I have had

  9. Safeguards Culture

    Energy Technology Data Exchange (ETDEWEB)

    Frazar, Sarah L.; Mladineo, Stephen V.

    2012-07-01

    The concepts of nuclear safety and security culture are well established; however, a common understanding of safeguards culture is not internationally recognized. Supported by the National Nuclear Security Administration, the authors prepared this report, an analysis of the concept of safeguards culture, and gauged its value to the safeguards community. The authors explored distinctions between safeguards culture, safeguards compliance, and safeguards performance, and evaluated synergies and differences between safeguards culture and safety/security culture. The report concludes with suggested next steps.

  10. An Approach to Enhancement of the Safety Culture of Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Yong Hee [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-05-15

    The culture of an organization is very complex to study and evaluate, but it is possible to examine the specific norms that figure out the culture for the safety of a system. This paper describes an initiation plan to study the safety culture issue in Korean NPPs. Recently there happened successively events that turned out to be socially prominent in Korea. Many issues on the safety culture aspect of NPPs have been raised including the types of errors such as violations, an intended concealment of safety-related information, counterfeit items, forgery process in procurement, and so on. Those were investigated in detail for the root causes of these issues as human and organizational errors and for the countermeasures to prevent those events. They are integrated into a correspondent long-term plan including the establishment of a fundamental infrastructure of safety culture management for operating NPPs in Korea. A monitoring system with analysis functions utilizing system dynamics simulation and data mining is proposed to be incorporated into a safety culture management system. Additionally, a set of training and support programs are to be developed for the enhancement of some selected competence of the operating personnel in Korean NPPs. The safe operation of NPPs requires the typical safety culture characteristics of the high reliability organization (HRO). The culture of an organization is very complex to study and evaluate, but it is possible to examine the specific norms that figure out the culture for the safety of a system. This paper describes an integrated systems approach as an initiating plan to study the safety culture issue in Korean NPPs.

  11. An Approach to Enhancement of the Safety Culture of Nuclear Power Plants

    International Nuclear Information System (INIS)

    Lee, Yong Hee

    2014-01-01

    The culture of an organization is very complex to study and evaluate, but it is possible to examine the specific norms that figure out the culture for the safety of a system. This paper describes an initiation plan to study the safety culture issue in Korean NPPs. Recently there happened successively events that turned out to be socially prominent in Korea. Many issues on the safety culture aspect of NPPs have been raised including the types of errors such as violations, an intended concealment of safety-related information, counterfeit items, forgery process in procurement, and so on. Those were investigated in detail for the root causes of these issues as human and organizational errors and for the countermeasures to prevent those events. They are integrated into a correspondent long-term plan including the establishment of a fundamental infrastructure of safety culture management for operating NPPs in Korea. A monitoring system with analysis functions utilizing system dynamics simulation and data mining is proposed to be incorporated into a safety culture management system. Additionally, a set of training and support programs are to be developed for the enhancement of some selected competence of the operating personnel in Korean NPPs. The safe operation of NPPs requires the typical safety culture characteristics of the high reliability organization (HRO). The culture of an organization is very complex to study and evaluate, but it is possible to examine the specific norms that figure out the culture for the safety of a system. This paper describes an integrated systems approach as an initiating plan to study the safety culture issue in Korean NPPs

  12. Enhanced rearrangement technique for secure data transmission: case study credit card process

    Science.gov (United States)

    Vyavahare, Tushar; Tekade, Darshana; Nayak, Saurabh; kumar, N. Suresh; Blessy Trencia Lincy, S. S.

    2017-11-01

    Encryption of data is very important in order to keep the data secure and make secure transactions and transmission of data. Such as online shopping. whenever we give our card details there is possibility of data being hacked or intruded. So to secure that we need to encrypt the data and decryption strategy should be known only to that particular bank. Therefore to achieve this objective RSA algorithm can be used. Where only intended sender and receiver can know about the encryption and decryption of data. To make the RSA technique more secure in this paper we propose the technique we call it Modified RSA. for which a transposition module is designed which uses Row Transposition method to encrypt the data. Before giving the card details to RSA the input will be given to this transposition module which will scrambles the data and rearranges it. Output of transposition will be then provided to the modified RSA which produces the cipher text to send over the network. Use of RSA and the transposition module will provide the dual security to whole system.

  13. A flexible privacy enhanced and secured ICT architecture for a smart grid project with active cosumers in the city of Zwolle-NL

    NARCIS (Netherlands)

    Montes Portela, C.; Rooden, H.; Kohlmann, J.; Leersum, van D.; Geldtmeijer, D.A.M.; Slootweg, J.G.; van Eekelen, Marko

    2013-01-01

    This paper presents the ICT architecture for a Smart Grid project with consumer interaction in the city of Zwolle, the Netherlands. It describes the privacy and security enhancing measures applied to ensure a positive sum of necessary functionality and respect for consumer’s privacy and secure

  14. Mesenchymal stem cells enhance the metastasis of 3D-cultured hepatocellular carcinoma cells

    International Nuclear Information System (INIS)

    Liu, Chang; Liu, Yang; Xu, Xiao-xi; Guo, Xin; Sun, Guang-wei; Ma, Xiao-jun

    2016-01-01

    Accumulating evidences have demonstrated that mesenchymal stem cells (MSC) could be recruited to the tumor microenvironment. Umbilical cord mesenchymal stem cells (UCMSC) were attractive vehicles for delivering therapeutic agents against cancer. Nevertheless, the safety of UCMSC in the treatment of tumors including hepatocellular carcinoma (HCC) was still undetermined. In this study, an in vitro co-culture system was established to evaluate the effect of UCMSC on the cell growth, cancer stem cell (CSC) characteristics, drug resistance, metastasis of 3D-cultured HCC cells, and the underlying mechanism was also investigated. It was found that after co-cultured with UCMSC, the metastatic ability of 3D-cultured HCC cells was significantly enhanced as indicated by up-regulation of matrix metalloproteinase (MMP), epithelial-mesenchymal transition (EMT)-related genes, and migration ability. However, cell growth, drug resistance and CSC-related gene expression of HCC cells were not affected by UCMSC. Moreover, EMT was reversed, MMP-2 expression was down-regulated, and migration ability of HCC cell was significantly inhibited when TGF-β receptor inhibitor SB431542 was added into the co-culture system. Therefore, these data indicated that UCMSC could significantly enhance the tumor cell metastasis, which was due to the EMT of HCC cells induced by TGF-β. The online version of this article (doi:10.1186/s12885-016-2595-4) contains supplementary material, which is available to authorized users

  15. Strategy of National Cultural Security and Modern Russia «Soft Force»

    Directory of Open Access Journals (Sweden)

    G J Filimonov

    2010-09-01

    Full Text Available Today one of the key factors needed for preservation of the state sovereignty, territorial integrity of the country, consolidation of a society, creation of conditions for the successful decision of internal problems and accordingly occurrence of possibility for conducting by the state of active foreign policy necessity of formation of own strategy of maintenance of national cultural safety and potentials so-called «soft force» appears.

  16. Russian Oil and Natural Gas: Strategic Culture and Security Implications of European Dependence

    National Research Council Canada - National Science Library

    Phillips, William M

    2007-01-01

    .... The third section investigates the importance of revenues that Russia receives from consumption of oil and natural gas exports to Europe on their Gross National Product and economic growth for the future. By understanding Russia's strategic culture and the interdependence of European demand and Russian supply, conclusions are made that determine the threat, risk, and circumstances that Russia will deny energy resources to European countries.

  17. Extensions and Enhancements to “the Secure Remote Update Protocol”

    Directory of Open Access Journals (Sweden)

    Andrew John Poulter

    2017-09-01

    Full Text Available This paper builds on previous work introducing the Secure Remote Update Protocol (SRUP, a secure communications protocol for Command and Control applications in the Internet of Things, built on top of MQTT. This paper builds on the original protocol and introduces a number of additional message types: adding additional capabilities to the protocol. We also discuss the difficulty of proving that a physical device has an identity corresponding to a logical device on the network and propose a mechanism to overcome this within the protocol.

  18. Can the use of the Leggett-Garg inequality enhance security of the BB84 protocol?

    Science.gov (United States)

    Shenoy H., Akshata; Aravinda, S.; Srikanth, R.; Home, Dipankar

    2017-08-01

    Prima facie, there are good reasons to answer in the negative the question posed in the title: the Bennett-Brassard 1984 (BB84) protocol is provably secure subject to the assumption of trusted devices, while the Leggett-Garg-type inequality (LGI) does not seem to be readily adaptable to the device independent (DI) or semi-DI scenario. Nevertheless, interestingly, here we identify a specific device attack, which has been shown to render the standard BB84 protocol completely insecure, but against which our formulated LGI-assisted BB84 protocol (based on an appropriate form of LGI) is secure.

  19. Information theoretically secure, enhanced Johnson noise based key distribution over the smart grid with switched filters.

    Science.gov (United States)

    Gonzalez, Elias; Kish, Laszlo B; Balog, Robert S; Enjeti, Prasad

    2013-01-01

    We introduce a protocol with a reconfigurable filter system to create non-overlapping single loops in the smart power grid for the realization of the Kirchhoff-Law-Johnson-(like)-Noise secure key distribution system. The protocol is valid for one-dimensional radial networks (chain-like power line) which are typical of the electricity distribution network between the utility and the customer. The speed of the protocol (the number of steps needed) versus grid size is analyzed. When properly generalized, such a system has the potential to achieve unconditionally secure key distribution over the smart power grid of arbitrary geometrical dimensions.

  20. Test and Evaluation for Enhanced Security: A Quantitative Method to Incorporate Expert Knowledge into Test Planning Decisions.

    Energy Technology Data Exchange (ETDEWEB)

    Rizzo, Davinia [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Blackburn, Mark [Stevens Inst. of Technology, Hoboken, NJ (United States)

    2017-03-01

    Complex systems are comprised of technical, social, political and environmental factors as well as the programmatic factors of cost, schedule and risk. Testing these systems for enhanced security requires expert knowledge in many different fields. It is important to test these systems to ensure effectiveness, but testing is limited to due cost, schedule, safety, feasibility and a myriad of other reasons. Without an effective decision framework for Test and Evaluation (T&E) planning that can take into consideration technical as well as programmatic factors and leverage expert knowledge, security in complex systems may not be assessed effectively. Therefore, this paper covers the identification of the current T&E planning problem and an approach to include the full variety of factors and leverage expert knowledge in T&E planning through the use of Bayesian Networks (BN).

  1. International Cooperation for Enhancing Nuclear Safety, Security, Safeguards and Non-proliferation : 60 Years of IAEA and EURATOM

    CERN Document Server

    Abousahl, Said; Plastino, Wolfango

    2018-01-01

    This open access book examines key aspects of international cooperation to enhance nuclear safety, security, safeguards, and non-proliferation, thereby assisting in development and maintenance of the verification regime and fostering progress toward a nuclear weapon-free world. The book opens by addressing important political, institutional, and legal dimensions. Current challenges are discussed and attempts made to identify possible solutions and future improvements. Subsequent sections consider scientific developments that have the potential to increase the effectiveness of implementation of international regimes, particularly in critical areas, technology foresight, and the ongoing evaluation of current capabilities. The closing sections examine scientific and technical challenges and discuss the role of international cooperation and actions of the scientific community in leading the world toward peace and security. The book – which celebrates 60 years of IAEA Atoms for Peace and Development and the EURA...

  2. Enhanced Geothermal System Development of the AmeriCulture Leasehold in the Animas Valley; FINAL

    International Nuclear Information System (INIS)

    Duchane, David V; Seawright, Gary L; Sewright, Damon E; Brown, Don; Witcher, James c.; Nichols, Kenneth E.

    2001-01-01

    Working under the grant with AmeriCulture, Inc., and its team of geothermal experts, assembled a plan to apply enhanced geothermal systems (EGS) techniques to increase both the temperature and flow rate of the geothermal waters on its leasehold. AmeriCulture operates a commercial aquaculture facility that will benefit from the larger quantities of thermal energy and low cost electric power that EGS technology can provide. The project brought together a team of specialists that, as a group, provided the full range of expertise required to successfully develop and implement the project

  3. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  4. Towards an Enhancement of Organizational Information Security through Threat Factor Profiling (TFP) Model

    Science.gov (United States)

    Sidi, Fatimah; Daud, Maslina; Ahmad, Sabariah; Zainuddin, Naqliyah; Anneisa Abdullah, Syafiqa; Jabar, Marzanah A.; Suriani Affendey, Lilly; Ishak, Iskandar; Sharef, Nurfadhlina Mohd; Zolkepli, Maslina; Nur Majdina Nordin, Fatin; Amat Sejani, Hashimah; Ramadzan Hairani, Saiful

    2017-09-01

    Information security has been identified by organizations as part of internal operations that need to be well implemented and protected. This is because each day the organizations face a high probability of increase of threats to their networks and services that will lead to information security issues. Thus, effective information security management is required in order to protect their information assets. Threat profiling is a method that can be used by an organization to address the security challenges. Threat profiling allows analysts to understand and organize intelligent information related to threat groups. This paper presents a comparative analysis that was conducted to study the existing threat profiling models. It was found that existing threat models were constructed based on specific objectives, thus each model is limited to only certain components or factors such as assets, threat sources, countermeasures, threat agents, threat outcomes and threat actors. It is suggested that threat profiling can be improved by the combination of components found in each existing threat profiling model/framework. The proposed model can be used by an organization in executing a proactive approach to incident management.

  5. Secure open cloud in data transmission using reference pattern and identity with enhanced remote privacy checking

    Science.gov (United States)

    Vijay Singh, Ran; Agilandeeswari, L.

    2017-11-01

    To handle the large amount of client’s data in open cloud lots of security issues need to be address. Client’s privacy should not be known to other group members without data owner’s valid permission. Sometime clients are fended to have accessing with open cloud servers due to some restrictions. To overcome the security issues and these restrictions related to storing, data sharing in an inter domain network and privacy checking, we propose a model in this paper which is based on an identity based cryptography in data transmission and intermediate entity which have client’s reference with identity that will take control handling of data transmission in an open cloud environment and an extended remote privacy checking technique which will work at admin side. On behalf of data owner’s authority this proposed model will give best options to have secure cryptography in data transmission and remote privacy checking either as private or public or instructed. The hardness of Computational Diffie-Hellman assumption algorithm for key exchange makes this proposed model more secure than existing models which are being used for public cloud environment.

  6. Enhancing Research in Networking & System Security, and Forensics, in Puerto Rico

    Science.gov (United States)

    2015-03-03

    Conference 2014 – Seattle, WA – Travel Scholarship awarded by Google. Celedonio was able to meet Mr. Tony Baylis, a recruiter from the Lawrence...Microsoft, Encase, Avaya, McAfee, Cisco , Department of Homeland Security, Department of Defense, ISACA among others. International Conferences in

  7. Power allocation and cooperative jamming for enhancing physical layer security in opportunistic relay networks in the presence of interference

    KAUST Repository

    Abd El-Malek, Ahmed H.; Salhab, Anas M.; Zummo, Salam A.; Alouini, Mohamed-Slim

    2017-01-01

    In this paper, the impact of cochannel interference on the secrecy performance of dual-hop decode-and-forward relaying is investigated. In particular, the outage and intercept probabilities are obtained for the opportunistic relay selection (ORS) model in the presence of nonidentical interfering signals under a single/multiple passive eavesdropper(s) attack. Moreover, the proposed work enhances physical layer security performance of ORS model using cooperative jamming (CJ) techniques. Therefore, new closed-form expressions are derived for the intercept and outage probabilities of the CJ-ORS model in the presence of interference over Rayleigh fading channels. Moreover, the analyses are generalized to the case of multiple eavesdroppers where closed-form expressions are derived for the intercept probability. To reveal more insights on the proposed work secrecy performance, asymptotic closed-form expressions for the intercept and outage probabilities are obtained. Using these asymptotic expressions, a power allocation optimization problem is formulated and solved for enhancing the system security. The derived analytical formulas herein are supported by numerical and simulation results to clarify the main contributions of the paper. The results show that, although the cochannel interference increases the system outage probability, it might improve the system secrecy performance. Moreover, the proposed CJ-ORS model is shown to enhance the system secrecy performance compared to ORS model.

  8. Power allocation and cooperative jamming for enhancing physical layer security in opportunistic relay networks in the presence of interference

    KAUST Repository

    Abd El-Malek, Ahmed H.

    2017-04-18

    In this paper, the impact of cochannel interference on the secrecy performance of dual-hop decode-and-forward relaying is investigated. In particular, the outage and intercept probabilities are obtained for the opportunistic relay selection (ORS) model in the presence of nonidentical interfering signals under a single/multiple passive eavesdropper(s) attack. Moreover, the proposed work enhances physical layer security performance of ORS model using cooperative jamming (CJ) techniques. Therefore, new closed-form expressions are derived for the intercept and outage probabilities of the CJ-ORS model in the presence of interference over Rayleigh fading channels. Moreover, the analyses are generalized to the case of multiple eavesdroppers where closed-form expressions are derived for the intercept probability. To reveal more insights on the proposed work secrecy performance, asymptotic closed-form expressions for the intercept and outage probabilities are obtained. Using these asymptotic expressions, a power allocation optimization problem is formulated and solved for enhancing the system security. The derived analytical formulas herein are supported by numerical and simulation results to clarify the main contributions of the paper. The results show that, although the cochannel interference increases the system outage probability, it might improve the system secrecy performance. Moreover, the proposed CJ-ORS model is shown to enhance the system secrecy performance compared to ORS model.

  9. Enhanced Mulberroside A Production from Cell Suspension and Root Cultures of Morus alba Using Elicitation.

    Science.gov (United States)

    Komaikul, Jukrapun; Kitisripanya, Tharita; Tanaka, Hiroyuki; Sritularak, Boonchoo; Putalun, Waraporn

    2015-07-01

    Morus alba L. has been used in Asian traditional medicine as an anti-inflammatory, anti-asthmatic, anthelmintic and as a whitening agent in cosmetic products. Mulberroside A is the major active compound from M. alba root bark. In this study, cell suspension and root cultures of M. alba were established, and the effect of the elicitors on the enhancement of mulberroside A production in M. alba was investigated. The cell suspension and root cultures of M. alba were exposed to elicitors and then mulberroside A contents were determined by an indirect competitive ELISA method. High levels of mulberroside A were obtained by addition of 100 and 200 μM salicylic acid with 24 h exposure time in cell suspension cultures (37.9 ± 1.5 and 34.0 ± 4.7 mg/g dry wt., respectively). Furthermore, addition of yeast extract at 2 mg/mL with 24 h exposure time can significantly increase mulberroside A contents from both cell suspension (3.2-fold) and root cultures (6.6-fold). Mulberroside A contents from both cell suspension and root cultures after treatment with elicitors are similar or higher than those found in the intact root and root bark of several years old M. alba. These results indicate that mulberry tissue cultures using the elicitation method are interesting alternative sources for mulberroside A production.

  10. A culture of education: Enhancing school performance of youth living in residential group care in Ontario.

    Science.gov (United States)

    Gharabaghi, Kiaras

    2011-01-01

    This article presents a synthesis of what is known about the educational experiences of youth living in residential group care based on a literature review that highlights both the experiences of the youth themselves and the operational context of residential group care in Ontario as it pertains to educational performance. The author argues that there is little emphasis on education within the residential group care sector in Ontario that could translate into more productive educational experiences for youth. The article then provides a framework for developing a culture of education for residential group care that can be acted upon expeditiously. Enhancing the educational performance of young people living in group care will require a cultural approach that provides for daily and pervasive education supports and encouragement, and aims to enhance the lived experience of young people pursuant to their education.

  11. U.S. assistance enhancing safety culture in countries operating Soviet-designed reactors

    International Nuclear Information System (INIS)

    Guppy, J.G.; Horak, W.C.; Reisman, A.W.

    1995-01-01

    The United States Department of Energy (USDOE) is managing the International Nuclear Safety Program (INSP), which is aimed at providing assistance to enhance safety at commercial nuclear power plants (NPPS) in Russia and Ukraine, as well as Central European countries (CEC). The funding for this program has been provided by the US Agency for International Development (AID). Brookhaven National Laboratory has been assisting DOE in certain portions of this program. The enhancement of safety culture is one of the most important goals of the joint International Nuclear Safety Program. In terms of the INSP, safety culture is comprised of two major components; (1) an environment that is a function of regulations, management sensitivity and structure; and (2) an individual commitment to safety in the day to day execution of activities in terms of thought and accountability. The long term impact of the INSP activities can only be measured by the effectiveness of strengthening safety culture within our partner counties. The strengthening of this culture will manifest in reduced risk of a nuclear accident long after other evidence of the INSP activities has disappeared. One area within the INSP, which has already led to a number of successful specific projects, is under the plant safety upgrade activities. Here, the US and the partner countries jointly identify specific target areas for the INSP efforts. Each identified area has a major component involving safety culture enhancement. With any direct involvement in the particular assistance activities, areas are identified to include a need for training. As technical experts and management from the partner country are assisted in addressing the identified needs, the training programs are provided which will not only address the specific need at hand, but will also teach skills which can be applied to different, but related needs that may exist or develop

  12. Enhancing Cross-Cultural Training Efficacy on Expatriate Adjustment through Emotional Intelligence and Social Capital

    OpenAIRE

    Susanto, Ely; Rostiani, Rokhima

    2012-01-01

    Cross cultural training is widely believed to make a positive contribution to expatriate adjustment. In practice, however, it is very costly and sometimes ineffective for expatriates. Therefore, there is a growing importance placed on increasing the cost effectiveness or enhancing the efficacy of crosscultural training by functioning individual expatriate’s social capital and emotional intelligence as moderating variables towards expatriate’s adjustment and performance. To do so we blend idea...

  13. Hardware Module for the Security Enhancement of Optical Telecom Network Equipment

    International Nuclear Information System (INIS)

    Nadeem; Ali, M.

    2015-01-01

    The telecommunication equipment physical security threats have increased not only in Pakistan but also anywhere in the world and hence, reducing the revenue. This new challenging and alarming situation is created for the telecom network provider. The main focus of this paper is to provide a low cost economical design for reducing the theft of the costly telecommunication equipment like optical network units (ONU). This system is based on instant messaging on the mobile in the event of theft through GSM modem. The proposed security module is dynamic, flexible and can also be integrated in the existing networks and separately having its own independent low power consumption source. The module will continuously work successfully under different scenarios such as completely isolated from other devices by power break down or by fibre cut. (author)

  14. Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing

    Directory of Open Access Journals (Sweden)

    James (Jong Hyuk Park

    2016-09-01

    Full Text Available Entropy is a basic and important concept in information theory. It is also often used as a measure of the unpredictability of a cryptographic key in cryptography research areas. Ubiquitous computing (Ubi-comp has emerged rapidly as an exciting new paradigm. In this special issue, we mainly selected and discussed papers related with ore theories based on the graph theory to solve computational problems on cryptography and security, practical technologies; applications and services for Ubi-comp including secure encryption techniques, identity and authentication; credential cloning attacks and countermeasures; switching generator with resistance against the algebraic and side channel attacks; entropy-based network anomaly detection; applied cryptography using chaos function, information hiding and watermark, secret sharing, message authentication, detection and modeling of cyber attacks with Petri Nets, and quantum flows for secret key distribution, etc.

  15. How the United Kingdom seeks to enhance nuclear security with the help of IPPAS

    International Nuclear Information System (INIS)

    Fawaz-Huber, May

    2016-01-01

    In October 2011, an IAEA team of international nuclear security experts conducted an International Physical Protection Service mission (IPPAS) to the United Kingdom. They visited the Sellafield civil nuclear site, as well as Barrow Port, which is used for the transport of nuclear material. The IAEA conducted a follow-up mission in February 2016. IPPAS missions provide advice on how to improve the effectiveness of a State’s physical protection regime, either nationally or at facility level. They do so by comparing it with relevant international legal instruments, guidelines and best practices, particularly the 2005 Amendment to the Convention on the Physical Protection of Nuclear Material and the IAEA Nuclear Security Series guidance publications.

  16. Enhancing Unity of Effort in Homeland Defense, Homeland Security, and Civil Support Through Interdisciplinary Education

    Science.gov (United States)

    2010-03-01

    Parameters, Winter 1998, 39–50. Walt Disney Pictures. (2004) Miracle. Burbank, CA. Wormuth, C. E., & Witkowsky, A. (2008). Managing the Next...defense, homeland security, and civil support. In 2004, Disney produced a movie entitled Miracle that portrayed the story of the 1980 hockey team...perspective that the players have finally set aside their differences and internal competitions to form a true team. These quotes from a movie Disney

  17. Social Protection for Enhanced Food Security in Sub-Saharan Africa

    OpenAIRE

    Stephen Devereux

    2012-01-01

    This paper identifies several positive synergies between social protection programmes and food security outcomes. One function of social protection is to manage and reduce vulnerability, and several instruments are reviewed – weather-indexed insurance, public works programmes, emergency food aid and buffer stock management – which all contribute to stabilising income and access to food across good and bad years, or between the harvest and the hungry season. Other social protection instruments...

  18. Enhancing Information Security in Cloud Computing Services using SLA based metrics

    OpenAIRE

    , Nia; Mganga, Ramadianti Putri;; Charles, Medard

    2011-01-01

    Context: Cloud computing is a prospering technology that most organizations are considering for adoption as a cost effective strategy for managing IT. However, organizations also still consider the technology to be associated with many business risks that are not yet resolved. Such issues include security, privacy as well as legal and regulatory risks. As an initiative to address such risks, organizations can develop and implement SLA to establish common expectations and goals between the clo...

  19. Leveraging Service Oriented Architecture to Enhance Information Sharing for Surface Transportation Security

    Science.gov (United States)

    2008-09-01

    Fire and Emergency Management Services, Suffolk County Sheriff’s Department, the U.S. Attorney’s Office, the Bureau of Alcohol, Tobacco and Firearms...mass transit services. These include express and regular bus service, a downtown Skyway monorail , a trolley service and the Stadium Shuttle for various...safety related incidents rather than security, including transportation disruptions due to derailments, accidents, fires , hazardous materials spills

  20. A sequential-move game for enhancing safety and security cooperation within chemical clusters

    International Nuclear Information System (INIS)

    Pavlova, Yulia; Reniers, Genserik

    2011-01-01

    The present paper provides a game theoretic analysis of strategic cooperation on safety and security among chemical companies within a chemical industrial cluster. We suggest a two-stage sequential move game between adjacent chemical plants and the so-called Multi-Plant Council (MPC). The MPC is considered in the game as a leader player who makes the first move, and the individual chemical companies are the followers. The MPC's objective is to achieve full cooperation among players through establishing a subsidy system at minimum expense. The rest of the players rationally react to the subsidies proposed by the MPC and play Nash equilibrium. We show that such a case of conflict between safety and security, and social cooperation, belongs to the 'coordination with assurance' class of games, and we explore the role of cluster governance (fulfilled by the MPC) in achieving a full cooperative outcome in domino effects prevention negotiations. The paper proposes an algorithm that can be used by the MPC to develop the subsidy system. Furthermore, a stepwise plan to improve cross-company safety and security management in a chemical industrial cluster is suggested and an illustrative example is provided.

  1. A sequential-move game for enhancing safety and security cooperation within chemical clusters.

    Science.gov (United States)

    Pavlova, Yulia; Reniers, Genserik

    2011-02-15

    The present paper provides a game theoretic analysis of strategic cooperation on safety and security among chemical companies within a chemical industrial cluster. We suggest a two-stage sequential move game between adjacent chemical plants and the so-called Multi-Plant Council (MPC). The MPC is considered in the game as a leader player who makes the first move, and the individual chemical companies are the followers. The MPC's objective is to achieve full cooperation among players through establishing a subsidy system at minimum expense. The rest of the players rationally react to the subsidies proposed by the MPC and play Nash equilibrium. We show that such a case of conflict between safety and security, and social cooperation, belongs to the 'coordination with assurance' class of games, and we explore the role of cluster governance (fulfilled by the MPC) in achieving a full cooperative outcome in domino effects prevention negotiations. The paper proposes an algorithm that can be used by the MPC to develop the subsidy system. Furthermore, a stepwise plan to improve cross-company safety and security management in a chemical industrial cluster is suggested and an illustrative example is provided. Copyright © 2010 Elsevier B.V. All rights reserved.

  2. Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique

    Directory of Open Access Journals (Sweden)

    Nithya Chidambaram

    2016-01-01

    Full Text Available With the rapid rise of the Internet and electronics in people’s life, the data related to it has also undergone a mammoth increase in magnitude. The data which is stored in the cloud can be sensitive and at times needs a proper file storage system with a tough security algorithm. Whereas cloud is an open shareable elastic environment, it needs impenetrable and airtight security. This paper deals with furnishing a secure storage system for the above-mentioned purpose in the cloud. To become eligible to store data a user has to register with the cloud database. This prevents unauthorized access. The files stored in the cloud are encrypted with RSA algorithm and digital fingerprint for the same has been generated through MD5 message digest before storage. The RSA provides unreadability of data to anyone without the private key. MD5 makes it impossible for any changes on data to go unnoticed. After the application of RSA and MD5 before storage, the data becomes resistant to access or modifications by any third party and to intruders of cloud storage system. This application is tested in Amazon Elastic Compute Cloud Web Services.

  3. Ecosystem Management: Tomorrow’s Approach to Enhancing Food Security under a Changing Climate

    Directory of Open Access Journals (Sweden)

    Mike Rivington

    2011-06-01

    Full Text Available This paper argues that a sustainable ecosystem management approach is vital to ensure the delivery of essential ‘life support’ ecosystem services and must be mainstreamed into societal conscience, political thinking and economic processes. Feeding the world at a time of climate change, environmental degradation, increasing human population and demand for finite resources requires sustainable ecosystem management and equitable governance. Ecosystem degradation undermines food production and the availability of clean water, hence threatening human health, livelihoods and ultimately societal stability. Degradation also increases the vulnerability of populations to the consequences of natural disasters and climate change impacts. With 10 million people dying from hunger each year, the linkages between ecosystems and food security are important to recognize. Though we all depend on ecosystems for our food and water, about seventy per cent of the estimated 1.1 billion people in poverty around the world live in rural areas and depend directly on the productivity of ecosystems for their livelihoods. Healthy ecosystems provide a diverse range of food sources and support entire agricultural systems, but their value to food security and sustainable livelihoods are often undervalued or ignored. There is an urgent need for increased financial investment for integrating ecosystem management with food security and poverty alleviation priorities. As the world’s leaders worked towards a new international climate change agenda in Cancun, Mexico, 29 November–10 December 2010 (UNFCCC COP16, it was clear that without a deep and decisive post-2012 agreement and major concerted effort to reduce the food crisis, the Millennium Development Goals will not be attained. Political commitment at the highest level will be needed to raise the profile of ecosystems on the global food agenda. It is recommended that full recognition and promotion be given of the linkages

  4. Cultural influence, economic security, and the fertility behavior of the Chinese in Canada

    Directory of Open Access Journals (Sweden)

    Tang, Zongli

    2001-01-01

    Full Text Available EnglishThis study explores interactions of cultural influence and economic insecurity and their effects on the fertility behavior of the Chinese in Canada. The importance of group context on the actions of individuals is measured through data from the PUST of the 1971 and1991 Canadian Censuses. Contextual analysis and random coefficient models are the major statistical tools employed to achieve the above objectives. The Chinese-Canadians are compared to the British-Canadians, who are used as the reference group. The findings suggest that Chinese reproductive norms with pronatalist endowments exert strong influence on the fertility behavior of the Chinese in Canada.This influence effectively counteracts the negative effects of economic insecurity and encourages Chinese immigrants to quickly recover their fertility deficit after the initial immigration stage. The effects of the origin culture on fertility diminish with increasing exposure to the host society.However, even among the native-born or Canadian-born Chinese, the influence of Chinese reproductive norms is still present though not as strong as among the foreign-born Chinese.FrenchCette étude explore les interactions de l'influence culturelle et de l'insécuritééconomique et leurs effets sur le comportement procréateur des Chinois auCanada. L'importance d'un contexte de groupe sur les actions des individus estmesurée au moyen de données provenant de la BEGD (bande-échantillon àgrande diffusion des recensements canadiens de 1971 et 1991. L'analysecontextuelle et les coefficients de modèles au hasard constituent les principauxoutils statistiques employés pour atteindre les objectifs susmentionnés. Les Sino-Canadiens sont comparés aux habitants de la Colombie-Britannique qui serventde groupe témoin. Les conclusions indiquent que les normes de reproduction àaction nataliste exercent une forte influence sur le comportement procréateur desChinois au Canada. Cette influence

  5. Geoheritage, Geotourism and the Cultural Landscape: Enhancing the Visitor Experience and Promoting Geoconservation

    Directory of Open Access Journals (Sweden)

    John E. Gordon

    2018-04-01

    Full Text Available Geotourism spans a range of visitor interests, from the specialist geotourist to the more general visitor. As well as supporting geoconservation outcomes, it provides economic, cultural, relational and social benefits for both visitors and host communities. The interconnections between geoheritage and the cultural components of the landscape have antecedents in concepts of landscape aesthetics in different cultures. These interconnections provide a range of opportunities for enhancing the geotourist experience and promoting geoconservation and geoeducation by means of activities that involve aesthetic and emotional experiences and interpretation through different cultural filters that encourage the rediscovery of a sense of wonder both about the geological stories in the landscape and the human interactions. A cultural ecosystem services framework provides a holistic approach for informing conservation policy, management and planning for geotourism, enabling assessment of multiple benefits and trade-offs for visitors and communities based on the values of the geoheritage assets. Geotourism studies could also benefit from integration of existing theory, conceptual analysis and practice from broader heritage and nature-based tourism and closer collaboration with relevant social sciences. Adhering to sound geoethical practice is an essential part of geotourism, which can also play a role in the promotion of geoethics among the public and professionals.

  6. Effectiveness evaluation methodology for safety processes to enhance organisational culture in hazardous installations

    International Nuclear Information System (INIS)

    Mengolini, A.; Debarberis, L.

    2008-01-01

    Safety performance indicators are widely collected and used in hazardous installations. The IAEA, OECD and other international organisations have developed approaches that strongly promote deployment of safety performance indicators. These indicators focus mainly on operational performance, but some of them also address organisational and safety culture aspects. However, operators of hazardous installations, in particular those with limited resources and time constraints, often find it difficult to collect the large number of different safety performance indicators. Moreover, they also have difficulties with giving a meaning to the numbers and trends recorded, especially to those that should reflect a positive safety culture. In this light, the aim of this article is to address the need to monitor and assess progress on implementation of a programme to enhance safety and organisational culture. It proposes a specific process-view approach to effectiveness evaluation of organisational and safety culture indicators by means of a multi-level system in which safety processes and staff involvement in defining improvement activities are central. In this way safety becomes fully embedded in staff activities. Key members of personnel become directly involved in identifying and supplying leading indicators relating to their own daily activity and become responsible and accountable for keeping the measurement system alive. Besides use of lagging indicators, particular emphasis is placed on the importance of identifying and selecting leading indicators which can be used to drive safety performance for organisational and safety culture aspects as well

  7. Effectiveness evaluation methodology for safety processes to enhance organisational culture in hazardous installations.

    Science.gov (United States)

    Mengolini, A; Debarberis, L

    2008-06-30

    Safety performance indicators are widely collected and used in hazardous installations. The IAEA, OECD and other international organisations have developed approaches that strongly promote deployment of safety performance indicators. These indicators focus mainly on operational performance, but some of them also address organisational and safety culture aspects. However, operators of hazardous installations, in particular those with limited resources and time constraints, often find it difficult to collect the large number of different safety performance indicators. Moreover, they also have difficulties with giving a meaning to the numbers and trends recorded, especially to those that should reflect a positive safety culture. In this light, the aim of this article is to address the need to monitor and assess progress on implementation of a programme to enhance safety and organisational culture. It proposes a specific process-view approach to effectiveness evaluation of organisational and safety culture indicators by means of a multi-level system in which safety processes and staff involvement in defining improvement activities are central. In this way safety becomes fully embedded in staff activities. Key members of personnel become directly involved in identifying and supplying leading indicators relating to their own daily activity and become responsible and accountable for keeping the measurement system alive. Besides use of lagging indicators, particular emphasis is placed on the importance of identifying and selecting leading indicators which can be used to drive safety performance for organisational and safety culture aspects as well.

  8. Enhanced radiosensitivity and defective DNA repair in cultured fibroblasts derived from Rothmund Thomson syndrome patients

    Energy Technology Data Exchange (ETDEWEB)

    Smith, P J; Paterson, M C [Atomic Energy of Canada Ltd., Chalk River, Ontario. Radiation Biology Branch

    1982-01-01

    Rothmund Thomson syndrome (RTS) is an oculocutaneous and cancer-prone disorder in which enhanced carcinogen sensitivity, mediated through abnormal DNA metabolism, may be an associated factor. Cultured fibroblasts from 4 RTS patients have been examined for their colony-forming abilities and DNA repair capacities following ..gamma..-irradiation. 2 of the 4 RTS strains showed enhanced sensitivity following hypoxic ..gamma..-irradiation, and 1 of these 2 strains also showed enhanced sensitivity under oxic conditions. Defective DNA repair was implicated in the above abnormal responses to ..gamma..-radiation since both strains displayed reduced levels of repair synthesis and slow removal of radiogenic DNA lesions (assayed by their sensitivity to strand-incising activities present in protein extracts of Micrococcus luteus cells). A hypothesis is presented to rationalize the origin and heterogeneity of these laboratory phenotypes of RTS.

  9. The novel approach to enhance seed security: dual anti-counterfeiting methods applied on tobacco pelleted seeds.

    Science.gov (United States)

    Guan, Yajing; Wang, Jianchen; Tian, Yixin; Hu, Weimin; Zhu, Liwei; Zhu, Shuijin; Hu, Jin

    2013-01-01

    Seed security is of prime importance for agriculture. To protect true seeds from being faked, more secure dual anti-counterfeiting technologies for tobacco (Nicotiana tabacum L.) pelleted seed were developed in this paper. Fluorescein (FR), rhodamine B (RB), and magnetic powder (MP) were used as anti-counterfeiting labels. According to their different properties and the special seed pelleting process, four dual-labeling treatments were conducted for two tobacco varieties, MS Yunyan85 (MSYY85) and Honghua Dajinyuan (HHDJY). Then the seed germination and seedling growth status were investigated, and the fluorescence in cracked pellets and developing seedlings was observed under different excitation lights. The results showed that FR, RB, and MP had no negative effects on the germination, seedling growth, and MDA content of the pelleted seeds, and even some treatments significantly enhanced seedling dry weight, vigor index, and shoot height in MS YY85, and increased SOD activity and chlorophyll content in HHDJY as compared to the control. In addition, the cotyledon tip of seedlings treated with FR and MP together represented bright green fluorescence under illumination of blue light (478 nm). And the seedling cotyledon vein treated with RB and MP together showed red fluorescence under green light (546 nm). All seeds pelleted with magnetic powder of proper concentration could be attracted by a magnet. Thus, it indicated that those new dual-labeling methods that fluorescent compound and magnetic powder simultaneously applied in the same seed pellets definitely improved anti-counterfeiting technology and enhanced the seed security. This technology will ensure that high quality seed will be used in the crop production.

  10. The novel approach to enhance seed security: dual anti-counterfeiting methods applied on tobacco pelleted seeds.

    Directory of Open Access Journals (Sweden)

    Yajing Guan

    Full Text Available Seed security is of prime importance for agriculture. To protect true seeds from being faked, more secure dual anti-counterfeiting technologies for tobacco (Nicotiana tabacum L. pelleted seed were developed in this paper. Fluorescein (FR, rhodamine B (RB, and magnetic powder (MP were used as anti-counterfeiting labels. According to their different properties and the special seed pelleting process, four dual-labeling treatments were conducted for two tobacco varieties, MS Yunyan85 (MSYY85 and Honghua Dajinyuan (HHDJY. Then the seed germination and seedling growth status were investigated, and the fluorescence in cracked pellets and developing seedlings was observed under different excitation lights. The results showed that FR, RB, and MP had no negative effects on the germination, seedling growth, and MDA content of the pelleted seeds, and even some treatments significantly enhanced seedling dry weight, vigor index, and shoot height in MS YY85, and increased SOD activity and chlorophyll content in HHDJY as compared to the control. In addition, the cotyledon tip of seedlings treated with FR and MP together represented bright green fluorescence under illumination of blue light (478 nm. And the seedling cotyledon vein treated with RB and MP together showed red fluorescence under green light (546 nm. All seeds pelleted with magnetic powder of proper concentration could be attracted by a magnet. Thus, it indicated that those new dual-labeling methods that fluorescent compound and magnetic powder simultaneously applied in the same seed pellets definitely improved anti-counterfeiting technology and enhanced the seed security. This technology will ensure that high quality seed will be used in the crop production.

  11. Host based internet protocol (IP) packet analysis to enhance network security

    International Nuclear Information System (INIS)

    Ahmad, T.; Ahmad, S.Z.; Yasin, M.M.

    2007-01-01

    Data communication in a computer network environment is facing serious security threats from numerous sources such as viruses, worms, Zombies etc. These threats can be broadly characterized as internal or external security threats. Internal threats are mainly attributed to sneaker-nets, utility modems and unauthorized users, which can be minimized by skillful network administration, password management and optimum usage policy definition. The external threats need more serious attention as these attacks are mostly coming from public networks such as Internet. Frequency and complexity of such attacks is much higher as compared to internal attacks. This paper presents a host based network layer screening of external and internal IP packets for logging, analyzing and real-time detection of possible IP spoofing and Denial of Service attacks. This work can also be used in tuning security rules definition for gateway firewalls. Software has been developed which intercepts IP traffic and analyses it with respect to integrity and origin of I P packet. The received IP packets are parsed and analyzed for possible signs of intrusion. The results show that by watching and categorizing composition of various transport protocol such as TCP, UDP, ICMP and others along with verifying the origin of received IP packet can help in devising real-time firewall rule and blocking possible external attack. This is highly desirable for fighting against zero day attacks and can result in a better Mean Time between Failures (MTBF) to increase the survivability of computer network. Used in a right context, packet screening and filtering can be a useful tool for provision of reliable and stable network services. (author)

  12. Examining the Religious Strands of Islamic Terrorists to Enhance U.S. Security

    Science.gov (United States)

    2012-03-01

    donkey laden with books” (Suras 3:60-74, 5:56, 62:5, 5:16).5 Second, is the teaching known as “An eye for eye...a tooth for a tooth”, and a well...NBC Nightly News MSNBC.com Video , January 30, 2012, http://www.jihadwatch.org/2012/02/post-4html, (accessed February 5, 2012). 21 Ibid. 22 Robert...2010. You Tube, video file, http://secure.afa.net/afa/activism/takeaction.asp?id=384 (accessed January 11, 2012). 31 Mary Habeck, she is the Associate

  13. Enhanced Survey and Proposal to secure the data in Cloud Computing Environment

    OpenAIRE

    MR.S.SUBBIAH; DR.S.SELVA MUTHUKUMARAN; DR.T.RAMKUMAR

    2013-01-01

    Cloud computing have the power to eliminate the cost of setting high end computing infrastructure. It is a promising area or design to give very flexible architecture, accessible through the internet. In the cloud computing environment the data will be reside at any of the data centers. Due to that, some data center may leak the data stored on there, beyond the reach and control of the users. For this kind of misbehaving data centers, the service providers should take care of the security and...

  14. A mobile gateway for medical auscultation : Enhanced Client Certificate Authentication and MTLS Security

    OpenAIRE

    Leijon, Jon

    2016-01-01

      Attempting to re-engineer a telemedicine application, this report sets out to make a cheap yet robust solution that is portable and easy to use. It will be a Inera compliant system using Android that authenticates in a secure way with a .NET server behind F5 full proxy.The report begins with a background to telemedicine, and a technical specification that might fulfill the demands of privacy laws regarding health care records. The focus of the report moves on to inspects the choices for aut...

  15. Impact of Euro-Canadian agrarian practices: in search of sustainable import-substitution strategies to enhance food security in subarctic Ontario, Canada.

    Science.gov (United States)

    Spiegelaar, Nicole F; Tsuji, Leonard J S

    2013-01-01

    In Canada, food insecurity exists among Aboriginal (Inuit, Metis and First Nations) people living in remote northern communities, in part, because of their reliance on the industrialized, import-based food system. Local food production as a substitute to imports would be an adaptive response, but enhancement of food security via food localization requires reflection on previous failings of conventional agricultural strategies so that informed decisions can be made. In light of potential reintroduction of local food production in remote First Nations communities, we investigated the cultural, social and ecological effects of a 20th century, Euro-Canadian agrarian settlement on the food system of a subarctic First Nation; this will act as the first step in developing a more sustainable local food program and enhancing food security in this community. To investigate the socio-cultural impacts of the Euro-Canadian agrarian initiative on the food system of Fort Albany First Nation, purposive, semi-directive interviews were conducted with elders and other knowledgeable community members. Interview data were placed into themes using inductive analyses. To determine the biophysical impact of the agrarian initiative, soil samples were taken from one site within the cultivated area and from one site in an undisturbed forest area. Soil properties associated with agricultural use and productivity were assessed. To compare the means of a given soil property between the sites, one-tailed t-tests were employed. Vegetative analysis was conducted in both sites to assess disturbance. According to the interviewees, prior to the agrarian initiative, First Nation families harvested wild game and fish, and gathered berries as well as other forms of vegetation for sustenance. With the introduction of the residential school and agrarian initiative, traditional food practices were deemed inadequate, families were forced to work and live in the settlement (becoming less reliant on

  16. Supporting reputation based trust management enhancing security layer for cloud service models

    Science.gov (United States)

    Karthiga, R.; Vanitha, M.; Sumaiya Thaseen, I.; Mangaiyarkarasi, R.

    2017-11-01

    In the existing system trust between cloud providers and consumers is inadequate to establish the service level agreement though the consumer’s response is good cause to assess the overall reliability of cloud services. Investigators recognized the significance of trust can be managed and security can be provided based on feedback collected from participant. In this work a face recognition system that helps to identify the user effectively. So we use an image comparison algorithm where the user face is captured during registration time and get stored in database. With that original image we compare it with the sample image that is already stored in database. If both the image get matched then the users are identified effectively. When the confidential data are subcontracted to the cloud, data holders will become worried about the confidentiality of their data in the cloud. Encrypting the data before subcontracting has been regarded as the important resources of keeping user data privacy beside the cloud server. So in order to keep the data secure we use an AES algorithm. Symmetric-key algorithms practice a shared key concept, keeping data secret requires keeping this key secret. So only the user with private key can decrypt data.

  17. Laminin enhances the growth of human neural stem cells in defined culture media

    Directory of Open Access Journals (Sweden)

    Lathia Justin D

    2008-07-01

    Full Text Available Abstract Background Human neural stem cells (hNSC have the potential to provide novel cell-based therapies for neurodegenerative conditions such as multiple sclerosis and Parkinson's disease. In order to realise this goal, protocols need to be developed that allow for large quantities of hNSC to be cultured efficiently. As such, it is important to identify factors which enhance the growth of hNSC. In vivo, stem cells reside in distinct microenvironments or niches that are responsible for the maintenance of stem cell populations. A common feature of niches is the presence of the extracellular matrix molecule, laminin. Therefore, this study investigated the effect of exogenous laminin on hNSC growth. Results To measure hNSC growth, we established culture conditions using B27-supplemented medium that enable neurospheres to grow from human neural cells plated at clonal densities. Limiting dilution assays confirmed that neurospheres were derived from single cells at these densities. Laminin was found to increase hNSC numbers as measured by this neurosphere formation. The effect of laminin was to augment the proliferation/survival of the hNSC, rather than promoting the undifferentiated state. In agreement, apoptosis was reduced in dissociated neurospheres by laminin in an integrin β1-dependent manner. Conclusion The addition of laminin to the culture medium enhances the growth of hNSC, and may therefore aid their large-scale production.

  18. Use of polyethyleneimine polymer in cell culture as attachment factor and lipofection enhancer.

    Science.gov (United States)

    Vancha, Ajith R; Govindaraju, Suman; Parsa, Kishore V L; Jasti, Madhuri; González-García, Maribel; Ballestero, Rafael P

    2004-10-15

    Several cell lines and primary cultures benefit from the use of positively charged extracellular matrix proteins or polymers that enhance their ability to attach to culture plates. Polyethyleneimine is a positively charged polymer that has gained recent attention as a transfection reagent. A less known use of this cationic polymer as an attachment factor was explored with several cell lines. Polyethyleneimine compared favorably to traditional attachment factors such as collagen and polylysine. PC-12 and HEK-293 cells plated on dishes coated with polyethyleneimine showed a homogeneous distribution of cells in the plate, demonstrating strong cell adhesion that survived washing procedures. The polymer could also be used to enhance the adherence and allow axonal outgrowth from zebrafish retinal explants. The effects of this coating agent on the transfection of loosely attaching cell lines were studied. Pre-coating with polyethyleneimine had the effect of enhancing the transfection yield in procedures using lipofection reagents. Polyethyleneimine is an effective attachment factor for weakly anchoring cell lines and primary cells. Its use in lipofection protocols makes the procedures more reliable and increases the yield of expressed products with commonly used cell lines such as PC-12 and HEK-293 cells.

  19. Use of polyethyleneimine polymer in cell culture as attachment factor and lipofection enhancer

    Directory of Open Access Journals (Sweden)

    González-García Maribel

    2004-10-01

    Full Text Available Abstract Background Several cell lines and primary cultures benefit from the use of positively charged extracellular matrix proteins or polymers that enhance their ability to attach to culture plates. Polyethyleneimine is a positively charged polymer that has gained recent attention as a transfection reagent. A less known use of this cationic polymer as an attachment factor was explored with several cell lines. Results Polyethyleneimine compared favorably to traditional attachment factors such as collagen and polylysine. PC-12 and HEK-293 cells plated on dishes coated with polyethyleneimine showed a homogeneous distribution of cells in the plate, demonstrating strong cell adhesion that survived washing procedures. The polymer could also be used to enhance the adherence and allow axonal outgrowth from zebrafish retinal explants. The effects of this coating agent on the transfection of loosely attaching cell lines were studied. Pre-coating with polyethyleneimine had the effect of enhancing the transfection yield in procedures using lipofection reagents. Conclusion Polyethyleneimine is an effective attachment factor for weakly anchoring cell lines and primary cells. Its use in lipofection protocols makes the procedures more reliable and increases the yield of expressed products with commonly used cell lines such as PC-12 and HEK-293 cells.

  20. Privacy enhancing techniques - the key to secure communication and management of clinical and genomic data.

    Science.gov (United States)

    De Moor, G J E; Claerhout, B; De Meyer, F

    2003-01-01

    To introduce some of the privacy protection problems related to genomics based medicine and to highlight the relevance of Trusted Third Parties (TTPs) and of Privacy Enhancing Techniques (PETs) in the restricted context of clinical research and statistics. Practical approaches based on two different pseudonymisation models, both for batch and interactive data collection and exchange, are described and analysed. The growing need of managing both clinical and genetic data raises important legal and ethical challenges. Protecting human rights in the realm of privacy, while optimising research potential and other statistical activities is a challenge that can easily be overcome with the assistance of a trust service provider offering advanced privacy enabling/enhancing solutions. As such, the use of pseudonymisation and other innovative Privacy Enhancing Techniques can unlock valuable data sources.

  1. Augmented Performance Environment for Enhancing Interagency Coordination in Stability, Security, Transition, and Reconstruction (SSTR) Operations

    Science.gov (United States)

    2009-02-01

    mastery-harmony, hierarchy-egalitarianism, autonomy -conservatism, and intuitive-analytical (e.g., Allinson & Hayes, 2000; Hofstede, 2001; Schwartz... autonomy -conservatism in large samples of teachers and students from 49 nations, the implications for interpersonal interaction of coming from...rather than families or other social units. In contrast, collectivist cultures (e.g., Iraq and Afghanistan) place the interests of family, tribe, or

  2. The significance of enset culture and biodiversity for rural household food and livelihood security in southwestern Ethiopia

    NARCIS (Netherlands)

    Negash, A.; Niehof, A.

    2004-01-01

    The significance of enset (Ensete ventricosum Welw. Cheesman) for the food and livelihood security of rural households in Southwestern Ethiopia, where this crop is the main staple, raises two major questions. The first concerns the related issues of household food security and livelihood security

  3. Human endothelin subtype A receptor enhancement during tissue culture via de novo transcription

    DEFF Research Database (Denmark)

    Hansen-Schwartz, Jacob; Nordström, Carl-Henrik; Edvinsson, Lars

    2002-01-01

    OBJECTIVE: Endothelin (ET) has, since its discovery, increasingly been considered a key player in the pathophysiological processes of cerebral vasospasm in the course of subarachnoid hemorrhage, although it remains unclear how ET is involved. We present data that indicate an inherent capacity...... of human cerebral arteries to change their sensitivity to ET. METHODS: Human cerebral arteries were obtained from patients undergoing intracranial tumor surgery. The vessels were divided into segments and subjected to organ culture for 48 hours. The vessels were then examined by using in vitro...... pharmacological methods and molecular biological techniques. RESULTS: After organ culture of the cerebral arteries, both the sensitivity to and potency of ET were enhanced (maximal response, 152 +/- 9%; -log (50% effective concentration), 10.3 +/- 0.3), in comparison with data for fresh cerebral arteries...

  4. Enhancement of Shikonin Production in Suspension Cultures of Lithospermum erythrorhizon Cells by Gamma-irradiation

    International Nuclear Information System (INIS)

    Baek, Myung Hwa; Chung, Byung Yeoup; Kim, Jae Sung; An, Beyoung Chul; Lee, Young Bok

    2005-01-01

    The shikonin and several derivatives produced by the roots of Boraginacae family plants are purple compounds that have been used in several parts of the World as antimicrobial and antitumor agents in human pharmaceuticals. Shikonin has been reported as the most successful specimen of the mass production of plant secondary metabolites by cell suspension culture. Numerous studies have elucidated the regulation of production of these compounds in cell suspension cultures. It has known that ultrasonic and gamma irradiation can enhance the production of secondary metabolites. Thus, in present study, we investigate the effects of gamma-irradiation on the shikonin production and the key enzymes in the shikonin biosynthetic pathway of L. erythrorhizon cells

  5. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  6. Security enhancement of hand geometry scanners using optical blood flow detection

    Science.gov (United States)

    Crihalmeanu, Musat C.; Jerabek, Mark A.; Meehan, Kathleen

    2004-08-01

    In today's security conscious society the efficiency of biometric systems has an increasing tendency to replace the classic but less effective keys and passwords. Hand geometry readers are popular biometrics used for acces control and time and attendance applications. One of their weaknesses is vulnerability to spoofing using fake hands (latex, play-doh or dead-hands). The object of this paper is to design a feature to be added to the hand geometry scanner in order to detect vitality in the hand, reducing the possibilities for spoofing. This paper demonstrates how the hand reader was successfully spoofed and shows the implementation of the vitality detection feature through an inexpensive but efficient electronic design. The method used for detection is photo-plethysmography. The Reflectance Sensor built is of original conception. After amplifying, filtering and processing the sensor's signal, a message is shown via an LCD display, concerning the liveness of the hand and the pulse rate.

  7. Synergies between Communicable and Noncommunicable Disease Programs to Enhance Global Health Security.

    Science.gov (United States)

    Kostova, Deliana; Husain, Muhammad J; Sugerman, David; Hong, Yuling; Saraiya, Mona; Keltz, Jennifer; Asma, Samira

    2017-12-01

    Noncommunicable diseases are the leading cause of death and disability worldwide. Initiatives that advance the prevention and control of noncommunicable diseases support the goals of global health security in several ways. First, in addressing health needs that typically require long-term care, these programs can strengthen health delivery and health monitoring systems, which can serve as necessary platforms for emergency preparedness in low-resource environments. Second, by improving population health, the programs might help to reduce susceptibility to infectious outbreaks. Finally, in aiming to reduce the economic burden associated with premature illness and death from noncommunicable diseases, these initiatives contribute to the objectives of international development, thereby helping to improve overall country capacity for emergency response.

  8. 78 FR 2214 - Enhanced Weapons, Firearms Background Checks, and Security Event Notifications

    Science.gov (United States)

    2013-01-10

    .... Voluntary Consensus Standards XI. Finding of No Significant Environmental Impact XII. Paperwork Reduction... ML110480470 of Nuclear Energy Institute, on the proposed ``Enhanced Weapons, Firearms Background Checks and... consensus standards. XI. Finding of No Significant Environmental Impact In the proposed rule published on...

  9. Strengthening Local Safety Nets as a Key to Enhancing the Food Security of Pastoralists in East Africa: A Case Study of the Rendille of Northern Kenya

    OpenAIRE

    SUN, Xiaogang

    2017-01-01

    The increase in climate-change-related natural disasters presents a major threat to the food security of pastoralists in East Africa. This paper explores ways of reducing the dependence on food aid and enhancing the food security of pastoralists through a case study of the Rendille in Northern Kenya. Current Rendille food systems have resulted from adapted livestock herding strategies and loss of nomadic lifestyles, as well as dependence on food aid. Although food aid is included in the livel...

  10. Enhancing Cross-Cultural Training Efficacy on Expatriate Adjustment through Emotional Intelligence and Social Capital

    Directory of Open Access Journals (Sweden)

    Ely Susanto

    2012-05-01

    Full Text Available Cross cultural training is widely believed to make a positive contribution to expatriate adjustment. In practice, however, it is very costly and sometimes ineffective for expatriates. Therefore, there is a growing importance placed on increasing the cost effectiveness or enhancing the efficacy of crosscultural training by functioning individual expatriate’s social capital and emotional intelligence as moderating variables towards expatriate’s adjustment and performance. To do so we blend ideas drawn from social capital theory and emotional intelligence to develop the structure that underlies the logic of this paper. Thus, this paper uses social capital and emotional intelligence theories to enrich extant literature on expatriate adjustment

  11. International cooperation for the development of consistent and stable transportation regulations to promote and enhance safety and security

    International Nuclear Information System (INIS)

    Strosnider, J.

    2004-01-01

    International commerce of radioactive materials crosses national boundaries, linking separate regulatory institutions with a common purpose and making it necessary for these institutions to work together in order to achieve common safety goals in a manner that does not place an undue burden on industry and commerce. Widespread and increasing use of radioactive materials across the world has led to increases in the transport of radioactive materials. The demand for consistency in the oversight of international transport has also increased to prevent unnecessary delays and costs associated with incongruent or redundant regulatory requirements by the various countries through which radioactive material is transported. The International Atomic Energy Agency (IAEA) is the authority for international regulation of transportation of radioactive materials responsible for promulgation of regulations and guidance for the establishment of acceptable methods of transportation for the international community. As such, the IAEA is seen as the focal point for consensus building between its Member States to develop consistency in transportation regulations and reviews and to ensure the safe and secure transport of radioactive material. International cooperation is also needed to ensure stability in our regulatory processes. Changes to transportation regulations should be based on an anticipated safety benefit supported by risk information and insights gained from continuing experience, evaluation, and research studies. If we keep safety as the principle basis for regulatory changes, regulatory stability will be enhanced. Finally, as we endeavour to maintain consistency and stability in our international regulations, we must be mindful of the new security challenges that lay before the international community as a result of a changing terrorist environment. Terrorism is a problem of global concern that also requires international cooperation and support, as we look for ways to

  12. Feasibility of a novel participatory multi-sector continuous improvement approach to enhance food security in remote Indigenous Australian communities.

    Science.gov (United States)

    Brimblecombe, J; Bailie, R; van den Boogaard, C; Wood, B; Liberato, S C; Ferguson, M; Coveney, J; Jaenke, R; Ritchie, J

    2017-12-01

    Food insecurity underlies and compounds many of the development issues faced by remote Indigenous communities in Australia. Multi-sector approaches offer promise to improve food security. We assessed the feasibility of a novel multi-sector approach to enhance community food security in remote Indigenous Australia. A longitudinal comparative multi-site case study, the Good Food Systems Good Food for All Project, was conducted (2009-2013) with four Aboriginal communities. Continuous improvement meetings were held in each community. Data from project documents and store sales were used to assess feasibility according to engagement, uptake and sustainability of action, and impact on community diet, as well as identifying conditions facilitating or hindering these. Engagement was established where: the community perceived a need for the approach; where trust was developed between the community and facilitators; where there was community stability; and where flexibility was applied in the timing of meetings. The approach enabled stakeholders in each community to collectively appraise the community food system and plan action. Actions that could be directly implemented within available resources resulted from developing collaborative capacity. Actions requiring advocacy, multi-sectoral involvement, commitment or further resources were less frequently used. Positive shifts in community diet were associated with key areas where actions were implemented. A multi-sector participatory approach seeking continuous improvement engaged committed Aboriginal and non-Aboriginal stakeholders and was shown to have potential to shift community diet. Provision of clear mechanisms to link this approach with higher level policy and decision-making structures, clarity of roles and responsibilities, and processes to prioritise and communicate actions across sectors should further strengthen capacity for food security improvement. Integrating this approach enabling local decision-making into

  13. Enhancement of human neural stem cell self-renewal in 3D hypoxic culture.

    Science.gov (United States)

    Ghourichaee, Sasan Sharee; Powell, Elizabeth M; Leach, Jennie B

    2017-05-01

    The pathology of neurological disorders is associated with the loss of neuronal and glial cells that results in functional impairments. Human neural stem cells (hNSCs), due to their self-renewing and multipotent characteristics, possess enormous tissue-specific regenerative potential. However, the efficacy of clinical applications is restricted due to the lack of standardized in vitro cell production methods with the capability of generating hNSC populations with well-defined cellular compositions. At any point, a population of hNSCs may include undifferentiated stem cells, intermediate and terminally differentiated progenies, and dead cells. Due to the plasticity of hNSCs, environmental cues play crucial roles in determining the cellular composition of hNSC cultures over time. Here, we investigated the independent and synergistic effect of three important environmental factors (i.e., culture dimensionality, oxygen concentration, and growth factors) on the survival, renewal potential, and differentiation of hNSCs. Our experimental design included two dimensional (2D) versus three dimensional (3D) cultures and normoxic (21% O 2 ) versus hypoxic (3% O 2 ) conditions in the presence and absence of epidermal growth factor (EGF) and fibroblast growth factor-2 (FGF-2). Additionally, we discuss the feasibility of mathematical models that predict hNSC growth and differentiation under these culture conditions by adopting a negative feedback regulatory term. Our results indicate that the synergistic effect of culture dimensionality and hypoxic oxygen concentration in the presence of growth factors enhances the proliferation of viable, undifferentiated hNSCs. Moreover, the same synergistic effect in the absence of growth factors promotes the differentiation of hNSCs. Biotechnol. Bioeng. 2017;114: 1096-1106. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  14. Calcitriol enhances fat synthesis factors and calpain activity in co-cultured cells.

    Science.gov (United States)

    Choi, Hyuck; Myung, Kyuho

    2014-08-01

    We have conducted an in vitro experiment to determine whether calcitriol can act as a fat synthesizer and/or meat tenderizer when skeletal muscle cells, adipose tissue, and macrophages are co-cultured. When co-cultured, pro-inflammatory cytokine tumor necrosis factor-α (TNF-α) and interleukin-6 (IL-6) expression increased, whereas decreased anti-inflammatory cytokine (IL-10 and IL-15) expression decreased in both C2C12 and 3T3-L1 cells. Calcitriol increased reactive oxygen species (ROS) production in the media. While adiponectin gene expression decreased, leptin, resistin, CCAAT-enhancer-binding protein-beta (C/EBP-β), and peroxisome proliferator-activated receptor gamma (PPAR-γ) gene expression was significantly (P cultured with two different cell types. Inducible nitric oxide synthase (iNOS) protein levels were also stimulated in the C2C12 and 3T3-L1 cells, but arginase l was attenuated by calcitriol. Cacitriol highly amplified (P = 0.008) µ-calpain gene expression in co-cultured C2C12 cells. The results showed an overall increase in pro-inflammatory cytokines and a decrease in anti-inflammatory cytokines of C2C12 and 3T3-L1 cells with calcitriol in co-culture systems. µ-Calpain protein was also augmented in differentiated C2C12 cells with calcitriol. These findings suggest that calcitriol can be used as not only fat synthesizer, but meat tenderizer, in meat-producing animals. © 2014 International Federation for Cell Biology.

  15. Image combination enhancement method for X-ray compton back-scattering security inspection body scanner

    International Nuclear Information System (INIS)

    Wang Huaiying; Zhang Yujin; Yang Lirui; Li Dong

    2011-01-01

    As for X-ray Compton Back-Scattering (CBS) body scanner, image clearness is very important for the performance of detecting the contraband hidden on the body. A new image combination enhancement method is provided based on characteristics of CBS body images and points of human vision. After processed by this method, the CBS image will be obviously improved with clear levels, distinct outline and uniform background. (authors)

  16. Nuclear Security Education in Morocco

    International Nuclear Information System (INIS)

    Hakam, O.K.

    2015-01-01

    Morocco has made significant progress in the field of nuclear security by supporting the efforts and activities of the International Atomic Energy Agency (IAEA), promoting nuclear security under international initiatives and continues to undertake actions aiming at strengthening capacity building in nuclear security. As well, Morocco has developed a new law on radiological and nuclear safety and security which was promulgated in 2014. Some Moroccan universities in cooperation with the IAEA-International Nuclear Security Education Network (INSEN) and the US-DoS Partnership for Nuclear Security (PNS) are working to develop their nuclear security educational programmes. In this regard, faculties who have been involved in INSEN Professional Development Courses (PDCs) have acquired a high-quality of knowledge and teaching tools in nuclear security topics that led them to be able to develop and teach their nuclear security curriculum as is the case at the University of Ibn Tofail. Furthermore, University of Ibn Tofail has developed in 2014 with collaboration with CRDFGlobal the first Institute of Nuclear Material Management (INMM) Student Chapter in Africa. This Chapter has organized many events to promote best practices among the young generation. Moreover, University of Ibn Tofail and Brandenburg University in Germany are working to develop a PDC on Nuclear IT/Cyber Security to be held in Kenitra, Morocco. This PDC aims at building capacity among the academic communities from Africa and MENA Region in order to further raise awareness, develop and disseminate best practices, increase professional standards and therefore enhance nuclear security culture. So, this paper will present some nuclear security education activities in Morocco and more specifically at the University of Ibn Tofail. These activities involve women as leaders but also contribute in education and training of young generation of women in nuclear field. (author)

  17. Electronic Health Records: An Enhanced Security Paradigm to Preserve Patient's Privacy

    Science.gov (United States)

    Slamanig, Daniel; Stingl, Christian

    In recent years, demographic change and increasing treatment costs demand the adoption of more cost efficient, highly qualitative and integrated health care processes. The rapid growth and availability of the Internet facilitate the development of eHealth services and especially of electronic health records (EHRs) which are promising solutions to meet the aforementioned requirements. Considering actual web-based EHR systems, patient-centric and patient moderated approaches are widely deployed. Besides, there is an emerging market of so called personal health record platforms, e.g. Google Health. Both concepts provide a central and web-based access to highly sensitive medical data. Additionally, the fact that these systems may be hosted by not fully trustworthy providers necessitates to thoroughly consider privacy issues. In this paper we define security and privacy objectives that play an important role in context of web-based EHRs. Furthermore, we discuss deployed solutions as well as concepts proposed in the literature with respect to this objectives and point out several weaknesses. Finally, we introduce a system which overcomes the drawbacks of existing solutions by considering an holistic approach to preserve patient's privacy and discuss the applied methods.

  18. Enhancing Security of Double Random Phase Encoding Based on Random S-Box

    Science.gov (United States)

    Girija, R.; Singh, Hukum

    2018-06-01

    In this paper, we propose a novel asymmetric cryptosystem for double random phase encoding (DRPE) using random S-Box. While utilising S-Box separately is not reliable and DRPE does not support non-linearity, so, our system unites the effectiveness of S-Box with an asymmetric system of DRPE (through Fourier transform). The uniqueness of proposed cryptosystem lies on employing high sensitivity dynamic S-Box for our DRPE system. The randomness and scalability achieved due to applied technique is an additional feature of the proposed solution. The firmness of random S-Box is investigated in terms of performance parameters such as non-linearity, strict avalanche criterion, bit independence criterion, linear and differential approximation probabilities etc. S-Boxes convey nonlinearity to cryptosystems which is a significant parameter and very essential for DRPE. The strength of proposed cryptosystem has been analysed using various parameters such as MSE, PSNR, correlation coefficient analysis, noise analysis, SVD analysis, etc. Experimental results are conferred in detail to exhibit proposed cryptosystem is highly secure.

  19. Using Differential Evolution to Optimize Learning from Signals and Enhance Network Security

    Energy Technology Data Exchange (ETDEWEB)

    Harmer, Paul K [Air Force Institute of Technology; Temple, Michael A [Air Force Institute of Technology; Buckner, Mark A [ORNL; Farquhar, Ethan [ORNL

    2011-01-01

    Computer and communication network attacks are commonly orchestrated through Wireless Access Points (WAPs). This paper summarizes proof-of-concept research activity aimed at developing a physical layer Radio Frequency (RF) air monitoring capability to limit unauthorizedWAP access and mprove network security. This is done using Differential Evolution (DE) to optimize the performance of a Learning from Signals (LFS) classifier implemented with RF Distinct Native Attribute (RF-DNA) fingerprints. Performance of the resultant DE-optimized LFS classifier is demonstrated using 802.11a WiFi devices under the most challenging conditions of intra-manufacturer classification, i.e., using emissions of like-model devices that only differ in serial number. Using identical classifier input features, performance of the DE-optimized LFS classifier is assessed relative to a Multiple Discriminant Analysis / Maximum Likelihood (MDA/ML) classifier that has been used for previous demonstrations. The comparative assessment is made using both Time Domain (TD) and Spectral Domain (SD) fingerprint features. For all combinations of classifier type, feature type, and signal-to-noise ratio considered, results show that the DEoptimized LFS classifier with TD features is uperior and provides up to 20% improvement in classification accuracy with proper selection of DE parameters.

  20. Security Enhancement of Knowledge-based User Authentication through Keystroke Dynamics

    Directory of Open Access Journals (Sweden)

    Roy Soumen

    2016-01-01

    Full Text Available Keystroke Dynamics is a behavioural biometrics characteristic in Biometric science, which solve the issues in user identification or verification. In Knowledge-based user authentication technique, we compromise with PIN or password which is unsafe due to different type of attacks. It is good to choose password with the combination of upper and lower case letter with some digits and symbols, but which is very hard to remember or generally we forget to distinguish those passwords for different access control systems. Our system not only takes the users’ entered texts but their typing style is also account for. In our experiment, we have not taken hard password type texts, we have chosen some daily used words where users are habituated and comfortable at typing and we obtained the consisting typing pattern. Different distance-based and data mining algorithms we have applied on collected typing pattern and obtained impressive results. As per our experiment, if we use keystroke dynamics in existing knowledge based user authentication system with minimum of five daily used common texts then it increases the security level up to 97.6% to 98.2% (if we remove some of the irrelevant feature sets.

  1. Enhancing effectiveness of agriculture group in supporting government program to increase food security

    Science.gov (United States)

    Retnowati, Daru; Subarjo, A. H.

    2018-05-01

    Food Security is closely related to agriculture, including fisheries. Food is a basic necessity and indispensable to humans. Nowadays, there are many agricultural lands and fisheries are turning to settlements and offices. To overcome these obstacles, the government took the policy of forming farmer groups. Farmer groups are channeling the government assistance, whether capital, seeds, training, or technology and knowledge assistance. This research is qualitative. The population in this study were members of the fish farming group in Purwomartani, Kalasan, Sleman. The population in this study were 4 Farmers Group in Purwomartani, Kalasan, Sleman. The sample in this research is 1 farmer group with the largest number of members that is 31 people. For the other three groups of fish farmers the number of members is 20 people. The results show that farmer groups are effective in supporting government programs. The role of farmer groups is needed to support the successful management of agricultural land, improvement of knowledge and skills of fish farmers, renewal of agricultural technology and equipment, and marketing of agricultural products.

  2. Elicitation Based Enhancement of Secondary Metabolites in Rauwolfia serpentina and Solanum khasianum Hairy Root Cultures.

    Science.gov (United States)

    Srivastava, Mrinalini; Sharma, Swati; Misra, Pratibha

    2016-05-01

    Rauwolfia serpentina and Solanum khasianum are well-known medicinally important plants contained important alkaloids in their different parts. Elicitation of these alkaloids is important because of associated pharmaceutical properties. Targeted metabolites were ajmaline and ajmalicine in R. serpentina; solasodine and α-solanine in S. khasianum. Enhancement of secondary metabolites through biotic and abiotic elicitors in hairy root cultures of R. serpentina and S. khasianum. In this report, hairy root cultures of these two plants were established through Agrobacterium rhizogenes mediated transformation by optimizing various parameters as age of explants, duration of preculture, and co-cultivation period. NaCl was used as abiotic elicitors in these two plants. Cellulase from Aspergillus niger was used as biotic elicitor in S. khasianum and mannan from Saccharomyces cerevisiae was used in R. serpentina. First time we have reported the effect of biotic and abiotic elicitors on the production of important metabolites in hairy root cultures of these two plants. Ajmalicine production was stimulated up to 14.8-fold at 100 mM concentration of NaCl after 1 week of treatment. Ajmaline concentration was also increased 2.9-fold at 100 mg/l dose of mannan after 1 week. Solasodine content was enhanced up to 4.0-fold and 3.6-fold at 100 mM and 200 mM NaCl, respectively, after 6 days of treatments. This study explored the potential of the elicitation strategy in A. rhizogenes transformed cell cultures and this potential further used for commercial production of these pharmaceutically important secondary metabolites. Hairy roots of Rauwolfia serpentina were subjected to salt (abiotic stress) and mannan (biotic stress) treatment for 1 week. Ajmaline and ajmalicine secondary metabolites were quantified before and after stress treatmentAjmalicine yield was enhanced up to 14.8-fold at 100 mM concentration of NaCl. Ajmaline content was also stimulated 2.9-fold at 100 mg/l dose of mannan

  3. Advanced Materials, Technologies, and Complex Systems Analyses: Emerging Opportunities to Enhance Urban Water Security.

    Science.gov (United States)

    Zodrow, Katherine R; Li, Qilin; Buono, Regina M; Chen, Wei; Daigger, Glen; Dueñas-Osorio, Leonardo; Elimelech, Menachem; Huang, Xia; Jiang, Guibin; Kim, Jae-Hong; Logan, Bruce E; Sedlak, David L; Westerhoff, Paul; Alvarez, Pedro J J

    2017-09-19

    Innovation in urban water systems is required to address the increasing demand for clean water due to population growth and aggravated water stress caused by water pollution, aging infrastructure, and climate change. Advances in materials science, modular water treatment technologies, and complex systems analyses, coupled with the drive to minimize the energy and environmental footprints of cities, provide new opportunities to ensure a resilient and safe water supply. We present a vision for enhancing efficiency and resiliency of urban water systems and discuss approaches and research needs for overcoming associated implementation challenges.

  4. Adaptive enhancement of learning protocol in hippocampal cultured networks grown on multielectrode arrays

    Science.gov (United States)

    Pimashkin, Alexey; Gladkov, Arseniy; Mukhina, Irina; Kazantsev, Victor

    2013-01-01

    Learning in neuronal networks can be investigated using dissociated cultures on multielectrode arrays supplied with appropriate closed-loop stimulation. It was shown in previous studies that weakly respondent neurons on the electrodes can be trained to increase their evoked spiking rate within a predefined time window after the stimulus. Such neurons can be associated with weak synaptic connections in nearby culture network. The stimulation leads to the increase in the connectivity and in the response. However, it was not possible to perform the learning protocol for the neurons on electrodes with relatively strong synaptic inputs and responding at higher rates. We proposed an adaptive closed-loop stimulation protocol capable to achieve learning even for the highly respondent electrodes. It means that the culture network can reorganize appropriately its synaptic connectivity to generate a desired response. We introduced an adaptive reinforcement condition accounting for the response variability in control stimulation. It significantly enhanced the learning protocol to a large number of responding electrodes independently on its base response level. We also found that learning effect preserved after 4–6 h after training. PMID:23745105

  5. Enhancement of synaptic transmission induced by BDNF in cultured cortical neurons

    Science.gov (United States)

    He, Jun; Gong, Hui; Zeng, Shaoqun; Li, Yanling; Luo, Qingming

    2005-03-01

    Brain-derived neurotrophic factor (BDNF), like other neurotrophins, has long-term effects on neuronal survival and differentiation; furthermore, BDNF has been reported to exert an acute potentiation of synaptic activity and are critically involved in long-term potentiation (LTP). We found that BDNF rapidly induced potentiation of synaptic activity and an increase in the intracellular Ca2+ concentration in cultured cortical neurons. Within minutes of BDNF application to cultured cortical neurons, spontaneous firing rate was dramatically increased as were the frequency and amplitude of excitatory spontaneous postsynaptic currents (EPSCs). Fura-2 recordings showed that BDNF acutely elicited an increase in intracellular calcium concentration ([Ca2+]c). This effect was partially dependent on [Ca2+]o; The BDNF-induced increase in [Ca2+]c can not be completely blocked by Ca2+-free solution. It was completely blocked by K252a and partially blocked by Cd2+ and TTX. The results demonstrate that BDNF can enhances synaptic transmission and that this effect is accompanied by a rise in [Ca2+]c that requires two route: the release of Ca2+ from intracellular calcium stores and influx of extracellular Ca2+ through voltage-dependent Ca2+ channels in cultured cortical neurons.

  6. Monitoring cell culture media degradation using surface enhanced Raman scattering (SERS) spectroscopy.

    Science.gov (United States)

    Calvet, Amandine; Ryder, Alan G

    2014-08-20

    The quality of the cell culture media used in biopharmaceutical manufacturing is a crucial factor affecting bioprocess performance and the quality of the final product. Due to their complex composition these media are inherently unstable, and significant compositional variations can occur particularly when in the prepared liquid state. For example photo-degradation of cell culture media can have adverse effects on cell viability and thus process performance. There is therefore, from quality control, quality assurance and process management view points, an urgent demand for the development of rapid and inexpensive tools for the stability monitoring of these complex mixtures. Spectroscopic methods, based on fluorescence or Raman measurements, have now become viable alternatives to more time-consuming and expensive (on a unit analysis cost) chromatographic and/or mass spectrometry based methods for routine analysis of media. Here we demonstrate the application of surface enhanced Raman scattering (SERS) spectroscopy for the simple, fast, analysis of cell culture media degradation. Once stringent reproducibility controls are implemented, chemometric data analysis methods can then be used to rapidly monitor the compositional changes in chemically defined media. SERS shows clearly that even when media are stored at low temperature (2-8°C) and in the dark, significant chemical changes occur, particularly with regard to cysteine/cystine concentration. Copyright © 2014 Elsevier B.V. All rights reserved.

  7. Enhanced biofilm formation in dual-species culture of Listeria monocytogenes and Ralstonia insidiosa

    Directory of Open Access Journals (Sweden)

    Yunfeng Xu

    2017-09-01

    Full Text Available In the natural environments microorganisms coexist in communities as biofilms. Since foodborne pathogens have varying abilities to form biofilms, investigation of bacterial interactions in biofilm formation may enhance our understanding of the persistence of these foodborne pathogens in the environment. Thus the objective of this study was to investigate the interactions between Listeria monocytogenes and Ralstonia insidiosa in dual species biofilms. Biofilm development after 24 h was measured using crystal violet in 96-well microtiter plate. Scanning electron microscopy and cell enumeration were employed after growth on stainless steel coupons. When compared with their single species counterparts, the dual species biofilms exhibited a significant increase in biofilm biomass. The number of L. monocytogenes in co-culture biofilms on stainless steel also increased significantly. However, there was no effect on the biofilm formation of L. monocytogenes when cultured with R. insidiosa separated by a semi-permeable membrane-linked compartment or cultured in R. insidiosa cell-free supernatant, indicating that direct cell-cell contact is critical for this interaction.

  8. β-Carotene from Yeasts Enhances Laccase Production of Pleurotus eryngii var. ferulae in Co-culture.

    Science.gov (United States)

    Guo, Chaolin; Zhao, Liting; Wang, Feng; Lu, Jian; Ding, Zhongyang; Shi, Guiyang

    2017-01-01

    Laccase is widely used in several industrial applications and co-culture is a common method for enhancing laccase production in submerged fermentation. In this study, the co-culture of four yeasts with Pleurotus eryngii var. ferulae was found to enhance laccase production. An analysis of sterilization temperatures and extraction conditions revealed that the stimulatory compound in yeasts was temperature-sensitive, and that it was fat-soluble. An LC-MS analysis revealed that the possible stimulatory compound for laccase production in the four yeast extracts was β-carotene. Moreover, the addition of 4 mg β-carotene to 150 mL of P. eryngii var. ferulae culture broth improved laccase production by 2.2-fold compared with the control (i.e., a monoculture), and was similar to laccase production in co-culture. In addition, the enhanced laccase production was accompanied by an increase of lac gene transcription, which was 6.2-time higher than the control on the fifth day. Therefore, it was concluded that β-carotene from the co-cultured yeasts enhanced laccase production in P. eryngii var. ferulae , and strains that produce β-carotene could be selected to enhance fungal laccase production in a co-culture. Alternatively, β-carotene or crude extracts of β-carotene could be used to induce high laccase production in large scale.

  9. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  10. Supply Chain Security: U.S. Customs and Border Protection has Enhanced its Partnership with Import Trade Sectors by Challenges Remain in Verifying Security Practices

    National Research Council Canada - National Science Library

    Caldwell, Stephen L; Fossett, Christine A; Conrad, Christopher; Berbsteub, Amy; Berry, Fredrick; Camarillo, Yecenia; Cook, Frances; David, Katherine; Dye, Wendy; Gibson, Nkenge

    2008-01-01

    .... For example, between March 2005 and November 2007, CBP established requirements for C-TPAT members in nine trade sectors to meet minimum security criteria for their specific trade sector, including...

  11. Le scienze aziendali per la valorizzazione del capitale culturale storico / Managerial sciences for the enhancement of historical cultural heritage

    Directory of Open Access Journals (Sweden)

    Massimo Montella

    2010-10-01

    In Italy the application of business economics to the enhancement of cultural heritage fails, when it distorts the disciplinary statute of economic sciences, when it does not get things done, when it has not clear the meaning of “enhancement” and of “cultural heritage” and their possible interaction, when it does not use the specific conceptual, lexical, historiographical tools to interact with the policy makers and the cultural experts, when it does not focus on the peculiarity of the present-day national context. After satisfying these preconditions, business economics should address to the strategies, to the product and to the bonds of organizations whose mission is the enhancement of cultural heritage. Moreover, it should not stop sancta sanctorum. In order to verify the effective ability to create value, it should not be misled by the archetypal opposition between economics and culture and by the abstract category of merit goods.

  12. Fast-Valving of Large Steam Turbine Units as a Means of Power System Security Enhancement

    Directory of Open Access Journals (Sweden)

    Bogdan Sobczak

    2014-03-01

    Full Text Available Fast-valving assists in maintaining system stability following a severe transmission system fault by reducing the turbine mechanical power. Fast-valving consists in rapid closing and opening of steam valves in an adequate manner to reduce the generator accelerating power following the recognition of a severe fault. FV can be an effective and economical method of meeting the performance requirements of a power system in the presence of an increase in wind and solar generation in the power system, newly connected large thermal units and delaying of building new transmission lines. The principle of fast-valving and advantages of applying this technique in large steam turbine units was presented in the paper. Effectiveness of fast-valving in enhancing the stability of the Polish Power Grid was analyzed. The feasibility study of fast-valving application in the 560 MW unit in Kozienice Power Station (EW SA was discussed.

  13. Photon activation therapy with 127I-deoxyuridine: measurement of dose enhancement in cultured mammalian cells

    International Nuclear Information System (INIS)

    Fairchild, R.G.; Laster, B.H.; Commerford, S.L.; Furcinitti, P.S.; Sylvester, B.; Gabel, D.; Popenoe, E.; Foster, S.

    1985-01-01

    A technique for radiation enhancement of conventional photon radiotherapy is outlined which has been called photon activation therapy (PAT) (6). High linear energy transfer (LET) radiations in the form of Auger electron distributions are generated by photons of appropriate energies, through photon activation of stable iodine incorporated as an analog of thymidine (Tyd) in DNA. Of the several halogenated deoxyribonucleosides evaluated, iodinated deoxyuridine (IdUrd) has been chosen as the only Tyd analog providing effective photon activation. This mechanism is combined with radiation sensitization produced by IdUrd to produce an overall radiation enhancement. Calculations show that at 5% replacement (IdUrd for Tyd) therapeutic (TG) will vary from ∼2 (single acute dose) to ∼17 (low dose rates associated with permanent implant brachytherapy). Parameters used in the calculation of TG have been evaluated in cell culture; dose enhancements obtained with x-rays (including photon activation) were found to be significantly higher than values measured with γ-rays (no photon activation). Comparison is made between theoretical and measured values. Because of the evident lack of repair of damage produced by both sensitization and photon activation, significant gains are expected to be realized following protracted irradiations. Exchanges (IdUrd for Tyd) for 105 have been obtained in vivo (murine tumors). The authors believe that the application of PAT would be most advantageous in the treatment of brain tumors (grade IV astrocytomas) with implanted 145 Sm sources

  14. [System construction of early warning for ecological security at cultural and natural heritage mixed sites and its application: a case study of Wuyishan Scenery District].

    Science.gov (United States)

    You, Wei-Bin; He, Dong-Jin; Qin, De-Hua; Ji, Zhi-Rong; Wu, Li-Yun; Yu, Jian-An; Chen, Bing-Rong; Tan, Yong

    2014-05-01

    This paper proposed a new concept of ecological security for protection by a comprehensive analysis of the contents and standards of world heritage sites. A frame concept model named "Pressure-State-Control" for early warning of ecological security at world heritage mixed sites was constructed and evaluation indicators of this frame were also selected. Wuyishan Scenery District was chosen for a case study, which has been severely disturbed by natural and artificial factors. Based on the frame model of "Pressure-State-Control" and by employing extension analysis, the matter-element model was established to assess the ecological security status of this cultural and natural world heritage mixed site. The results showed that the accuracy of ecological security early warning reached 84%. Early warning rank was I level (no alert status) in 1997 and 2009, but that in 2009 had a higher possibility to convert into II level. Likewise, the early-warning indices of sensitive ranks were different between 1997 and 2009. Population density, population growth rate, area index for tea garden, cultivated land owned per capita, level of drought, and investment for ecological and environmental construction were the main limiting factors to hinder the development of ecological security from 2009 to future. In general, the status of Wuyishan Scenery District ecological security was relatively good and considered as no alert level, while risk conditions also existed in terms of a few early-warning indicators. We still need to pay more attention to serious alert indicators and adopt effective prevention and control measures to maintain a good ecological security status of this heritage site.

  15. Enhancing the cyber-security of smart grids with applications to synchrophasor data

    Science.gov (United States)

    Pal, Seemita

    In the power grids, Supervisory Control and Data Acquisition (SCADA) systems are used as part of the Energy Management System (EMS) for enabling grid monitoring, control and protection. In recent times, with the ongoing installation of thousands of Phasor Measurement Units (PMUs), system operators are becoming increasingly reliant on PMU-generated synchrophasor measurements for executing wide-area monitoring and real-time control. The availability of PMU data facilitates dynamic state estimation of the system, thus improving the efficiency and resiliency of the grid. Since the SCADA and PMU data are used to make critical control decisions including actuation of physical systems, the timely availability and integrity of this networked data is of paramount importance. Absence or wrong control actions can potentially lead to disruption of operations, monetary loss, damage to equipments or surroundings or even blackout. This has posed new challenges to information security especially in this age of ever-increasing cyber-attacks. In this thesis, potential cyber-attacks on smart grids are presented and effective and implementable schemes are proposed for detecting them. The focus is mainly on three kinds of cyber-attacks and their detection: (i) gray-hole attacks on synchrophasor systems, (ii) PMU data manipulation attacks and (iii) data integrity attacks on SCADA systems. In the case of gray-hole attacks, also known as packet-drop attacks, the adversary may arbitrarily drop PMU data packets as they traverse the network, resulting in unavailability of time-sensitive data for the various critical power system applications. The fundamental challenge is to distinguish packets dropped by the adversary from those that occur naturally due to network congestion.The proposed gray-hole attack detection technique is based on exploiting the inherent timing information in the GPS time-stamped PMU data packets and using the temporal trends of the latencies to classify the cause of

  16. Stakeholder Transportation Scorecard: Reviewing Nevada's Recommendations for Enhancing the Safety and Security of Nuclear Waste Shipments - 13518

    Energy Technology Data Exchange (ETDEWEB)

    Dilger, Fred C. [Black Mountain Research, Henderson, NV 81012 (United States); Ballard, James D. [Department of Sociology, California State University, Northridge, CA 91330 (United States); Halstead, Robert J. [State of Nevada Agency for Nuclear Projects, Carson City, NV 80906 (United States)

    2013-07-01

    As a primary stakeholder in the Yucca Mountain program, the state of Nevada has spent three decades examining and considering national policy regarding spent nuclear fuel and high-level radioactive waste transportation. During this time, Nevada has identified 10 issues it believes are critical to ensuring the safety and security of any spent nuclear fuel transportation program, and achieving public acceptance. These recommendations are: 1) Ship the oldest fuel first; 2) Ship mostly by rail; 3) Use dual-purpose (transportable storage) casks; 4) Use dedicated trains for rail shipments; 5) Implement a full-scale cask testing program; 6) Utilize a National Environmental Policy Act (NEPA) process for the selection of a new rail spur to the proposed repository site; 7) Implement the Western Interstate Energy Board (WIEB) 'straw man' process for route selection; 8) Implement Section 180C assistance to affected States, Tribes and localities through rulemaking; 9) Adopt safety and security regulatory enhancements proposed states; and 10) Address stakeholder concerns about terrorism and sabotage. This paper describes Nevada's proposals in detail and examines their current status. The paper describes the various forums and methods by which Nevada has presented its arguments and sought to influence national policy. As of 2012, most of Nevada's recommendations have been adopted in one form or another, although not yet implemented. If implemented in a future nuclear waste program, the State of Nevada believes these recommendations would form the basis for a successful national transportation plan for shipments to a geologic repository and/or centralized interim storage facility. (authors)

  17. Stakeholder Transportation Scorecard: Reviewing Nevada's Recommendations for Enhancing the Safety and Security of Nuclear Waste Shipments - 13518

    International Nuclear Information System (INIS)

    Dilger, Fred C.; Ballard, James D.; Halstead, Robert J.

    2013-01-01

    As a primary stakeholder in the Yucca Mountain program, the state of Nevada has spent three decades examining and considering national policy regarding spent nuclear fuel and high-level radioactive waste transportation. During this time, Nevada has identified 10 issues it believes are critical to ensuring the safety and security of any spent nuclear fuel transportation program, and achieving public acceptance. These recommendations are: 1) Ship the oldest fuel first; 2) Ship mostly by rail; 3) Use dual-purpose (transportable storage) casks; 4) Use dedicated trains for rail shipments; 5) Implement a full-scale cask testing program; 6) Utilize a National Environmental Policy Act (NEPA) process for the selection of a new rail spur to the proposed repository site; 7) Implement the Western Interstate Energy Board (WIEB) 'straw man' process for route selection; 8) Implement Section 180C assistance to affected States, Tribes and localities through rulemaking; 9) Adopt safety and security regulatory enhancements proposed states; and 10) Address stakeholder concerns about terrorism and sabotage. This paper describes Nevada's proposals in detail and examines their current status. The paper describes the various forums and methods by which Nevada has presented its arguments and sought to influence national policy. As of 2012, most of Nevada's recommendations have been adopted in one form or another, although not yet implemented. If implemented in a future nuclear waste program, the State of Nevada believes these recommendations would form the basis for a successful national transportation plan for shipments to a geologic repository and/or centralized interim storage facility. (authors)

  18. Efficient Hybrid Watermarking Scheme for Security and Transmission Bit Rate Enhancement of 3D Color-Plus-Depth Video Communication

    Science.gov (United States)

    El-Shafai, W.; El-Rabaie, S.; El-Halawany, M.; Abd El-Samie, F. E.

    2018-03-01

    Three-Dimensional Video-plus-Depth (3DV + D) comprises diverse video streams captured by different cameras around an object. Therefore, there is a great need to fulfill efficient compression to transmit and store the 3DV + D content in compressed form to attain future resource bounds whilst preserving a decisive reception quality. Also, the security of the transmitted 3DV + D is a critical issue for protecting its copyright content. This paper proposes an efficient hybrid watermarking scheme for securing the 3DV + D transmission, which is the homomorphic transform based Singular Value Decomposition (SVD) in Discrete Wavelet Transform (DWT) domain. The objective of the proposed watermarking scheme is to increase the immunity of the watermarked 3DV + D to attacks and achieve adequate perceptual quality. Moreover, the proposed watermarking scheme reduces the transmission-bandwidth requirements for transmitting the color-plus-depth 3DV over limited-bandwidth wireless networks through embedding the depth frames into the color frames of the transmitted 3DV + D. Thus, it saves the transmission bit rate and subsequently it enhances the channel bandwidth-efficiency. The performance of the proposed watermarking scheme is compared with those of the state-of-the-art hybrid watermarking schemes. The comparisons depend on both the subjective visual results and the objective results; the Peak Signal-to-Noise Ratio (PSNR) of the watermarked frames and the Normalized Correlation (NC) of the extracted watermark frames. Extensive simulation results on standard 3DV + D sequences have been conducted in the presence of attacks. The obtained results confirm that the proposed hybrid watermarking scheme is robust in the presence of attacks. It achieves not only very good perceptual quality with appreciated PSNR values and saving in the transmission bit rate, but also high correlation coefficient values in the presence of attacks compared to the existing hybrid watermarking schemes.

  19. Culture.

    Science.gov (United States)

    Smith, Timothy B; Rodríguez, Melanie Domenech; Bernal, Guillermo

    2011-02-01

    This article summarizes the definitions, means, and research of adapting psychotherapy to clients' cultural backgrounds. We begin by reviewing the prevailing definitions of cultural adaptation and providing a clinical example. We present an original meta-analysis of 65 experimental and quasi-experimental studies involving 8,620 participants. The omnibus effect size of d = .46 indicates that treatments specifically adapted for clients of color were moderately more effective with that clientele than traditional treatments. The most effective treatments tended to be those with greater numbers of cultural adaptations. Mental health services targeted to a specific cultural group were several times more effective than those provided to clients from a variety of cultural backgrounds. We recommend a series of research-supported therapeutic practices that account for clients' culture, with culture-specific treatments being more effective than generally culture-sensitive treatments. © 2010 Wiley Periodicals, Inc.

  20. Jasmonic and salicylic acids enhanced phytochemical production and biological activities in cell suspension cultures of spine gourd (Momordica dioica Roxb).

    Science.gov (United States)

    Chung, Ill-Min; Rekha, Kaliyaperumal; Rajakumar, Govindasamy; Thiruvengadam, Muthu

    2017-03-01

    In vitro cell suspension culture was established for the production of commercially valuable phytochemicals in Momordica dioica. The influence of elicitors in jasmonic acid (JA) and salicylic acid (SA) increased their effect on phytochemical production and biomass accumulation in M. dioica. The results indicate that compared with non-elicited cultures, JA- and SA-elicited cell suspension cultures had significantly enhanced phenolic, flavonoid, and carotenoid production, as well as antioxidant, antimicrobial, and antiproliferative activities. Furthermore, elicited cultures produced 22 phenolic compounds, such as flavonols, hydroxycinnamic acids, and hydroxybenzoic acids. Greater biomass production, phytochemical accumulation, and biological activity occurred in JA- than in SA-elicited cell cultures. This study is the first to successfully establish M. dioica cell suspension cultures for the production of phenolic compounds and carotenoids, as well as for biomass accumulation.

  1. The Development of a Cultural-Based Educational Program to Enhance Breast Self-Examination (BSE Self-Efficacy

    Directory of Open Access Journals (Sweden)

    Juanita Juanita

    2012-08-01

    Full Text Available Purpose: To develop the educational program which is appropriate with Islamic culture in order to enhance BSE self-efficacy of nursing students and thus promote BSE practice. Method: This study is a development research study which is consisting of three phases including: 1 reviewing several existing BSE educational programs; 2 program design based on SCT and Islamic culture; and 3 program validation by three experts. Result: Based on previous studies, the most appropriate theory to enhance self-efficacy was Social Cognitive Theory (SCT because this theory provides several strategies to increase the self-efficacy. Further, the program that used Islamic culture was more appropriate to increase BSE practice among Muslim women. As a result, the newly developed program was developed used SCT and Islamic culture. This program was comprised of four sessions including: 1 exploring Islamic mandate on prevention and individual responsibility in health promotion, and culture-related beliefs toward BSE, 2 health education by conducting lecturing session and watching a video about BSE procedures, 3 BSE training activities including BSE demonstration and return demonstration, 4 follow-up by conducting a meeting. Conclusion: The cultural-based educational program for enhancing BSE self-efficacy and promoting BSE is a program using multifaceted methods. It designed based on a review of the literature from previous studies and were supported by research findings on experimental studies in other population. Keywords: Cultural, Educational program development, Breast self-examination, Self-efficacy.

  2. Renewable Energy Certificate and Perform, Achieve, Trade mechanisms to enhance the energy security for India

    International Nuclear Information System (INIS)

    Kumar, Rajesh; Agarwala, Arun

    2013-01-01

    The Renewable Energy Certificate and Perform Achieve Trade mechanisms in India are designed to target energy generation and saving, respectively, in line with Clean Development Mechanism implemented by United Nations Framework Convention on Climate Change. The Renewable Energy Certificate System is a voluntary regulation in India for renewable energy generators and is designed for effective implementation of inter-state transactions by introducing the Renewable Purchase Obligation regulation for consumers and a flexible trading platform for transactions across the country. Another initiative, the Perform Achieve Trade scheme, is an enhanced energy efficiency trading mechanism based on consumption targets that require large energy user sectors to improve efficiency by 1–2% per year. The Perform Achieve Trade programme has introduced mechanisms for the identification of industry sector, designated customer, specific energy consumption and target setting. The Perform Achieve Trade design issues are in test phase in the first cycle of the scheme which will run from 2012 to 2015. This paper discusses key design issues about boundary and target setting for Renewable Energy Certificate and Perform Achieve Trade energy saving certificate (ESCert) A data sharing and trading mechanism for Perform Achieve Trade is also proposed for review and coordination among regulator, designated consumers and traders in the market. - Highlights: ► Renewable Energy Certificate’ and ‘Perform Achieve Trade’ are energy certification programmes. ► REC and PAT programme implementation and the institutional network work are presented. ► The trading and communication network propose for possible linkage between REC, PAT and CDM. ► Independent associations in parallel with CERC and BEE are redefined for two tier review of scheme

  3. Sustaining engagement and partnership: model of enhancing cultural capital among nonaffiliated IRB members.

    Science.gov (United States)

    Hung, Yvonne; Ayala, Armida; Morales, Francisco; Frierman-Hunt, Gina; Moreno, Alva; Nwachuku, Ijeoma

    2013-07-01

    Although federal regulations require the presence of at least one nonaffiliated member on the roster of an institutional review board (IRB), little research exists about how to foster their participation and satisfaction. Guided by principles of justice and diversity, the Kaiser Permanente Southern California IRB adapted the sociological concept of "cultural capital" to develop training and support with its nonaffiliated IRB members. Using in-depth qualitative interviews with four past and current nonaffiliated IRB members, we describe how our initial and ongoing activities enhanced their ability to analyze, communicate, and complete the ethical review of research. This case study is situated in the gaps of existing research about nonaffiliated IRB members by providing insights into how to sustain their engagement while protecting the rights of research volunteers, particularly from vulnerable communities.

  4. Dimethyl Sulfoxide Enhances Effectiveness of Skin Antiseptics and Reduces Contamination Rates of Blood Cultures

    Science.gov (United States)

    LaSala, Paul R.; Han, Xiang-Yang; Rolston, Kenneth V.; Kontoyiannis, Dimitrios P.

    2012-01-01

    Effective skin antisepsis is of central importance in the prevention of wound infections, colonization of medical devices, and nosocomial transmission of microorganisms. Current antiseptics have a suboptimal efficacy resulting in substantial infectious morbidity, mortality, and increased health care costs. Here, we introduce an in vitro method for antiseptic testing and a novel alcohol-based antiseptic containing 4 to 5% of the polar aprotic solvent dimethyl sulfoxide (DMSO). The DMSO-containing antiseptic resulted in a 1- to 2-log enhanced killing of Staphylococcus epidermidis and other microbes in vitro compared to the same antiseptic without DMSO. In a prospective clinical validation, blood culture contamination rates were reduced from 3.04% for 70% isopropanol–1% iodine (control antiseptic) to 1.04% for 70% isopropanol–1% iodine–5% DMSO (P antiseptics containing strongly polarized but nonionizing (polar aprotic) solvents. PMID:22378911

  5. Withania somnifera: Advances and Implementation of Molecular and Tissue Culture Techniques to Enhance Its Application

    Directory of Open Access Journals (Sweden)

    Vibha Pandey

    2017-08-01

    Full Text Available Withania somnifera, commonly known as Ashwagandha an important medicinal plant largely used in Ayurvedic and indigenous medicine for over 3,000 years. Being a medicinal plant, dried powder, crude extract as well as purified metabolies of the plant has shown promising therapeutic properties. Withanolides are the principal metabolites, responsible for the medicinal properties of the plant. Availability and amount of particular withanolides differ with tissue type and chemotype and its importance leads to identification characterization of several genes/ enzymes related to withanolide biosynthetic pathway. The modulation in withanolides can be achieved by controlling the environmental conditions like, different tissue culture techniques, altered media compositions, use of elicitors, etc. Among all the in vitro techniques, hairy root culture proved its importance at industrial scale, which also gets benefits due to more accumulation (amount and number of withanolides in roots tissues of W. somnifera. Use of media compostion and elicitors further enhances the amount of withanolides in hairy roots. Another important modern day technique used for accumulation of desired secondary metabolites is modulating the gene expression by altering environmental conditions (use of different media composition, elicitors, etc. or through genetic enginnering. Knowing the significance of the gene and the key enzymatic step of the pathway, modulation in withanolide contents can be achieved upto required amount in therapeutic industry. To accomplish maximum productivity through genetic enginnering different means of Withania transformation methods have been developed to obtain maximum transformation efficiency. These standardized transformation procedues have been used to overexpress/silence desired gene in W. somnifera to understand the outcome and succeed with enhanced metabolic production for the ultimate benefit of human race.

  6. Canonical Wnt signaling transiently stimulates proliferation and enhances neurogenesis in neonatal neural progenitor cultures

    International Nuclear Information System (INIS)

    Hirsch, Cordula; Campano, Louise M.; Woehrle, Simon; Hecht, Andreas

    2007-01-01

    Canonical Wnt signaling triggers the formation of heterodimeric transcription factor complexes consisting of β-catenin and T cell factors, and thereby controls the execution of specific genetic programs. During the expansion and neurogenic phases of embryonic neural development canonical Wnt signaling initially controls proliferation of neural progenitor cells, and later neuronal differentiation. Whether Wnt growth factors affect neural progenitor cells postnatally is not known. Therefore, we have analyzed the impact of Wnt signaling on neural progenitors isolated from cerebral cortices of newborn mice. Expression profiling of pathway components revealed that these cells are fully equipped to respond to Wnt signals. However, Wnt pathway activation affected only a subset of neonatal progenitors and elicited a limited increase in proliferation and neuronal differentiation in distinct subsets of cells. Moreover, Wnt pathway activation only transiently stimulated S-phase entry but did not support long-term proliferation of progenitor cultures. The dampened nature of the Wnt response correlates with the predominant expression of inhibitory pathway components and the rapid actuation of negative feedback mechanisms. Interestingly, in differentiating cell cultures activation of canonical Wnt signaling reduced Hes1 and Hes5 expression suggesting that during postnatal neural development, Wnt/β-catenin signaling enhances neurogenesis from progenitor cells by interfering with Notch pathway activity

  7. Changing cultures: enhancing mental health and wellbeing of refugee young people through education and training.

    Science.gov (United States)

    Bond, Lyndal; Giddens, Anne; Cosentino, Anne; Cook, Margaret; Hoban, Paul; Haynes, Ann; Scaffidi, Louise; Dimovski, Mary; Cini, Eileen; Glover, Sara

    2007-01-01

    Many refugee people and others entering Australia under the Humanitarian Program, have experienced extremely stressful and disrupted lives prior to arrival. A major difficulty experienced by a significant number of refugee young people is their lack of formal education before arrival. It directly affects their ability to start connecting to their new society and constructing a new life. The level of ease with which young people can move into the education and training system and begin to establish a meaningful career pathway has a huge impact on their successful settlement and stable mental health. This paper describes the Changing Cultures Project, a three-year project, which explored models of appropriate and accessible education and training for refugee and newly arrived young people that would enhance their mental health. The Changing Cultures Project was a partnership between the education, health and settlement sectors. This paper describes the program and system response to the health, settlement, education and vocational issues facing refugee young people using a mental health promotion framework and reflective practice. We discuss how the refugee youth programs met a broad range of needs as well as providing language, literacy and basic education to newly arrived young people. While working in an environment of changing policy and public opinion regarding refugee issues, the Project delivered successful outcomes at the program and organisational levels for refugee young people by addressing issues of program development and delivery, organisational development and capacity building and community development and evaluation.

  8. Enhanced removal of petroleum hydrocarbons using a bioelectrochemical remediation system with pre-cultured anodes

    International Nuclear Information System (INIS)

    Venkidusamy, Krishnaveni; Megharaj, Mallavarapu; Marzorati, Massimo; Lockington, Robin; Naidu, Ravi

    2016-01-01

    Bioelectrochemical remediation (BER) systems such as microbial fuel cells (MFCs) have recently emerged as a green technology for the effective remediation of petroleum hydrocarbon contaminants (PH) coupled with simultaneous energy recovery. Recent research has shown that biofilms previously enriched for substrate degrading bacteria resulted in excellent performance in terms of substrate removal and electricity generation but the effects on hydrocarbon contaminant degradation were not examined. Here we investigate the differences between enriched biofilm anodes and freshly inoculated new anodes in diesel fed single chamber mediatorless microbial fuel cells (DMFC) using various techniques for the enhancement of PH contaminant remediation with concomitant electricity generation. An anodophilic microbial consortium previously selected for over a year through continuous culturing with a diesel concentration of about 800 mg l"−"1 and which now showed complete removal of this concentration of diesel within 30 days was compared to that of a freshly inoculated new anode MFC (showing 83.4% removal of diesel) with a simultaneous power generation of 90.81 mW/m"2 and 15.04 mW/m"2 respectively. The behaviour of pre-cultured anodes at a higher concentration of PH (8000 mg l"−"1) was also investigated. Scanning electron microscopy observation revealed a thick biofilm covering the pre-cultured anodic electrode but not the anode from the freshly inoculated MFC. High resolution imaging showed the presence of thin 60 nm diametre pilus-like projections emanating from the cells. Anodic microbial community profiling confirmed that the selection for diesel degrading exoelectrogenic bacteria had occurred. Identification of a biodegradative gene (alkB) provided strong evidence of the catabolic pathway used for diesel degradation in the DMFCs.

  9. Enhanced removal of petroleum hydrocarbons using a bioelectrochemical remediation system with pre-cultured anodes

    Energy Technology Data Exchange (ETDEWEB)

    Venkidusamy, Krishnaveni [Centre for Environmental Risk Assessment and Remediation (CERAR), University of South (Australia); CRC for Contamination Assessment and Remediation of the Environment (CRCCARE), Mawson Lakes, SA5095 (Australia); Megharaj, Mallavarapu, E-mail: megh.mallavarapu@newcastle.edu.au [Centre for Environmental Risk Assessment and Remediation (CERAR), University of South (Australia); CRC for Contamination Assessment and Remediation of the Environment (CRCCARE), Mawson Lakes, SA5095 (Australia); Global Centre for Environmental Remediation, Faculty of Science and Information Technology, The University of Newcastle, Callaghan, NSW 2308 (Australia); Marzorati, Massimo [Laboratory for Microbial Ecology and Technology (LabMET), Gent University, 9000 Gent (Belgium); Lockington, Robin [Centre for Environmental Risk Assessment and Remediation (CERAR), University of South (Australia); CRC for Contamination Assessment and Remediation of the Environment (CRCCARE), Mawson Lakes, SA5095 (Australia); Naidu, Ravi [Centre for Environmental Risk Assessment and Remediation (CERAR), University of South (Australia); CRC for Contamination Assessment and Remediation of the Environment (CRCCARE), Mawson Lakes, SA5095 (Australia); Global Centre for Environmental Remediation, Faculty of Science and Information Technology, The University of Newcastle, Callaghan, NSW 2308 (Australia)

    2016-01-01

    Bioelectrochemical remediation (BER) systems such as microbial fuel cells (MFCs) have recently emerged as a green technology for the effective remediation of petroleum hydrocarbon contaminants (PH) coupled with simultaneous energy recovery. Recent research has shown that biofilms previously enriched for substrate degrading bacteria resulted in excellent performance in terms of substrate removal and electricity generation but the effects on hydrocarbon contaminant degradation were not examined. Here we investigate the differences between enriched biofilm anodes and freshly inoculated new anodes in diesel fed single chamber mediatorless microbial fuel cells (DMFC) using various techniques for the enhancement of PH contaminant remediation with concomitant electricity generation. An anodophilic microbial consortium previously selected for over a year through continuous culturing with a diesel concentration of about 800 mg l{sup −1} and which now showed complete removal of this concentration of diesel within 30 days was compared to that of a freshly inoculated new anode MFC (showing 83.4% removal of diesel) with a simultaneous power generation of 90.81 mW/m{sup 2} and 15.04 mW/m{sup 2} respectively. The behaviour of pre-cultured anodes at a higher concentration of PH (8000 mg l{sup −1}) was also investigated. Scanning electron microscopy observation revealed a thick biofilm covering the pre-cultured anodic electrode but not the anode from the freshly inoculated MFC. High resolution imaging showed the presence of thin 60 nm diametre pilus-like projections emanating from the cells. Anodic microbial community profiling confirmed that the selection for diesel degrading exoelectrogenic bacteria had occurred. Identification of a biodegradative gene (alkB) provided strong evidence of the catabolic pathway used for diesel degradation in the DMFCs.

  10. Enhanced production of azadirachtin by hairy root cultures of Azadirachta indica A. Juss by elicitation and media optimization.

    Science.gov (United States)

    Satdive, Ramesh K; Fulzele, Devanand P; Eapen, Susan

    2007-02-01

    Azadirachtin is one of the most potent biopesticides so far developed from a plant sources. Influence of different culture media and elicitation on growth and production of azadirachtin by hairy root cultures of Azadirachta indica was studied. Out of the three media tested, namely Ohyama and Nitsch, Gamborg's and Murashige and Skoog's basal media, hairy roots cultured on Ohyama and Nitsch's basal medium produced maximum yield of azadirachtin (0.0166% dry weight, DW). Addition of biotic elicitor enhanced the production of azadirachtin by approximately 5-fold (0.074% DW), while signal compounds such as jasmonic acid and salicylic acid showed a approximately 6 (0.095% DW) and approximately 9-fold (0.14% DW) enhancement, respectively, in the production of azadirachtin as compared to control cultures on Ohyama and Nitsch medium. Extracts from hairy roots were found to be superior to those from the leaves for antifeedant activity against the larvae of Spodoptera litura.

  11. Diclofenac enhances proinflammatory cytokine-induced phagocytosis of cultured microglia via nitric oxide production

    International Nuclear Information System (INIS)

    Kakita, Hiroki; Aoyama, Mineyoshi; Nagaya, Yoshiaki; Asai, Hayato; Hussein, Mohamed Hamed; Suzuki, Mieko; Kato, Shin; Saitoh, Shinji; Asai, Kiyofumi

    2013-01-01

    Influenza-associated encephalopathy (IAE) is a central nervous system complication with a high mortality rate, which is increased significantly by the non-steroidal anti-inflammatory drug diclofenac sodium (DCF). In the present study, we investigated the effects of DCF on brain immune cells (i.e. microglia) stimulated with three proinflammatory cytokines, namely tumor necrosis factor-α, interleukin-1β, and interferon-γ. Similar to previous findings in astrocytes, all three cytokines induced the expression of inducible NO synthase (iNOS), as well as NO production, in microglia. The addition of DCF to the culture system augmented iNOS expression and NO production. Immunocytochemical analysis and the phagocytosis assay revealed that cytokine treatment induced morphological changes to and phagocytosis by the microglia. The addition of DCF to the culture system enhanced microglial activation, as well as the phagocytic activity of cytokine-stimulated microglia. Inhibitors of nuclear factor (NF)-κB inhibited iNOS gene expression in cytokine-stimulated microglia with or without DCF, suggesting that the NF-κB pathway is one of the main signaling pathways involved. The iNOS inhibitor N G -monomethyl-L-arginine (L-NMMA) reduced both cytokine-induced phagocytosis and phagocytosis induced by the combination of cytokines plus DCF. Furthermore, the NO donor sodium nitroprusside induced phagocytosis, indicating that NO production is a key regulator of microglial phagocytosis. In conclusion, DCF acts synergistically with proinflammatory cytokines to increase the production of NO in microglia, leading to phagocytic activity of the activated microglia. These findings, together with previous observations regarding astrocytes, may explain the significant increase in mortality of IAE patients treated with DCF. - Highlights: ► Influenza-associated encephalopathy (IAE) is associated with a high mortality rate. ► Hyperimmunization in the brain is believed to be responsible for IAE

  12. Intracellular cholesterol-binding proteins enhance HDL-mediated cholesterol uptake in cultured primary mouse hepatocytes.

    Science.gov (United States)

    Storey, Stephen M; McIntosh, Avery L; Huang, Huan; Landrock, Kerstin K; Martin, Gregory G; Landrock, Danilo; Payne, H Ross; Atshaves, Barbara P; Kier, Ann B; Schroeder, Friedhelm

    2012-04-15

    A major gap in our knowledge of rapid hepatic HDL cholesterol clearance is the role of key intracellular factors that influence this process. Although the reverse cholesterol transport pathway targets HDL to the liver for net elimination of free cholesterol from the body, molecular details governing cholesterol uptake into hepatocytes are not completely understood. Therefore, the effects of sterol carrier protein (SCP)-2 and liver fatty acid-binding protein (L-FABP), high-affinity cholesterol-binding proteins present in hepatocyte cytosol, on HDL-mediated free cholesterol uptake were examined using gene-targeted mouse models, cultured primary hepatocytes, and 22-[N-(7-nitrobenz-2-oxa-1,3-diazol-4-yl)-amino]-23,24-bisnor-5-cholen-3β-ol (NBD-cholesterol). While SCP-2 overexpression enhanced NBD-cholesterol uptake, counterintuitively, SCP-2/SCP-x gene ablation also 1) enhanced the rapid molecular phase of free sterol uptake detectable in rate and maximal uptake of HDL free cholesterol and 2) differentially enhanced free cholesterol uptake mediated by the HDL3, rather than the HDL2, subfraction. The increased HDL free cholesterol uptake was not due to increased expression or distribution of the HDL receptor [scavenger receptor B1 (SRB1)], proteins regulating SRB1 [postsynaptic density protein (PSD-95)/Drosophila disk large tumor suppressor (dlg)/tight junction protein (ZO1) and 17-kDa membrane-associated protein], or other intracellular cholesterol trafficking proteins (steroidogenic acute response protein D, Niemann Pick C, and oxysterol-binding protein-related proteins). However, expression of L-FABP, the single most prevalent hepatic cytosolic protein that binds cholesterol, was upregulated twofold in SCP-2/SCP-x null hepatocytes. Double-immunogold electron microscopy detected L-FABP sufficiently close to SRB1 for direct interaction, similar to SCP-2. These data suggest a role for L-FABP in HDL cholesterol uptake, a finding confirmed with SCP-2/SCP-x/L-FABP null

  13. Diclofenac enhances proinflammatory cytokine-induced phagocytosis of cultured microglia via nitric oxide production

    Energy Technology Data Exchange (ETDEWEB)

    Kakita, Hiroki [Department of Molecular Neurobiology, Nagoya City University Graduate School of Medical Sciences, 1 Kawasumi, Mizuho-cho, Mizuho-ku, Nagoya 467-8601 (Japan); Department of Pediatrics and Neonatology, Nagoya City University Graduate School of Medical Sciences, 1 Kawasumi, Mizuho-cho, Mizuho-ku, Nagoya 467-8601 (Japan); Aoyama, Mineyoshi, E-mail: ao.mine@med.nagoya-cu.ac.jp [Department of Molecular Neurobiology, Nagoya City University Graduate School of Medical Sciences, 1 Kawasumi, Mizuho-cho, Mizuho-ku, Nagoya 467-8601 (Japan); Nagaya, Yoshiaki; Asai, Hayato [Department of Molecular Neurobiology, Nagoya City University Graduate School of Medical Sciences, 1 Kawasumi, Mizuho-cho, Mizuho-ku, Nagoya 467-8601 (Japan); Department of Pediatrics and Neonatology, Nagoya City University Graduate School of Medical Sciences, 1 Kawasumi, Mizuho-cho, Mizuho-ku, Nagoya 467-8601 (Japan); Hussein, Mohamed Hamed [Neonatal Intensive Care Unit, Pediatric Hospital, Cairo University, Cairo 11559 (Egypt); Maternal and Child Health Department, VACSERA, 51 Wizaret El-Zeraa-Agouza, Giza 22311 (Egypt); Suzuki, Mieko [Department of Molecular Neurobiology, Nagoya City University Graduate School of Medical Sciences, 1 Kawasumi, Mizuho-cho, Mizuho-ku, Nagoya 467-8601 (Japan); Kato, Shin [Department of Molecular Neurobiology, Nagoya City University Graduate School of Medical Sciences, 1 Kawasumi, Mizuho-cho, Mizuho-ku, Nagoya 467-8601 (Japan); Department of Pediatrics and Neonatology, Nagoya City University Graduate School of Medical Sciences, 1 Kawasumi, Mizuho-cho, Mizuho-ku, Nagoya 467-8601 (Japan); Saitoh, Shinji [Department of Pediatrics and Neonatology, Nagoya City University Graduate School of Medical Sciences, 1 Kawasumi, Mizuho-cho, Mizuho-ku, Nagoya 467-8601 (Japan); Asai, Kiyofumi [Department of Molecular Neurobiology, Nagoya City University Graduate School of Medical Sciences, 1 Kawasumi, Mizuho-cho, Mizuho-ku, Nagoya 467-8601 (Japan)

    2013-04-15

    Influenza-associated encephalopathy (IAE) is a central nervous system complication with a high mortality rate, which is increased significantly by the non-steroidal anti-inflammatory drug diclofenac sodium (DCF). In the present study, we investigated the effects of DCF on brain immune cells (i.e. microglia) stimulated with three proinflammatory cytokines, namely tumor necrosis factor-α, interleukin-1β, and interferon-γ. Similar to previous findings in astrocytes, all three cytokines induced the expression of inducible NO synthase (iNOS), as well as NO production, in microglia. The addition of DCF to the culture system augmented iNOS expression and NO production. Immunocytochemical analysis and the phagocytosis assay revealed that cytokine treatment induced morphological changes to and phagocytosis by the microglia. The addition of DCF to the culture system enhanced microglial activation, as well as the phagocytic activity of cytokine-stimulated microglia. Inhibitors of nuclear factor (NF)-κB inhibited iNOS gene expression in cytokine-stimulated microglia with or without DCF, suggesting that the NF-κB pathway is one of the main signaling pathways involved. The iNOS inhibitor N{sup G}-monomethyl-L-arginine (L-NMMA) reduced both cytokine-induced phagocytosis and phagocytosis induced by the combination of cytokines plus DCF. Furthermore, the NO donor sodium nitroprusside induced phagocytosis, indicating that NO production is a key regulator of microglial phagocytosis. In conclusion, DCF acts synergistically with proinflammatory cytokines to increase the production of NO in microglia, leading to phagocytic activity of the activated microglia. These findings, together with previous observations regarding astrocytes, may explain the significant increase in mortality of IAE patients treated with DCF. - Highlights: ► Influenza-associated encephalopathy (IAE) is associated with a high mortality rate. ► Hyperimmunization in the brain is believed to be responsible for

  14. Preliminary Ideas for a Project on Cultural Heritage: "Heva"-Digital Resources Optimization for the Enhancement of Cultural Heritage

    OpenAIRE

    Fernández Martín, J. J.; García Fernández, J.; Delgado del Hoyo, F. J.; Finat Codes, J.

    2012-01-01

    Cultural Heritage documentation by itself is meaningless if it does not help to create wealth and provide values to society. In recent years, the number of digital contents related to cultural heritage resources is growing in a way that it very difficult to discover reliable information. Thanks to the Internet they can be easily published and distributed but there are three main problems: 1) the quality of the resources is not well evaluated or tagged; 2) the resources are fragmented across s...

  15. An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System.

    Science.gov (United States)

    You, Ilsun; Kwon, Soonhyun; Choudhary, Gaurav; Sharma, Vishal; Seo, Jung Taek

    2018-06-08

    The Internet of Things (IoT) utilizes algorithms to facilitate intelligent applications across cities in the form of smart-urban projects. As the majority of devices in IoT are battery operated, their applications should be facilitated with a low-power communication setup. Such facility is possible through the Low-Power Wide-Area Network (LPWAN), but at a constrained bit rate. For long-range communication over LPWAN, several approaches and protocols are adopted. One such protocol is the Long-Range Wide Area Network (LoRaWAN), which is a media access layer protocol for long-range communication between the devices and the application servers via LPWAN gateways. However, LoRaWAN comes with fewer security features as a much-secured protocol consumes more battery because of the exorbitant computational overheads. The standard protocol fails to support end-to-end security and perfect forward secrecy while being vulnerable to the replay attack that makes LoRaWAN limited in supporting applications where security (especially end-to-end security) is important. Motivated by this, an enhanced LoRaWAN security protocol is proposed, which not only provides the basic functions of connectivity between the application server and the end device, but additionally averts these listed security issues. The proposed protocol is developed with two options, the Default Option (DO) and the Security-Enhanced Option (SEO). The protocol is validated through Burrows⁻Abadi⁻Needham (BAN) logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The proposed protocol is also analyzed for overheads through system-based and low-power device-based evaluations. Further, a case study on a smart factory-enabled parking system is considered for its practical application. The results, in terms of network latency with reliability fitting and signaling overheads, show paramount improvements and better performance for the proposed protocol compared with the two

  16. An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System

    Directory of Open Access Journals (Sweden)

    Ilsun You

    2018-06-01

    Full Text Available The Internet of Things (IoT utilizes algorithms to facilitate intelligent applications across cities in the form of smart-urban projects. As the majority of devices in IoT are battery operated, their applications should be facilitated with a low-power communication setup. Such facility is possible through the Low-Power Wide-Area Network (LPWAN, but at a constrained bit rate. For long-range communication over LPWAN, several approaches and protocols are adopted. One such protocol is the Long-Range Wide Area Network (LoRaWAN, which is a media access layer protocol for long-range communication between the devices and the application servers via LPWAN gateways. However, LoRaWAN comes with fewer security features as a much-secured protocol consumes more battery because of the exorbitant computational overheads. The standard protocol fails to support end-to-end security and perfect forward secrecy while being vulnerable to the replay attack that makes LoRaWAN limited in supporting applications where security (especially end-to-end security is important. Motivated by this, an enhanced LoRaWAN security protocol is proposed, which not only provides the basic functions of connectivity between the application server and the end device, but additionally averts these listed security issues. The proposed protocol is developed with two options, the Default Option (DO and the Security-Enhanced Option (SEO. The protocol is validated through Burrows–Abadi–Needham (BAN logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA tool. The proposed protocol is also analyzed for overheads through system-based and low-power device-based evaluations. Further, a case study on a smart factory-enabled parking system is considered for its practical application. The results, in terms of network latency with reliability fitting and signaling overheads, show paramount improvements and better performance for the proposed protocol compared with

  17. Security Injections 2.0: Increasing Engagement and Faculty Adoption Using Enhanced Secure Coding Modules for Lower-Level Programming Courses

    OpenAIRE

    Raina , Sagar; Taylor , Blair; Kaza , Siddharth

    2015-01-01

    Part 2: Software Security Education; International audience; Learning interventions based on modules are common in computer science education. Traditional learning modules that present a large amount of content in a linear format can lead to students skimming and skipping content resulting in lower student engagement and effectiveness. In this paper, we present theoretical support for increasing engagement and effectiveness of learning modules, describe a system that implements these principl...

  18. Influence of Culture and Language Sensitive Physics on Science Attitude Enhancement

    Science.gov (United States)

    Morales, Marie Paz E.

    2015-01-01

    The study critically explored how culture and language sensitive curriculum materials in physics improve Pangasinan learners' attitude towards science. Their cultural dimensions, epistemological beliefs, and views on integration of culture and language in the teaching and learning process determined their cultural preference or profile. Design and…

  19. Lignin depletion enhances the digestibility of cellulose in cultured xylem cells.

    Directory of Open Access Journals (Sweden)

    Catherine I Lacayo

    Full Text Available Plant lignocellulose constitutes an abundant and sustainable source of polysaccharides that can be converted into biofuels. However, the enzymatic digestion of native plant cell walls is inefficient, presenting a considerable barrier to cost-effective biofuel production. In addition to the insolubility of cellulose and hemicellulose, the tight association of lignin with these polysaccharides intensifies the problem of cell wall recalcitrance. To determine the extent to which lignin influences the enzymatic digestion of cellulose, specifically in secondary walls that contain the majority of cellulose and lignin in plants, we used a model system consisting of cultured xylem cells from Zinniaelegans. Rather than using purified cell wall substrates or plant tissue, we have applied this system to study cell wall degradation because it predominantly consists of homogeneous populations of single cells exhibiting large deposits of lignocellulose. We depleted lignin in these cells by treating with an oxidative chemical or by inhibiting lignin biosynthesis, and then examined the resulting cellulose digestibility and accessibility using a fluorescent cellulose-binding probe. Following cellulase digestion, we measured a significant decrease in relative cellulose content in lignin-depleted cells, whereas cells with intact lignin remained essentially unaltered. We also observed a significant increase in probe binding after lignin depletion, indicating that decreased lignin levels improve cellulose accessibility. These results indicate that lignin depletion considerably enhances the digestibility of cellulose in the cell wall by increasing the susceptibility of cellulose to enzymatic attack. Although other wall components are likely to contribute, our quantitative study exploits cultured Zinnia xylem cells to demonstrate the dominant influence of lignin on the enzymatic digestion of the cell wall. This system is simple enough for quantitative image analysis

  20. The Effectiveness of Local Culture-Based Mathematical Heuristic-KR Learning towards Enhancing Student's Creative Thinking Skill

    Science.gov (United States)

    Tandiseru, Selvi Rajuaty

    2015-01-01

    The problem in this research is the lack of creative thinking skills of students. One of the learning models that is expected to enhance student's creative thinking skill is the local culture-based mathematical heuristic-KR learning model (LC-BMHLM). Heuristic-KR is a learning model which was introduced by Krulik and Rudnick (1995) that is the…

  1. Analytical Methods for Energy Diversity and Security. Portfolio Optimization in the Energy Sector: A Tribute to the work of Dr. Shimon Awerbuch. Chapter 7. The role of wind generation in enhancing Scotland's energy diversity and security

    International Nuclear Information System (INIS)

    Jansen, J.C.; Beurskens, L.W.M.

    2008-11-01

    This volume aims at professionals in academia, industry and government interested in the rapidly evolving area at the nexus between energy and climate change policy. The cutting-edge international contributions allow for a wide coverage of the topic. Energy Diversity and Security focuses on the consideration of financial risk in the energy sector. It describes how tools borrowed from financial economic theory, in particular mean-variance portfolio theory, can provide insights on the costs and benefits of diversity, and thus inform investment decision making in conditions of uncertainty. It gives the reader an in-depth understanding of how to manage risk at a time when the world's focus is on this area. The book provides insights from leading authorities in the area of energy security. It gives readers abundant, rigorous analysis and guidance at a critical time in facing the twin challenges of energy security and climate change. The book also highlights the role of clean energy technology in moving towards future diverse and intelligent electricity systems. In this chapter attention is paid to the role of wind generation in enhancing Scotland's energy diversity and security

  2. Analytical Methods for Energy Diversity and Security. Portfolio Optimization in the Energy Sector: A Tribute to the work of Dr. Shimon Awerbuch. Chapter 7. The role of wind generation in enhancing Scotland's energy diversity and security

    Energy Technology Data Exchange (ETDEWEB)

    Jansen, J.C.; Beurskens, L.W.M.

    2008-11-15

    This volume aims at professionals in academia, industry and government interested in the rapidly evolving area at the nexus between energy and climate change policy. The cutting-edge international contributions allow for a wide coverage of the topic. Energy Diversity and Security focuses on the consideration of financial risk in the energy sector. It describes how tools borrowed from financial economic theory, in particular mean-variance portfolio theory, can provide insights on the costs and benefits of diversity, and thus inform investment decision making in conditions of uncertainty. It gives the reader an in-depth understanding of how to manage risk at a time when the world's focus is on this area. The book provides insights from leading authorities in the area of energy security. It gives readers abundant, rigorous analysis and guidance at a critical time in facing the twin challenges of energy security and climate change. The book also highlights the role of clean energy technology in moving towards future diverse and intelligent electricity systems. In this chapter attention is paid to the role of wind generation in enhancing Scotland's energy diversity and security.

  3. Security at the Expense of Liberty: A Test of Predictions Deriving from the Culture of Control Thesis

    Science.gov (United States)

    Pickett, Justin T.; Mears, Daniel P.; Stewart, Eric A.; Gertz, Marc

    2013-01-01

    In "The Culture of Control: Crime and Social Order in Contemporary Society," David Garland linked contemporary crime control policies and welfare reforms to a cultural formation that he termed the "crime complex of late modernity." According to Garland, once established, the crime complex exerts a contemporaneous effect on…

  4. The role of secure attachment, empathic self-efficacy, and stress perception in causal beliefs related to mental illness – a cross-cultural study: Italy versus Israel

    Directory of Open Access Journals (Sweden)

    Mannarini S

    2017-10-01

    Full Text Available Stefania Mannarini,1 Alisa Reikher,1 Sharon Shani,1 Inbal Shani-Zinovich2 1Department of Philosophy, Sociology, Education and Applied Psychology, Interdepartmental Center for Family Research, University of Padova, Padova, Italy; 2Department of Counseling and Human Development, Faculty of Education, University of Haifa, Mount Carmel, Haifa, Israel Background: Research suggests that “mental illness etiological beliefs” and attitudes toward mentally ill people are significantly related; it has also been demonstrated that adult attachment style and empathic self-efficacy affect such attitudes. Moreover, community or regional culture has a significant impact on etiology beliefs and attitudes toward the mentally sick. Materials and methods: We carried out this study in Italy and Israel among psychology students to compare two cultures in regards to causal beliefs of mental disorders and the roles that specific variables, such as secure attachment, empathic self-efficacy, and stress, play in etiological beliefs. The participants (N=305 were students who belonged to two universities: Padua (N=183 and Haifa (N=122. The Many Facet Rasch Model (MFRM was applied in a cross-cultural perspective to analyze the differential functioning of specific etiological beliefs in relation to the above mentioned variables; the effect of gender and religious beliefs was also entered in the MFRM. Results: The two cultures reacted differently to the biogenetic and psychosocial causal explanations of mental disorders: Israeli students endorsed the biogenetic causal beliefs model more frequently than the Italians. Among other findings, concerning the biogenetic model, the Italian students were predominantly males, who declared to be religious and reported lower levels of secure attachment than Israelis. On the other hand, the Israeli students who manifested a preference toward the biogenetic explanation were mostly females, who declared not to be religious and who

  5. Ethanol enhances GABA-induced 36Cl-influx in primary spinal cord cultured neurons

    International Nuclear Information System (INIS)

    Ticku, M.K.; Lowrimore, P.; Lehoullier, P.

    1986-01-01

    Ethanol has a pharmacological profile similar to other centrally acting drugs, which facilitate GABAergic transmission. GABA is known to produce its effects by increasing the conductance to Cl- ions. In this study, we have examined the effect of ethanol on GABA-induced 36Cl-influx in primary spinal cord cultured neurons. GABA produces a concentration-dependent, and saturable effect on 36Cl-influx in these neurons. Ethanol potentiates the effect of GABA on 36Cl-influx in these neurons. GABA (20 microM) increased the 36Cl-influx by 75% over the basal value, and in the presence of 50 mM ethanol, the observed increase was 142%. Eadie-Hoffstee analysis of the saturation curves indicated that ethanol decreases the Km value of GABA (10.6 microM to 4.2 microM), and also increases the Vmax. Besides potentiating the effect of GABA, ethanol also appears to have a direct effect in the absence of added GABA. These results suggest that ethanol enhances GABA-induced 36Cl-influx and indicate a role of GABAergic system in the actions of ethanol. These results also support the behavioral and electrophysiological studies, which have implicated GABA systems in the actions of ethanol. The potential mechanism(s) and the role of direct effect of ethanol is not clear at this time, but is currently being investigated

  6. Enhancement of Human Prolactin Synthesis by Sodium Butyrate Addition to Serum-Free CHO Cell Culture

    Directory of Open Access Journals (Sweden)

    Herbert Rodrigues Goulart

    2010-01-01

    Full Text Available Sodium butyrate (NaBu has been used as a productivity enhancer for the synthesis of recombinant proteins in Chinese hamster ovary (CHO cells. Thus, the influence of NaBu on the production of recombinant human prolactin (hPRL from CHO cells was investigated for the first time. CHO cell cultures were submitted to a treatment with different concentrations of NaBu (0.25 to 4 mM. Quantitative and qualitative analyses by reverse-phase high-performance liquid chromatography (RP-HPLC and Western blot or SDS-PAGE, carried out directly on CHO-conditioned medium, showed that the highest hPRL expression was obtained with 1 mM NaBu. In vitro biological assays based on noble rat lymphoma (Nb2 and mouse pro-B lymphoma (Ba/F3-LLP cells were carried out on purified hPRL. Its bioactivity in the presence of NaBu was not apparently different from that of the First International Reference Reagent of recombinant hPRL (WHO 97/714. Our results show that NaBu increased the synthesis of recombinant hPRL in CHO cells, apparently without compromising either its structure or function.

  7. Optimization of culture media for enhancing gamma-linolenic acid production by Mucor hiemalis

    Directory of Open Access Journals (Sweden)

    Mina Mohammadi Nasr

    2016-03-01

    Full Text Available Introduction: g-linolenic acid is an essential fatty acid in human nutrition. In the present study, production of g-linolenic acid by Mucor hiemalis PTCC 5292 was evaluated in submerged fermentation. Materials and methods: The fermentation variables were chosen according to the fractional factorial design and further optimized via full factorial method. Four significant variables, glucose, peptone, ammonium nitrate and pH were selected for the optimization studies. The design consisted of total 16 runs consisting of runs at two levels for each factor with three replications of the center points. Results: The analysis of variance and three-dimensional response surface plot of effects indicated that variables were regarded to be significant for production of g-linolenic acid by Mucor hiemalis. Results indicated that fermentation at the optimum conditions (100 g/l glucose concentration; 1 g/l peptone; 1 g/l ammonium nitrate, and pH of 4.5 enhanced the g-linolenic acid production up to 709 mg/l. Discussion and conclusion: The results of this study indicated that higher g-linolenic acid yield can be achieved in a simple medium at high glucose and ammonium nitrate, low peptone concentrations and acidic pH by Mucor hiemalis PTCC 5292. This simple and low cost optimization condition of culture media can be applied for g-linolenic acid production at higher scale for pharmaceutical and nutritional industries. 

  8. Enhanced barrier functions and anti-inflammatory effect of cultured coconut extract on human skin.

    Science.gov (United States)

    Kim, Soomin; Jang, Ji Eun; Kim, Jihee; Lee, Young In; Lee, Dong Won; Song, Seung Yong; Lee, Ju Hee

    2017-08-01

    Natural plant oils have been used as a translational alternative to modern medicine. Particularly, virgin coconut oil (VCO) has gained popularity because of its potential benefits in pharmaceutical, nutritional, and cosmetic applications. Cultured coconut extract (CCE) is an alternative end product of VCO, which undergoes a further bacterial fermentation process. This study aimed to investigate the effects of CCE on human skin. We analyzed the expression of skin barrier molecules and collagens after applying CCE on human explanted skin. To evaluate the anti-inflammatory properties of CCE, the expression of inflammatory markers was analyzed after ultraviolet B (UVB) irradiation. The CCE-treated group showed increased expression of cornified cell envelope components, which contribute to protective barrier functions of the stratum corneum. Further, the expression of inflammatory markers was lower in the CCE-treated group after exposure to UVB radiation. These results suggest an anti-inflammatory effect of CCE against UVB irradiation-induced inflammation. Additionally, the CCE-treated group showed increased collagen and hyaluronan synthase-3 expression. In our study, CCE showed a barrier-enhancing effect and anti-inflammatory properties against ex vivo UVB irradiation-induced inflammation. The promising effect of CCE may be attributed to its high levels of polyphenols and fatty acid components. Copyright © 2017 Elsevier Ltd. All rights reserved.

  9. Culturing on decellularized extracellular matrix enhances antioxidant properties of human umbilical cord-derived mesenchymal stem cells

    International Nuclear Information System (INIS)

    Liu, Xiaozhen; Zhou, Long; Chen, Xi; Liu, Tao; Pan, Guoqing; Cui, Wenguo; Li, Mao; Luo, Zong-Ping; Pei, Ming; Yang, Huilin; Gong, Yihong; He, Fan

    2016-01-01

    Human umbilical cord-derived mesenchymal stem cells (UC-MSCs) have attracted great interest in clinical application because of their regenerative potential and their lack of ethical issues. Our previous studies showed that decellularized cell-deposited extracellular matrix (ECM) provided an in vivo-mimicking microenvironment for MSCs and facilitated in vitro cell expansion. This study was conducted to analyze the cellular response of UC-MSCs when culturing on the ECM, including reactive oxygen species (ROS), intracellular antioxidative enzymes, and the resistance to exogenous oxidative stress. After decellularization, the architecture of cell-deposited ECM was characterized as nanofibrous, collagen fibrils and the matrix components were identified as type I and III collagens, fibronectin, and laminin. Compared to tissue culture polystyrene (TCPS) plates, culturing on ECM yielded a 2-fold increase of UC-MSC proliferation and improved the percentage of cells in the S phase by 2.4-fold. The levels of intracellular ROS and hydrogen peroxide (H_2O_2) in ECM-cultured cells were reduced by 41.7% and 82.9%, respectively. More importantly, ECM-cultured UC-MSCs showed enhanced expression and activity of intracellular antioxidative enzymes such as superoxide dismutase and catalase, up-regulated expression of silent information regulator type 1, and suppressed phosphorylation of p38 mitogen-activated protein kinase. Furthermore, a continuous treatment with exogenous 100 μM H_2O_2 dramatically inhibited osteogenic differentiation of UC-MSCs cultured on TCPS, but culturing on ECM retained the differentiation capacity for matrix mineralization and osteoblast-specific marker gene expression. Collectively, by providing sufficient cell amounts and enhancing antioxidant capacity, decellularized ECM can be a promising cell culture platform for in vitro expansion of UC-MSCs. - Highlights: • Decellularization preserved the architecture and components of cell-deposited ECM.

  10. Culturing on decellularized extracellular matrix enhances antioxidant properties of human umbilical cord-derived mesenchymal stem cells

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Xiaozhen [School of Engineering, Sun Yat-sen University, Guangzhou 510006 (China); Zhou, Long; Chen, Xi [Orthopaedic Institute, Soochow University, Suzhou 215007 (China); Department of Orthopaedics, The First Affiliated Hospital of Soochow University, Suzhou 215006 (China); Liu, Tao [Department of Orthopaedics, The First Affiliated Hospital of Soochow University, Suzhou 215006 (China); Pan, Guoqing; Cui, Wenguo; Li, Mao; Luo, Zong-Ping [Orthopaedic Institute, Soochow University, Suzhou 215007 (China); Department of Orthopaedics, The First Affiliated Hospital of Soochow University, Suzhou 215006 (China); Pei, Ming [Stem Cell and Tissue Engineering Laboratory, Department of Orthopaedics, West Virginia University, Morgantown, WV 26506 (United States); Yang, Huilin [Orthopaedic Institute, Soochow University, Suzhou 215007 (China); Department of Orthopaedics, The First Affiliated Hospital of Soochow University, Suzhou 215006 (China); Gong, Yihong, E-mail: gongyih@mail.sysu.edu.cn [School of Engineering, Sun Yat-sen University, Guangzhou 510006 (China); He, Fan, E-mail: fanhe@suda.edu.cn [Orthopaedic Institute, Soochow University, Suzhou 215007 (China); Department of Orthopaedics, The First Affiliated Hospital of Soochow University, Suzhou 215006 (China)

    2016-04-01

    Human umbilical cord-derived mesenchymal stem cells (UC-MSCs) have attracted great interest in clinical application because of their regenerative potential and their lack of ethical issues. Our previous studies showed that decellularized cell-deposited extracellular matrix (ECM) provided an in vivo-mimicking microenvironment for MSCs and facilitated in vitro cell expansion. This study was conducted to analyze the cellular response of UC-MSCs when culturing on the ECM, including reactive oxygen species (ROS), intracellular antioxidative enzymes, and the resistance to exogenous oxidative stress. After decellularization, the architecture of cell-deposited ECM was characterized as nanofibrous, collagen fibrils and the matrix components were identified as type I and III collagens, fibronectin, and laminin. Compared to tissue culture polystyrene (TCPS) plates, culturing on ECM yielded a 2-fold increase of UC-MSC proliferation and improved the percentage of cells in the S phase by 2.4-fold. The levels of intracellular ROS and hydrogen peroxide (H{sub 2}O{sub 2}) in ECM-cultured cells were reduced by 41.7% and 82.9%, respectively. More importantly, ECM-cultured UC-MSCs showed enhanced expression and activity of intracellular antioxidative enzymes such as superoxide dismutase and catalase, up-regulated expression of silent information regulator type 1, and suppressed phosphorylation of p38 mitogen-activated protein kinase. Furthermore, a continuous treatment with exogenous 100 μM H{sub 2}O{sub 2} dramatically inhibited osteogenic differentiation of UC-MSCs cultured on TCPS, but culturing on ECM retained the differentiation capacity for matrix mineralization and osteoblast-specific marker gene expression. Collectively, by providing sufficient cell amounts and enhancing antioxidant capacity, decellularized ECM can be a promising cell culture platform for in vitro expansion of UC-MSCs. - Highlights: • Decellularization preserved the architecture and components of cell

  11. Securing the Future of Cultural Heritage by Identifying Barriers to and Strategizing Solutions for Preservation under Changing Climate Conditions

    Directory of Open Access Journals (Sweden)

    Sandra Fatorić

    2017-11-01

    Full Text Available Climate change challenges cultural heritage management and preservation. Understanding the barriers that can impede preservation is of paramount importance, as is developing solutions that facilitate the planning and management of vulnerable cultural resources. Using online survey research, we elicited the opinions of diverse experts across southeastern United States, a region with cultural resources that are particularly vulnerable to flooding and erosion from storms and sea level rise. We asked experts to identify the greatest challenges facing cultural heritage policy and practice from coastal climate change threats, and to identify strategies and information needs to overcome those challenges. Using content analysis, we identified institutional, technical and financial barriers and needs. Findings revealed that the most salient barriers included the lack of processes and preservation guidelines for planning and implementing climate adaptation actions, as well as inadequate funding and limited knowledge about the intersection of climate change and cultural heritage. Experts perceived that principal needs to overcome identified barriers included increased research on climate adaptation strategies and impacts to cultural heritage characteristics from adaptation, as well as collaboration among diverse multi-level actors. This study can be used to set cultural heritage policy and research agendas at local, state, regional and national scales.

  12. Enhancement of recovery of Neisseria meningitidis by gelatin in blood culture media.

    OpenAIRE

    Pai, C H; Sorger, S

    1981-01-01

    The efficacy of gelatin for the recovery of Neisseria meningitidis from blood cultures was evaluated in a clinical setting. The organism was isolated from seven patients with meningococcal infections in blood culture media containing 1% gelatin. In contrast, only two blood cultures from these patients were positive in media without gelatin (P less than 0.05). Gelatin did not influence the recovery of other organisms isolated during this study. Conventional blood culture media may be supplemen...

  13. Enhanced Production of Anthraquinones and Phenolic Compounds and Biological Activities in the Cell Suspension Cultures of Polygonum multiflorum

    Directory of Open Access Journals (Sweden)

    Muthu Thiruvengadam

    2016-11-01

    Full Text Available Anthraquinones (AQs and phenolic compounds are important phytochemicals that are biosynthesized in cell suspension cultures of Polygonum multiflorum. We wanted to optimize the effects of plant growth regulators (PGRs, media, sucrose, l-glutamine, jasmonic acid (JA, and salicylic acid (SA for the production of phytochemicals and biomass accumulation in a cell suspension culture of P. multiflorum. The medium containing Murashige and Skoog (MS salts and 4% sucrose supplemented with 1 mg/L 2,4-dichlorophenoxyacetic acid, 0.5 mg/L thidiazuron, and 100 µM l-glutamine at 28 days of cell suspension culture was suitable for biomass accumulation and AQ production. Maximum biomass accumulation (12.5 and 12.35 g fresh mass (FM; 3 and 2.93 g dry mass (DM and AQ production (emodin 295.20 and 282 mg/g DM; physcion 421.55 and 410.25 mg/g DM were observed using 100 µM JA and SA, respectively. JA- and SA-elicited cell cultures showed several-fold higher biomass accumulation and AQ production than the control cell cultures. Furthermore, the cell suspension cultures effectively produced 23 phenolic compounds, such as flavonols and hydroxycinnamic and hydroxybenzoic acid derivatives. PGR-, JA-, and SA-elicited cell cultures produced a higher amount of AQs and phenolic compounds. Because of these metabolic changes, the antioxidant, antimicrobial, and anticancer activities were high in the PGR-, JA-, and SA-elicited cell cultures. The results showed that the elicitors (JA and SA induced the enhancement of biomass accumulation and phytochemical (AQs and phenolic compounds production as well as biological activities in the cell suspension cultures of P. multiflorum. This optimized protocol can be developed for large-scale biomass accumulation and production of phytochemicals (AQs and phenolic compounds from cell suspension cultures, and the phytochemicals can be used for various biological activities.

  14. Enhanced Production of Anthraquinones and Phenolic Compounds and Biological Activities in the Cell Suspension Cultures of Polygonum multiflorum

    Science.gov (United States)

    Thiruvengadam, Muthu; Rekha, Kaliyaperumal; Rajakumar, Govindasamy; Lee, Taek-Jun; Kim, Seung-Hyun; Chung, Ill-Min

    2016-01-01

    Anthraquinones (AQs) and phenolic compounds are important phytochemicals that are biosynthesized in cell suspension cultures of Polygonum multiflorum. We wanted to optimize the effects of plant growth regulators (PGRs), media, sucrose, l-glutamine, jasmonic acid (JA), and salicylic acid (SA) for the production of phytochemicals and biomass accumulation in a cell suspension culture of P. multiflorum. The medium containing Murashige and Skoog (MS) salts and 4% sucrose supplemented with 1 mg/L 2,4-dichlorophenoxyacetic acid, 0.5 mg/L thidiazuron, and 100 µM l-glutamine at 28 days of cell suspension culture was suitable for biomass accumulation and AQ production. Maximum biomass accumulation (12.5 and 12.35 g fresh mass (FM); 3 and 2.93 g dry mass (DM)) and AQ production (emodin 295.20 and 282 mg/g DM; physcion 421.55 and 410.25 mg/g DM) were observed using 100 µM JA and SA, respectively. JA- and SA-elicited cell cultures showed several-fold higher biomass accumulation and AQ production than the control cell cultures. Furthermore, the cell suspension cultures effectively produced 23 phenolic compounds, such as flavonols and hydroxycinnamic and hydroxybenzoic acid derivatives. PGR-, JA-, and SA-elicited cell cultures produced a higher amount of AQs and phenolic compounds. Because of these metabolic changes, the antioxidant, antimicrobial, and anticancer activities were high in the PGR-, JA-, and SA-elicited cell cultures. The results showed that the elicitors (JA and SA) induced the enhancement of biomass accumulation and phytochemical (AQs and phenolic compounds) production as well as biological activities in the cell suspension cultures of P. multiflorum. This optimized protocol can be developed for large-scale biomass accumulation and production of phytochemicals (AQs and phenolic compounds) from cell suspension cultures, and the phytochemicals can be used for various biological activities. PMID:27854330

  15. Enhancing Promotion, Tenure and Beyond: Faculty Socialization as a Cultural Process. ERIC Digest.

    Science.gov (United States)

    Tierney, William G.; Rhoads, Robert A.

    This digest is a brief summary of a longer monograph of the same title on the importance of understanding faculty socialization as a cultural process in the context of the current changes urged on higher education. A section on how faculty socialization is conceptualized adopts a view of culture in which culture shapes and is shaped by social…

  16. Long-term culture of sponge explants: conditions enhancing survival and growth, and assessment of bioactivity

    NARCIS (Netherlands)

    Caralt, de S.; Agell, G.; Uriz, M.J.

    2003-01-01

    Sponges are an important source of secondary metabolites with pharmaceutical interest. This is the main reason for the increasing interest of sponge culture recent years. The optimal culture system depends on the species to be cultured: while some species easily produce sponge aggregates after

  17. Direct Conversion of Equine Adipose-Derived Stem Cells into Induced Neuronal Cells Is Enhanced in Three-Dimensional Culture.

    Science.gov (United States)

    Petersen, Gayle F; Hilbert, Bryan J; Trope, Gareth D; Kalle, Wouter H J; Strappe, Padraig M

    2015-12-01

    The ability to culture neurons from horses may allow further investigation into equine neurological disorders. In this study, we demonstrate the generation of induced neuronal cells from equine adipose-derived stem cells (EADSCs) using a combination of lentiviral vector expression of the neuronal transcription factors Brn2, Ascl1, Myt1l (BAM) and NeuroD1 and a defined chemical induction medium, with βIII-tubulin-positive induced neuronal cells displaying a distinct neuronal morphology of rounded and compact cell bodies, extensive neurite outgrowth, and branching of processes. Furthermore, we investigated the effects of dimensionality on neuronal transdifferentiation, comparing conventional two-dimensional (2D) monolayer culture against three-dimensional (3D) culture on a porous polystyrene scaffold. Neuronal transdifferentiation was enhanced in 3D culture, with evenly distributed cells located on the surface and throughout the scaffold. Transdifferentiation efficiency was increased in 3D culture, with an increase in mean percent conversion of more than 100% compared to 2D culture. Additionally, induced neuronal cells were shown to transit through a Nestin-positive precursor state, with MAP2 and Synapsin 2 expression significantly increased in 3D culture. These findings will help to increase our understanding of equine neuropathogenesis, with prospective roles in disease modeling, drug screening, and cellular replacement for treatment of equine neurological disorders.

  18. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  19. Enhancing Brand Image through Events and Cultural Festivals: the Perspective of the Stresa Festival’s Visitors

    Directory of Open Access Journals (Sweden)

    Elisa Piva

    2017-06-01

    Full Text Available Cultural events have become a significant component within the strategies of destination branding of a place. Territories are increasingly using events and cultural festivals to enhance their image and boost tourism development. Many destinations worldwide have built events portfolios as a strategic initiative to attract visitors and to develop their own brand. A destination brand represents a dynamic interaction between the destination’s core assets and the way in which potential visitors perceive them. Thus, the visitor perspective is considered as fundamental in triggering processes of destination branding. This paper investigates how the visitors assess the impact of cultural events and festivals in enhancing the image of a tourist destination. The Stresa Festival (Stresa, Lake Maggiore, Italy has been selected as a case study. Stresa Festival is undoubtedly one of the best-known European classical music festivals that every year offers performances by internationally famous artists to its audiences. Structured questionnaires have been used as the methodology to carry out the research. Online questionnaires have been handed out to residents and non-resident visitors to the Stresa Festival to extract the opinions and experience from the public on the image effects of this festival. Findings reveal that there is a positive relationship between this cultural event and the enhancement of the city image and its territory.

  20. Liquid culture enhances diagnosis of patients with milder forms of non-tuberculous mycobacterial lung disease.

    Science.gov (United States)

    Lee, H; Han, J-H; Park, H Y; Jeon, K; Huh, H J; Ki, C-S; Lee, N Y; Koh, W-J

    2017-03-01

    To evaluate the proportion and clinical characteristics of patients with non-tuberculous mycobacteria (NTM) lung disease diagnosed based on positive culture results in liquid medium only. We reviewed the medical records of 978 patients diagnosed with NTM lung disease. All clinical samples were cultured in both solid and liquid media. Of the 978 patients, 111 (11.3%) were culture-positive in liquid medium only (liquid culture group), and 867 (88.7%) (solid culture group) on solid medium, regardless of the culture results in liquid medium. At the time of diagnosis, the liquid culture group was less likely than the solid culture group to have haemoptysis (11.7% vs. 20.0%, P = 0.04), positive sputum smear for acid-fast bacilli (14.4% vs. 50.2%, P disease (3.6% vs. 14.6%, P = 0.001). During the median follow-up period of 28.9 months (interquartile range 19.1-41.6), the proportion of patients requiring antibiotic treatment was lower in the liquid culture group than in the solid culture group (44.1% vs. 61.6%, P culture is helpful in the diagnosis of patients with less severe forms of NTM lung disease.

  1. The potential of chitosan in enhancing peptide and protein absorption across the TR146 cell culture model-an in vitro model of the buccal epithelium

    DEFF Research Database (Denmark)

    Portero, Ana; Remuñán-López, Carmen; Nielsen, Hanne Mørck

    2002-01-01

    To investigate the potential of chitosan (CS) to enhance buccal peptide and protein absorption, the TR146 cell culture model, a model of the buccal epithelium, was used.......To investigate the potential of chitosan (CS) to enhance buccal peptide and protein absorption, the TR146 cell culture model, a model of the buccal epithelium, was used....

  2. U.V.-enhanced reactivation of u.v.-irradiated herpes virus by primary cultures of rat hepatocytes

    International Nuclear Information System (INIS)

    Zurlo, J.; Yager, J.D.

    1984-01-01

    Carcinogen treatment of cultured mammalian cells prior to infection with u.v.-irradiated virus results in enhanced virus survival and mutagenesis suggesting the induction of SOS-type processes. In this paper, we report the development of a primary rat hepatocyte culture system to investigate cellular responses to DNA damage which may be relevant to hepatocarcinogenesis in vivo. We have obtained data demonstrating that enhanced reactivation of u.v.-irradiated Herpes simplex virus type 1 (HSV-1) occurs in hepatocytes irradiated with u.v. Cultured hepatocytes were pretreated with u.v. at the time of enhanced DNA synthesis. These treatments caused an inhibition followed by a recovery of DNA synthesis. At various times after pretreatment, the hepatocytes were infected with control or u.v.-irradiated HSV-1 at low multiplicity, and virus survival was measured by direct plaque assay. U.v.-irradiated HSV-1 exhibited the expected two-component survival curve in control or u.v. pretreated hepatocytes. The magnitude of enhanced reactivation of HSV-1 was dependent on the u.v. dose to the hepatocytes, the time of infection following u.v. pretreatment, and the level of DNA synthesis at the time of pretreatment. These results suggest that u.v. treatment of rat hepatocytes causes the induction of SOS-type functions that may have a role in the initiation of hepatocarcinogenesis

  3. Software Assurance in Acquisition: Mitigating Risks to the Enterprise. A Reference Guide for Security-Enhanced Software Acquisition and Outsourcing

    Science.gov (United States)

    2009-02-01

    Monitoring ISO /IEC 12207 2008(E) IEEE 1062 1998 PMBOK 3.0 Initiating Closing 3. Monitoring & Controlling 1. Planning 2. Executing Follow-on...software life cycles [ ISO /IEC 15026]. Software assurance is a key element of national security and homeland security. It is critical because dramatic...they are met. This may also include a plan for testing that SwA requirements are met. The [NDIA] and [ ISO /IEC 15026] provide details on structure and

  4. BOF4WSS : a business-oriented framework for enhancing web services security for e-business

    OpenAIRE

    Nurse, Jason R. C.; Sinclair, Jane

    2009-01-01

    When considering Web services' (WS) use for online business-to-business (B2B) collaboration between companies, security is a complicated and very topical issue. This is especially true with regard to reaching a level of security beyond the technological layer, that is supported and trusted by all businesses involved. With appreciation of this fact, our research draws from established development methodologies to develop a new, business-oriented framework (BOF4WSS) to guide e-businesses in def...

  5. Enhanced glucose metabolism in cultured human skeletal muscle after Roux-en-Y gastric bypass surgery.

    Science.gov (United States)

    Nascimento, Emmani B M; Riedl, Isabelle; Jiang, Lake Qunfeng; Kulkarni, Sameer S; Näslund, Erik; Krook, Anna

    2015-01-01

    Roux-en-Y gastric bypass (RYGB) surgery rapidly increases whole body insulin sensitivity, with changes in several organs including skeletal muscle. Objectives were to determine whether improvements in insulin action in skeletal muscle may occur directly at the level of the myocyte or secondarily from changes in systemic factors associated with weight loss. Myotubes were derived before and after RYGB surgery. The setting was Karolinska University Hospital and Karolinska Institutet, Stockholm, Sweden. Eight patients (body mass index (BMI) 41.8 kg/m(2); age 41 yr) underwent RYGB surgery. Before and 6 months after RYGB surgery, skeletal muscle biopsies were collected from vastus lateralis muscle. Satellite cells derived from skeletal muscle biopsies were propagated in vitro as myoblasts and differentiated into myotubes. Expression of myogenic markers is increased in myoblasts derived from biopsies taken 6 months after bypass surgery, compared with their respective presurgery condition. Furthermore, glycogen synthesis, tyrosine phosphorylation of insulin receptor (IRS)-1-Tyr612 and Interleukin (IL)-8 secretion were increased, while fatty acid oxidation and circulating IL8 levels remain unaltered. Myotubes derived from muscle biopsies obtained after RYGB surgery displayed increased insulin-stimulated phosphorylation of protein kinase B (PKB)-Thr308 and proline-rich Akt substrate of 40 kDa (PRAS40)-Thr246. RYGB surgery is accompanied by enhanced glucose metabolism and insulin signaling, altered IL8 secretion and changes in mRNA levels and myogenic markers in cultured skeletal muscle cells. Thus, RYGB surgery involves intrinsic reprogramming of skeletal muscle to increase peripheral insulin sensitivity and glucose metabolism. Copyright © 2015 American Society for Bariatric Surgery. Published by Elsevier Inc. All rights reserved.

  6. Oxygen enhancement ratio as a function of neutron energy with mammalian cells in culture

    International Nuclear Information System (INIS)

    Rini, F.J.; Hall, E.J.; Marino, S.A.

    1979-01-01

    Chinese hamster cells (V79) in culture under oxic and hypoxic conditions were irradiated with several neutron beams spanning a wide energy range to determine the oxygen enhancement ratio (OER). Eight essentially monoenergetic neutron beams, ranging from 0.22 to 13.6 MeV and a 0.11-MeV neutron spectrum, were produced at the Radiological Research Accelerator Facility (RARAF) at Brookhaven National Laboratory. Additional experiments were performed at the Naval Research Laboratory, Washington, DC, where neutrons are produced for radiotherapy by bombarding a beryllium target with 35-MeV deuterons. This beam has a broad energy spectrum with a mean energy of about 15 MeV. A maximum OER of about 1.9 was observed for 13.6-MeV neutrons. The OER values of the monoenergetic neutrons decreased with energy, plateaued at about 1.45 for the energy range from 0.22 to 2.0 MeV and increased slightly to about 1.55 for lower energy spectrum. In the light of microdosimetric data obtained for the neutron beams at RARAF, the OER appears to depend primarily on the intermediate-LET secondaries produced by neutrons in tissue, such as protons, while in contrast high LET-secondaries, such as α-particles and recoil ions, play a minor role. The studies using the NRL neutron beam resulted in a lower OER of about 1.67 as compared to the monoenergetic 13.6-MeV beam. This is a consequence of the fact that more of the dose is deposited by intermediate LET secondaries for the NRL neutron beam

  7. Study on examples of safety culture enhancing activities at U.S. Nuclear Power Stations

    International Nuclear Information System (INIS)

    Ichiki, Kuniyasu

    2010-01-01

    After the wake of the incident of reactor vessel head degradation at Davis Basse in 2002, the NRC, the regulatory body in the U.S., included extraction of safety culture (SC) related elements from every failure into its inspection scheme of Reactor Oversight Process, since July 2006. The idea of SC itself was established some time ago, though, there are very few similar examples of such evaluation so far. This study is an attempt of making analyses on various activities with regard to SC in the U.S., to gain useful knowledge for considering the way to improve station's SC in Japan. Despite the fact that the numbers of inspection findings at stations are generally seen as unchanged, it is obvious that there are substantial difference in the number of the NRC's findings by each station. This appears to show that the condition of SC may largely different by stations. At several stations which accepted our investigation, those staff have made serious efforts to correct their area for improvements which were pointed out by the NRC. Such examples include improving management of their Corrective Action Program and establishing various measures to enable transmitting employee's concerns. It is thought that such activities aim to achieve efficient transfer of vital information among the station. This kind of activities should help every station solve various deficiencies in equipment, and also remove any obstacles in its communication. Their effort seem to result in not only the decrease in number of trouble but also much enhancement of mutual trust among the station, which would contribute to the great advance in their SC. (author)

  8. Membrane culture and reduced oxygen tension enhances cartilage matrix formation from equine cord blood mesenchymal stromal cells in vitro.

    Science.gov (United States)

    Co, C; Vickaryous, M K; Koch, T G

    2014-03-01

    Ongoing research is aimed at increasing cartilage tissue yield and quality from multipotent mesenchymal stromal cells (MSC) for the purpose of treating cartilage damage in horses. Low oxygen culture has been shown to enhance chondrogenesis, and novel membrane culture has been proposed to increase tissue yield and homogeneity. The objective of this study was to evaluate and compare the effect of reduced oxygen and membrane culture during in vitro chondrogenesis of equine cord blood (CB) MSC. CB-MSC (n = 5 foals) were expanded at 21% oxygen prior to 3-week differentiation in membrane or pellet culture at 5% and 21% oxygen. Assessment included histological examination (H&E, toluidine Blue, immunohistochemistry (IHC) for collagen type I and II), protein quantification by hydroxyproline assay and dimethylmethylene assay, and mRNA analysis for collagen IA1, collagen IIA1, collagen XA1, HIF1α and Sox9. Among treatment groups, 5% membrane culture produced neocartilage most closely resembling hyaline cartilage. Membrane culture resulted in increased wet mass, homogenous matrix morphology and an increase in total collagen content, while 5% oxygen culture resulted in higher GAG and type II collagen content. No significant differences were observed for mRNA analysis. Membrane culture at 5% oxygen produces a comparatively larger amount of higher quality neocartilage. Matrix homogeneity is attributed to a uniform diffusion gradient and reduced surface tension. Membrane culture holds promise for scale-up for therapeutic purposes, for cellular preconditioning prior to cytotherapeutic applications, and for modeling system for gas-dependent chondrogenic differentiation studies. Crown Copyright © 2014. Published by Elsevier Ltd. All rights reserved.

  9. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  10. Sucrose-enhanced biosynthesis of medicinally important antioxidant secondary metabolites in cell suspension cultures of Artemisia absinthium L.

    Science.gov (United States)

    Ali, Mohammad; Abbasi, Bilal Haider; Ahmad, Nisar; Ali, Syed Shujait; Ali, Shahid; Ali, Gul Shad

    2016-12-01

    Natural products are gaining tremendous importance in pharmaceutical industry and attention has been focused on the applications of in vitro technologies to enhance yield and productivity of such products. In this study, we investigated the accumulation of biomass and antioxidant secondary metabolites in response to different carbohydrate sources (sucrose, maltose, fructose and glucose) and sucrose concentrations (1, 3, 5, 7 and 9 %). Moreover, the effects of 3 % repeated sucrose feeding (day-12, -18 and -24) were also investigated. The results showed the superiority of disaccharides over monosaccharides for maximum biomass and secondary metabolites accumulation. Comparable profiles for maximum biomass were observed in response to sucrose and maltose and initial sucrose concentrations of 3 and 5 %. Maximum total phenolic and total flavonoid contents were displayed by cultures treated with sucrose and maltose; however, initial sucrose concentrations of 5 and 7 % were optimum for both classes of metabolites, respectively. Following 3 % extra sucrose feeding, cultures fed on day-24 (late-log phase) showed higher biomass, total phenolic and total flavonoid contents as compared to control cultures. Highest antioxidant activity was exhibited by maltose-treated cultures. Moreover, sucrose-treated cultures displayed positive correlation of antioxidant activity with total phenolics and total flavonoids production. This work describes the stimulatory role of disaccharides and sucrose feeding strategy for higher accumulation of phenolics and flavonoids, which could be potentially scaled up to bioreactor level for the bulk production of these metabolites in suspension cultures of A. absinthium.

  11. Single-walled carbon nanotubes: a nano-specific enhancer of cellular growth in LB culture

    International Nuclear Information System (INIS)

    Zhao Jinming; Yang Xiafeng; Zhao Yun; Huang Qing; Li Jiang; Lu Min

    2012-01-01

    We conducted a study to characterize the antimicrobial properties of SWNTs to B.subtilis in a saline solution or in a LB culture. Dimensions and the antibacterial ability of SWNTs in a saline solution were different from those in a LB culture. Transmission and scanning electron microscopes were used to characterize the SWNTs structure with and without LB culture. The antibacterial ability of SWNTs was affected by the environment of bacterial growth. The antibacterial mechanism of SWNTs was studied,too. (authors)

  12. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  13. cultural

    Directory of Open Access Journals (Sweden)

    Irene Kreutz

    2006-01-01

    Full Text Available Es un estudio cualitativo que adoptó como referencial teorico-motodológico la antropología y la etnografía. Presenta las experiencias vivenciadas por mujeres de una comunidad en el proceso salud-enfermedad, con el objetivo de comprender los determinantes sócio-culturales e históricos de las prácticas de prevención y tratamiento adoptados por el grupo cultural por medio de la entrevista semi-estructurada. Los temas que emergieron fueron: la relación entre la alimentación y lo proceso salud-enfermedad, las relaciones con el sistema de salud oficial y el proceso salud-enfermedad y lo sobrenatural. Los dados revelaron que los moradores de la comunidad investigada tienen un modo particular de explicar sus procedimientos terapéuticos. Consideramos que es papel de los profesionales de la salud en sus prácticas, la adopción de abordajes o enfoques que consideren al individuo en su dimensión sócio-cultural e histórica, considerando la enorme diversidad cultural en nuestro país.

  14. SAHA-induced TRAIL-sensitisation of Multiple Myeloma cells is enhanced in 3D cell culture.

    Science.gov (United States)

    Arhoma, A; Chantry, A D; Haywood-Small, S L; Cross, N A

    2017-11-15

    Multiple Myeloma (MM) is currently incurable despite many novel therapies. Tumour Necrosis Factor-Related Apoptosis-Inducing Ligand (TRAIL) is a potential anti-tumour agent although effects as a single agent are limited. In this study, we investigated whether the Histone Deacetylase (HDAC) inhibitor SAHA can enhance TRAIL-induced apoptosis and target TRAIL resistance in both suspension culture, and 3D cell culture as a model of disseminated MM lesions that form in bone. The effects of SAHA and/or TRAIL in 6 Multiple Myeloma cell lines were assessed in both suspension cultures and in an Alginate-based 3D cell culture model. The effect of SAHA and/or TRAIL was assessed on apoptosis by assessment of nuclear morphology using Hoechst 33342/Propidium Iodide staining. Viable cell number was assessed by CellTiter-Glo luminescence assay, Caspase-8 and -9 activities were measured by Caspase-Glo™ assay kit. TRAIL-resistant cells were generated by culture of RPMI 8226 and NCI-H929 by acute exposure to TRAIL followed by selection of TRAIL-resistant cells. TRAIL significantly induced apoptosis in a dose-dependent manner in OPM-2, RPMI 8226, NCI-H929, U266, JJN-3 MM cell lines and ADC-1 plasma cell leukaemia cells. SAHA amplified TRAIL responses in all lines except OPM-2, and enhanced TRAIL responses were both via Caspase-8 and -9. SAHA treatment induced growth inhibition that further increased in the combination treatment with TRAIL in MM cells. The co-treatment of TRAIL and SAHA reduced viable cell numbers all cell lines. TRAIL responses were further potentiated by SAHA in 3D cell culture in NCI-H929, RPMI 8226 and U266 at lower TRAIL + SAHA doses than in suspension culture. However TRAIL responses in cells that had been selected for TRAIL resistance were not further enhanced by SAHA treatment. SAHA is a potent sensitizer of TRAIL responses in both TRAIL sensitive and resistant cell lines, in both suspension and 3D culture, however SAHA did not sensitise TRAIL-sensitive cell

  15. Selective enhancement of scopadulcic acid B production in the cultured tissues of Scoparia dulcis by methyl jasmonate.

    Science.gov (United States)

    Nkembo, Kasidimoko Marguerite; Lee, Jung-Bum; Hayashi, Toshimitsu

    2005-07-01

    The effects of methyl jasmonate (MeJA) on isoprenoid production were evaluated in cultured tissues of Scoparia dulcis. It was found that MeJA suppressed the accumulation of chlorophylls, carotenoids, phytol and beta-sitosterol in the tissues. MeJA, however, remarkably enhanced the production of scopadulcic acid B (SDB), with 10 microM being optimal observed concentration for stimulation of SDB production. The maximum concentration of SDB was observed 6 d after MeJA treatment.

  16. Android application security essentials

    CERN Document Server

    Rai, Pragati

    2013-01-01

    Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and technologists who wish to enhance their knowledge of Android security will find this book interesting. Some prior knowledge of development on the Android stack is desirable but not required.

  17. Enhancing Cross-Cultural Competence in Multicultural Teacher Education: Transformation in Global Learning

    Science.gov (United States)

    Seeberg, Vilma; Minick, Theresa

    2012-01-01

    Teacher education needs to engage teacher candidates in developing cross-cultural competence so that they may be able to transmit global learning to their future students. This study theorizes cross-cultural competence (CCC) from the perspectives of multicultural and global education. During a four-year project at a mid-western US university,…

  18. Culture, Gender and Technology-Enhanced Learning: Female and Male Students' Perceptions across Three Continents

    Science.gov (United States)

    Richter, Thomas; Zelenkauskaite, Asta

    2014-01-01

    With the on-going "Learning Culture Survey", we aim to foster the implementation of culture-sensitive education. The motivation of this study is based on the need of a better understanding of the reasons for intercultural conflicts in education. These issues are particularly pertinent to international learning scenarios, such as in urban…

  19. Exploring the Impact of Culture- and Language-Influenced Physics on Science Attitude Enhancement

    Science.gov (United States)

    Morales, Marie Paz E.

    2016-01-01

    "Culture," a set of principles that trace and familiarize human beings within their existential realities, may provide an invisible lens through which reality could be discerned. Critically explored in this study is how culture- and language-sensitive curriculum materials in physics improve Pangasinan learners' attitude toward science.…

  20. Enhancing Social Capital in Children via School-Based Community Cultural Development Projects: A Pilot Study

    Science.gov (United States)

    Buys, Laurie; Miller, Evonne

    2009-01-01

    This exploratory pilot study investigates the extent to which participating in a community cultural development (CCD) initiative builds social capital among children. An independent youth arts organisation implemented two cultural activities, developing a compact disc of original music and designing mosaic artworks for a library courtyard, in two…

  1. Enhanced differentiation of human embryonic stem cells into cardiomyocytes by combining hanging drop culture and 5-azacytidine treatment.

    Science.gov (United States)

    Yoon, Byung Sun; Yoo, Seung Jun; Lee, Jeoung Eun; You, Seungkwon; Lee, Hoon Taek; Yoon, Hyun Soo

    2006-04-01

    Cell replacement therapy is a promising approach for the treatment of cardiac diseases. It is, however, challenged by a limited supply of appropriate cells. Therefore, we have investigated whether functional cardiomyocytes can be efficiently generated from human embryonic stem cells (hESCs). In this study, we developed an efficient protocol for the generation of functional cardiomyocytes from hESCs by combining hanging drop culture and 5-azacytidine, a well-known demethylating agent, and then evaluated the expression of cardiac-specific markers. hESCs were cultured both in the medium without or with 0.1, 1, or 10 microM of 5-azacytidine under a hanging drop culture. The expression of several cardiac-specific markers was determined by real-time PCR, RT-PCR, immunofluorescence, and confocal microscopy. To verify the structural and functional properties of hESC-derived cardiomyocytes, we performed electron microscopy and electrophysiological recording. The efficiency of beating cell generation was significantly improved in the hanging drop culture compared with that in suspension culture. Treatment of hESCs with 0.1 microM of 5-azacytidine for 1-3 days significantly increased the number of beating cells and simultaneously enhanced the expression of cardiac-specific markers. Transmission electron microscopy and electrophysiological recording showed that hESC-derived cardiomyocytes acquired structural and functional properties of cardiomyocytes. In conclusion, these results suggest that differentiation of hESCs into cardiomyocytes can be enhanced by the combination of hanging drop culture and 5-azacytidine treatment. Also the methylation status of genes related to cardiomyocyte development may play an important role in the differentiation of hESCs into cardiomyocytes.

  2. Pretreatment of Parsley (Petroselinum crispum L.) Suspension Cultures with Methyl Jasmonate Enhances Elicitation of Activated Oxygen Species.

    Science.gov (United States)

    Kauss, H.; Jeblick, W.; Ziegler, J.; Krabler, W.

    1994-01-01

    Suspension-cultured cells of parsley (Petroselinum crispum L.) were used to demonstrate an influence of jasmonic acid methyl ester (JAME) on the elicitation of activated oxygen species. Preincubation of the cell cultures for 1 d with JAME greatly enhanced the subsequent induction by an elicitor preparation from cell walls of Phytophtora megasperma f. sp. glycinea (Pmg elicitor) and by the polycation chitosan. Shorter preincubation times with JAME were less efficient, and the effect was saturated at about 5 [mu]M JAME. Treatment of the crude Pmg elicitor with trypsin abolished induction of activated oxygen species, an effect similar to that seen with elicitation of coumarin secretion. These results suggest that JAME conditioned the parsley suspension cells in a time-dependent manner to become more responsive to elicitation, reminiscent of developmental effects caused by JAME in whole plants. It is interesting that pretreatment of the parsley cultures with 2,6-dichloroisonicotinic and 5-chlorosalicylic acid only slightly enhanced the elicitation of activated oxygen species, whereas these substances greatly enhanced the elicitation of coumarin secretion. Therefore, these presumed inducers of systemic acquired resistance exhibit a specificity different from JAME. PMID:12232189

  3. A study of a culturally enhanced EatRight dietary intervention in a predominately African American workplace.

    Science.gov (United States)

    Ard, Jamy D; Cox, Tiffany L; Zunker, Christie; Wingo, Brooks C; Jefferson, Wendy K; Brakhage, Cora

    2010-01-01

    The workplace may be an ideal venue for engaging African American women in behavioral interventions for weight reduction. To examine the effectiveness of a culturally enhanced EatRight dietary intervention among a group of predominately African American women in a workplace setting. Crossover design study. Workplace. A total of 39 women volunteered for this study, of whom 27 completed it. The control period involved observation of participants for 22 weeks after receiving standard counseling on lifestyle methods to achieve a healthy weight; following the control period, participants crossed over to the 22-week intervention period. The intervention was culturally enhanced using feedback derived from formative assessment and delivered as 15 group sessions. The primary outcome measure was the difference in weight change between the control and intervention periods; changes in waist circumference and quality of life were secondary outcomes. Most participants were obese, with a mean baseline body mass index of 36 kg/m², weight of 97.9 kg, and waist circumference of 111 cm. Weight increased during the control period by 0.7 kg but decreased by 2.6 kg during the intervention (net difference = -3.4 kg, P culturally enhanced behavioral weight loss intervention in a predominately African American workplace setting. The workplace may be conducive for targeting African American women who are disproportionately affected by obesity.

  4. Enhanced expression of contractile endothelin ET(B) receptors in rat coronary artery after organ culture

    DEFF Research Database (Denmark)

    Johnsson, E.; Maddahi, A.; Wackenfors, A.

    2008-01-01

    . In cardiovascular disease and in organ culture in vitro, endothelin ET(B) receptors are up-regulated on smooth muscle cells. The objectives of the present study were to characterise the endothelin receptor-induced vasoconstriction and quantify the endothelin receptor mRNA levels and immunoreactivity in fresh...... and cultured rat coronary arteries. We demonstrate that endothelin-1 induces strong and equal concentration-dependent contractions in fresh and cultured segments from the left anterior descending coronary artery. Sarafotoxin 6c, an endothelin ET(B) receptor agonist, had negligible effect in fresh arteries...... but produced significant vasoconstriction after organ culture. The endothelin ET(B) receptor mRNA level and the receptor protein immunoreactivity were increased, whereas the level of endothelin ET(A) receptor mRNA was down-regulated but not its receptor protein immunoreactivity after organ culture...

  5. A novel three-dimensional cell culture method enhances antiviral drug screening in primary human cells.

    Science.gov (United States)

    Koban, Robert; Neumann, Markus; Daugs, Aila; Bloch, Oliver; Nitsche, Andreas; Langhammer, Stefan; Ellerbrok, Heinz

    2018-02-01

    Gefitinib is a specific inhibitor of the epidermal growth factor receptor (EGFR) and FDA approved for treatment of non-small cell lung cancer. In a previous study we could show the in vitro efficacy of gefitinib for treatment of poxvirus infections in monolayer (2D) cultivated cell lines. Permanent cell lines and 2D cultures, however, are known to be rather unphysiological; therefore it is difficult to predict whether determined effective concentrations or the drug efficacy per se are transferable to the in vivo situation. 3D cell cultures, which meanwhile are widely distributed across all fields of research, are a promising tool for more predictive in vitro investigations of antiviral compounds. In this study the spreading of cowpox virus and the antiviral efficacy of gefitinib were analyzed in primary human keratinocytes (NHEK) grown in a novel 3D extracellular matrix-based cell culture model and compared to the respective monolayer culture. 3D-cultivated NHEK grew in a polarized and thus a more physiological manner with altered morphology and close cell-cell contact. Infected cultures showed a strongly elevated sensitivity towards gefitinib. EGFR phosphorylation, cell proliferation, and virus replication were significantly reduced in 3D cultures at gefitinib concentrations which were at least 100-fold lower than those in monolayer cultures and well below the level of cytotoxicity. Our newly established 3D cell culture model with primary human cells is an easy-to-handle alternative to conventional monolayer cell cultures and previously described more complex 3D cell culture systems. It can easily be adapted to other cell types and a broad spectrum of viruses for antiviral drug screening and many other aspects of virus research under more in vivo-like conditions. In consequence, it may contribute to a more targeted realization of necessary in vivo experiments. Copyright © 2017 Elsevier B.V. All rights reserved.

  6. Safety, security and safeguard

    International Nuclear Information System (INIS)

    Zakariya, Nasiru Imam; Kahn, M.T.E.

    2015-01-01

    Highlights: • The 3S interface in the design of PPS is hereby proposed. • The 3S synergy enhances the reduction in vulnerability and terrorism. • Highlighted were concept of detection, delay and response. - Abstract: A physical protection system (PPS) integrates people, procedures, and equipment for the protection of assets or facilities against theft, sabotage and terrorist attacks. Therefore, this paper proposes the use of a systematic and measurable approach to the design of PPS and its emphases on the concept of detection, delay and response. The proposed performance based PPS has the capability of defeating adversaries thereby achieving its targets. Therefore, timely detection of intrusion – based on the use of sensors, signal lines and alarm systems – is a major principle in the proposed system. Also the need for deterrence such as barriers in form of guards, access control, close circuit television (CCTV), strong policy and procedures, then the security culture amongst the facility workers was appropriately discussed. Since nuclear power is considered the only source that can provide large scale electricity with comparatively minimal impact on the environment, the paper also considered base guidelines for the application of PPS in any nuclear and radioactive facilities, followed with the necessity to incorporate inherent safety, security and safeguard (3S) synergy innovation in the physical protection system design and other characteristics that will enhance to reduce the vulnerability of nuclear facilities and materials to theft sabotage and terrorist attacks

  7. Enhanced Chondrocyte Proliferation in a Prototyped Culture System with Wave-Induced Agitation

    Directory of Open Access Journals (Sweden)

    Pilarek Maciej

    2017-06-01

    Full Text Available One of the actual challenges in tissue engineering applications is to efficiently produce as high of number of cells as it is only possible, in the shortest time. In static cultures, the production of animal cell biomass in integrated forms (i.e. aggregates, inoculated scaffolds is limited due to inefficient diffusion of culture medium components observed in such non-mixed culture systems, especially in the case of cell-inoculated fiber-based dense 3D scaffolds, inside which the intensification of mass transfer is particularly important. The applicability of a prototyped, small-scale, continuously wave-induced agitated system for intensification of anchorage-dependent CP5 chondrocytes proliferation outside and inside three-dimensional poly(lactic acid (PLA scaffolds has been discussed. Fibrous PLA-based constructs have been inoculated with CP5 cells and then maintained in two independent incubation systems: (i non-agitated conditions and (ii culture with wave-induced agitation. Significantly higher values of the volumetric glucose consumption rate have been noted for the system with the wave-induced agitation. The advantage of the presented wave-induced agitation culture system has been confirmed by lower activity of lactate dehydrogenase (LDH released from the cells in the samples of culture medium harvested from the agitated cultures, in contrast to rather high values of LDH activity measured for static conditions. Results of the proceeded experiments and their analysis clearly exhibited the feasibility of the culture system supported with continuously wave-induced agitation for robust proliferation of the CP5 chondrocytes on PLA-based structures. Aside from the practicability of the prototyped system, we believe that it could also be applied as a standard method offering advantages for all types of the daily routine laboratory-scale animal cell cultures utilizing various fiber-based biomaterials, with the use of only regular laboratory

  8. Enhanced proliferation and progesterone production by porcine granulosa cells cultured with pseudorabies virus growth factor (PRGF).

    Science.gov (United States)

    Piekło, R; Gregoraszczuk, E L; Lesko, J; Golais, F; Stokłosowa, S

    1999-03-01

    The objective of this research was to study possible interactions of pseudorabies virus growth factor (PRGF) with ovarian tissue. Granulosa cells isolated from porcine ovaries were cultured as monolayers for 6 days in a control medium without PRGF and in medium supplemented with different doses of this agent. Increased population density and change towards more fibroblastic-like shape of cells cultured with 10(9) I.U PRGF was observed when compared with control culture. The cells divided significantly faster during 6 days of culture under the influence of 10(3), 10(4), 10(5), 10(6), 10(7), 10(8) and 10(9) I.U./ml of PRGF at a dose dependent manner. PRGF in a dose 10(9) I.U. added to cultured cells isolated from small and medium follicles did not influence progesterone secretion . An increase of progesterone secretion under the influence of PRGF in all investigated days of cultures was observed in cells isolated from large preovulatory follicles. The marked increase in progesterone content in PRGF treated culture in doses of 0.5x10(7), 0.5x10(8), 0.5x10(9) I.U. was observed during 4 and 6 days of culture. The rise of progesterone content was not connected with increased number of secretory cells, but with a stimulation of production per cell. PRGF exerted no visible effect on progesterone secretion by granulosa cells from small and medium follicles cultured for 6 days. The presented in vitro data provide evidence for a local action of PRGF in the follicle depending on the stage of follicular development and duration of exposure. Precise relevance of the interaction of PRGF with follicular development requires further study.

  9. A novel culture medium designed for the simultaneous enhancement of biomass and lipid production by Chlorella vulgaris UTEX 26.

    Science.gov (United States)

    Ramírez-López, Citlally; Chairez, Isaac; Fernández-Linares, Luis

    2016-07-01

    A novel culture medium to enhance the biomass and lipid production simultaneously by Chlorella vulgaris UTEX 26 was designed in three stages of optimization. Initially, a culture medium was inferred applying the response surface method to adjust six factors [NaNO3, NH4HCO3, MgSO4·7H2O, KH2PO4, K2HPO4 and (NH4)2HPO4], which were selected on the basement of BBM (Bold's Basal Medium) and HAMGM (Highly Assimilable Minimal Growth Medium) culture media. Afterwards, the nitrogen source compound was optimized to reduce both, ammonium and nitrate concentrations. As result of the optimization process, the proposed culture medium improved 40% the biomass (0.73gL(-1)) compared with the BBM medium and 85% the lipid concentration (281mgL(-1)), with respect to HAMGM medium. Some culture media components concentrations were reduced up to 50%. Gas chromatography analysis revealed that C16:0, C18:0, C18:1, C18:2 and C18:3 were the major fatty acids produced by C. vulgaris UTEX 26. Copyright © 2016 Elsevier Ltd. All rights reserved.

  10. Enhancing Self-Awareness: A Practical Strategy to Train Culturally Responsive Social Work Students

    Directory of Open Access Journals (Sweden)

    Nalini J. Negi

    2010-10-01

    Full Text Available A primary goal of social justice educators is to engage students in a process of self-discovery, with the goal of helping them recognize their own biases, develop empathy, and become better prepared for culturally responsive practice. While social work educators are mandated with the important task of training future social workers in culturally responsive practice with diverse populations, practical strategies on how to do so are scant. This article introduces a teaching exercise, the Ethnic Roots Assignment, which has been shown qualitatively to aid students in developing self-awareness, a key component of culturally competent social work practice. Practical suggestions for classroom utilization, common challenges, and past student responses to participating in the exercise are provided. The dissemination of such a teaching exercise can increase the field’s resources for addressing the important goal of cultural competence training.

  11. Know Your Enemy and Know Yourself: Assessing Progress in Developing Cultural Competence to Enhance Operational Effectiveness

    National Research Council Canada - National Science Library

    Keene, Sean T

    2007-01-01

    .... Thousands of years ago, the writer of The Art of War highlighted the critical nature of cultural competence when he asserted his formula for military success, "know the enemy and know yourself...

  12. Suspended Cell Culture ANalysis (SCAN) Tool to Enhance ISS On-Orbit Capabilities, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Aurora Flight Sciences and partner, Draper Laboratory, propose to develop an on-orbit immuno-based label-free Suspension Cell Culture ANalysis tool, SCAN tool, which...

  13. Bioimpedance monitoring of 3D cell culturing-Complementary electrode configurations for enhanced spatial sensitivity

    DEFF Research Database (Denmark)

    Canali, Chiara; Heiskanen, Arto; Muhammad, Haseena Bashir

    2015-01-01

    A bioimpedance platform is presented as a promising tool for non-invasive real-time monitoring of the entire process of three-dimensional (3D) cell culturing in a hydrogel scaffold. In this study, the dynamics involved in the whole process of 3D cell culturing, starting from polymerisation...... spectroscopic (EIS) characterisation were used to determine the configurations' sensitivity field localisation. The 2T setup gives insight into the interfacial phenomena at both electrode surfaces and covers the central part of the 3D cell culture volume, while the four 3T modes provide focus on the dynamics...... the tested biomimetic environment, paving the way to further developments in bioimpedance tracking of 3D cell cultures and tissue engineering....

  14. French Cuisine in the Classroom: Using Culture to Enhance Language Proficiency.

    Science.gov (United States)

    Abrate, Jane E.

    1993-01-01

    French cuisine offers a valuable resource for creating culture-based contexts for language use in the classroom. Suggestions and ideas are presented for incorporating food-related activities in the French class. (VWL)

  15. rhEPO Enhances Cellular Anti-oxidant Capacity to Protect Long-Term Cultured Aging Primary Nerve Cells.

    Science.gov (United States)

    Wang, Huqing; Fan, Jiaxin; Chen, Mengyi; Yao, Qingling; Gao, Zhen; Zhang, Guilian; Wu, Haiqin; Yu, Xiaorui

    2017-08-01

    Erythropoietin (EPO) may protect the nervous system of animals against aging damage, making it a potential anti-aging drug for the nervous system. However, experimental evidence from natural aging nerve cell models is lacking, and the efficacy of EPO and underlying mechanism of this effect warrant further study. Thus, the present study used long-term cultured primary nerve cells to successfully mimic the natural aging process of nerve cells. Starting on the 11th day of culture, cells were treated with different concentrations of recombinant human erythropoietin (rhEPO). Using double immunofluorescence labeling, we found that rhEPO significantly improved the morphology of long-term cultured primary nerve cells and increased the total number of long-term cultured primary cells. However, rhEPO did not improve the ratio of nerve cells. A 3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide (MTT) assay was used to measure nerve cell activity and showed that rhEPO significantly improved the activity of long-term cultured primary nerve cells. Moreover, Annexin V-fluorescein isothiocyanate (FITC)/propidium iodide (PI) double immunofluorescence labeling flow cytometry revealed that rhEPO reduced the apoptotic rate of long-term cultured primary nerve cells. Senescence-associated β-galactosidase (SA-β-gal) immunohistochemistry staining showed that rhEPO significantly reduced the aging rate of long-term cultured primary nerve cells. Immunochemistry revealed that rhEPO enhanced intracellular superoxide dismutase (SOD) activity and glutathione (GSH) abundance and reduced the intracellular malondialdehyde (MDA) level. In addition, this effect depended on the dose, was maximized at a dose of 100 U/ml and was more pronounced than that of vitamin E. In summary, this study finds that rhEPO protects long-term cultured primary nerve cells from aging in a dose-dependent manner. The mechanism of this effect may be associated with the enhancement of the intracellular anti

  16. Does zero-water discharged technology enhance culture performance of pacific white shrimp (Litopenaeus vannamei Boone.)?

    Science.gov (United States)

    Suantika, Gede; Anggraeni, Jayanty; Hasby, Fahri Azhari; Yanuwiarti, Ni Putu Indah

    2014-03-01

    Litopenaeus vannamei or white leg shrimp is an introduced shrimp which has successfully cultured in Indonesia. In Indonesia, L. vannamei is commonly cultured on outdoor/earthen pond that requires renewal of water, less control in term of water quality and disease and attributed to unpredictable yield production. Based on the existing culture condition, a system that enable to minimize water consumption, improve the hygiene of the culture and at the same time maintain a more stable yield production is urgent to be developed by using a zero water discharge system. The system consists of: (a) culture tank - to retain and culture the shrimp; (b) CaCO3 grained - buffering agent and substrate of nitrifying bacteria; (c) aeration line - to provide O2 and homogenize the culture; (d) ancho (feeding) - to control an appropriate feed; (e) nitrifying bacteria adding - to consume ammonium and nitrite then convert it to nitrate, and also control pathogen Vibrio sp.; (f) diatom microalgae (Chaetoceros gracilis) - to uptake nitrate, bacteriostatic agent, feed source, provide O2 and shading. In this study, there were 2 treatments: the static culture (batch) system was set as control (K) (in 70 PL/m2), and culture system with zero-water discharge system which was inoculated by 0.02% v/v 106 CFU/ml of mixed culture nitrifying bacteria and diatom microalgae in 70 PL/m2 (P1). The white leg shrimp used in this experiment was at post larvae (PL) 10 and cultured in a batch system (1 × 1 × 0.5 m3 pond) during 2 months. Several parameters including survival rate, mean body weight, and water quality (salinity, temperature, pH, DO, ammonium, nitrite, and nitrate) were measured. Based on the results, biomass of P1 (237.12 ± 31.11) gram is significantly higher than control (K) (180.80 ± 12.26) gram (Pshrimp post larvae, except ammonium concentration in control (K) (2.612 ± 0.56) mg/L which is significantly different from P1 (1.287 ± 0.49) mg/L. Based on this research, zero-water discharge

  17. Enhanced production of vanillin flavour metabolites by precursor feeding in cell suspension cultures of Decalepis hamiltonii Wight & Arn., in shake flask culture.

    Science.gov (United States)

    Matam, Pradeep; Parvatam, Giridhar; Shetty, Nandini P

    2017-12-01

    The flavour rich tuberous roots of Decalepis hamiltonii are known for its edible and medicinal use and have become endangered due to commercial over-exploitation. Besides 2-Hydroxy-4-methoxy benzaldehyde (2H4MB), other flavour metabolites in tuberous roots include vanillin, 4-Methoxy Cinnamic acid derivatives, aromatic alcohols etc. So far, there are no reports on the pathway of 2H4MB biosynthesis nor there is an organized work on biotransformation using normal and cell suspension cultures for obtaining these metabolites using precursors. The main aim of the study is to develop a method for enhanced production of flavour attributing metabolites through ferulic acid (FA) feeding to the D. hamiltonii callus culture medium. Biomass of D. hamiltonii cell suspension cultures was maximum (200.38 ± 1.56 g/l) by 4th week. Maximum production of 2H4MB was recorded on 4th week (0.08 ± 0.01 mg/100 g dry weight) as quantified by HPLC. Addition of 0.1-1.5 mM ferulic acid as precursor in the culture medium showed significant ( p  vanillin, 2H4MB, vanillic acid, ferulic acid were of 0.1 ± 0.02 mg/100 g, 0.44 ± 0.01 mg/100 g, 0.52 ± 0.04 mg/100 g, 0.18 ± 0.02 mg/100 g DW respectively in 4 weeks of cultured cells supplemented with 1 mM ferulic acid as a precursor. The results indicate that, substantial increase in the levels of flavour metabolites in D. hamiltonii callus suspension culture was achieved. This would be having implications in biosynthesis of respective vanilla flavour attributing metabolites at very high levels for their large scale production.

  18. The relationship among work-family conflict and enhancement, organizational work-family culture, and work outcomes for older working women.

    Science.gov (United States)

    Gordon, Judith R; Whelan-Berry, Karen S; Hamilton, Elizabeth A

    2007-10-01

    This article examines the relationship among work-family conflict and enhancement, organizational work-family culture, and four work outcomes for 489 working women over the age of 50. Survey results from two U.S. health care organizations and one U.S. financial services organization indicate that older working women experience differing amounts of work-to-family conflict, family-to-work conflict, work-to-family enhancement, and family-to-work enhancement. Hypotheses relating organizational work-family culture to work-family conflict and enhancement were partially supported, and hypotheses relating conflict and enhancement to four work outcomes were partially supported. Work-to-family conflict and work-to-family enhancement partially mediate the relationship between organizational work-family culture and selected work outcomes. Implications for theory and practice, limitations of this study, and directions for future research are also presented.

  19. Organizational culture in Qazvin hospitals (2013

    Directory of Open Access Journals (Sweden)

    AM. Mosadeghrad

    2017-12-01

    Full Text Available Background: Organizational culture influences employees’ job satisfaction, commitment and performance. A strong corporate culture enhances organizational performance. Objective: The aim of this study was to determine the type of organizational culture in Qazvin hospitals. Methods: A descriptive and cross-sectional study was conducted by a survey questionnaire in Qazvin (2013 that was distributed among 800 hospital employees and managers based on stratified random sampling. Findings: The mean of hospitals’ organizational culture was 2.95 out of 5 score. Hospitals' organizational cultures were evaluated as strong in attention to details and stability dimensions and moderate in creativity, risk taking, team working and power distance dimensions. Attention to details in public hospitals was higher than private and social security hospitals. Conclusion: Organizational culture of Qazvin hospitals was evaluated as moderate. Managers for improving hospitals' performance and enhancing employees' and patients' satisfaction should create a culture of higher creativity, innovation, team working and risk taking and lower power distance.

  20. Implementing sponge physiological and genomic information to enhance the diversity of its culturable associated bacteria.

    Science.gov (United States)

    Lavy, Adi; Keren, Ray; Haber, Markus; Schwartz, Inbar; Ilan, Micha

    2014-02-01

    In recent years new approaches have emerged for culturing marine environmental bacteria. They include the use of novel culture media, sometimes with very low-nutrient content, and a variety of growth conditions such as temperature, oxygen levels, and different atmospheric pressures. These approaches have largely been neglected when it came to the cultivation of sponge-associated bacteria. Here, we used physiological and environmental conditions to reflect the environment of sponge-associated bacteria along with genomic data of the prominent sponge symbiont Candidatus Poribacteria sp. WGA-4E, to cultivate bacteria from the Red Sea sponge Theonella swinhoei. Designing culturing conditions to fit the metabolic needs of major bacterial taxa present in the sponge, through a combined use of diverse culture media compositions with aerobic and microaerophilic states, and addition of antibiotics, yielded higher diversity of the cultured bacteria and led to the isolation of novel sponge-associated and sponge-specific bacteria. In this work, 59 OTUs of six phyla were isolated. Of these, 22 have no close type strains at the species level (< 97% similarity of 16S rRNA gene sequence), representing novel bacteria species, and some are probably new genera and even families. © 2013 Federation of European Microbiological Societies. Published by John Wiley & Sons Ltd. All rights reserved.

  1. Functional enhancement of chitosan and nanoparticles in cell culture, tissue engineering, and pharmaceutical applications

    Directory of Open Access Journals (Sweden)

    Wenjuan eGao

    2012-08-01

    Full Text Available Abstract: As a biomaterial, chitosan has been widely used in tissue engineering, wound healing, drug delivery, and other biomedical applications. It can be formulated in a variety of forms, such as powder, film, sphere, gel and fiber. These features make chitosan an almost ideal biomaterial in cell culture applications, and cell cultures arguably constitute the most practical way to evaluate biocompatibility and biotoxicity. The advantages of cell cultures are that they can be performed under totally controlled environments, allow high throughput functional screening, and are less costly, as compared to other assessment methods. Chitosan can also be modified into multilayer composite by combining with other polymers and moieties to alter the properties of chitosan for particular biomedical applications. This review briefly depicts and discusses applications of chitosan and nanoparticles in cell culture, in particular, the effects of chitosan and nanoparticles on cell adhesion, cell survival, and the underlying molecular mechanisms: both stimulatory and inhibitory influences are discussed. Our aim is to update the current status of how nanoparticles can be utilized to modify the properties of chitosan to advance the art of tissue engineering by using cell cultures.

  2. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  3. Enhancing proliferation and optimizing the culture condition for human bone marrow stromal cells using hypoxia and fibroblast growth factor-2

    Directory of Open Access Journals (Sweden)

    Jung-Seok Lee

    2018-04-01

    Full Text Available This study aimed to determine the cellular characteristics and behaviors of human bone marrow stromal cells (hBMSCs expanded in media in a hypoxic or normoxic condition and with or without fibroblast growth factor-2 (FGF-2 treatment. hBMSCs isolated from the vertebral body and expanded in these four groups were evaluated for cellular proliferation/migration, colony-forming units, cell-surface characterization, in vitro differentiation, in vivo transplantation, and gene expression. Culturing hBMSCs using a particular environmental factor (hypoxia and with the addition of FGF-2 increased the cellular proliferation rate while enhancing the regenerative potential, modulated the multipotency-related processes (enhanced chondrogenesis-related processes/osteogenesis, but reduced adipogenesis, and increased cellular migration and collagen formation. The gene expression levels in the experimental samples showed activation of the hypoxia-inducible factor-1 pathway and glycolysis in the hypoxic condition, with this not being affected by the addition of FGF-2. The concurrent application of hypoxia and FGF-2 could provide a favorable condition for culturing hBMSCs to be used in clinical applications associated with bone tissue engineering, due to the enhancement of cellular proliferation and regenerative potential. Keywords: Bone marrow stromal cells, Hypoxia, Fibroblast growth factor, Tissue regeneration, Microenvironment interactions

  4. A synthetic auxin (NAA) suppresses secondary wall cellulose synthesis and enhances elongation in cultured cotton fiber.

    Science.gov (United States)

    Singh, Bir; Cheek, Hannah D; Haigler, Candace H

    2009-07-01

    Use of a synthetic auxin (naphthalene-1-acetic acid, NAA) to start (Gossypium hirsutum) ovule/fiber cultures hindered fiber secondary wall cellulose synthesis compared with natural auxin (indole-3-acetic acid, IAA). In contrast, NAA promoted fiber elongation and ovule weight gain, which resulted in larger ovule/fiber units. To reach these conclusions, fiber and ovule growth parameters were measured and cell wall characteristics were examined microscopically. The differences in fiber from NAA and IAA culture were underpinned by changes in the expression patterns of marker genes for three fiber developmental stages (elongation, the transition stage, and secondary wall deposition), and these gene expression patterns were also analyzed quantitatively in plant-grown fiber. The results demonstrate that secondary wall cellulose synthesis: (1) is under strong transcriptional control that is influenced by auxin; and (2) must be specifically characterized in the cotton ovule/fiber culture system given the many protocol variables employed in different laboratories.

  5. Enhanced production and isotope enrichment of recombinant glycoproteins produced in cultured mammalian cells

    International Nuclear Information System (INIS)

    Skelton, David; Goodyear, Abbey; Ni, DaQun; Walton, Wendy J.; Rolle, Myron; Hare, Joan T.; Logan, Timothy M.

    2010-01-01

    NMR studies of post-translationally modified proteins are complicated by the lack of an efficient method to produce isotope enriched recombinant proteins in cultured mammalian cells. We show that reducing the glucose concentration and substituting glutamate for glutamine in serum-free medium increased cell viability while simultaneously increasing recombinant protein yield and the enrichment of non-essential amino acids compared to culture in unmodified, serum-free medium. Adding dichloroacetate, a pyruvate dehydrogenase kinase inhibitor, further improves cell viability, recombinant protein yield, and isotope enrichment. We demonstrate the method by producing partially enriched recombinant Thy1 glycoprotein from Lec1 Chinese hamster ovary (CHO) cells using U- 13 C-glucose and 15 N-glutamate as labeled precursors. This study suggests that uniformly 15 N, 13 C-labeled recombinant proteins may be produced in cultured mammalian cells starting from a mixture of labeled essential amino acids, glucose, and glutamate.

  6. Enhancing student schematic knowledge of culture through literature circles in a foreign language classroom

    Directory of Open Access Journals (Sweden)

    Graham-Marr Alastair

    2015-01-01

    Full Text Available Improving student understanding of a foreign language culture is anything but a peripheral issue in the teaching of a foreign language. This pilot study reports on a second year required English course in a university in Japan that took a Literature Circles approach, where students were asked to read short stories out of class and then discuss these stories in class. Although students reported that they did not gain any special insights into the target language culture presented, they did report that reading fiction as source material for classroom activity helps with the acquisition of a vocabulary set that is more closely associated with lifestyle and culture. The results suggest that further study is warranted. Procedures of this pilot study are described and interpreted in the context of the English education system in Japan.

  7. Enhanced production and isotope enrichment of recombinant glycoproteins produced in cultured mammalian cells

    Energy Technology Data Exchange (ETDEWEB)

    Skelton, David; Goodyear, Abbey [Florida State University, Department of Chemistry and Biochemistry (United States); Ni, DaQun; Walton, Wendy J.; Rolle, Myron; Hare, Joan T. [Florida State University, Institute of Molecular Biophysics (United States); Logan, Timothy M., E-mail: tlogan@fsu.ed [Florida State University, Department of Chemistry and Biochemistry (United States)

    2010-10-15

    NMR studies of post-translationally modified proteins are complicated by the lack of an efficient method to produce isotope enriched recombinant proteins in cultured mammalian cells. We show that reducing the glucose concentration and substituting glutamate for glutamine in serum-free medium increased cell viability while simultaneously increasing recombinant protein yield and the enrichment of non-essential amino acids compared to culture in unmodified, serum-free medium. Adding dichloroacetate, a pyruvate dehydrogenase kinase inhibitor, further improves cell viability, recombinant protein yield, and isotope enrichment. We demonstrate the method by producing partially enriched recombinant Thy1 glycoprotein from Lec1 Chinese hamster ovary (CHO) cells using U-{sup 13}C-glucose and {sup 15}N-glutamate as labeled precursors. This study suggests that uniformly {sup 15}N,{sup 13}C-labeled recombinant proteins may be produced in cultured mammalian cells starting from a mixture of labeled essential amino acids, glucose, and glutamate.

  8. Algal recycling enhances algal productivity and settleability in Pediastrum boryanum pure cultures.

    Science.gov (United States)

    Park, Jason B K; Craggs, Rupert J; Shilton, Andy N

    2015-12-15

    Recycling a portion of gravity harvested algae (i.e. algae and associated bacteria biomass) has been shown to improve both algal biomass productivity and harvest efficiency by maintaining the dominance of a rapidly-settleable colonial alga, Pediastrum boryanum in both pilot-scale wastewater treatment High Rate Algal Ponds (HRAP) and outdoor mesocosms. While algal recycling did not change the relative proportions of algae and bacteria in the HRAP culture, the contribution of the wastewater bacteria to the improved algal biomass productivity and settleability with the recycling was not certain and still required investigation. P. boryanum was therefore isolated from the HRAP and grown in pure culture on synthetic wastewater growth media under laboratory conditions. The influence of recycling on the productivity and settleability of the pure P. boryanum culture was then determined without wastewater bacteria present. Six 1 L P. boryanum cultures were grown over 30 days in a laboratory growth chamber simulating New Zealand summer conditions either with (Pr) or without (Pc) recycling of 10% of gravity harvested algae. The cultures with recycling (Pr) had higher algal productivity than the controls (Pc) when the cultures were operated at both 4 and 3 d hydraulic retention times by 11% and 38% respectively. Furthermore, algal recycling also improved 1 h settleability from ∼60% to ∼85% by increasing the average P. boryanum colony size due to the extended mean cell residence time and promoted formation of large algal bio-flocs (>500 μm diameter). These results demonstrate that the presence of wastewater bacteria was not necessary to improve algal productivity and settleability with algal recycling. Copyright © 2015 Elsevier Ltd. All rights reserved.

  9. Security in the Sahel

    DEFF Research Database (Denmark)

    Hahonou, Eric Komlavi

    of volatile security. In this policy brief, Eric Hahonou argues that without complementary activities, the multiplication of border offices could even expand opportunities for corruption. Instead, security policy should focus on creating a culture of effectiveness including systematic and regular staff...

  10. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  11. EU Strategic Culture and the 2011 Libyan War

    DEFF Research Database (Denmark)

    Kahlke Hansen, Lea; Nielsen, Kristian L.

    Since the Maastricht Treaty came into force in 1992, the EU has sought to enhance its capacity as an actor within security policy. An important step in this process was the 2003 European Security Strategy, which introduced the EU goal of developing a common European strategic culture. The conflict...... in Libya in many ways seemed an ideal opportunity for the EU to manifest itself as an important security actor, and to fullfill its strategic ambitions as they are described in the 2003 European Security Strategy. Instead, due to internal disagreements on the use of force, the EU was unable to forge...... a common position of any importance and therefore once again remained peripheral. This article examines the strategic culture of the European Union and what the conflict in Libya, 2011, tells us about the emergence of such a strategic culture and the EU’s capacity as an actor in security policy. It argues...

  12. Enhanced hydrogen and 1,3-propanediol production from glycerol by fermentation using mixed cultures

    KAUST Repository

    Selembo, Priscilla A.; Perez, Joe M.; Lloyd, Wallis A.; Logan, Bruce E.

    2009-01-01

    The conversion of glycerol into high value products, such as hydrogen gas and 1,3-propanediol (PD), was examined using anaerobic fermentation with heat-treated mixed cultures. Glycerol fermentation produced 0.28 mol-H 2/mol-glycerol (72 mL-H2/g

  13. A Simulated Learning Environment of History Games for Enhancing Players' Cultural Awareness

    Science.gov (United States)

    Shih, Ju-Ling; Jheng, Shun-Cian; Tseng, Jia-Jiun

    2015-01-01

    This research attempted to create the historical context of Southern Taiwan in the late nineteenth century based on the martial art novel "Xiao-Mao" (Pussy) by designing a role-play digital game "Taiwan Epic Game" about the war time; in which, Taiwanese history, geography, and culture are presented in an innovative way with…

  14. Facilitating Occupational Therapy Student Learning to Enhance Cross-Cultural Effectiveness

    Science.gov (United States)

    Gilbertson, Barbara Carol Hooper

    2012-01-01

    Developing cultural awareness and effectiveness is critical to meaningful and successful occupational therapy practice and of concern to occupational therapists worldwide (World Federation of Occupational Therapists, 2010). Occupational therapy graduates, not fully representative of the demographics of the populations they will meet clinically,…

  15. Enhancing Critical Consciousness through a Cross-Cultural Immersion Experience in South Africa

    Science.gov (United States)

    Choi, Kyoung Mi; VanVoorhis, Richard W.; Ellenwood, Audrey E.

    2015-01-01

    Using phenomenological approaches, the author explored the meanings and essences of a cross-cultural immersion experience in South Africa among counseling master's-level students. Five core themes--the meaning of being American, sociopolitical awareness, engagement with South Africans and their communities, appreciation of life, and commitment to…

  16. Neighbors On Line: Enhancing Global Perspectives and Cultural Sharing with the Internet.

    Science.gov (United States)

    Lee, Okhwa; Knupfer, Nancy Nelson

    The purpose of this study was to investigate the status of computer use within Korean and United States schools, and then use the Internet to establish cross cultural communication between schools. It was hoped that through international communication using the Internet, students at the elementary, junior high, and high school levels would gain…

  17. Enhanced Antitumoral Activity of Extracts Derived from Cultured Udotea flabellum (Chlorophyta

    Directory of Open Access Journals (Sweden)

    Rosa Moo-Puc

    2011-01-01

    Full Text Available Very few studies have been performed to evaluate the effect of culture conditions on the production or activity of active metabolites in algae. Previous studies suggest that the synthesis of bioactive compounds is strongly influenced by irradiance level. To investigate whether the antiproliferative activity of Udotea flabellum extracts is modified after cultivation, this green alga was cultured under four photon flux densities (PFD for 30 days. After 10, 20, and 30 days, algae were extracted with dichloromethane: methanol and screened for antiproliferative activity against four human cancer cell lines (laryngeal—Hep-2, cervix—HeLa, cervix squamous—SiHa and nasopharynx—KB by SRB assay. Lipid and phenol content were evaluated by standardized methods on algae organic extracts. After 10 days of cultivation, organic U. flabellum extracts showed a significant increase in antiproliferative activity on Hela and SiHa cells when compared to noncultured algae extracts. Extracts obtained after 10 and 20 days of culture were active on KB and Hep-2 cells. Total phenol and polyunsaturated fatty acid content in organic extracts changed with cultivation time but not by irradiance treatment. Extracts from U. flabellum obtained after 10 and 20 days of culture have been selected for fractionation and isolation of active compounds.

  18. Shared Knowledge and Mutual Respect: Enhancing Culturally Competent Practice through Collaboration with Families and Communities

    Science.gov (United States)

    Verdon, Sarah; Wong, Sandie; McLeod, Sharynne

    2016-01-01

    Collaboration with families and communities has been identified as one of six overarching principles to speech and language therapists' (SLTs') engagement in culturally competent practice (Verdon et al., 2015a). The aim of this study was to describe SLTs' collaboration with families and communities when engaging in practice to support the speech,…

  19. Immigrant Children Promoting Environmental Care: Enhancing Learning, Agency and Integration through Culturally-Responsive Environmental Education

    Science.gov (United States)

    Blanchet-Cohen, Natasha; Reilly, Rosemary C.

    2017-01-01

    This paper examines the potential of culturally-responsive environmental education to engage immigrant early adolescents. Our study suggests that environmental involvement can become a means and an end for children to bridge their school and home in agential ways. Drawing from a multi-phase study involving focus groups with children, parents, and…

  20. Enhancing Cross Cultural Communication in the Marketing Classroom: A Case Approach

    Science.gov (United States)

    Budden, Michael C.; Budden, Connie B.; Lopez, Tará Burnthorne

    2017-01-01

    The importance of effective communication skills in the workplace is widely documented and recognized as a success factor in many fields of endeavor. As the workplace becomes more diverse and more global in nature, the ability to communicate across cultures is gaining in importance. A class exercise in which Panamanian educators and US students…