WorldWideScience

Sample records for security events revision

  1. Revised licensee event report system

    International Nuclear Information System (INIS)

    Mays, G.T.; Poore, W.P.

    1985-01-01

    Licensee Event Reports (LERs) provide the basis for evaluating and assessing operating experience information from nuclear power plants. The reporting requirements for submitting LERs to the Nuclear Regulatory Commission have been revised. Effective Jan. 1, 1984, all events were to be submitted in accordance with 10 CFR 50.73 of the Code of Federal Regulations. Report NUREG-1022, Licensee Event Report System-Description of System and Guidelines for Reporting, describes the guidelines on reportability of events. This article summarizes the reporting requirements as presented in NUREG-1022, high-lights differences in data reported between the revised and previous LER systems, and presents results from a preliminary assessment of LERs submitted under the revised LER reporting system

  2. Securing Major Events

    International Nuclear Information System (INIS)

    Loeoef, Susanna

    2013-01-01

    When asked why the IAEA should provide nuclear security support to countries that organize large public events, Nuclear Security Officer Sophia Miaw answers quickly and without hesitation. ''Imagine any major public event such as the Olympics, a football championship, or an Expo. If a dirty bomb were to be exploded at a site where tens of thousands of people congregate, the radioactive contamination would worsen the effects of the bomb, increase the number of casualties, impede a rapid emergency response, and cause long term disruption in the vicinity,'' she said. Avoiding such nightmarish scenarios is the driving purpose behind the assistance the IAEA offers States that host major sporting or other public events. The support can range from a single training course to a comprehensive programme that includes threat assessment, training, loaned equipment and exercises. The type and scope of assistance depends on the host country's needs. ''We incorporate nuclear security measures into their security plan. We don't create anything new,'' Miaw said

  3. Revised IAEA Code of Conduct on the Safety and Security of Radioactive Sources

    International Nuclear Information System (INIS)

    Wheatley, J. S.

    2004-01-01

    The revised Code of Conduct on the Safety and Security of Radioactive Sources is aimed primarily at Governments, with the objective of achieving and maintaining a high level of safety and security of radioactive sources through the development, harmonization and enforcement of national policies, laws and regulations; and through the fostering of international co-operation. It focuses on sealed radioactive sources and provides guidance on legislation, regulations and the regulatory body, and import/export controls. Nuclear materials (except for sources containing 239Pu), as defined in the Convention on the Physical Protection of Nuclear Materials, are not covered by the revised Code, nor are radioactive sources within military or defence programmes. An earlier version of the Code was published by IAEA in 2001. At that time, agreement was not reached on a number of issues, notably those relating to the creation of comprehensive national registries for radioactive sources, obligations of States exporting radioactive sources, and the possibility of unilateral declarations of support. The need to further consider these and other issues was highlighted by the events of 11th September 2001. Since then, the IAEA's Secretariat has been working closely with Member States and relevant International Organizations to achieve consensus. The text of the revised Code was finalized at a meeting of technical and legal experts in August 2003, and it was submitted to IAEA's Board of Governors for approval in September 2003, with a recommendation that the IAEA General Conference adopt it and encourage its wide implementation. The IAEA General Conference, in September 2003, endorsed the revised Code and urged States to work towards following the guidance contained within it. This paper summarizes the history behind the revised Code, its content and the outcome of the discussions within the IAEA Board of Governors and General Conference. (Author) 8 refs

  4. Intercorporate Security Event Correlation

    Directory of Open Access Journals (Sweden)

    D. O. Kovalev

    2010-03-01

    Full Text Available Security controls are prone to false positives and false negatives which can lead to unwanted reputation losses for the bank. The reputational database within the security operations center (SOC and intercorporate correlation of security events are offered as a solution to increase attack detection fidelity. The theses introduce the definition and structure of the reputation, architectures of reputational exchange and the place of intercorporate correlation in overall SOC correlation analysis.

  5. Fourth Dutch Process Security Control Event

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Zielstra, A.

    2010-01-01

    On December 1st, 2009, the fourth Dutch Process Control Security Event took place in Baarn, The Netherlands. The security event with the title ‘Manage IT!’ was organised by the Dutch National Infrastructure against Cybercrime (NICC). Mid of November, a group of over thirty people participated in the

  6. Software for security event management: Development and utilization

    Directory of Open Access Journals (Sweden)

    Aleksandr V. Kuznetcov

    2017-11-01

    Full Text Available We address the challenge to the information security coming from the lack of algorithmic machinery for managing the security events. We start with a mathematical formulation of the problem for a tabular processor by introducing an appropriate target function. Details of corresponding algorithm can be found by following the provided links. We describe our original software module that implements the algorithm for determining the registered security events. The module is based on the tabular processor certified by the Russian Federal Service for Technical and Export Control. We present a control sample for testing the developed module. The sample has the dimension 30x20 and contains 14 choices for threshold values of security events number. The results of the tests comply with the specified boundary conditions and demonstrate a nonlinear dependence of the objective function on the number of registered security events, as well as a nonlinear dependence of the percentage of the detected security event on the total initial number of security events to be registered at the event source. The performance of the module specifically, the central processing unit usage is found acceptable (not exceeding 33%, which allows one to use the software for typical automated workplaces equipped with appropriate tabular processors. Our approach is universal with respect to the application areas.

  7. Nutrition security under extreme events

    Science.gov (United States)

    Martinez, A.

    2017-12-01

    Nutrition security under extreme events. Zero hunger being one of the Sustainable Development Goal from the United Nations, food security has become a trending research topic. However extreme events impact on global food security is not yet 100% understood and there is a lack of comprehension of the underlying mechanisms of global food trade and nutrition security to improve countries resilience to extreme events. In a globalized world, food is still a highly regulated commodity and a strategic resource. A drought happening in a net food-exporter will have little to no effect on its own population but the repercussion on net food-importers can be extreme. In this project, we propose a methodology to describe and quantify the impact of a local drought to human health at a global scale. For this purpose, nutrition supply and global trade data from FAOSTAT have been used with domestic food production from national agencies and FAOSTAT, global precipitation from the Climate Research Unit and health data from the World Health Organization. A modified Herfindahl-Hirschman Index (HHI) has been developed to measure the level of resilience of one country to a drought happening in another country. This index describes how a country is dependent of importation and how diverse are its importation. Losses of production and exportation due to extreme events have been calculated using yield data and a simple food balance at country scale. Results show that countries the most affected by global droughts are the one with the highest dependency to one exporting country. Changes induced by droughts also disturbed their domestic proteins, fat and calories supply resulting most of the time in a higher intake of calories or fat over proteins.

  8. In Whom Do We Trust - Sharing Security Events

    NARCIS (Netherlands)

    Steinberger, Jessica; Kuhnert, Benjamin; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2016-01-01

    Security event sharing is deemed of critical importance to counteract large-scale attacks at Internet service provider (ISP) networks as these attacks have become larger, more sophisticated and frequent. On the one hand, security event sharing is regarded to speed up organization's mitigation and

  9. First Dutch Process Control Security Event

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2008-01-01

    On May 21st , 2008, the Dutch National Infrastructure against Cyber Crime (NICC) organised their first Process Control Security Event. Mrs. Annemarie Zielstra, the NICC programme manager, opened the event. She welcomed the over 100 representatives of key industry sectors. “Earlier studies in the

  10. Third Dutch Process Security Control Event

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2009-01-01

    On June 4th, 2009, the third Dutch Process Control Security Event took place in Amsterdam. The event, organised by the Dutch National Infrastructure against Cybercrime (NICC), attracted both Dutch process control experts and members of the European SCADA and Control Systems Information Exchange

  11. Mining known attack patterns from security-related events

    Directory of Open Access Journals (Sweden)

    Nicandro Scarabeo

    2015-10-01

    Full Text Available Managed Security Services (MSS have become an essential asset for companies to have in order to protect their infrastructure from hacking attempts such as unauthorized behaviour, denial of service (DoS, malware propagation, and anomalies. A proliferation of attacks has determined the need for installing more network probes and collecting more security-related events in order to assure the best coverage, necessary for generating incident responses. The increase in volume of data to analyse has created a demand for specific tools that automatically correlate events and gather them in pre-defined scenarios of attacks. Motivated by Above Security, a specialized company in the sector, and by National Research Council Canada (NRC, we propose a new data mining system that employs text mining techniques to dynamically relate security-related events in order to reduce analysis time, increase the quality of the reports, and automatically build correlated scenarios.

  12. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  13. Multitask Learning-Based Security Event Forecast Methods for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hui He

    2016-01-01

    Full Text Available Wireless sensor networks have strong dynamics and uncertainty, including network topological changes, node disappearance or addition, and facing various threats. First, to strengthen the detection adaptability of wireless sensor networks to various security attacks, a region similarity multitask-based security event forecast method for wireless sensor networks is proposed. This method performs topology partitioning on a large-scale sensor network and calculates the similarity degree among regional subnetworks. The trend of unknown network security events can be predicted through multitask learning of the occurrence and transmission characteristics of known network security events. Second, in case of lacking regional data, the quantitative trend of unknown regional network security events can be calculated. This study introduces a sensor network security event forecast method named Prediction Network Security Incomplete Unmarked Data (PNSIUD method to forecast missing attack data in the target region according to the known partial data in similar regions. Experimental results indicate that for an unknown security event forecast the forecast accuracy and effects of the similarity forecast algorithm are better than those of single-task learning method. At the same time, the forecast accuracy of the PNSIUD method is better than that of the traditional support vector machine method.

  14. Impacts of Floods Events on Food Security

    Science.gov (United States)

    Caporali, E.; Pacetti, T.; Rulli, M. C.

    2017-12-01

    The analysis of the interactions among natural disasters and food security is particularly significant for developing countries where food availability (one of the four pillars of food security together with access, utilization and stability) can be highly jeopardize by extreme events that damage the primary access to food, i.e. the agriculture. The main objective of this study is to analyze the impact of flood events on food security for two disastrous flood events in Bangladesh on 2007 and in Pakistan on 2010, selected here as case studies based on the existing literature related to extreme floods.The adopted methodology integrates remote sensing data, agricultural statistics, and water footprint values in order to (i) evaluating the potentially affected agricultural areas; (ii) converting the affected areas into crop loss; (iii) estimating the associated calories and water footprint losses. In Bangladesh, the estimated lost rice is around 12.5% of the total potential production, which implies a 5.3% calories loss with respect to the total potential energy provided by rice and 4.4% of total WF associated to national food supply. In Pakistan, the results show a crops loss of 19% for sugarcane and 40% for rice, with a related calories loss of 8.5% and a WF loss of 13.5%.The results highlight the countries vulnerability to flood, being both countries strongly dependent on local agricultural production. The 2007 flood event reflected critically upon Bangladeshi food security, almost doubling the existing food deficit. The same happened in Pakistan where an already scarce food supply has been worsened by the 2010 flood.Method results are fully repeatable; whereas, for remote sensed data the sources of data are valid worldwide and the data regarding land use and crops characteristics are strongly site specific, which need to be carefully evaluated.These case studies stress the importance of integrating different analysis approaches to carry out an assessment of the

  15. Nuclear Security Systems and Measures for Major Public Events. Implementing Guide

    International Nuclear Information System (INIS)

    2012-01-01

    Terrorism remains a threat to international stability and security. High profile international and national major public events occur regularly, capturing great public interest and receiving intense media coverage. It is widely acknowledged that there is a substantial threat of a terrorist attack on major public events such as high profile political or economic summit meetings or major sporting contests. The threat of nuclear and radiological terrorism remains on the international security agenda. Nevertheless, to reduce this risk, the international community has made great progress in securing nuclear and other radioactive material that could otherwise be used in a terrorist act. This progress is contingent on the efforts of all States to adopt strong nuclear security systems and measures. There are large quantities of diverse radioactive material in existence, which are used in areas such as health, the environment, agriculture and industry. The hazards of this material vary according to composition and intensity. Additionally, the use of explosives in combination with this material can drastically enhance the impact of a criminal or terrorist act. If a criminal or terrorist group managed to detonate a so-called 'dirty' bomb in an urban area, the result could be mass panic, widespread radioactive contamination and major economic and social disruption. Major public events are seldom held in the same State or at the same location or even at the same venue. At the national level, the hosting of major public events with proper nuclear security arrangements can provide a foundation on which to build an enduring national framework for nuclear security; one that can exist long after the event. The organization of a major public event in which large numbers of people congregate presents complex security challenges for the State hosting such an event. Criminal or terrorist acts involving nuclear or other radioactive material at any major public event could result in

  16. Event-related stresses in energy systems and their effects on energy security

    International Nuclear Information System (INIS)

    Hughes, Larry; Ranjan, Ashish

    2013-01-01

    Energy systems change over time as events, such as grid failures, new energy sources, and extreme weather conditions, occur, often affecting the system's energy security. Understanding events, their causes, and how they are handled, can help a jurisdiction and its energy stakeholders develop better, evidence-based energy policy. This paper employs a definition of stress in combination with systems analysis to specify methods for explaining the states through which an energy process, chain, or system passes in response to an event and how this response results in energy security improving, deteriorating, or being maintained. The definition uses three dimensions-availability, affordability, and acceptability-derived from the International Energy Agency's definition of energy security to show when and how a system's energy security will change. Examples are used to illustrate the application of the methods. - Highlights: • A generic set of methods and a common terminology to formalize the ongoing energy security discourse is proposed. • The methods define, measure and explain how energy security can change when events cause stresses in an energy system. • Events are classified in terms of three dimensions derived from the IEA's definition of energy security. • The application of the method is illustrated with detailed examples

  17. Security information and event management systems: benefits and inefficiencies

    OpenAIRE

    Κάτσαρης, Δημήτριος Σ.

    2014-01-01

    In this Master’s thesis, the new trend in computer and information security industry called Security Information and Event Management systems will be covered. The evolution, advantages and weaknesses of these systems will be described, as well as a home-based implementation with open source tools will be proposed and implemented.

  18. Nuclear Security Systems and Measures for Major Public Events. Implementing Guide (Russian Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    Terrorism remains a threat to international stability and security. High profile international and national major public events occur regularly, capturing great public interest and receiving intense media coverage. It is widely acknowledged that there is a substantial threat of a terrorist attack on major public events such as high profile political or economic summit meetings or major sporting contests. The threat of nuclear and radiological terrorism remains on the international security agenda. Nevertheless, to reduce this risk, the international community has made great progress in securing nuclear and other radioactive material that could otherwise be used in a terrorist act. This progress is contingent on the efforts of all States to adopt strong nuclear security systems and measures. There are large quantities of diverse radioactive material in existence, which are used in areas such as health, the environment, agriculture and industry. The hazards of this material vary according to composition and intensity. Additionally, the use of explosives in combination with this material can drastically enhance the impact of a criminal or terrorist act. If a criminal or terrorist group managed to detonate a so-called 'dirty' bomb in an urban area, the result could be mass panic, widespread radioactive contamination and major economic and social disruption. Major public events are seldom held in the same State or at the same location or even at the same venue. At the national level, the hosting of major public events with proper nuclear security arrangements can provide a foundation on which to build an enduring national framework for nuclear security; one that can exist long after the event. The organization of a major public event in which large numbers of people congregate presents complex security challenges for the State hosting such an event. Criminal or terrorist acts involving nuclear or other radioactive material at any major public event could result in

  19. Underground Test Area Quality Assurance Project Plan Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Irene Farnham

    2011-05-01

    This Quality Assurance Project Plan (QAPP) provides the overall quality assurance (QA) program requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Underground Test Area (UGTA) Sub-Project (hereafter the Sub-Project) activities. The requirements in this QAPP are consistent with DOE Order 414.1C, Quality Assurance (DOE, 2005); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). The QAPP Revision 0 supersedes DOE--341, Underground Test Area Quality Assurance Project Plan, Nevada Test Site, Nevada, Revision 4.

  20. Security, Violent Events, and Anticipated Surge Capabilities of Emergency Departments in Washington State

    Science.gov (United States)

    Weyand, Jonathan S.; Junck, Emily; Kang, Christopher S.; Heiner, Jason D.

    2017-01-01

    Introduction Over the past 15 years, violent threats and acts against hospital patients, staff, and providers have increased and escalated. The leading area for violence is the emergency department (ED) given its 24/7 operations, role in patient care, admissions gateway, and center for influxes during acute surge events. This investigation had three objectives: to assess the current security of Washington State EDs; to estimate the prevalence of and response to threats and violence in Washington State EDs; and to appraise the Washington State ED security capability to respond to acute influxes of patients, bystanders, and media during acute surge events. Methods A voluntary, blinded, 28-question Web-based survey developed by emergency physicians was electronically delivered to all 87 Washington State ED directors in January 2013. We evaluated responses by descriptive statistical analyses. Results Analyses occurred after 90% (78/87) of ED directors responded. Annual censuses of the EDs ranged from violent threats or acts occurring in their ED. Of these, 93% were directed towards nursing staff, 90% towards physicians, 74% towards security personnel, and 51% towards administrative personnel. Nearly half (48%) noted incidents directed towards another patient, and 50% towards a patient’s family or friend. These events were variably reported to the hospital administration. After an acute surge event, 35% believed the initial additional security response would not be adequate, with 26% reporting no additional security would be available within 15 minutes. Conclusion Our study reveals the variability of ED security staffing and a heterogeneity of capabilities throughout Washington State. These deficiencies and vulnerabilities highlight the need for other EDs and regional emergency preparedness planners to conduct their own readiness assessments. PMID:28435498

  1. After Halliburton: Event Studies and Their Role in Federal Securities Fraud Litigation

    NARCIS (Netherlands)

    J.E. Fisch (Jill); J.B. Gelbach (Jonah); J.M. Klick (Jonathan)

    2016-01-01

    markdownabstractEvent studies have become increasingly important in securities fraud litigation after the Supreme Court’s decision in Halliburton II. Litigants have used event study methodology, which empirically analyzes the relationship between the disclosure of corporate information and the

  2. Strengthening Security during Sporting Events by Unmannde Aerial Vehicles

    NARCIS (Netherlands)

    Evers, L.

    2012-01-01

    This paper shows how Unmanned Aerial Vehicles (UAVs) can improve security in major sporting events. Given the increase in violence among sports fans it is important to timely monitor possible conflict locations. A UAV can patrol and remotely monitor the activity at these locations. Such a patrol

  3. Cyber indicators of compromise: a domain ontology for security information and event management

    Science.gov (United States)

    2017-03-01

    heuristics, mapping, and detection. CybOX is aimed at supporting a broad range of important cyber security domains to include [31]: • Digital...REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE CYBER INDICATORS OF COMPROMISE: A DOMAIN ONTOLOGY FOR SECURITY INFORMATION AND...Distribution is unlimited. CYBER INDICATORS OF COMPROMISE: A DOMAIN ONTOLOGY FOR SECURITY INFORMATION AND EVENT MANAGEMENT Marsha D. Rowell

  4. Discrete-Event Simulation with Agents for Modeling of Dynamic Asymmetric Threats in Maritime Security

    National Research Council Canada - National Science Library

    Ng, Chee W

    2007-01-01

    .... Discrete-event simulation (DES) was used to simulate a typical port-security, local, waterside-threat response model and to test the adaptive response of asymmetric threats in reaction to port-security procedures, while a multi-agent system (MAS...

  5. Event reporting guidelines 10 CFR 50.72 and 50.73. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Allison, D P; Harper, M R; Jones, W R; MacKinnon, J B; Sandin, S S

    1998-01-01

    Revision 1 to NUREG-1022 clarifies the immediate notification requirements of Title 10 of the Code of Federal Regulations, Part 50, Section 50.72 (10 CFR 50.72), and the 30-day written licensee event report (LER) requirements of 10 CFR 50.73 for nuclear power plants. This revision was initiated to improve the reporting guidelines related to 10 CFR 50.72 and 50.73 and to consolidate these guidelines into a single reference document. A first draft of this document was noticed for public comment in the Federal Register on october 7, 1991 (56 FR 50598). A second draft was noticed for comment in the Federal Register on February 7, 1994 (59 FR 5614). This document updates and supersedes NUREG-1022 and its Supplements 1 and 2 (published in September 1983, February 1984, and September 1985, respectively). It does not change the reporting requirements of 10 CFR 50.72 and 50.73.

  6. Event reporting guidelines 10 CFR 50.72 and 50.73. Revision 1

    International Nuclear Information System (INIS)

    Allison, D.P.; Harper, M.R.; Jones, W.R.; MacKinnon, J.B.; Sandin, S.S.

    1998-01-01

    Revision 1 to NUREG-1022 clarifies the immediate notification requirements of Title 10 of the Code of Federal Regulations, Part 50, Section 50.72 (10 CFR 50.72), and the 30-day written licensee event report (LER) requirements of 10 CFR 50.73 for nuclear power plants. This revision was initiated to improve the reporting guidelines related to 10 CFR 50.72 and 50.73 and to consolidate these guidelines into a single reference document. A first draft of this document was noticed for public comment in the Federal Register on october 7, 1991 (56 FR 50598). A second draft was noticed for comment in the Federal Register on February 7, 1994 (59 FR 5614). This document updates and supersedes NUREG-1022 and its Supplements 1 and 2 (published in September 1983, February 1984, and September 1985, respectively). It does not change the reporting requirements of 10 CFR 50.72 and 50.73

  7. Nuclear Security Systems and Measures for Major Public Events. Implementing Guide (French Edition)

    International Nuclear Information System (INIS)

    2017-01-01

    This publication provides an overview, based on practical experience and lessons learned, for establishing nuclear security systems and measures for major public events. It covers technical and administrative nuclear security measures for developing the necessary organizational structure, developing plans, strategies and concepts of operations, and making arrangements for implementing the developed plans, strategies and concepts.

  8. Analysis of postulated events for the revised ALMR/PRISM design

    International Nuclear Information System (INIS)

    Slovik, G.C.; Tuyle, G.J. Van

    1992-01-01

    The Nuclear Regulatory Commission (NRC) is continuing a pre-application review of the 471 MWt, liquid metal reactor, PRISM, by General Electric, with Brookhaven National Laboratory providing technical support. The revised design has been evaluated, using the SSC code, for an unscrammed loss of heat sink (ULOHS), an unscrammed loss of flow (ULOF) with and without the Gas Expansion Modules (GEMs), and a 40 cents unscrammed transient overpower (UTOP) event. The feedback effects for U-27Pu-10Zr metal fuel were modeled in SSC. The ULOHS accident was determined to be a benign event for the design, with the reactor power transitioning down to a decay heat level within 500s. The power during the postulated ULOF events, with the GEMs functioning, transitioned to decay heat levels without fuel damage, and included a 300K margin to sodium saturation. The case without the GEMs had only a 160K margin to sodium saturation and higher fuel temperatures. In addition, the clad was predicted to quickly pass through the eutectic phase (between fuel and clad), and some clad wastage would result. The 40 cents UTOP was predicted to raise the power to 1.8 rated, which later stabilized near 1.2 times full power. SSC predicted some localized fuel melting for the event, but the significance of this localized damage has not yet been determined. If necessary, the vendor has options to reduce the maximum reactivity insertion below 40 cents

  9. Analysis of postulated events for the revised ALMR/PRISM design

    International Nuclear Information System (INIS)

    Slovik, G.C.; Van Tuyle, G.J.

    1991-01-01

    The Nuclear Regulatory Commission (NRC) is continuing a pre-application review of the 471 MWt, Liquid Metal Reactor, PRISM by General Electric, with Brookhaven National Laboratory providing technical support. The revised design has been evaluated, using the SSC code, for an unscrammed loss of heat sink (ULOHS), an unscrammed loss of flow (ULOF) with and without the Gas Expansion Modules (GEMs), and a 40 cents unscrammed transient overpower (UTOP) event. The feedback effects for U-27Pu-10Zr metal fuel were modeled in SSC. The ULOHS accident was determined to be a benign event for the design, with the reactor power transitioning down to a decay heat level within 500s. The power during the postulated ULOF events, with the GEMs functioning, transitioned to decay heat levels without fuel damage, and included a 300K margin to sodium saturation. The case without the GEMs had only a 160K margin to sodium saturation and higher fuel temperatures. In addition, the clad was predicted to quickly pass through the eutectic phase (between fuel and clad), and some clad wastage would result. The 40 cents UTOP was predicted to raise the power to 1.8 rated, which later stabilized near 1.2 times full power. SSC predicted some localized fuel melting for the event, but the significance of this localized damage has not yet been determined. If necessary, the vendor has options to reduce the maximum reactivity insertion below 40 cents

  10. Test Standard Revision Update: JESD57, "Procedures for the Measurement of Single-Event Effects in Semiconductor Devices from Heavy-Ion Irradiation"

    Science.gov (United States)

    Lauenstein, Jean-Marie

    2015-01-01

    The JEDEC JESD57 test standard, Procedures for the Measurement of Single-Event Effects in Semiconductor Devices from Heavy-Ion Irradiation, is undergoing its first revision since 1996. In this talk, we place this test standard into context with other relevant radiation test standards to show its importance for single-event effect radiation testing for space applications. We show the range of industry, government, and end-user party involvement in the revision. Finally, we highlight some of the key changes being made and discuss the trade-space in which setting standards must be made to be both useful and broadly adopted.

  11. Underground Test Area Fiscal Year 2012 Annual Quality Assurance Report Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Marutzky, Sam [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2013-01-01

    This report is mandated by the Underground Test Area (UGTA) Quality Assurance Project Plan (QAPP) and identifies the UGTA quality assurance (QA) activities for fiscal year (FY) 2012. All UGTA organizations—U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO); Desert Research Institute (DRI); Lawrence Livermore National Laboratory (LLNL); Los Alamos National Laboratory (LANL); Navarro-Intera, LLC (N-I); National Security Technologies, LLC (NSTec); and the U.S. Geological Survey (USGS)—conducted QA activities in FY 2012. The activities included conducting assessments, identifying findings and completing corrective actions, evaluating laboratory performance, revising the QAPP, and publishing documents. In addition, processes and procedures were developed to address deficiencies identified in the FY 2011 QAPP gap analysis.

  12. Changes in Extreme Events and the Potential Impacts on National Security

    Science.gov (United States)

    Bell, J.

    2017-12-01

    Extreme weather and climate events affect human health by causing death, injury, and illness, as well as having large socio-economic impacts. Climate change has caused changes in extreme event frequency, intensity and geographic distribution, and will continue to be a driver for changes in the future. Some of the extreme events that have already changed are heat waves, droughts, wildfires, flooding rains, coastal flooding, storm surge, and hurricanes. The pathways connecting extreme events to health outcomes and economic losses can be diverse and complex. The difficulty in predicting these relationships comes from the local intricacies of societal and environmental factors that influences the level of exposure. The goal of this presentation is to discuss the national security implications of changes in extreme weather events and demonstrate how changes in extremes can lead to a host cascading issues. To illustrate this point, this presentation will provide examples of the various pathways that extreme events can increase disease burden and cause economic stress.

  13. The New Indices of Religious Orientation Revised (NIROR: A Study among Canadian Adolescents Attending a Baptist Youth Mission and Service Event

    Directory of Open Access Journals (Sweden)

    Leslie J. Francis

    2016-05-01

    Full Text Available This study explores the properties of the New Indices of Religious Orientation Revised (NIROR among a sample of 521 Canadian adolescents attending a Baptist youth mission and service event, ranging in age from 12 to 19 years. This revision simplified the language of the original instrument to increase its accessibility among young people. The data support the internal consistency reliability and construct validity of the three revised nine-item scales designed to operationalise extrinsic religious orientation, intrinsic religious orientation, and quest religious orientation.

  14. Policy revision in health enterprise information security: P3WG final report

    Science.gov (United States)

    Sostrom, Kristen; Collmann, Jeff R.

    2003-05-01

    Health information management policies usually address the use of paper records with little or no mention of electronic health records. Information Technology (IT) policies often ignore the health care business needs and operational use of the information stored in its systems. Representatives from the Telemedicine & Advanced Technology Research Center (TATRC), TRICARE and Offices of the Surgeon General of each Military Service, collectively referred to as the Policies, Procedures and Practices Work Group (P3WG) examined military policies and regulations relating to computer-based information systems and medical records management. Using an interdisciplinary and interservice QA approach they compared existing military policies with the Health Insurance Portability and Accountability Act (HIPAA) Security Rule to identify gaps and discrepancies. The final report, including a plain English explanation of the individual standards and relevance to the Department of Defense (DoD), a comparative analysis and recommendations, will feed in to the security management process and HIPAA implementation efforts at multiple levels within the DoD. In light of High Reliability Theory, this process models how large enterprises may coordinate policy revision and reform across broad organizational and work domains, building consensus on key policy reforms among military stakeholders across different disciplines, levels of command hierarchy and services.

  15. EXAMINATION OF SECURITY EVENTS AS DBEs FOR MGDS IMPORTANT TO SAFETY SSCs

    International Nuclear Information System (INIS)

    J.M. Hartsell

    1998-01-01

    A portion of the safeguards and security system for the Mined Geologic Disposal System (MGDS) has been identified as QA-1 based on the classification of structures, systems, and components (SSCs) performed in accordance with QAP-2-3, ''Classification of Permanent Items'' (Reference 5.2). The classification analysis, ''Classification of the Preliminary MGDS Repository Design'' (Reference 5.9), identifies the ''Safeguards Material Control and Accountability'' system as a QA-1 SSC based on the identification of unauthorized intrusion, sabotage, theft, and diversion as potential Design Basis Events (DBEs). The purpose of this analysis is to provide justification to eliminate these events as DBEs for the MGDS based on a review of the Codes of Federal Regulation (CFRs) for geologic repositories (10 CFR 60), commercial reactor facilities (10 CFR 50), independent spent fuel storage installations (ISFSIs) and monitored retrievable storage (MRS) installations (10 CFR 72), and other relevant guidance documents in an effort to clarify that security events should not be considered in the QA design process of important to safety SSCs for the MGDS. The MGDS is a first of a kind geologic repository and no licensing precedent has been established for this type of facility

  16. 75 FR 36126 - Office of New Reactors; Proposed Revision to Standard Review Plan Section 13.6.1, Revision 1 on...

    Science.gov (United States)

    2010-06-24

    ... Standard Review Plan Section 13.6.1, Revision 1 on Physical Security--Combined License and Operating...), Section 13.6.1 on ``Physical Security--Combined License and Operating Reactors,'' (Agencywide Documents Access and Management System (ADAMS) Accession No. ML100350158). The Office of Nuclear Security and...

  17. EDAS: An Evaluation Prototype for Autonomic Event-Driven Adaptive Security in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Waqas Aman

    2015-07-01

    Full Text Available In Internet of Things (IoT, the main driving technologies are considered to be tiny sensory objects. These objects cannot host traditional preventive and detective technologies to provide protection against the increasing threat sophistication. Furthermore, these solutions are limited to analyzing particular contextual information, for instance network information or files, and do not provide holistic context for risk analysis and response. Analyzing a part of a situation may lead to false alarms and later to unnecessary and incorrect configurations. To overcome these concerns, we proposed an event-driven adaptive security (EDAS model for IoT. EDAS aims to observe security events (changes generated by various things in the monitored IoT environment, investigates any intentional or unintentional risks associated with the events and adapts to it autonomously. It correlates different events in time and space to reduce any false alarms and provides a mechanism to predict attacks before they are realized. Risks are responded to autonomically by utilizing a runtime adaptation ontology. The mitigation action is chosen after assessing essential information, such as the risk faced, user preferences, device capabilities and service requirements. Thus, it selects an optimal mitigation action in a particular adverse situation. The objective of this paper is to investigate EDAS feasibility and its aptitude as a real-world prototype in a remote patient monitoring context. It details how EDAS can be a practical choice for IoT-eHealth in terms of the security, design and implementation features it offers as compared to traditional security controls. We have explained the prototype’s major components and have highlighted the key technical challenges.

  18. Underground Test Area Activity Quality Assurance Plan Nevada National Security Site, Nevada. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Krenzien, Susan [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2012-10-01

    This Quality Assurance Plan (QAP) provides the overall quality assurance (QA) requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Underground Test Area (UGTA) activities. The requirements in this QAP are consistent with DOE Order 414.1C, Quality Assurance (DOE, 2005); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). NNSA/NSO, or designee, must review this QAP every two years. Changes that do not affect the overall scope or requirements will not require an immediate QAP revision but will be incorporated into the next revision cycle after identification. Section 1.0 describes UGTA objectives, participant responsibilities, and administrative and management quality requirements (i.e., training, records, procurement). Section 1.0 also details data management and computer software requirements. Section 2.0 establishes the requirements to ensure newly collected data are valid, existing data uses are appropriate, and environmental-modeling methods are reliable. Section 3.0 provides feedback loops through assessments and reports to management. Section 4.0 provides the framework for corrective actions. Section 5.0 provides references for this document.

  19. A Description of the Revised ATHEANA (A Technique for Human Event Analysis)

    International Nuclear Information System (INIS)

    FORESTER, JOHN A.; BLEY, DENNIS C.; COOPER, SUSANE; KOLACZKOWSKI, ALAN M.; THOMPSON, CATHERINE; RAMEY-SMITH, ANN; WREATHALL, JOHN

    2000-01-01

    This paper describes the most recent version of a human reliability analysis (HRA) method called ''A Technique for Human Event Analysis'' (ATHEANA). The new version is documented in NUREG-1624, Rev. 1 [1] and reflects improvements to the method based on comments received from a peer review that was held in 1998 (see [2] for a detailed discussion of the peer review comments) and on the results of an initial trial application of the method conducted at a nuclear power plant in 1997 (see Appendix A in [3]). A summary of the more important recommendations resulting from the peer review and trial application is provided and critical and unique aspects of the revised method are discussed

  20. Validation of the Revised Stressful Life Event Questionnaire Using a Hybrid Model of Genetic Algorithm and Artificial Neural Networks

    Directory of Open Access Journals (Sweden)

    Rasoul Sali

    2013-01-01

    Full Text Available Objectives. Stressors have a serious role in precipitating mental and somatic disorders and are an interesting subject for many clinical and community-based studies. Hence, the proper and accurate measurement of them is very important. We revised the stressful life event (SLE questionnaire by adding weights to the events in order to measure and determine a cut point. Methods. A total of 4569 adults aged between 18 and 85 years completed the SLE questionnaire and the general health questionnaire-12 (GHQ-12. A hybrid model of genetic algorithm (GA and artificial neural networks (ANNs was applied to extract the relation between the stressful life events (evaluated by a 6-point Likert scale and the GHQ score as a response variable. In this model, GA is used in order to set some parameter of ANN for achieving more accurate results. Results. For each stressful life event, the number is defined as weight. Among all stressful life events, death of parents, spouse, or siblings is the most important and impactful stressor in the studied population. Sensitivity of 83% and specificity of 81% were obtained for the cut point 100. Conclusion. The SLE-revised (SLE-R questionnaire despite simplicity is a high-performance screening tool for investigating the stress level of life events and its management in both community and primary care settings. The SLE-R questionnaire is user-friendly and easy to be self-administered. This questionnaire allows the individuals to be aware of their own health status.

  1. Security of radioactive sources. Interim guidance for comment

    International Nuclear Information System (INIS)

    2003-06-01

    In previous IAEA publications, there have been only rather general security requirements for non-nuclear radioactive material. These requirements were primarily directed to such issues as unintentional exposure to radiation, negligence and inadvertent loss. However, it is clear that more guidance is needed to not only try and prevent further events involving orphan sources, but also to prevent the deliberate attempt to acquire radioactive sources for malevolent purposes. Member States have requested guidance on the type and nature of security measures that might be put in place and on the methodology to be used in choosing such measures. These requests were also endorsed in the findings of the international conference on 'Security of Radioactive Sources' held in March 2003. Practical advice on assessing and implementing security measures complements the general commitments in the proposed Revised Code of Conduct on Safety and Security of radioactive Sources. A Safety Guide entitled 'Safety and Security of Radiation Sources' that, amongst other things, discusses these issues is being drafted. However, it is recognized that guidance material is required before this document will be finalized in order to allow Member States opportunity to put in place appropriate actions and planning to address current issues. Hence the purpose of the current document is to provide advice on security approaches and to allow comment on detailed recommendations for levels of security on radioactive sources that may be incorporated within the Safety Guide. This report is primarily addressed to Regulatory Authorities but it is also intended to provide guidance to manufacturers, suppliers and users of sources. Its objective is to assist Member States in deciding which security measures are needed to ensure consistency with the International Basic Safety Standards and the Revised Code of Conduct for the Safety and Security of Radioactive Sources. It is recognized that there must be a

  2. Safety analysis on Non-LOCA events for the revision of Wolsong NPP unit 2,3,4 sar

    International Nuclear Information System (INIS)

    Kim, Jong Hyun; Jin, Dong Sik; Ryu, Eui Seung; Kho, Dong Wook; Kim, Sung Min

    2015-01-01

    Korean Wolsong Nuclear Power Plant Units 2,3,4 (CANDU-6 Type) has prepared the revision of safety analysis report (Final Safety Analysis Report (FSAR) chapter 15) from the original performed in the year of 1990s, using the updated and state-of-the-art methodology and tools including IST safety analysis codes and more detail modelling. Compared with the original FSAR15, the revised FSAR15 has significant improvement in both the scope and the depth of safety analysis, which has demonstrated the safety analysis results have complied with the safety requirements(acceptance criteria). This paper will present the analysis scope for Non-LOCA events re-analyzed or added for the FSAR15 revision, methodologies applied such as codes and modelling and some important analysis results will be demonstrated with comparison to acceptance criteria. Application of more detail and near-realistic assumptions and method including Dev-PDO options and uncertainty related to the CHF correlations has altogether brought about more safety margin compared with the original FSAR15 with respect to SDS trip effectiveness etc. (author)

  3. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  4. Underground Test Area Activity Quality Assurance Plan Nevada National Security Site, Nevada. Revision 2

    Energy Technology Data Exchange (ETDEWEB)

    Krenzien, Susan [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2015-06-01

    This Quality Assurance Plan (QAP) provides the overall quality assurance (QA) requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) activities. The requirements in this QAP are consistent with DOE Order 414.1D, Change 1, Quality Assurance (DOE, 2013a); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). If a participant’s requirement document differs from this QAP, the stricter requirement will take precedence. NNSA/NFO, or designee, must review this QAP every two years. Changes that do not affect the overall scope or requirements will not require an immediate QAP revision but will be incorporated into the next revision cycle after identification. Section 1.0 describes UGTA objectives, participant responsibilities, and administrative and management quality requirements (i.e., training, records, procurement). Section 1.0 also details data management and computer software requirements. Section 2.0 establishes the requirements to ensure newly collected data are valid, existing data uses are appropriate, and environmental-modeling methods are reliable. Section 3.0 provides feedback loops through assessments and reports to management. Section 4.0 provides the framework for corrective actions. Section 5.0 provides references for this document.

  5. Sports Venue Security: Public Policy Options for Sear 4-5 Events

    Science.gov (United States)

    2014-06-01

    team which commands the highest attendance is the world-renowned New York Yankees franchise . The Yankees games average 10,300 people per pre-season...spectator-patron buy -in to partner with the government and private sector for funding SEAR 4–5 venue security. As shown in Chapter III, the sports...now. Further, the sports ticket buying public has also accepted the purely for profit convenience fees already attached to sporting event ticket

  6. Nuclear security in major public events: the XV Pan American Games and the III Para-Pan American Games in Brazil

    International Nuclear Information System (INIS)

    Mello, Luiz A. de; Monteiro Filho, Joselio S.; Belem, Lilia M.J.; Torres, Luiz F.B.

    2009-01-01

    The organization of a major public event involving large numbers of spectators and participants, presents important security challenges. Taking this into consideration, the Brazilian Nuclear Energy Commission (CNEN) has been requested, by the National Secretary of Public Security/ Ministry of Justice (SENASP/MJ), by the end of 2006, to participate on the security actions to be implemented in both the XV Pan American Games and III Para Pan American Games. The XV Pan American Games 2007 and the III Para Pan American Games were held in Rio de Janeiro, Brazil from 13 to 29 July 2007 and from 12 to 19 August 2007, respectively. Those events had 8700 participants between athletes, coaches and referees from 42 countries. More than 300 competition events were held at 17 different venues and were covered by 4910 professionals from TV, radio and written press. Around 2 million tickets have been sold or distributed and 18,000 volunteers participated on the organization. The participation of CNEN was concentrated on the implementation of specific nuclear and radiological security measures to be applied at those events. This was part of a multi-institutional plan for the security of the Games, coordinated by the National Secretary of Public Security of the Ministry of Justice (SENASP/MJ). The support provided by IAEA under a Cooperation Arrangement with the Brazilian authorities was a key factor for the success of the whole operation. The actions taken and the lessons identified by the Brazilian Nuclear Energy Commission related to nuclear and radiological security for the Pan American Games and for the Para Pan American Games are presented. (author)

  7. 78 FR 13897 - Final Revision and Publication of the 2012 Form M-1, Notice

    Science.gov (United States)

    2013-03-01

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration RIN 1210-AB51 Final Revision and Publication of the 2012 Form M-1, Notice AGENCY: Employee Benefits Security Administration, Department of... revisions to the Form M-1, Report for Multiple Employer Welfare Arrangements (MEWAs) and Certain Entities...

  8. 78 FR 25521 - Revised Medical Criteria for Evaluating Visual Disorders

    Science.gov (United States)

    2013-05-01

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2010-0078] Revised Medical Criteria for Evaluating Visual Disorders AGENCY: Social Security Administration. ACTION: Final rules; Correction. SUMMARY: The Social Security Administration published a document in the Federal Register of March 28, 2013, in FR Doc...

  9. Emergency medical consequence planning and management for national special security events after September 11: Boston 2004.

    Science.gov (United States)

    Kade, Kristy A; Brinsfield, Kathryn H; Serino, Richard A; Savoia, Elena; Koh, Howard K

    2008-10-01

    The post-September 11 era has prompted unprecedented attention to medical preparations for national special security events (NSSE), requiring extraordinary planning and coordination among federal, state, and local agencies. For an NSSE, the US Secret Service (USSS) serves as the lead agency for all security operations and coordinates with relevant partners to provide for the safety and welfare of participants. For the 2004 Democratic National Convention (DNC), designated an NSSE, the USSS tasked the Boston Emergency Medical Services (BEMS) of the Boston Public Health Commission with the design and implementation of health services related to the Convention. In this article, we describe the planning and development of BEMS' robust 2004 DNC Medical Consequence Management Plan, addressing the following activities: public health surveillance, on-site medical care, surge capacity in the event of a mass casualty incident, and management of federal response assets. Lessons learned from enhanced medical planning for the 2004 DNC may serve as an effective model for future mass gathering events.

  10. Aggressive Event Incidence using the Staff Observation of Aggression Scale-Revised (SOAS-R): A Longitudinal Study.

    Science.gov (United States)

    Iennaco, Joanne DeSanto; Whittemore, Robin; Dixon, Jane

    2017-09-01

    The aim of this study was to identify aggressive event incidence rates in the inpatient psychiatric setting, describe characteristics of events and differences based on aggression target and type (verbal vs. physical). A longitudinal study was carried out of aggressive events identified by workers in four inpatient psychiatric units using the Staff Observation of Aggression Scale-Revised (SOAS-R) over 6 weeks. A total of 113 aggressive events were recorded resulting in a rate of 13.27 events per bed per year. Verbal aggression was demonstrated in 86 % and physical aggression in 57 % of events. Most events (70.8 %, n = 81) targeted a worker. Compared to other targets, workers were 3.4 times more likely to feel threatened (95 % CI 1.2-9.6, χ 2  = 5.08, p = 0.0242), and less likely to have a visible injury (OR 0.15, 95 % CI 0.04-0.6; χ 2  = 7.1, p = 0.0078). Event severity ranged from 0 to 21 with a mean of 9.5(SD = 5.1), with 20 % considered severe. Verbal events had lower mean severity of 6.5(SD = 3.8) versus physical events with a severity of 11.8(SD = 4.8; t = 6.5, df = 111, p Aggression incidence was similar to incidence found in other studies. Workers were the target of most aggressive events and many were identified as having no understandable provocation. Further understanding of event characteristics will promote more effective prevention and management of aggressive events.

  11. Integrated security systems design a complete reference for building enterprise-wide digital security systems

    CERN Document Server

    Norman, Thomas L

    2014-01-01

    Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. With a flexible and scalable enterprise-level system, security decision makers can make better informed decisions when incidents occur and improve their operational efficiencies in ways never before possible. The revised edition covers why designing an integrated security system is essential a

  12. Instructions for preparation of data entry sheets for Licensee Event Report (LER) file. Revision 1. Instruction manual

    International Nuclear Information System (INIS)

    1977-07-01

    The manual provides instructions for the preparation of data entry sheets for the licensee event report (LER) file. It is a revision to an interim manual published in October 1974 in 00E-SS-001. The LER file is a computer-based data bank of information using the data entry sheets as input. These data entry sheets contain pertinent information in regard to those occurrences required to be reported to the NRC. The computer-based data bank provides a centralized source of data that may be used for qualitative assessment of the nature and extent of off-normal events in the nuclear industry and as an index of source information to which users may refer for more detail

  13. 77 FR 6954 - Special Local Regulations; Safety and Security Zones; Recurring Events in Captain of the Port...

    Science.gov (United States)

    2012-02-10

    ... necessary security zone, and (3) updating and reorganizing existing regulations for ease of use and... provide the event name, and type, as well as locations of the events. Annual notifications will be made to..., before the effective period, the Coast Guard will issue notice of the time and location of each regulated...

  14. A Development Framework for Software Security in Nuclear Safety Systems: Integrating Secure Development and System Security Activities

    Energy Technology Data Exchange (ETDEWEB)

    Park, Jaekwan; Suh, Yongsuk [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-02-15

    The protection of nuclear safety software is essential in that a failure can result in significant economic loss and physical damage to the public. However, software security has often been ignored in nuclear safety software development. To enforce security considerations, nuclear regulator commission recently issued and revised the security regulations for nuclear computer-based systems. It is a great challenge for nuclear developers to comply with the security requirements. However, there is still no clear software development process regarding security activities. This paper proposes an integrated development process suitable for the secure development requirements and system security requirements described by various regulatory bodies. It provides a three-stage framework with eight security activities as the software development process. Detailed descriptions are useful for software developers and licensees to understand the regulatory requirements and to establish a detailed activity plan for software design and engineering.

  15. Information security principles and practice

    CERN Document Server

    Stamp, Mark

    2011-01-01

    Now updated-your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge. Taking a pract

  16. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2003-01-01

    Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a ...must have... book, both for preparing for the CISSP exam and as a c

  17. Computer Security Handbook

    CERN Document Server

    Bosworth, Seymour; Whyne, Eric

    2012-01-01

    The classic and authoritative reference in the field of computer security, now completely updated and revised With the continued presence of large-scale computers; the proliferation of desktop, laptop, and handheld computers; and the vast international networks that interconnect them, the nature and extent of threats to computer security have grown enormously. Now in its fifth edition, Computer Security Handbook continues to provide authoritative guidance to identify and to eliminate these threats where possible, as well as to lessen any losses attributable to them. With seventy-seven chapter

  18. Knowledge of practice: A multi-sited event ethnography of border security fairs in Europe and North America.

    Science.gov (United States)

    Baird, Theodore

    2017-06-01

    This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce forms of knowledge. To explore situated knowledge of border security practices, I develop an approach to multi-sited event ethnography to observe and interpret knowledge that may be hard to access at the security fairs. The analysis focuses on mechanisms for disseminating and distributing scarce forms of knowledge, technological materializations of situated knowledge, expressions of transversal knowledge of security problems, how masculinities structure knowledge in gendered ways, and how unease is expressed through imagined futures in order to anticipate emergent solutions to proposed security problems. The article concludes by reflecting on the contradictions at play at fairs and how to address such contradictions through alternative knowledges and practices.

  19. Multi-Agent System based Event-Triggered Hybrid Controls for High-Security Hybrid Energy Generation Systems

    DEFF Research Database (Denmark)

    Dou, Chun-Xia; Yue, Dong; Guerrero, Josep M.

    2017-01-01

    This paper proposes multi-agent system based event- triggered hybrid controls for guaranteeing energy supply of a hybrid energy generation system with high security. First, a mul-ti-agent system is constituted by an upper-level central coordi-nated control agent combined with several lower......-level unit agents. Each lower-level unit agent is responsible for dealing with internal switching control and distributed dynamic regula-tion for its unit system. The upper-level agent implements coor-dinated switching control to guarantee the power supply of over-all system with high security. The internal...

  20. 75 FR 73947 - Securities of Nonmember Insured Banks

    Science.gov (United States)

    2010-11-30

    ..., DC, and should be addressed as follows: Accounting and Securities Disclosure Section, Division of..., Accounting and Securities Disclosure Section, Division of Supervision and Consumer Protection, 550 17th... comment. SUMMARY: The FDIC is revising its securities disclosure regulations applicable to state nonmember...

  1. Method and device for detecting impact events on a security barrier which includes a hollow rebar allowing insertion and removal of an optical fiber

    Science.gov (United States)

    Pies, Ross E.

    2016-03-29

    A method and device for the detection of impact events on a security barrier. A hollow rebar is farmed within a security barrier, whereby the hollow rebar is completely surrounded by the security barrier. An optical fiber passes through the interior of the hollow rebar. An optical transmitter and an optical receiver are both optically connected to the optical fiber and connected to optical electronics. The optical electronics are configured to provide notification upon the detection of an impact event at the security barrier based on the detection of disturbances within the optical fiber.

  2. Secure access control and large scale robust representation for online multimedia event detection.

    Science.gov (United States)

    Liu, Changyu; Lu, Bin; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.

  3. Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection

    Directory of Open Access Journals (Sweden)

    Changyu Liu

    2014-01-01

    Full Text Available We developed an online multimedia event detection (MED system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.

  4. Nuclear security and radiological preparedness for the olympic games, athens 2004: lessons learned for organizing major public events.

    Science.gov (United States)

    Kamenopoulou, Vassiliki; Dimitriou, Panayiotis; Hourdakis, Constantine J; Maltezos, Antonios; Matikas, Theodore; Potiriadis, Constantinos; Camarinopoulos, Leonidas

    2006-10-01

    In light of the exceptional circumstances that arose from hosting the Olympic Games in Athens in 2004 and from recent terrorist events internationally, Greece attributes the highest priority to security issues. According to its statutory role, the Greek Atomic Energy Commission is responsible for emergency preparedness and response in case of nuclear and radiological events, and advises the Government on the measures and interventions necessary to protect the public. In this context, the Commission participated in the Nuclear, Radiological, Biological, and Chemical Threat National Emergency Plan, specially developed for the Olympic Games, and coordinated by the Olympic Games Security Division. The objective of this paper is to share the experience gained during the organization of the Olympic Games and to present the nuclear security program implemented prior to, during, and beyond the Games, in order to prevent, detect, assess, and respond to the threat of nuclear terrorism. This program adopted a multi-area coverage of nuclear security, including physical protection of nuclear and radiological facilities, prevention of smuggling of radioactive materials through borders, prevention of dispersion of these materials into the Olympic venues, enhancement of emergency preparedness and response to radiological events, upgrading of the technical infrastructure, establishment of new procedures for assessing the threat and responding to radiological incidents, and training personnel belonging to several organizations involved in the National Emergency Response Plan. Finally, the close cooperation of Greek Authorities with the International Atomic Energy Agency and the U.S. Department of Energy, under the coordination of the Greek Atomic Energy Commission, is also discussed.

  5. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  6. LANL Safeguards and Security Assurance Program. Revision 6

    International Nuclear Information System (INIS)

    1995-01-01

    The Safeguards and Security (S and S) Assurance Program provides a continuous quality improvement approach to ensure effective, compliant S and S program implementation throughout the Los Alamos National Laboratory. Any issues identified through the various internal and external assessments are documented, tracked and closed using the Safeguards and Security Issue Management Program. The Laboratory utilizes an integrated S and S systems approach to protect US Department of Energy (DOE) interests from theft or diversion of special nuclear material (SNM), sabotage, espionage, loss or theft of classified/controlled matter or government property, and other hostile acts that may cause unacceptable impacts on national security, health and safety of employees and the public, and the environment. This document explains the basis, scope, and conduct of the S and S process to include: self-assessments, issue management, risk assessment, and root cause analysis. It also provides a discussion of S and S topical areas, roles and responsibilities, process flow charts, minimum requirements, methodology, terms, and forms

  7. Command and Control for Homeland Security

    National Research Council Canada - National Science Library

    Greene, Marjorie

    2007-01-01

    ... Security June 2006, NIMS Revision Version 2 March 2007, NWDC Domestic Disaster Relief Operations Planning, 15 May 2006, AFRL-Supported Studies on Large- Scale Coordination, A Sociotechnical Systems...

  8. Security threat assessment of an Internet security system using attack tree and vague sets.

    Science.gov (United States)

    Chang, Kuei-Hu

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete--the traditional approach for calculating reliability--is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods.

  9. Identifying Adverse Events Using International Classification of Diseases, Tenth Revision Y Codes in Korea: A Cross-sectional Study

    Directory of Open Access Journals (Sweden)

    Minsu Ock

    2018-01-01

    Full Text Available Objectives The use of administrative data is an affordable alternative to conducting a difficult large-scale medical-record review to estimate the scale of adverse events. We identified adverse events from 2002 to 2013 on the national level in Korea, using International Classification of Diseases, tenth revision (ICD-10 Y codes. Methods We used data from the National Health Insurance Service-National Sample Cohort (NHIS-NSC. We relied on medical treatment databases to extract information on ICD-10 Y codes from each participant in the NHIS-NSC. We classified adverse events in the ICD-10 Y codes into 6 types: those related to drugs, transfusions, and fluids; those related to vaccines and immunoglobulin; those related to surgery and procedures; those related to infections; those related to devices; and others. Results Over 12 years, a total of 20 817 adverse events were identified using ICD-10 Y codes, and the estimated total adverse event rate was 0.20%. Between 2002 and 2013, the total number of such events increased by 131.3%, from 1366 in 2002 to 3159 in 2013. The total rate increased by 103.9%, from 0.17% in 2002 to 0.35% in 2013. Events related to drugs, transfusions, and fluids were the most common (19 446, 93.4%, followed by those related to surgery and procedures (1209, 5.8% and those related to vaccines and immunoglobulin (72, 0.3%. Conclusions Based on a comparison with the results of other studies, the total adverse event rate in this study was significantly underestimated. Improving coding practices for ICD-10 Y codes is necessary to precisely monitor the scale of adverse events in Korea.

  10. Investigation into the risk perceptions of investors in the securities of nuclear-dependent electric utilities

    International Nuclear Information System (INIS)

    Spudeck, R.E.

    1983-01-01

    Two weeks prior to the Three Mile Island accident, March 15, 1979, the Nuclear Regulatory Commission ordered five operating nuclear plants shut down in order to reexamine safety standards in these plants. Reports in the popular and trade press during this time suggested that these events, particularly the accident at Three Mile Island, caused investors in the securities of electric utilities that had nuclear-generation facilities to revise their risk perceptions. This study was designed to examine the impact of both the Nuclear Regulatory Commission order and the accident at Three Mile Island on investor risk perceptions. Selected categories of electric utilities were chosen to examine any differential risk effects resulting from these events. An asset pricing model devoid of many of the restrictive assumptions of more familiar models was used to model investor behavior. The findings suggest that the events described did cause investors to revise upward their perceptions of systematic risk regarding different categories of electric utilities. More specifically, those electric utilities that were operating nuclear plants in 1979 experienced the largest and most sustained increase in systematic risk. However, electric utilities that in 1979 had no operating nuclear plants, but had planned and committed funds for nuclear plants in the future, also experienced increases in systematic risk

  11. Revision of the Paris Convention from the German point of view

    International Nuclear Information System (INIS)

    Mahlmann, Wilfried.

    1977-01-01

    The paper discusses the revision of the Paris Convention from the German point of view and states how this country has used the possibilities for exceptions provided under the Convention so that German nuclear third party liability legislation differs somewhat from the standards laid down in the Convention. This is explained by a desire to provide increased financial security for the population concerned. After describing various proposed procedures for increasing liability amounts in the Paris Convention and the Brussels Supplementary Convention the author concludes that his country would welcome a revision of the Conventions which would provide increased financial security for the public. (NEA) [fr

  12. Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets

    OpenAIRE

    Kuei-Hu Chang

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system’s elementary event are incomplete—the traditional approach for ca...

  13. Licensee Event Report (LER) compilation, December 1991

    International Nuclear Information System (INIS)

    1992-01-01

    This monthly report contains licensee event report (LER) operational information that was processed into the LER data file of the Nuclear Safety Information Center (NSIC) during the one month period identified on the cover of the document. The LERs, from which this information is derived, are submitted to the Nuclear Regulatory Commission (NRC) by nuclear power plant licensees in accordance with federal regulations. Procedures for LER reporting for revisions to those events occurring prior to 1984 are described in NRC Regulatory Guide 1.16 and NUREG-0161, Instructions for Preparation of Data Entry Sheets for Licensee Event Reports. For those events occurring on and after January 1, 1984, LERs are being submitted in accordance with the revised rule contained in Title 10 Part 50.73 of the Code of Federal Regulations (10 CFR 50.73 - Licensee Event Report System) which was published in the Federal Register (Vol. 48, No. 144) on July 26, 1983. NUREG-1022, Licensee Event Report System - Description of Systems and Guidelines for Reporting, provides supporting guidance and information on the revised LER rule

  14. 76 FR 72984 - Revised Application for a License To Export High-Enriched Uranium

    Science.gov (United States)

    2011-11-28

    ... NUCLEAR REGULATORY COMMISSION Revised Application for a License To Export High-Enriched Uranium The application for a license to export high-enriched Uranium has been revised as noted below. Notice... fabricate fuel France. Security Complex; October 18, Uranium (93.35%). uranium (174.0 elements in France...

  15. 78 FR 77606 - Security Requirements for Facilities Storing Spent Nuclear Fuel

    Science.gov (United States)

    2013-12-24

    ... NUCLEAR REGULATORY COMMISSION 10 CFR Parts 72 and 73 [NRC-2009-0558] RIN 3150-AI78 Security... rulemaking that would revise the security requirements for storing spent nuclear fuel (SNF) in an independent... Nuclear Security and Incident Response, U.S. Nuclear Regulatory Commission, Washington, DC 20555-0001...

  16. Loose glenoid components in revision shoulder arthroplasty: is there an association with positive cultures?

    Science.gov (United States)

    Lucas, Robert M; Hsu, Jason E; Whitney, Ian J; Wasserburger, Jory; Matsen, Frederick A

    2016-08-01

    Glenoid loosening is one of the most common causes of total shoulder failure. High rates of positive cultures of Propionibacterium and coagulase-negative staphylococcus have been found among shoulders having surgical revision for glenoid loosening. This study reviewed the culture results in a series of surgical revisions for failed total shoulder arthroplasty to determine the relationship between glenoid loosening and positive cultures. The medical records of 221 patients without obvious evidence of infection who underwent revision total shoulder arthroplasty were reviewed to examine the association between the security of fixation of the glenoid component and the results of cultures obtained at revision surgery. Of the revised shoulders, 53% had positive cultures; 153 of the shoulders (69%) had a loose glenoid component, whereas 68 (31%) had secure glenoid component fixation. Of the 153 loose glenoid components, 82 (54%) had at least 1 positive culture and 44 (29%) had 2 or more positive cultures of the same microorganism. Similarly, of the 68 secure glenoid components, 35 (51%) had at least 1 positive culture (P = .77) and 14 (21%) had 2 or more positive cultures of the same microorganism (P = .25). Explanted glenoid components that were loose had a higher rate of culture positivity (56% [24/43]) in comparison to explanted glenoid components that were well fixed (13% [1/8]) (P = .05). Propionibacterium and coagulase-negative staphylococcus are commonly recovered in revision shoulder arthroplasty, whether or not the glenoid components are loose. Copyright © 2016 Journal of Shoulder and Elbow Surgery Board of Trustees. Published by Elsevier Inc. All rights reserved.

  17. TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS

    OpenAIRE

    Sen-Tarng Lai

    2015-01-01

    E-commerce is an important information system in the network and digital age. However, the network intrusion, malicious users, virus attack and system security vulnerabilities have continued to threaten the operation of the e-commerce, making e-commerce security encounter serious test. How to improve ecommerce security has become a topic worthy of further exploration. Combining routine security test and security event detection procedures, this paper proposes the Two-Layer Secure ...

  18. Are you in Control? : That was the key question discussed at the second Dutch Second Dutch Process Control Security Event at the Technical University of Delft, December 4, 2008

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2009-01-01

    The second Dutch Process Control Security Event attracted many process control people. The event was organised by the National Infrastructure against Cybercrime (NICC). Over hundred people responsible for the security of process control systems (PCS) and related networks in many of the Dutch

  19. 77 FR 21538 - Announcing DRAFT Revisions to Federal Information Processing Standard (FIPS) 186-3, Digital...

    Science.gov (United States)

    2012-04-10

    ...-01] Announcing DRAFT Revisions to Federal Information Processing Standard (FIPS) 186-3, Digital... Technology (NIST) requests comments on revisions to Federal Information Processing Standard (FIPS) 186-3... 25, 2012. ADDRESSES: Written comments may be sent to: Chief, Computer Security Division, Information...

  20. Event planning the ultimate guide to successful meetings, corporate events, fundraising galas, conferences, conventions, incentives and other special events

    CERN Document Server

    Allen, Judy

    2009-01-01

    This bestselling all–in–one guide to the event planning business is back and better than ever, fully updated and revised to reflect the very latest trends and best practices in the industry. This handy, comprehensive guide includes forms, checklists, and tips for managing events, as well as examples and case studies of both successful and unsuccessful events. Judy Allen (Toronto, ON, Canada) is founder and President of Judy Allen Productions, a full–service event planning production company.

  1. Updating energy security and environmental policy: Energy security theories revisited.

    Science.gov (United States)

    Proskuryakova, L

    2018-06-18

    The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.

  2. Psychometric properties of the Children’s Revised Impact of Events Scale (CRIES with Bangladeshi children and adolescents

    Directory of Open Access Journals (Sweden)

    Farah Deeba

    2014-08-01

    Full Text Available Identification of possible cases suffering post-traumatic stress disorder (PTSD is important, especially in developing countries where traumatic events are typically prevalent. The Children’s Revised Impact of Events Scale is a reliable and valid measure that has two brief versions (13 items and 8 items to assess reactions to traumatic events among young people. The current study evaluated the psychometric properties of both versions of the CRIES in a sample of 1,342 children and adolescents aged 9–17 years (M = 12.3 years, SD = 2.12 recruited from six districts of Bangladesh. A sub-group of 120 children from four schools was re-tested on the measures within 3.5 weeks. Confirmatory factor analysis supported factor structures similar to those found in other studies for both versions of the CRIES. Multiple group confirmatory factor analysis showed gender and age-group differences within the sample, supporting established age and gender differences in prevalence of PTSD symptoms. Analyses also indicated moderate to excellent internal consistency and test-retest reliability and clear discriminant and convergent validity. These data support use of both the CRIES-13 and CRIES-8 to provide quick and psychometrically sound assessment of symptoms of PTSD among children and adolescents from Bangla-speaking communities.

  3. Reporting of safeguards events

    International Nuclear Information System (INIS)

    Dwyer, P.A.; Ervin, N.E.

    1988-02-01

    On June 9, 1987, the Commission published in the Federal Register a final rule revising the reporting requirements for safeguards events. Safeguards events include actual or attempted theft of special nuclear material (SNM); actual or attempted acts or events which interrupt normal operations at power reactors due to unauthorized use of or tampering with machinery, components, or controls; certain threats made against facilities possessing SNM; and safeguards system failures impacting the effectiveness of the system. The revised rule was effective October 8, 1987. On September 14, 1987, the NRC held a workshop in Bethesda, MD, to answer affected licensees' questions on the final rule. This report documents questions discussed at the September 14 meeting, reflects a completed staff review of the answers, and supersedes previous oral comment on the topics covered

  4. Information security value in e-entrepreneurship

    OpenAIRE

    Nunes, Sérgio

    2012-01-01

    This paper researches the information security value in e-entrepreneurship by revising the literature that establishes the entrepreneurial domain and by relating it with the development of technological resources that create value for the customer in an online business. It details multiple paradigms regarding consumer’s values of information security, while relating them with common practices and previous researches in technological entrepreneurship. This research presents and discusses the b...

  5. A secure distributed logistic regression protocol for the detection of rare adverse drug events.

    Science.gov (United States)

    El Emam, Khaled; Samet, Saeed; Arbuckle, Luk; Tamblyn, Robyn; Earle, Craig; Kantarcioglu, Murat

    2013-05-01

    There is limited capacity to assess the comparative risks of medications after they enter the market. For rare adverse events, the pooling of data from multiple sources is necessary to have the power and sufficient population heterogeneity to detect differences in safety and effectiveness in genetic, ethnic and clinically defined subpopulations. However, combining datasets from different data custodians or jurisdictions to perform an analysis on the pooled data creates significant privacy concerns that would need to be addressed. Existing protocols for addressing these concerns can result in reduced analysis accuracy and can allow sensitive information to leak. To develop a secure distributed multi-party computation protocol for logistic regression that provides strong privacy guarantees. We developed a secure distributed logistic regression protocol using a single analysis center with multiple sites providing data. A theoretical security analysis demonstrates that the protocol is robust to plausible collusion attacks and does not allow the parties to gain new information from the data that are exchanged among them. The computational performance and accuracy of the protocol were evaluated on simulated datasets. The computational performance scales linearly as the dataset sizes increase. The addition of sites results in an exponential growth in computation time. However, for up to five sites, the time is still short and would not affect practical applications. The model parameters are the same as the results on pooled raw data analyzed in SAS, demonstrating high model accuracy. The proposed protocol and prototype system would allow the development of logistic regression models in a secure manner without requiring the sharing of personal health information. This can alleviate one of the key barriers to the establishment of large-scale post-marketing surveillance programs. We extended the secure protocol to account for correlations among patients within sites through

  6. Building an intelligence-led security program

    CERN Document Server

    Liska, Allan

    2014-01-01

    As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented inte

  7. 75 FR 55529 - Homeland Security Acquisition Regulation (HSAR); Revision Initiative

    Science.gov (United States)

    2010-09-13

    ... 3002 Definitions of Words and Terms Add an additional office within components--the Office of Selective... (b) of HSAR section 3003.1004 advises contracting officers that special posters and instructions may... DHS Hotline Poster described in the clause at FAR 52.203-14. Part 3004 Administrative Matters Revise...

  8. 78 FR 9743 - Event Reporting Guidelines

    Science.gov (United States)

    2013-02-11

    ... NUCLEAR REGULATORY COMMISSION [NRC-2011-0237] Event Reporting Guidelines AGENCY: Nuclear... Regulatory Commission (NRC) has issued NUREG- 1022, Revision 3, ``Event Reporting Guidelines: 10 CFR 50.72 and 50.73.'' [[Page 9744

  9. 76 FR 63565 - Event Reporting Guidelines

    Science.gov (United States)

    2011-10-13

    ...-2011-0237] Event Reporting Guidelines AGENCY: Nuclear Regulatory Commission. ACTION: Draft NUREG... comments on Draft NUREG-1022, Revision 3, ``Event Reporting Guidelines: 10 CFR 50.72 and 50.73''. The NUREG-1022 contains guidelines that the NRC staff considers acceptable for use in meeting the event reporting...

  10. 75 FR 69129 - Proposed Revision of Information Collection: Comment Request National Medical Support Notice-Part B

    Science.gov (United States)

    2010-11-10

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration Proposed Revision of Information Collection: Comment Request National Medical Support Notice--Part B AGENCY: Employee Benefits Security... assess the impact of its collection requirements on respondents. Currently, the Employee Benefits...

  11. A Psychometric Evaluation of Super's Work Values Inventory--Revised

    Science.gov (United States)

    Robinson, Carrie H.; Betz, Nancy E.

    2008-01-01

    This study describes the psychometric evaluation of Super's Work Values Inventory--Revised (SWVI-R), an instrument comprised of 12 scales measuring the relative importance placed on the following work-related value dimensions: Achievement, Coworkers, Creativity, Income, Independence, Lifestyle, Mental Challenge, Prestige, Security, Supervision,…

  12. Validation of the Impact of Event Scale-Revised for adolescents experiencing the floods and mudslides

    Directory of Open Access Journals (Sweden)

    Cheng-Sheng Chen

    2011-12-01

    Full Text Available The purpose of this study was to validate the Impact of Event Scale-Revised (IES-R for adolescents who had experienced the floods and mudslides caused by Typhoon Morakot in Taiwan. The internal consistency, construct validity, and criteria validity of the instrument were examined. Principal component analysis followed by an oblique rotation was used to derive a three-factor solution. These factors were labeled intrusion, hyperarousal, and avoidance; all three factors together accounted for 58.1% of the variance. The total Cronbach’s alpha of 0.94 reflected the good internal consistency of the instrument. With reference to diagnosis of posttraumatic stress disorder, the IES-R cutoff point for posttraumatic stress disorder was 19 of 20 with a sensitivity of 85.7% and specificity of 84.1%. In conclusion, the IES-R can be used as a reliable and valid instrument when evaluating psychological distress among adolescents who have experienced a natural disaster, such as flooding and mudslides.

  13. Maritime security : progress made in implementing Maritime Transportation Security Act, but concerns remain : statement of Margaret Wrightson, Director, Homeland Security and Justice Issues

    Science.gov (United States)

    2003-09-09

    After the events of September 11, 2001, concerns were raised over the security of U.S. ports and waterways. In response to the concerns over port security, Congress passed the Maritime Transportation Security Act in November 2002. The act created a b...

  14. Licensee Event Report (LER) compilation, March 1992

    International Nuclear Information System (INIS)

    1992-05-01

    This monthly report contains Licensee Event Report (LER) operational information that was processed into the LER data file of the Nuclear Operations Analysis Center (NOAC) during the one month period identified on the cover of the document. The LERs, from which this information is derived, are submitted to the Nuclear Regulatory Commission (NRC) by nuclear power plant licensees in accordance with federal regulations. Procedures for LER reporting for revisions to those events occurring prior to 1984 are described in NRC Regulatory Guide 1.16 and NUREG-0161, Instructions for Preparation of Data Entry Sheets for Licensee Event Reports. For those events occurring on and after January 1, 1984, LERs are being submitted in accordance with the revised rule contained in Title 10 Part 50.73 of the Code of Federal Regulations (10 CFR 50.73 -- Licensee Event Report System) which was published in the Federal Register (Vol. 48, No. 144) on July 26, 1983. NUREG-1022, Licensee Event Report System -- Description of Systems and Guidelines for Reporting, provides supporting guidance and information on the revised LER rule. The LER summaries in this report are arranged alphabetically by facility name and then chronologically by event date for each facility. Component, system, keyword, and component vendor indexes follow the summaries. Vendors are those identified by the utility when the LER form is initiated; the keywords for the component, system, and general keyword indexes are assigned by the computer using correlation tables from the Sequence Coding and Search System

  15. Licensee Event Report (LER) compilation, April 1991

    International Nuclear Information System (INIS)

    1991-05-01

    This monthly report contains Licensee Event Report (LER) operational information that was processed into the LER data file of the Nuclear Safety Information Center (NSIC) during the one month period identified on the cover of the document. The LERs, from which this information is derived, are submitted to the Nuclear Regulatory Commission (NRC) by nuclear power plant licensees in accordance with federal regulations. Procedures for LER reporting for revisions to those events occurring prior to 1984 are described in NRC Regulatory Guide 1.16 and NUREG-0161, Instructions for Preparation of Data Entry Sheets for Licensee Event Reports. For those events occurring on and after January 1, 1984, LERs are being submitted in accordance with the revised rule contained in Title 10 Part 50.73 of the Code of Federal Regulations (10 CFR 50.73 -- Licensee Event Report System) which was published in the Federal Register (Vol. 48, No. 144) on July 26, 1983. NUREG-1022, Licensee Event Report System -- Description of Systems and Guidelines for Reporting, provides supporting guidance and information on the revised LER rule. The LER summaries in this report are arranged alphabetically by facility name and then chronologically by event date for each facility. Component, system, keyword, and component vendor indexes follow the summaries. Vendors are those identified by the utility when the LER form is initiated; the keywords for the component, system, and general keyword indexes are assigned by the computer using correlation tables from the Sequence Coding and Search System

  16. 75 FR 71632 - Revised Medical Criteria for Evaluating Mental Disorders

    Science.gov (United States)

    2010-11-24

    ... Revised Medical Criteria for Evaluating Mental Disorders AGENCY: Social Security Administration. ACTION... comments on any other aspects of the proposed listings for mental disorders that we receive during this... our mental disorders listings: Definitions we provide for the terms ``marked'' and ``extreme'' that...

  17. Licensee Event Report (LER) compilation for month of October 1990

    International Nuclear Information System (INIS)

    1990-11-01

    This monthly report contains Licensee Event Report (LER) operational information that was processed into the LER data file of Nuclear Safety Information Center (NSIC) during the one month period identified on the cover of the document. The LERs, from which this information is derived, are submitted to the Nuclear Regulatory Commission (NRC) by nuclear power plant licensees in accordance with federal regulations. Procedures for LER reporting for revisions to those events occurring prior to 1984 are described in NRC Regulatory Guide 1.16 and NUREG-0161, Instructions for Preparation of Data Entry Sheets for Licensee Event Reports. For those events occurring on and after January 1, 1984, LERs are being submitted in accordance with the revised rule contained in Title 10 Part 50.73 of the Code of Federal Regulations (10 CFR 50.73 -- Licensee Event Report System) which was published in the Federal Register (Vol. 48, No. 144) on July 26, 1983.NUREG-1022, Licensee Event Report System -- Description of Systems and Guidelines for Reporting, provides supporting guidance and information on the revised LER rule

  18. Licensee Event Report (LER) compilation for month of October 1988

    International Nuclear Information System (INIS)

    1988-11-01

    This monthly report contains Licensee Event Report (LER) operational information that was processed into the LER data file of the Nuclear Safety Information Center (NSIC) during the one month period identified on the cover of the document. The LERs, from which this information is derived, are submitted to the Nuclear Regulatory Commission (NRC) by nuclear power plant licensees in accordance with federal regulations. Procedures for LER reporting for revisions to those events occurring prior to 1984 are described in NRC Regulatory Guide 1.16 and NUREG-1061, Instructions for Preparation of Data Entry Sheets for Licensee Event Reports. For those events occurring on and after January 1, 1984, LERs are being submitted in accordance with the revised rule contained in Title 10 Part 50.73 of the Code of Federal Regulations (10 CFR 50.73--Licensee Event Report System) which was published in the Federal Register (Vol. 48, No. 144) on July 26, 1983. NUREG-1022, Licensee Event Report System--Description of Systems and Guidelines for Reporting, provides supporting guidance and information on the revised LER rule

  19. Licensee Event Report (LER) compilation for month of August 1990

    International Nuclear Information System (INIS)

    1990-09-01

    This monthly report contains Licensee Event Report (LER) operational information that was processed into the LER data file of the Nuclear Safety Information Center (NSIC) during the one month period identified on the cover of the document. The LERs, from which this information is derived, are submitted to the Nuclear Regulatory Commission (NRC) by nuclear power plant licensees in accordance with federal regulations. Procedures for LER reporting for revisions to those events occurring prior to 1984 are described in NRC Regulatory Guide 1.16 and NUREG-0161, Instructions for Preparation of Data Entry Sheets for Licensee Event Reports. For those events occurring on and after January 1, 1984, LERs are being submitted in accordance with the revised rule contained in Title 10 Part 50.73 of the Code of Federal Regulations (10 CFR 50.73 -- Licensee Event Report System) which was published in the Federal Register (Vol. 48, No. 144) on July 26, 1983. NUREG-1022, Licensee Event Report System -- Description of Systems and Guidelines for Reporting, provides supporting guidance and information on the revised LER rule

  20. Licensee Event Report (LER) compilation for month of March 1988

    International Nuclear Information System (INIS)

    1988-04-01

    This monthly report contains Licensee Event Report (LER) operational information that was processed into the LER data file of the Nuclear Safety Information Center (NSIC) during the one-month period identified on the cover of the document. The LERS, from which this information is derived, are submitted to the Nuclear Regulatory Commission (NRC) by nuclear power plant licensees in accordance with federal regulations. Procedures for LER reporting for revisions to those events occurring prior to 1984 are described in NRC Regulatory Guide 1.16 and NUREG-1061, Instructions for preparation of data entry sheets for licensee event reports. For those events occurring on and after January 1, 1984, LERs are being submitted in accordance with the revised rule contained in Title 10 Part 50.73 of the Code of Federal Regulations (10 CFR 50.73 - Licensee Event Report System) which was published in the Federal Register (Vol. 48, No. 144) on July 26, 1983. NUREG-1022, Licensee Event Report System - Description of systems and guidelines for reporting, provides supporting guidance and information on the revised LER rule

  1. Licensee Event Report (LER) compilation for month of August 1989

    International Nuclear Information System (INIS)

    1989-09-01

    This monthly report contains Licensee Event Report (LER) operational information that was processed into the LER data file of the Nuclear Safety Information Center (NSIC) during the one month period identified on the cover of the document. The LERs, from which this information is derived, are submitted to the Nuclear Regulatory Commission (NRC) by nuclear power plant licensees in accordance with federal regulations. Procedures for LER reporting for revisions to these events occurring prior to 1984 are described in NRC Regulatory Guide 1.16 and NUREG-0161, Instructions for Preparation of Data Entry Sheets for Licensee Event Reports. For those events occurring on and after January 1, 1984, LERs are being submitted in accordance with the revised rule contained in Title 10 Part 50.73 of the Code of Federal Regulations (10 CFR 50.73 -- Licensee Event Report System) which was published in the Federal Register (Vol. 48, No. 144) on July 26, 1983. NUREG-1022, Licensee Event Report System -- Description of Systems and Guidelines for Reporting, provides supporting guidance and information on the revised LER rule

  2. 49 CFR 387.303 - Security for the protection of the public: Minimum limits.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 5 2010-10-01 2010-10-01 false Security for the protection of the public: Minimum... Insurance for Motor Carriers and Property Brokers § 387.303 Security for the protection of the public... convenience of the user, the revised text is set forth as follows: § 387.303 Security for the protection of...

  3. 75 FR 29588 - Office of New Reactors: Proposed NUREG-0800; Standard Review Plan Section 13.6.6, Draft Revision...

    Science.gov (United States)

    2010-05-26

    ...; Standard Review Plan Section 13.6.6, Draft Revision 0 on Cyber Security Plan AGENCY: Nuclear Regulatory... Plants,'' on a proposed Standard Review Plan (SRP) Section 13.6.6 on ``Cyber Security Plan'' (Agencywide Documents Access and Management System (ADAMS) Accession No. ML093560837). The Office of Nuclear Security...

  4. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  5. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  6. Energy security in the post-Cold War era: Identifying future courses for crises

    Energy Technology Data Exchange (ETDEWEB)

    Freund, M.T.; Wise, J.A.; Ulibarri, C.A.; Shaw, B.R.; Seely, H.E.; Roop, J.M.

    1994-11-01

    This paper addresses US energy security in the post-Cold War era for a conference on energy security jointly sponsored by the Department of Energy and the National Defense University. It examines the evolving nature of energy security based on analysis of past crisis-inducing events and-discusses potentially important geopolitical, environmental, regulatory, and economic developments during the next twenty-five years. The paper steps beyond the traditional economic focus of energy security issues to examine the interplay between fundamental economic and technical drivers on the one hand, and political, environmental, and perceptual phenomena, on the other hand, that can combine to create crises where none were expected. The paper expands on the premise that the recent demise of the Soviet Union and other changing world conditions have created a new set of energy dynamics, and that it is imperative that the United States revise its energy security perspective accordingly. It proceeds by reviewing key factors that comprise the concepts of ``energy security`` and ``energy crisis`` and how they may fit into the new world energy security equation. The study also presents a series of crisis scenarios that could develop during the next twenty-five years, paying particular attention to mechanisms and linked crisis causes and responses. It concludes with a discussion of factors that may serve to warn analysts and decision makers of impending future crises conditions. The crisis scenarios contained in this report should be viewed only as a representative sample of the types of situations that could occur. They serve to illustrate the variety of factors that can coalesce to produce a ``crisis.``

  7. Transportation planning for planned special events

    Science.gov (United States)

    2011-05-01

    Unique among planned special event activities are those events that carry the National Special Security Event (NSSE) designation. NSSEs occur with some frequency, with 35 of these events held between September 1998 and February 2010. These events inc...

  8. How do insured perceive their financial security in the event of illness?--a panel data analysis for Germany.

    Science.gov (United States)

    Lange, Ansgar; Prenzler, Anne; Zuchandke, Andy

    2012-01-01

    There is a lack of research regarding the subjective perception of financial security in the event of illness of insured persons. Therefore, the aim of our study was to analyze the subjective perception of financial security in the event of illness in the German setting over time and to identify major determinants of that perception. We applied a probit-adapted ordinary least squares estimation procedure including fixed effects to a balanced data set from the German Socio-Economic Panel. After correcting our data set, we included approximately 23,500 observations in our analyses. We show that higher income and the existence of private health insurance have a positive and significant impact on the perception of financial security. Furthermore, private supplementary health insurance has a positive and significant effect on this perception; however, this is solely true for policies that cover special features during hospital stays. Experience with the health care system is also positively related to the individual's perception. Finally, our regression results illustrate that the overall perception is declining over time. The results indicate that political decision makers are facing challenges regarding the declining subjective perception in the German health care system. Because of the positive correlation between experience and subjective perception, it can be assumed that the health care system and especially statutory health insurance are better than their presentation in the media. Hence, there is a problem of communication and information, and political decision makers face challenges in presenting the system objectively and handling the media in a proper way. Copyright © 2012 International Society for Pharmacoeconomics and Outcomes Research (ISPOR). Published by Elsevier Inc. All rights reserved.

  9. Critical infrastructure system security and resiliency

    CERN Document Server

    Biringer, Betty; Warren, Drake

    2013-01-01

    Security protections for critical infrastructure nodes are intended to minimize the risks resulting from an initiating event, whether it is an intentional malevolent act or a natural hazard. With an emphasis on protecting an infrastructure's ability to perform its mission or function, Critical Infrastructure System Security and Resiliency presents a practical methodology for developing an effective protection system that can either prevent undesired events or mitigate the consequences of such events.Developed at Sandia National Labs, the authors' analytical approach and

  10. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  11. Water Security Toolkit User Manual Version 1.2.

    Energy Technology Data Exchange (ETDEWEB)

    Klise, Katherine A.; Siirola, John Daniel; Hart, David; Hart, William Eugene; Phillips, Cynthia Ann; Haxton, Terranna; Murray, Regan; Janke, Robert; Taxon, Thomas; Laird, Carl; Seth, Arpan; Hackebeil, Gabriel; McGee, Shawn; Mann, Angelica

    2014-08-01

    The Water Security Toolkit (WST) is a suite of open source software tools that can be used by water utilities to create response strategies to reduce the impact of contamination in a water distribution network . WST includes hydraulic and water quality modeling software , optimizati on methodologies , and visualization tools to identify: (1) sensor locations to detect contamination, (2) locations in the network in which the contamination was introduced, (3) hydrants to remove contaminated water from the distribution system, (4) locations in the network to inject decontamination agents to inactivate, remove, or destroy contaminants, (5) locations in the network to take grab sample s to help identify the source of contamination and (6) valves to close in order to isolate contaminate d areas of the network. This user manual describes the different components of WST , along w ith examples and case studies. License Notice The Water Security Toolkit (WST) v.1.2 Copyright c 2012 Sandia Corporation. Under the terms of Contract DE-AC04-94AL85000, there is a non-exclusive license for use of this work by or on behalf of the U.S. government. This software is distributed under the Revised BSD License (see below). In addition, WST leverages a variety of third-party software packages, which have separate licensing policies: Acro Revised BSD License argparse Python Software Foundation License Boost Boost Software License Coopr Revised BSD License Coverage BSD License Distribute Python Software Foundation License / Zope Public License EPANET Public Domain EPANET-ERD Revised BSD License EPANET-MSX GNU Lesser General Public License (LGPL) v.3 gcovr Revised BSD License GRASP AT&T Commercial License for noncommercial use; includes randomsample and sideconstraints executable files LZMA SDK Public Domain nose GNU Lesser General Public License (LGPL) v.2.1 ordereddict MIT License pip MIT License PLY BSD License PyEPANET Revised BSD License Pyro MIT License PyUtilib Revised BSD License Py

  12. Command and Control during Security Incidents/Emergencies

    Energy Technology Data Exchange (ETDEWEB)

    Knipper, W. [NSTec

    2013-10-16

    This presentation builds on our response to events that pose, or have the potential to pose, a serious security or law enforcement risk and must be responded to and controlled in a clear a decisive fashion. We will examine some common concepts in the command and control of security-centric events.

  13. 7 CFR 1786.103 - Security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Security. 1786.103 Section 1786.103 Agriculture... Prepayments on RUS Notes in the Event of a Merger of Certain RUS Electric Borrowers § 1786.103 Security. If... of providing security for loans the proceeds of which were used to prepay RUS Notes. Such lien...

  14. Infrastructure to support trading strategies against the occurrence of extraordinary events: Secure area of the equipment storage

    International Nuclear Information System (INIS)

    Blas Gordo, A. de; Asensio Vega, J.; Fernandez Morales, E. J.; Font Hadinger, I.

    2013-01-01

    Compliance with the requirements specified in the Technical Instructions ITC and ITC-1-2, issued by the Nuclear Safety Council (CSN), is conducting exhaustive analyzes on coping in Nuclear Power Plants emergencies due to the occurrence extraordinary events. As part of the necessary infrastructure, a secure area for parking and storage of projects teams involved in the development of various operational strategies. The design of it ensures compliance with all regulatory and practical requirements, ensuring minimization strategies and time functionality in the application of the same.

  15. [Food security in Mexico].

    Science.gov (United States)

    Urquía-Fernández, Nuria

    2014-01-01

    An overview of food security and nutrition in Mexico is presented, based on the analysis of the four pillars of food security: availability, access, utilization of food, and stability of the food supply. In addition, the two faces of malnutrition in Mexico were analyzed: obesity and undernourishment. Data were gathered from the food security indicators of the United Nations's Food and Agriculture Organization, from the Mexican Scale of Food Security, and from the National Health and Nutrition Survey. Mexico presents an index of availability of 3 145 kilocalories per person per day, one of the highest indexes in the world, including both food production and imports. In contrast, Mexico is affected by a double burden of malnutrition: whereas children under five present 14% of stunt, 30% of the adult population is obese. Also, more than 18% of the population cannot afford the basic food basket (food poverty). Using perception surveys, people reports important levels of food insecurity, which concentrates in seven states of the Mexican Federation. The production structure underlying these indicators shows a very heterogeneous landscape, which translates in to a low productivity growth across the last years. Food security being a multidimensional concept, to ensure food security for the Mexican population requires a revision and redesign of public productive and social policies, placing a particular focus on strengthening the mechanisms of institutional governance.

  16. Asthma severity, child security, and child internalizing: using story stem techniques to assess the meaning children give to family and disease-specific events.

    Science.gov (United States)

    Winter, Marcia A; Fiese, Barbara H; Spagnola, Mary; Anbar, Ran D

    2011-12-01

    Children with persistent asthma are at increased risk for mental health problems. Although mechanisms of effect are not yet known, it may be that children are less trusting of the family as a source of support and security when they have more severe asthma. This study tested whether asthma severity is related to children's perceptions of insecurity in the family, and whether insecurity is in turn associated with child adjustment. Children (N = 168; mean age = 8 years) completed story stems pertaining to routine family events (e.g., mealtimes) and ambiguous but potentially threatening asthma events such as tightness in the chest. Responses were evaluated for the extent to which appraisals portrayed the family as responding in cohesive, security-provoking ways. Asthma severity was assessed by both objective lung function testing and primary caregiver report. Caregivers reported child symptomatology. Beyond medication adherence, caregiver education, and child age and gender, greater asthma severity predicted more internalizing and externalizing symptoms. Greater asthma severity, assessed using spirometry (but not parent report), was related to less secure child narratives of the family, which in turn related to more child internalizing symptoms. Results suggest that asthma can take a considerable toll on children's feelings of security and mental health. Furthermore, given the difficulty in assessing young children's perceptions, this study helps demonstrate the potential of story stem techniques in assessing children's appraisals of illness threat and management in the family.

  17. Russia and the System of Transatlantic Security: Perspectives for the Future

    National Research Council Canada - National Science Library

    Alexeev, Denis

    2006-01-01

    .... The international security system, which was created in the middle of 20th Century, can hardly be applied to contemporary reality and calls for a serious revision of at least some key principles...

  18. ASSET guidelines. Revised 1991 Edition

    International Nuclear Information System (INIS)

    1991-12-01

    The present publication is an updated version of the IAEA Assessment of Safety Significant Events Team (ASSET) Guidelines, IAEA-TECDOC-573, published in 1990. Sections 5 and 6 include revised definitions and investigation guidelines for identification of both direct and root causes. These revisions were recommended by a Consultants Meeting held in Vienna on 3-7 December 1990. This guidance is not intended to infringe an expert's prerogative to investigate additional items. Its main purpose is to provide a basic structure and ensure consistency in the assessments. Use of the ASSET guidelines should also facilitate comparison between the observations made in different nuclear power plants and harmonize the reporting of generic ASSET results. The guidelines should always be used with a critical attitude and a view to possible improvements

  19. Excessive Heat Events and National Security: Building Resilience based on Early Warning Systems

    Science.gov (United States)

    Vintzileos, A.

    2017-12-01

    Excessive heat events (EHE) affect security of Nations in multiple direct and indirect ways. EHE are the top cause for morbidity/mortality associated to any atmospheric extremes. Higher energy consumption used for cooling can lead to black-outs and social disorder. EHE affect the food supply chain reducing crop yield and increasing the probability of food contamination during delivery and storage. Distribution of goods during EHE can be severely disrupted due to mechanical failure of transportation equipment. EHE during athletic events e.g., marathons, may result to a high number of casualties. Finally, EHE may also affect military planning by e.g. reducing hours of exercise and by altering combat gear. Early warning systems for EHE allow for building resilience. In this paper we first define EHE as at least two consecutive heat days; a heat day is defined as a day with a maximum heat index with probability of occurrence that exceeds a certain threshold. We then use retrospective forecasts performed with a multitude of operational models and show that it is feasible to forecast EHE at forecast lead of week-2 and week-3 over the contiguous United States. We finally introduce an improved definition of EHE based on an intensity index and investigate forecast skill of the predictive system in the tropics and subtropics.

  20. Network Security Visualization

    National Research Council Canada - National Science Library

    1999-01-01

    The application of interactive, three-dimensional viewing techniques to the representation of security-related, computer network status and events is expected to improve the timeliness and efficiency...

  1. The development and revision of the Federal Radiological Emergency Response Plan

    International Nuclear Information System (INIS)

    Gant, K.S.; Adler, M.V.; Wolff, W.F.

    1989-01-01

    Since 1985, federal agencies have been using the Federal Radiological Emergency Response Plan (FRERP) in exercises and real events. This experience and the development of other emergency response guidance (e.g., National System for Emergency Coordination) are fueling current efforts to review and revise the FRERP to reflect what the agencies have learned since the FRERP was published. Revision efforts are concentrating on clarifying the plan and addressing deficiencies. No major changes are expected in the general structure of the federal response nor should states need to revise their plans because of these modifications. 5 refs

  2. Licensee Event Report (LER) compilation for month of September 1991

    International Nuclear Information System (INIS)

    1991-10-01

    This monthly report contains Licensee Event Report (LER) operational information that was processed into the LER data file of the Nuclear Safety Information Center (NSIC) during the one month period identified on the cover of the document. The LERs, from which this information is derived, are submitted to the Nuclear Regulatory Commission (NRC) by nuclear power plant licensees in accordance with federal regulations. Procedures for LER reporting for revisions to those events occurring prior to 1984 are described in NRC Regulatory Guide 1.16 and NUREG-0161, Instructions for Preparation of Data Entry Sheets for Licensee Event Reports. For these events occurring on and after January 1, 1984, LERs are being submitted in accordance with the revised rule contained in Title 10 Part 50.73 of the Code of Federal Regulations (10 CFR 50.73 -- Licensee Event Report System) which was published in the Federal Register (Vol. 48, No. 144) on July 26, 1983. NUREG-1022, Licensee Event Report System -- Description of Systems and Guidelines for Reporting, provides supporting guidance and information on the revised LER rule. The LER summaries in this report are arranged alphabetically by facility name and then chronologically by event data for each facility. Component, system, keyword, and component vendor indexes follow the summaries. Vendors are those identified by the utility when the LER form is initiated; the keywords for the component, system, and general keyword indexes are assigned by the computer using correlation tables from the Sequence Coding and Search System

  3. Licensee Event Report (LER) compilation for month of August 1991

    International Nuclear Information System (INIS)

    1991-09-01

    This monthly report contains Licensee Event Report (LER) operational information that was processed into the LER data file of the Nuclear Safety Information Center (NSIC) during the one month period identified on the cover of the document. The LERs, from which this information is derived, are submitted to the Nuclear Regulatory Commission (NRC) by nuclear power plant licensees in accordance with federal regulations. Procedures for LER reporting for revisions to those events occurring prior to 1984 are described in NRC Regulatory Guide 1.16 and NUREG-0161, Instructions for Preparation of Data Entry Sheets for Licensee Event Reports. For those events occurring on and after January 1, 1984, LERs are being submitted in accordance with the revised rule contained in Title 10 Part 50.73 of the Code of Federal Regulations (10 CFR 5.073 -- Licensee Event Report System) which was published in the Federal Register (Vol. 48, No. 144) on July 26, 1983. NUREG-1022, Licensee Event Report System -- Description of Systems and Guidelines for Reporting, provides supporting guidance and information on the revised LER rule. The LER summaries in this report are arranged alphabetically by facility name and then chronologically by event date for each facility. Component, system, keyword, and component vendor indexes follow the summaries. Vendors are those identified by the utility when the LER form is initiated; the keywords for the component, system, and general keyword indexes are assigned by the computer using correlation tables from the Sequence Coding and Search System

  4. [Quality in Revision Arthroplasty: A Comparison between Claims Data Analysis and External Quality Assurance].

    Science.gov (United States)

    Wessling, M; Gravius, S; Gebert, C; Smektala, R; Günster, C; Hardes, J; Rhomberg, I; Koller, D

    2016-02-01

    External quality assurance for revisions of total knee arthroplasty (TKA) and total hip arthroplasty (THA) are carried out through the AQUA institute in Germany. Data are collected by the providers and are analyzed based on predefined quality indicators from the hospital stay in which the revision was performed. The present study explores the possibility to add routine data analysis to the existing external quality assurance (EQS). Differences between methods are displayed. The study aims to quantify the benefit of an additional analysis that allows patients to be followed up beyond the hospitalization itself. All persons insured in an AOK sickness fund formed the population for analysis. Revisions were identified using the same algorithm as the existing external quality assurance. Adverse events were defined according to the AQUA indicators for the years 2008 to 2011.The hospital stay in which the revision took place and a follow-up of 30 days were included. For re-operation and dislocation we also defined a 365 days interval for additional follow-up. The results were compared to the external quality control reports. Almost all indicators showed higher events in claims data analysis than in external quality control. Major differences are seen for dislocation (EQS SD: 1.87 vs. claims data [cd] SD: 2.06 %, cd+30 d: 2.91 %, cd+365 d: 7.27 %) and reoperation (hip revision: EQS SD: 5.88 % vs. claims data SD: 8.79 % cd+30 d: 9.82 %, cd+365 d: 15.0 %/knee revision: EQS SD: 3.21 % vs. claims data SD: 4.07 %, cd+30 d: 4.6 %, cd+365 d: 15.43 %). Claims data could show additional adverse events for all indicators after the initial hospital stay, rising to 77 % of all events. The number of adverse events differs between the existing external quality control and our claims data analysis. Claims data give the opportunity to complement existing methods of quality control though a longer follow-up, when many complications become evident. Georg

  5. Deep Borehole Emplacement Mode Hazard Analysis Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Sevougian, S. David [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-08-07

    This letter report outlines a methodology and provides resource information for the Deep Borehole Emplacement Mode Hazard Analysis (DBEMHA). The main purpose is identify the accident hazards and accident event sequences associated with the two emplacement mode options (wireline or drillstring), to outline a methodology for computing accident probabilities and frequencies, and to point to available databases on the nature and frequency of accidents typically associated with standard borehole drilling and nuclear handling operations. Risk mitigation and prevention measures, which have been incorporated into the two emplacement designs (see Cochran and Hardin 2015), are also discussed. A key intent of this report is to provide background information to brief subject matter experts involved in the Emplacement Mode Design Study. [Note: Revision 0 of this report is concentrated more on the wireline emplacement mode. It is expected that Revision 1 will contain further development of the preliminary fault and event trees for the drill string emplacement mode.

  6. Novel Approaches to Enhance Mobile WiMAX Security

    Directory of Open Access Journals (Sweden)

    Taeshik Shon

    2010-01-01

    Full Text Available The IEEE 802.16 Working Group on Broadband Wireless Access Standards released IEEE 802.16-2004 which is a standardized technology for supporting broadband and wireless communication with fixed and nomadic access. After the IEEE 802.16-2004 standard, a new advanced and revised standard was released as the IEEE 802.16e-2005 amendment which is foundation of Mobile WiMAX network supporting handover and roaming capabilities. In the area of security aspects, compared to IEEE 802.16-2004, IEEE 802.16e, called Mobile WiMAX, adopts improved security architecture—PKMv2 which includes EAP authentication, AES-based authenticated encryption, and CMAC or HMAC message protection. However, there is no guarantee that PKMv2-based Mobile WiMAX network will not have security flaws. In this paper, we investigate the current Mobile WiMAX security architecture focusing mainly on pointing out new security vulnerabilities such as a disclosure of security context in network entry, a lack of secure communication in network domain, and a necessity of efficient handover supporting mutual authentication. Based on the investigation results, we propose a novel Mobile WiMAX security architecture, called RObust and Secure MobilE WiMAX (ROSMEX, to prevent the new security vulnerabilities.

  7. A Component-Based Approach for Securing Indoor Home Care Applications.

    Science.gov (United States)

    Agirre, Aitor; Armentia, Aintzane; Estévez, Elisabet; Marcos, Marga

    2017-12-26

    eHealth systems have adopted recent advances on sensing technologies together with advances in information and communication technologies (ICT) in order to provide people-centered services that improve the quality of life of an increasingly elderly population. As these eHealth services are founded on the acquisition and processing of sensitive data (e.g., personal details, diagnosis, treatments and medical history), any security threat would damage the public's confidence in them. This paper proposes a solution for the design and runtime management of indoor eHealth applications with security requirements. The proposal allows applications definition customized to patient particularities, including the early detection of health deterioration and suitable reaction (events) as well as security needs. At runtime, security support is twofold. A secured component-based platform supervises applications execution and provides events management, whilst the security of the communications among application components is also guaranteed. Additionally, the proposed event management scheme adopts the fog computing paradigm to enable local event related data storage and processing, thus saving communication bandwidth when communicating with the cloud. As a proof of concept, this proposal has been validated through the monitoring of the health status in diabetic patients at a nursing home.

  8. Preliminary Study on the Revision of Nuclear Safety Policy Statement

    International Nuclear Information System (INIS)

    Lee, Y. E.; Lee, S. H.; Chang, H. S.; Choi, K. S.; Jung, S. J.

    2011-01-01

    Nuclear safety policy in Korea is currently declared in the Nuclear Safety Charter as the highest tier document and safety principles and directions are announced in the Nuclear Safety Policy Statement. As the circumstances affecting on the nuclear safety policy change, it needs to revise the Statement. This study aims to develop the revised Nuclear Safety Policy Statement to declare that securing safety is a prerequisite to the utilization of nuclear energy, and that all workers in nuclear industry and regulatory body must adhere to the principle of priority to safety. As a result, two different types of revision are being prepared as of August. One is based on the spirit of Nuclear Safety Charter as well as the direction of future-oriented safety policies including the changes in the environment after declaration of the Statement. The other is to declare the fundamental safety objective and safety principles as the top philosophy of national nuclear safety policy by adopting the '10 Safety Principles in IAEA Safety Fundamental' instead of the current Charter. Both versions of revision are subject to further in-depth discussion. However once the revision is finalized and declared, it would be useful to accomplish effectively the organizational responsibilities and to enhance the public confidence in nuclear safety by performing the regulatory activities in a planned and systematic manner and promulgating the government's dedication to priority to safety

  9. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals

    International Nuclear Information System (INIS)

    2013-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  10. 78 FR 76412 - Agency Information Collection (VA National Rehabilitation Special Events, Event Registration...

    Science.gov (United States)

    2013-12-17

    ... INFORMATION: Titles: a. National Disabled Veterans Winter Sports Clinic Application, VA Form 0924a, c, d and..., c, e. j. Voluntary Service Application, VA Form 0927f. k. National Veterans Summer sports Clinic... Festival Event Application, VA0929a, b, c, d, e, f, g, h. Type of Review: Revision of an already approved...

  11. Recent advances in systems safety and security

    CERN Document Server

    Stamatescu, Grigore

    2016-01-01

    This book represents a timely overview of advances in systems safety and security, based on selected, revised and extended contributions from the 2nd and 3rd editions of the International Workshop on Systems Safety and Security – IWSSS, held in 2014 and 2015, respectively, in Bucharest, Romania. It includes 14 chapters, co-authored by 34 researchers from 7 countries. The book provides an useful reference from both theoretical and applied perspectives in what concerns recent progress in this area of critical interest. Contributions, broadly grouped by core topic, address challenges related to information theoretic methods for assuring systems safety and security, cloud-based solutions, image processing approaches, distributed sensor networks and legal or risk analysis viewpoints. These are mostly accompanied by associated case studies providing additional practical value and underlying the broad relevance and impact of the field.

  12. A Component-Based Approach for Securing Indoor Home Care Applications

    Science.gov (United States)

    Estévez, Elisabet

    2017-01-01

    eHealth systems have adopted recent advances on sensing technologies together with advances in information and communication technologies (ICT) in order to provide people-centered services that improve the quality of life of an increasingly elderly population. As these eHealth services are founded on the acquisition and processing of sensitive data (e.g., personal details, diagnosis, treatments and medical history), any security threat would damage the public’s confidence in them. This paper proposes a solution for the design and runtime management of indoor eHealth applications with security requirements. The proposal allows applications definition customized to patient particularities, including the early detection of health deterioration and suitable reaction (events) as well as security needs. At runtime, security support is twofold. A secured component-based platform supervises applications execution and provides events management, whilst the security of the communications among application components is also guaranteed. Additionally, the proposed event management scheme adopts the fog computing paradigm to enable local event related data storage and processing, thus saving communication bandwidth when communicating with the cloud. As a proof of concept, this proposal has been validated through the monitoring of the health status in diabetic patients at a nursing home. PMID:29278370

  13. A Component-Based Approach for Securing Indoor Home Care Applications

    Directory of Open Access Journals (Sweden)

    Aitor Agirre

    2017-12-01

    Full Text Available eHealth systems have adopted recent advances on sensing technologies together with advances in information and communication technologies (ICT in order to provide people-centered services that improve the quality of life of an increasingly elderly population. As these eHealth services are founded on the acquisition and processing of sensitive data (e.g., personal details, diagnosis, treatments and medical history, any security threat would damage the public’s confidence in them. This paper proposes a solution for the design and runtime management of indoor eHealth applications with security requirements. The proposal allows applications definition customized to patient particularities, including the early detection of health deterioration and suitable reaction (events as well as security needs. At runtime, security support is twofold. A secured component-based platform supervises applications execution and provides events management, whilst the security of the communications among application components is also guaranteed. Additionally, the proposed event management scheme adopts the fog computing paradigm to enable local event related data storage and processing, thus saving communication bandwidth when communicating with the cloud. As a proof of concept, this proposal has been validated through the monitoring of the health status in diabetic patients at a nursing home.

  14. International Nuclear Security Education Network (INSEN) and the Nuclear Security Training and Support Centre (NSSC) Network

    International Nuclear Information System (INIS)

    Nikonov, Dmitriy

    2013-01-01

    International Nuclear Security Education Network established in 2010: A partnership between the IAEA and universities, research institutions and other stakeholders - •Promotion of nuclear security education; • Development of educational materials; • Professional development for faculty members; • Collaborative research and resource sharing. Currently over 90 members from 38 member states. Mission: to enhance global nuclear security by developing, sharing and promoting excellence in nuclear security education. Nuclear Security Support Centre: Primary objectives are: • Develop human resources through the implementation of a tailored training programme; • Develop a network of experts; • Provide technical support for lifecycle equipment management and scientific support for the detection of and the response to nuclear security events

  15. Stream II-V5: Revision Of Stream II-V4 To Account For The Effects Of Rainfall Events

    International Nuclear Information System (INIS)

    Chen, K.

    2010-01-01

    STREAM II-V4 is the aqueous transport module currently used by the Savannah River Site emergency response Weather Information Display (WIND) system. The transport model of the Water Quality Analysis Simulation Program (WASP) was used by STREAM II to perform contaminant transport calculations. WASP5 is a US Environmental Protection Agency (EPA) water quality analysis program that simulates contaminant transport and fate through surface water. STREAM II-V4 predicts peak concentration and peak concentration arrival time at downstream locations for releases from the SRS facilities to the Savannah River. The input flows for STREAM II-V4 are derived from the historical flow records measured by the United States Geological Survey (USGS). The stream flow for STREAM II-V4 is fixed and the flow only varies with the month in which the releases are taking place. Therefore, the effects of flow surge due to a severe storm are not accounted for by STREAM II-V4. STREAM II-V4 has been revised to account for the effects of a storm event. The steps used in this method are: (1) generate rainfall hyetographs as a function of total rainfall in inches (or millimeters) and rainfall duration in hours; (2) generate watershed runoff flow based on the rainfall hyetographs from step 1; (3) calculate the variation of stream segment volume (cross section) as a function of flow from step 2; (4) implement the results from steps 2 and 3 into the STREAM II model. The revised model (STREAM II-V5) will find the proper stream inlet flow based on the total rainfall and rainfall duration as input by the user. STREAM II-V5 adjusts the stream segment volumes (cross sections) based on the stream inlet flow. The rainfall based stream flow and the adjusted stream segment volumes are then used for contaminant transport calculations.

  16. Revised Paris and Vienna Nuclear Liability Conventions - Challenges for Nuclear Insurers

    International Nuclear Information System (INIS)

    Tetley, M.

    2006-01-01

    The revisions recently implemented to both the Vienna and Paris nuclear liability Conventions are intended to widen significantly the amount and scope of compensation payable in the event of a nuclear accident. Whilst this is a laudable objective, the final extent of the revisions leaves nuclear site operators and their insurers with greater uncertainty as a result of the wider and unquantifiable nature of some aspects of the revised nuclear damage definition, in particular where reference is made to environmental reinstatement and extended prescription periods. Incorporating broader definitions in the Convention revisions will therefore leave gaps in the insurance cover where insurers are unable to insure the new, wider scope of cover. If no insurance is available, then the liability for the revised scope of cover must fall upon either the operator or the national Government. This presentation will give an overview of where and why the major gaps in nuclear liability insurance cover will occur in the revised Conventions; it will also examine the problems in defining the revised scope of cover and will look at where these unquantifiable risks should now reside, to ensure there is equity between the liabilities imposed on the nuclear industry and those imposed on other industrial sectors. (author)

  17. Categorization of radioactive sources. Revision of IAEA-TECDOC-1191, Categorization of radiation sources

    International Nuclear Information System (INIS)

    2003-07-01

    the Safety of Radiation Sources and the Security of Radioactive Materials (the Action Plan) in Attachment 2 to publication GOV/1999/46-GC(43)/10. In September 1999, the Board approved the Action Plan and requested the Secretariat to implement it. The subsequent General Conference endorsed the Board's decision and urged the Secretariat to implement the Action Plan. The Action Plan covered seven major work areas, one of which identified the need for a system of source categorization. The resulting IAEA-TECDOC-1191 Categorization of Radiation Sources, was published in December 2000. Whilst IAEA-TECDOC-1191 provided a useful system for categorizing radioactive sources, according to radiological and other risks, it was limited in its scope of application. Under the auspices of the Action Plan, the IAEA also organized an International Conference of National Regulatory Authorities with Competence in the Safety of Radiation Sources and the Security of Radioactive Material, which was held in Buenos Aires, Argentina, from 11 to 15 December 2000 (the Buenos Aires Conference). At its meetings in March 2001 the Board considered the report on the major findings of the Buenos Aires Conference (GOV/2001/3, 12 February 2001). It noted these major findings and requested the Secretariat to assess the implications of the major findings of the Buenos Aires Conference for the Action Plan for the Safety of Radiation Sources and the Security of Radioactive Materials, and to implement any adjustments to the Action Plan that may be necessary. The subsequent revised Action Plan on the Safety and Security of Radiation Sources (GOV/2001/29-GC(45)/12) noted the need to review how the categorization system was being used, and to consider revising it. The Secretariat also recognized that the new categorization system was crucial to other high priority work initiatives being carried out by IAEA, such as the revised Code of Conduct on the Safety and Security of Radioactive Sources (in preparation) and

  18. Features, Events, and Processes: Disruptive Events

    International Nuclear Information System (INIS)

    P. Sanchez

    2004-01-01

    The purpose of this analysis report is to evaluate and document the inclusion or exclusion of the disruptive events features, events, and processes (FEPs) with respect to modeling used to support the total system performance assessment for license application (TSPA-LA). A screening decision, either ''Included'' or ''Excluded,'' is given for each FEP, along with the technical basis for screening decisions. This information is required by the U.S. Nuclear Regulatory Commission (NRC) at 10 CFR 63.114 (d), (e), and (f) [DIRS 156605]. The FEPs addressed in this report deal with both seismic and igneous disruptive events, such as fault displacements through the repository and an igneous intrusion into the repository. For included FEPs, this analysis summarizes the implementation of the FEP in TSPA-LA (i.e., how the FEP is included). For excluded FEPs, this analysis provides the technical basis for exclusion from TSPA-LA (i.e., why the FEP is excluded). Previous versions of this report were developed to support the total system performance assessments (TSPA) for various prior repository designs. This revision addresses the repository design for the license application (LA)

  19. Features, Events, and Processes: Disruptive Events

    Energy Technology Data Exchange (ETDEWEB)

    P. Sanchez

    2004-11-08

    The purpose of this analysis report is to evaluate and document the inclusion or exclusion of the disruptive events features, events, and processes (FEPs) with respect to modeling used to support the total system performance assessment for license application (TSPA-LA). A screening decision, either ''Included'' or ''Excluded,'' is given for each FEP, along with the technical basis for screening decisions. This information is required by the U.S. Nuclear Regulatory Commission (NRC) at 10 CFR 63.114 (d), (e), and (f) [DIRS 156605]. The FEPs addressed in this report deal with both seismic and igneous disruptive events, such as fault displacements through the repository and an igneous intrusion into the repository. For included FEPs, this analysis summarizes the implementation of the FEP in TSPA-LA (i.e., how the FEP is included). For excluded FEPs, this analysis provides the technical basis for exclusion from TSPA-LA (i.e., why the FEP is excluded). Previous versions of this report were developed to support the total system performance assessments (TSPA) for various prior repository designs. This revision addresses the repository design for the license application (LA).

  20. Safeguards Summary Event List (SSEL), pre-NRC through December 31, 1982

    International Nuclear Information System (INIS)

    1983-08-01

    This document represents a revision of the list published December 1980 of safeguards-related events involving NRC licensees and licensed material. It summarizes events occurring between June 30, 1982 and December 31, 1982. Editorial changes to earlier pages are also included

  1. NRC Information No. 89-89: Event notification worksheets

    International Nuclear Information System (INIS)

    Rossi, C.E.

    1992-01-01

    The NRC ''Event Notification Worksheet,'' NRC Form 361, has been revised to assist the NRC Headquarters Operations Officers in obtaining adequate information for evaluation of significant events reported to the NRC Operations Center. The new forms more accurately reflect the event classifications and the 10 CFR 50.72 categories that must be reported. A copy of the new worksheet is enclosed for your reference. NRC Form 361 can be ordered from the NRC Information and Records Management Branch

  2. Foil fabrication for the ROMANO event. Revision 1

    International Nuclear Information System (INIS)

    Romo, J.G. Jr.; Weed, J.W.; Griggs, G.E.; Brown, T.G.; Tassano, P.L.

    1984-01-01

    The Vacuum Processes Lab (VPL), of LLNL's M.E. Dept. - Material Fabrication Division (MFD), conducted various vacuum related support activities for the ROMANO nuclear physics experiment. This report focuses on the foil fabrication activities carried out between July and November 1983 for the ROMANO event. Other vacuum related activities for ROMANO, such as outgassing tests of materials, are covered in separate documentation. VPL was asked to provide 270 coated Parylene foils for the ROMANO event. However, due to the developmental nature of some of the procedures, approximately 400 coated foils were processed. In addition, VPL interacted with MFD's Plastics Shop to help supply Parylene substrates to other organizations (i.e., LBL and commercial vendors) which had also been asked to provide coated foils for ROMANO. The purposes of this report are (A) to document the processes developed and the techniques used to produce the foils, and (B) to suggest future directions. The report is divided into four sections describing: (1) nuclear target foil fabrication, (2) Parylene substrate preparation and production, (3) calibration foil fabrication, and (4) foil and substrate inspections

  3. 78 FR 59981 - Proposed Revision to Physical Security-Standard Design Certification and Operating Reactors

    Science.gov (United States)

    2013-09-30

    ... Design Certification and Operating Reactors AGENCY: Nuclear Regulatory Commission. ACTION: Standard... Design Certification and Operating Reactors.'' The NRC seeks comments on the proposed revised section of... subject): Federal Rulemaking Web site: Go to http://www.regulations.gov and search for Docket ID NRC-2013...

  4. 77 FR 50929 - Security Zones; 2012 RNC Bridge Security Zones, Captain of the Port St. Petersburg Zone, Tampa, FL

    Science.gov (United States)

    2012-08-23

    ... Convention have conducted threat, vulnerability, and risk analyses relating to the event. The convention is... mitigate the threats and vulnerabilities identified in the analysis discussed above. Security measures have... maritime stakeholders, including recreational boaters, from threats and security vulnerabilities. The Coast...

  5. Climatic change and security stakes

    International Nuclear Information System (INIS)

    Ambrosi, Ph.; Hallegatte, St.

    2006-01-01

    This paper explores the relationships between climate change and security. Potential threats from climate change, as a unique source of stress or together with other factors, to human security are first examined. Some of the most explicit examples illustrate this section: food security, water availability, vulnerability to extreme events and vulnerability of small islands States and coastal zones. By questioning the basic needs of some populations or at least aggravating their precariousness, such risks to human security could also raise global security concerns, which we examine in turn, along four directions: rural exodus with an impoverishment of displaced populations, local conflicts for the use of natural resources, diplomatic tensions and international conflicts, and propagation to initially-unaffected regions through migratory flows. (authors)

  6. Language, Semantics, and Methods for Security Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico

    events. Methods like strand spaces and the inductive method of Paulson have been designed to support an intensional, event-based, style of reasoning. These methods have successfully tackled a number of protocols though in an ad hoc fashion. They make an informal spring from a protocol to its......-nets. They have persistent conditions and as we show in this thesis, unfold under reasonable assumptions to a more basic kind of nets. We relate SPL-nets to strand spaces and inductive rules, as well as trace languages and event structures so unifying a range of approaches, as well as providing conditions under...... reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events that a security protocol can perform, and make use of a causal dependency that exists between...

  7. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Chinese Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  8. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Arabic Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  9. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Spanish Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objeurity Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit

  10. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (French Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  11. Initiating events and accidental sequences taken into account in the CAREM reactor design

    International Nuclear Information System (INIS)

    Kay, J.M.; Felizia, E.R.; Navarro, N.R.; Caruso, G.J.

    1990-01-01

    The advance made in the nuclear security evaluation of the CAREM reactor is presented. It was carried out using the Security Probabilistic Analysis (SPA). The latter takes into account the different phases of identification and solution of initiating events and the qualitative development of event trees. The method of identification of initiating events is the Master Logical Diagram (MLD), whose deductive basis makes it appropriate for a new design like the one described. The qualitative development of the event trees associated to the identified initiating events, allows identification of those accidental sequences which are to have the security systems in the reactor. (Author) [es

  12. Revising Translations

    DEFF Research Database (Denmark)

    Rasmussen, Kirsten Wølch; Schjoldager, Anne

    2011-01-01

    The paper explains the theoretical background and findings of an empirical study of revision policies, using Denmark as a case in point. After an overview of important definitions, types and parameters, the paper explains the methods and data gathered from a questionnaire survey and an interview...... survey. Results clearly show that most translation companies regard both unilingual and comparative revisions as essential components of professional quality assurance. Data indicate that revision is rarely fully comparative, as the preferred procedure seems to be a unilingual revision followed by a more...... or less comparative rereading. Though questionnaire data seem to indicate that translation companies use linguistic correctness and presentation as the only revision parameters, interview data reveal that textual and communicative aspects are also considered. Generally speaking, revision is not carried...

  13. 77 FR 50631 - Homeland Security Acquisition Regulation (HSAR); Revision Initiative [HSAR Case 2009-002

    Science.gov (United States)

    2012-08-22

    ..., provides guidance and direction for compliance with green purchasing and other sustainable practices...--IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST 0 14. Revise section 3003.101-3 to read as follows: 3003.101-3 Agency regulations. The United States Office of Government Ethics has promulgated...

  14. The effects of event occurrence and duration on resilience and adaptation in energy systems

    International Nuclear Information System (INIS)

    Hughes, Larry

    2015-01-01

    Energy security exists in an energy system until an event occurs which increases the stress on one or more of its entities. A resilient entity, designed to recover quickly from an event, will return the system (and, by extension, the affected entity) to its previous secure state. However, if the event occurs repeatedly or the time to recover is deemed too slow, or both, the system may remain in a high-stress, insecure state. In these situations, if the stress is to be reduced, the entity must be adapted to handle the event and put the system into a new, secure state. This paper applies research from a variety of disciplines to analyze the temporal effects of events on entities, and shows how resilience and adaptation contribute to the existence of energy security in energy systems. It underscores the importance of time when discussing the impact of events on an energy system and employs methods associated with reliability, notably mean time between failures (MTBF), mean time to recover (MTTR), and tolerance, to describe resilience and adaptation. The analysis is presented and discussed with examples using three common energy security indicators. - Highlights: • Explains how temporal events, entities, and resilience affect energy security. • Describes the two different temporal effects that can affect an entity's resilience. • Demonstrates how the loss of resilience can lead to the intolerance of an event. • Shows how intolerance can result in new energy policy and adaptation for an entity. • Explains how adaptation leads to resilience and can improve energy security

  15. The Event Chain of Survival in the Context of Music Festivals: A Framework for Improving Outcomes at Major Planned Events.

    Science.gov (United States)

    Lund, Adam; Turris, Sheila

    2017-08-01

    Despite the best efforts of event producers and on-site medical teams, there are sometimes serious illnesses, life-threatening injuries, and fatalities related to music festival attendance. Producers, clinicians, and researchers are actively seeking ways to reduce the mortality and morbidity associated with these events. After analyzing the available literature on music festival health and safety, several major themes emerged. Principally, stakeholder groups planning in isolation from one another (ie, in silos) create fragmentation, gaps, and overlap in plans for major planned events (MPEs). The authors hypothesized that one approach to minimizing this fragmentation may be to create a framework to "connect the dots," or join together the many silos of professionals responsible for safety, security, health, and emergency planning at MPEs. Adapted from the well-established literature regarding the management of cardiac arrests, both in and out of hospital, the "chain of survival" concept is applied to the disparate groups providing services that support event safety in the context of music festivals. The authors propose this framework for describing, understanding, coordinating and planning around the integration of safety, security, health, and emergency service for events. The adapted Event Chain of Survival contains six interdependent links, including: (1) event producers; (2) police and security; (3) festival health; (4) on-site medical services; (5) ambulance services; and (6) off-site medical services. The authors argue that adapting and applying this framework in the context of MPEs in general, and music festivals specifically, has the potential to break down the current disconnected approach to event safety, security, health, and emergency planning. It offers a means of shifting the focus from a purely reactive stance to a more proactive, collaborative, and integrated approach. Improving health outcomes for music festival attendees, reducing gaps in planning

  16. 2009.3 Revision of the Evaluated Nuclear Data Library (ENDL2009.3)

    Energy Technology Data Exchange (ETDEWEB)

    Thompson, I. J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Beck, B. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Descalle, M. A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Mattoon, C. M. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Jurgenson, E. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-11-06

    LLNL's Computational Nuclear Data and Theory Group have created a 2009.3 revised release of the Evaluated Nuclear Data Library (ENDL2009.3). This library is designed to support LLNL's current and future nuclear data needs and will be employed in nuclear reactor, nuclear security and stockpile stewardship simulations with ASC codes. The ENDL2009 database was the most complete nuclear database for Monte Carlo and deterministic transport of neutrons and charged particles. It was assembled with strong support from the ASC PEM and Attribution programs, leveraged with support from Campaign 4 and the DOE/Office of Science's US Nuclear Data Program. This document lists the revisions and fixes made in a new release called ENDL2009.3, by com- paring with the existing data in the previous release ENDL2009.2. These changes are made in conjunction with the revisions for ENDL2011.3, so that both the .3 releases are as free as possible of known defects.

  17. 2011.2 Revision of the Evaluated Nuclear Data Library (ENDL2011.2)

    Energy Technology Data Exchange (ETDEWEB)

    Beck, B. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Descalles, M. A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Mattoon, C. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Jurgenson, E. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Thompson, I. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-09-22

    LLNL's Computational Nuclear Physics Group and Nuclear Theory and Modeling Group have col- laborated to create the 2011.2 revised release of the Evaluated Nuclear Data Library (ENDL2011.2). ENDL2011.2 is designed to support LLNL's current and future nuclear data needs and will be em- ployed in nuclear reactor, nuclear security and stockpile stewardship simulations with ASC codes. This database is currently the most complete nuclear database for Monte Carlo and deterministic transport of neutrons and charged particles. This library was assembled with strong support from the ASC PEM and Attribution programs, leveraged with support from Campaign 4 and the DOE/O ce of Science's US Nuclear Data Program. This document lists the revisions made in ENDL2011.2 compared with the data existing in the original ENDL2011.0 release and the ENDL2011.1-rc4 re- lease candidate of April 2015. These changes are made in parallel with some similar revisions for ENDL2009.2.

  18. Nevada National Security Site Integrated Groundwater Sampling Plan, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Marutzky, Sam; Farnham, Irene

    2014-10-01

    The purpose of the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan) is to provide a comprehensive, integrated approach for collecting and analyzing groundwater samples to meet the needs and objectives of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) Activity. Implementation of this Plan will provide high-quality data required by the UGTA Activity for ensuring public protection in an efficient and cost-effective manner. The Plan is designed to ensure compliance with the UGTA Quality Assurance Plan (QAP). The Plan’s scope comprises sample collection and analysis requirements relevant to assessing the extent of groundwater contamination from underground nuclear testing. This Plan identifies locations to be sampled by corrective action unit (CAU) and location type, sampling frequencies, sample collection methodologies, and the constituents to be analyzed. In addition, the Plan defines data collection criteria such as well-purging requirements, detection levels, and accuracy requirements; identifies reporting and data management requirements; and provides a process to ensure coordination between NNSS groundwater sampling programs for sampling of interest to UGTA. This Plan does not address compliance with requirements for wells that supply the NNSS public water system or wells involved in a permitted activity.

  19. Shipment security update - 2003

    International Nuclear Information System (INIS)

    Patterson, John; Anne, Catherine

    2003-01-01

    At the 2002 RERTR, NAC reported on the interim measures taken by the U.S. Nuclear Regulatory Commission to enhance the security afforded to shipments of spent nuclear fuel. Since that time, there have been a number of additional actions focused on shipment security including training programs sponsored by the U.S. Department of Transportation and the Electric Power Research Council, investigation by the Government Accounting Office, and individual measures taken by shippers and transportation agents. The paper will present a status update regarding this dynamic set of events and provide an objective assessment of the cost, schedule and technical implications of the changing security landscape. (author)

  20. Revision total hip arthoplasty: factors associated with re-revision surgery.

    Science.gov (United States)

    Khatod, Monti; Cafri, Guy; Inacio, Maria C S; Schepps, Alan L; Paxton, Elizabeth W; Bini, Stefano A

    2015-03-04

    The survivorship of implants after revision total hip arthroplasty and risk factors associated with re-revision are not well defined. We evaluated the re-revision rate with use of the institutional total joint replacement registry. The purpose of this study was to determine patient, implant, and surgeon factors associated with re-revision total hip arthroplasty. A retrospective cohort study was conducted. The total joint replacement registry was used to identify patients who had undergone revision total hip arthroplasty for aseptic reasons from April 1, 2001, to December 31, 2010. The end point of interest was re-revision total hip arthroplasty. Risk factors evaluated for re-revision total hip arthroplasty included: patient risk factors (age, sex, body mass index, race, and general health status), implant risk factors (fixation type, bearing surface, femoral head size, and component replacement), and surgeon risk factors (volume and experience). A multivariable Cox proportional hazards model was used. Six hundred and twenty-nine revision total hip arthroplasties with sixty-three (10%) re-revisions were evaluated. The mean cohort age (and standard deviation) was 57.0 ± 12.4 years, the mean body mass index (and standard deviation) was 29.5 ± 6.1 kg/m(2), and most of the patients were women (64.5%) and white (81.9%) and had an American Society of Anesthesiologists score of associated with the risk of re-revision. For every ten-year increase in patient age, the hazard ratio for re-revision decreases by a factor of 0.72 (95% confidence interval, 0.58 to 0.90). For every five revision surgical procedures performed by a surgeon, the risk of revision decreases by a factor of 0.93 (95% confidence interval, 0.86 to 0.99). At the time of revision, a new or retained cemented femoral implant or all-cemented hip implant increases the risk of revision by a factor of 3.19 (95% confidence interval, 1.22 to 8.38) relative to a retained or new uncemented hip implant. A ceramic on a

  1. Safeguards Summary Event List (SSEL). Pre-NRC-June 30, 1985. Revision 11

    International Nuclear Information System (INIS)

    1986-01-01

    The Safeguards Summary Event List (SSRL) provides brief summaries of several hundred safeguards-related events involving nuclear material or facilities regulated by the US Nuclear Regulatory Commission (NRC). Events are described under the categories of bomb-related, intrusion, missing and/or allegedly stolen, transportation, tampering/vandalism, arson, firearms, radiological sabotage, non-radiological sabotage and miscellaneous. The information contained in the event descriptions is derived primarily from official NRC reporting channels. 12 figs

  2. Consequence Prioritization Process for Potential High Consequence Events (HCE)

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, Sarah G. [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2016-10-31

    This document describes the process for Consequence Prioritization, the first phase of the Consequence-Driven Cyber-Informed Engineering (CCE) framework. The primary goal of Consequence Prioritization is to identify potential disruptive events that would significantly inhibit an organization’s ability to provide the critical services and functions deemed fundamental to their business mission. These disruptive events, defined as High Consequence Events (HCE), include both events that have occurred or could be realized through an attack of critical infrastructure owner assets. While other efforts have been initiated to identify and mitigate disruptive events at the national security level, such as Presidential Policy Directive 41 (PPD-41), this process is intended to be used by individual organizations to evaluate events that fall below the threshold for a national security. Described another way, Consequence Prioritization considers threats greater than those addressable by standard cyber-hygiene and includes the consideration of events that go beyond a traditional continuity of operations (COOP) perspective. Finally, Consequence Prioritization is most successful when organizations adopt a multi-disciplinary approach, engaging both cyber security and engineering expertise, as in-depth engineering perspectives are required to recognize and characterize and mitigate HCEs. Figure 1 provides a high-level overview of the prioritization process.

  3. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  4. Radioactive Waste SECURITY

    International Nuclear Information System (INIS)

    Brodowski, R.; Drapalik, M.; Gepp, C.; Gufler, K.; Sholly, S.

    2010-01-01

    The purpose of this work is to investigate the safety requirements for a radioactive waste repository, the fundamental problems involved and the legislative rules and arrangements for doing so. As the title already makes clear, the focus of this work is on aspects that can be assigned to the security sector - ie the security against the influence of third parties - and are to be distinguished from safety measures for the improvement of the technical safety aspects. In this context, mention is made of events such as human intrusion into guarded facilities, whereas e.g. a geological analysis on seismic safety is not discussed. For a variety of reasons, the consideration of security nuclear waste repositories in public discussions is increasingly taking a back seat, as ia. Terrorist threats can be considered as negligible risk or well calculable. Depending on the type of storage, different security aspects still have to be considered. (roessner)

  5. INES: The International Nuclear Event Scale user's manual

    International Nuclear Information System (INIS)

    1992-09-01

    The revised and extended addition of the International Nuclear Event Scale is presented. The manual is comprised of four parts. Part 1 contains a summary of the basis of the scale and of the procedure to be used for rating events. Part 2 contains the detailed guidance required to rate events in terms of off-site and on-site impact. These two parts are applicable to all nuclear facilities. Parts 3 and 4 contain the detailed guidance required to rate events in terms of defence in depth for reactors and other facilities, respectively. 5 figs, 2 tabs

  6. Revision of the Paris and Brussels Conventions of Nuclear Liability

    International Nuclear Information System (INIS)

    Reyners, P.

    2002-01-01

    The Contracting Parties to the 1960 Paris Convention on Third Party Liability in the Field of Nuclear Energy and to the 1963 Brussels Convention Supplementary to the Paris Convention, have concluded this Spring four years of negotiation on the revision of these instruments. This exercise was itself started as a logical consequence of the adoption in 1997 of a revised Vienna Convention on Civil Liability for Nuclear Damage and of a Convention on Supplementary Compensation for Nuclear Damage. The Contracting Parties have concluded that the existing regime established by these Conventions remains viable and sound but that it also warrants improvements to ensure that greater financial security will be available to compensate a potentially larger number of victims in respect of a broader range of nuclear damage. A number of more technical amendments have also been agreed, in particular to ensure compatibility with other existing Conventions in this field. When the revised Paris and Brussels Conventions come into force, the total amount of funds available for compensation, provided by the liable nuclear operator and by the States concerned, will be 1.5 billion euros. (author)

  7. Use of computer programs to evaluate effectiveness of security systems

    International Nuclear Information System (INIS)

    Harris, L. Jr.; Goldman, L.A.; Mc Daniel, T.L.

    1987-01-01

    Thirty or more computer programs for security vulnerability analysis were developed from 1975 through 1980. Most of these programs are intended for evaluating security system effectiveness against outsider threats, but at least six programs are primarily oriented to insider threats. Some strengths and weaknesses of these programs are described. Six of these programs, four for outsider threats and two for insider threats, have been revised and adapted for use with IBM personal computers. The vulnerability analysis process is discussed with emphasis on data collection. The difference between design data and operational data is described. For performance-type operational data, such as detection probabilities and barrier delay times, the difference between unstressed and stressed performance data is discussed. Stressed performance data correspond to situations where an adversary attempts to weaken a security system by mitigating certain security measures. Suggestions are made on the combined use of manual analysis and computer analysis

  8. 77 FR 48492 - Event Data Recorders

    Science.gov (United States)

    2012-08-14

    ... that [cir] Involve side or side curtain/tube air bags such that EDR data would only need to be locked... deployable restraints other than frontal, side or side/curtain air bags such that EDR data would not need to... definitions to alleviate any uncertainties in multiple event crashes; Revised certain sensor ranges and...

  9. Special event planning for the emergency manager.

    Science.gov (United States)

    Gaynor, Peter T

    2009-11-01

    In the domain of emergency management and homeland security there is a lack of a formal planning process at the local level when it comes to special event planning. The unique nature of special event planning demands an understanding of the planning process for both traditional and non-traditional planning partners. This understanding will make certain that local governments apply due diligence when planning for the safety of the public. This paper offers a practical roadmap for planning at the local level. It will address those 'special events' that are beyond routine local events but not of a sufficient scale to be granted National Special Security Event status. Due to the infrequency of 'special events' in most communities, it is imperative that deliberate planning takes place. Upon conclusion, the reader will be able to construct a planning process tailored to the needs of their community, guide both traditional and non-traditional planning partners through the planning process, determine priorities, explore alternatives, plan for contingencies, conduct a confirmation brief, facilitate operations and assemble an after-action report and improvement plan.

  10. Strengthening of safety and security of radioactive sources: new regulatory challenges

    Energy Technology Data Exchange (ETDEWEB)

    El Messaoudi, M.; Essadki M Lferde, H.; Moutia, Z. [Faculte des Sciences, Dept. de Physique, Rabat (Morocco)

    2006-07-01

    The answer to these new regulatory challenges was given by implementation of divers measures aimed at strengthening of safety and security of radioactive sources and to prevent the malevolent use of radioactive sources. The international basic safety standards for protection against ionizing radiation and for the safety of radiation sources (B.S.S.) require the establishment and implementation of security measures of radioactive sources to ensure that protection and safety requirements are met. The IAEA has engaged in an extensive effort to establish and/or strengthen national radiation protection and radiological safety infrastructure, including legislation and regulation, a regulatory authority empowered to authorize and inspect regulated activities, an adequate number of trained personnel and technical services that are beyond the capabilities required of the authorized legal persons. The Moroccan authority makes steady efforts to strengthen national radiation safety infrastructure by participating in IAEA model project for upgrading radiation protection infrastructure, to implement the revised version of code of conduct on the safety and security of radioactive sources. Indeed, Morocco expressed its adhesion with the technical assistance project of the IAEA in 2001, carrying on the reinforcement of the national infrastructure of regulation and control of the radioactive materials. The control over radioactive sources is an essential element for maintaining high level of security and safety of radioactive sources. The IAEA T.E.C.-D.O.C.-1388 serves as reference document to implement the control culture. The security problems with which the world is confronted showed that the uses of radioactive sources should subject reinforcements of safety, of control and of security of the radioactive sources. For this purpose, the IAEA launched an action plan for the safety and security of radioactive sources. The IAEA guide Security of radioactive sources will help the

  11. Strengthening of safety and security of radioactive sources: new regulatory challenges

    International Nuclear Information System (INIS)

    El Messaoudi, M.; Essadki M Lferde, H.; Moutia, Z.

    2006-01-01

    The answer to these new regulatory challenges was given by implementation of divers measures aimed at strengthening of safety and security of radioactive sources and to prevent the malevolent use of radioactive sources. The international basic safety standards for protection against ionizing radiation and for the safety of radiation sources (B.S.S.) require the establishment and implementation of security measures of radioactive sources to ensure that protection and safety requirements are met. The IAEA has engaged in an extensive effort to establish and/or strengthen national radiation protection and radiological safety infrastructure, including legislation and regulation, a regulatory authority empowered to authorize and inspect regulated activities, an adequate number of trained personnel and technical services that are beyond the capabilities required of the authorized legal persons. The Moroccan authority makes steady efforts to strengthen national radiation safety infrastructure by participating in IAEA model project for upgrading radiation protection infrastructure, to implement the revised version of code of conduct on the safety and security of radioactive sources. Indeed, Morocco expressed its adhesion with the technical assistance project of the IAEA in 2001, carrying on the reinforcement of the national infrastructure of regulation and control of the radioactive materials. The control over radioactive sources is an essential element for maintaining high level of security and safety of radioactive sources. The IAEA T.E.C.-D.O.C.-1388 serves as reference document to implement the control culture. The security problems with which the world is confronted showed that the uses of radioactive sources should subject reinforcements of safety, of control and of security of the radioactive sources. For this purpose, the IAEA launched an action plan for the safety and security of radioactive sources. The IAEA guide Security of radioactive sources will help the

  12. Reasons for revision of failed hemiarthroplasty: Are there any differences between unipolar and bipolar?

    Science.gov (United States)

    Iamthanaporn, Khanin; Chareancholvanich, Keerati; Pornrattanamaneewong, Chaturong

    2018-03-16

    Hemiarthroplasty (HA) is an effective procedure for treatment of femoral neck fracture. However, it is debatable whether unipolar or bipolar HA is the most suitable implant. The purpose of this study was to compare the causes of failure and longevity in both types of HA. We retrospectively reviewed 133 cases that underwent revision surgery of HA between 2002 and 2012. The causes of revision surgery were identified and stratified into early (≤ 5 years) failure and late (> 5 years) failure. Survival analyses were performed for each implant type. The common causes for revision were aseptic loosening (49.6%), infection (22.6%) and acetabular erosion (15.0%). Unipolar and bipolar HA were not different in causes for revision, but the unipolar group had a statistically significantly higher number of acetabular erosion events compared with the bipolar group (p = 0.002). In the early period, 24 unipolar HA (52.9%) and 28 bipolar HA (34.1%) failed. There were no statistically significant differences in the numbers of revised HA in each period between the two groups (p = 0.138). The median survival times in the unipolar and bipolar groups were 84.0 ± 24.5 and 120.0 ± 5.5 months, respectively. However, the survival times of both implants were not statistically significantly different. Aseptic loosening was the most common reason for revision surgery after hemiarthroplasty surgery in early and late failures. Unipolar and bipolar hemiarthroplasty were not different in terms of causes of failure and survivorship except bipolar hemiarthroplasty had many fewer acetabular erosion events.

  13. Development and Demonstration of a Security Core Component

    Energy Technology Data Exchange (ETDEWEB)

    Turke, Andy

    2014-02-28

    In recent years, the convergence of a number of trends has resulted in Cyber Security becoming a much greater concern for electric utilities. A short list of these trends includes: · Industrial Control Systems (ICSs) have evolved from depending on proprietary hardware and operating software toward using standard off-the-shelf hardware and operating software. This has meant that these ICSs can no longer depend on “security through obscurity. · Similarly, these same systems have evolved toward using standard communications protocols, further reducing their ability to rely upon obscurity. · The rise of the Internet and the accompanying demand for more data about virtually everything has resulted in formerly isolated ICSs becoming at least partially accessible via Internet-connected networks. · “Cyber crime” has become commonplace, whether it be for industrial espionage, reconnaissance for a possible cyber attack, theft, or because some individual or group “has something to prove.” Electric utility system operators are experts at running the power grid. The reality is, especially at small and mid-sized utilities, these SCADA operators will by default be “on the front line” if and when a cyber attack occurs against their systems. These people are not computer software, networking, or cyber security experts, so they are ill-equipped to deal with a cyber security incident. Cyber Security Manager (CSM) was conceived, designed, and built so that it can be configured to know what a utility’s SCADA/EMS/DMS system looks like under normal conditions. To do this, CSM monitors log messages from any device that uses the syslog standard. It can also monitor a variety of statistics from the computers that make up the SCADA/EMS/DMS: outputs from host-based security tools, intrusion detection systems, SCADA alarms, and real-time SCADA values – even results from a SIEM (Security Information and Event Management) system. When the system deviates from

  14. Data Protection and the Prevention of Cybercrime: The EU as an area of security?

    OpenAIRE

    PORCEDDA, Maria Grazia

    2012-01-01

    (This working paper is a revised version of Ms. Porcedda's EUI LL.M. thesis, 2012.) Cybercrime and cyber-security are attracting increasing attention, both for the relevance of Critical Information Infrastructure to the national economy and security, and the interplay of the policies tackling them with ‘ICT sensitive’ liberties, such as privacy and data protection. This study addresses the subject in two ways. On the one hand, it aims to cast light on the (legal substantive) nature of, ...

  15. Safeguards Summary Event List (SSEL)

    International Nuclear Information System (INIS)

    1991-07-01

    The Safeguards Summary Event List (SSEL) provides brief summaries of several hundred safeguards-related events involving nuclear material or facilities regulated by the US Nuclear Regulatory Commission (NRC). Because of public interest, the Miscellaneous category includes a few events which involve either source material, byproduct material, or natural uranium which are exempt from safeguards requirements. Events are described under the categories of bomb-related, intrusion, missing and/or allegedly stolen, transportation, tampering/vandalism, arson, firearms, radiological sabotage, nonradiological sabotage, pre-1990 alcohol and drugs (involving reactor operators, security force members, or management persons), and miscellaneous. The information contained in the event descriptions is derived primarily from official NRC reporting channels

  16. 33 CFR 66.05-10 - State waters for private aids to navigation; designations; revisions, and revocations.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions, and...

  17. Using Financial Instruments to Transfer the Information Security Risks

    Directory of Open Access Journals (Sweden)

    Pankaj Pandey

    2016-05-01

    Full Text Available For many individuals and organizations, cyber-insurance is the most practical and only way of handling a major financial impact of an information security event. However, the cyber-insurance market suffers from the problem of information asymmetry, lack of product diversity, illiquidity, high transaction cost, and so on. On the other hand, in theory, capital market-based financial instruments can provide a risk transfer mechanism with the ability to absorb the adverse impact of an information security event. Thus, this article addresses the limitations in the cyber-(reinsurance markets with a set of capital market-based financial instruments. This article presents a set of information security derivatives, namely options, vanilla options, swap, and futures that can be traded at an information security prediction market. Furthermore, this article demonstrates the usefulness of information security derivatives in a given scenario and presents an evaluation of the same in comparison with cyber-insurance. In our analysis, we found that the information security derivatives can at least be a partial solution to the problems in the cyber-insurance markets. The information security derivatives can be used as an effective tool for information elicitation and aggregation, cyber risk pricing, risk hedging, and strategic decision making for information security risk management.

  18. Revision Total Hip Arthoplasty: Factors Associated with Re-Revision Surgery

    OpenAIRE

    Khatod, M; Cafri, G; Inacio, MCS; Schepps, AL; Paxton, EW; Bini, SA

    2015-01-01

    The survivorship of implants after revision total hip arthroplasty and risk factors associated with re-revision are not well defined. We evaluated the re-revision rate with use of the institutional total joint replacement registry. The purpose of this study was to determine patient, implant, and surgeon factors associated with re-revision total hip arthroplasty.A retrospective cohort study was conducted. The total joint replacement registry was used to identify patients who had undergone revi...

  19. CUSTOM TRIFLANGE ACETABULAR COMPONENTS IN REVISION HIP REPLACEMENT (EXPERIENCE REVIEW

    Directory of Open Access Journals (Sweden)

    A. A. Korytkin

    2017-01-01

    Full Text Available Extensive defects of acetabulum especially accompanied by pelvis discontinuity at the level of acetabulum pose a serious challenge in revision hip replacement and create additional complexity in fixing the acetabular component. One of the perspective options to solve the above issue is the use of custom triflange acetabular components (CTAC designed based on preoperative computer tomography given the specifics of bone defects of the patient. Purpose of the study — to evaluate the outcomes of CTAC use in revision hip replacement.Materials and methods. The authors analyzed treatment outcomes of 12 patients after revision hip replacement using additive techniques of computer simulation and 3D printing CTAC. Follow up period after the surgery averaged 7±3 months (from one to ten months. 7 out of 12 patients had acetabular defects of Paprosky 3B type, 4 patients had defects of Paprosky 3A and in one patient — of Paprosky 2C.Results. Two out of twelve patients had prosthesis dislocations that required revision hip surgery, one of those patients underwent open reduction of dislocation with wound debridement, another patient underwent replacement of articulating couple of acetabular component. Total scores under Harris Hip Score and paint VAS score prior to treatment was 28±7 and 7±1 points respectively, postoperative scores were 76±9 and 3±1 respectively.Conclusion. The application of additive techniques for revision hip replacement in patients with extensive acetabular and pelvic defects allows to make a precise preoperative planning, to restore joint rotation center, to reconstruct bone defects and to securely fix triflange acetabular component that altogether significantly improve treatment outcomes and patients satisfaction with the surgery.

  20. Mortgage Finance and Security of Collateral

    DEFF Research Database (Denmark)

    Haldrup, Karin

    2011-01-01

    Developing economies face a gigantic lack of financing for urbanization due to the absence of formal and transparent property markets. The paper discuss the interference between mortgage finance and collateral security by using the Danish mortgage financing model as an example, because of its 200...... years long history, and because the system is recommended as an option in emerging markets and as a possible model for remedying failures in mature housing finance markets. It is suggested that development policies in land administration need to be revised in order to support a widening of credit...

  1. 'Adoption and attachment theory' the attachment models of adoptive mothers and the revision of attachment patterns of their late-adopted children.

    Science.gov (United States)

    Pace, C S; Zavattini, G C

    2011-01-01

    This study examined the attachment patterns of late-adopted children (aged 4-7) and their adoptive mothers during the first 7- to 8-month period after adoption and aimed to evaluate the effect of adoptive mothers' attachment security on the revision of the attachment patterns of their late-adopted children. We assessed attachment patterns in 20 adoptive dyads and 12 genetically related dyads at two different times: T1 (time 1) within 2 months of adoption and T2 (time 2) 6 months after T1. The children's behavioural attachment patterns were assessed using the Separation-Reunion Procedure and the children's representational (verbal) attachment patterns using the Manchester Child Attachment Story Task. The attachment models of the adoptive mothers were classified using the Adult Attachment Interview. We found that there was a significant enhancement of the late-adopted children's attachment security across the time period considered (P= 0.008). Moreover, all the late-adopted children who showed a change from insecurity to security had adoptive mothers with secure attachment models (P= 0.044). However, the matching between maternal attachment models and late-adopted children's attachment patterns (behaviours and representations) was not significant. Our data suggest that revision of the attachment patterns in the late-adopted children is possible but gradual, and that the adoptive mothers' attachment security makes it more likely to occur. © 2010 Blackwell Publishing Ltd.

  2. Revised

    DEFF Research Database (Denmark)

    Johannsen, Vivian Kvist; Nord-Larsen, Thomas; Riis-Nielsen, Torben

    This report is a revised analysis of the Danish data on CO2 emissions from forest, afforestation and deforestation for the period 1990 - 2008 and a prognosis for the period until 2020. Revision have included measurements from 2009 in the estimations. The report is funded by the Ministry of Climate...

  3. An analysis of international situation concerning nuclear security. Focused on the revision to INFCIRC/225/Rev.5

    International Nuclear Information System (INIS)

    Inamura, Tomoaki; Tanabe, Tomoyuki

    2011-01-01

    Since the September 11 attacks in 2001, counterterrorism measures have become not just domestic issues but critical issues that need international cooperation. Various nuclear security measures are in place as part of international counterterrorism measures. This report looks at the trend of international nuclear security measures to get implications for Japan, focusing on INFCIRC/225/Rev.5, an international guideline for physical protection of nuclear materials and nuclear facilities drawn up by IAEA. The observations of this report are as follows: 1) While legally binding nuclear security measures such as multilateral treaties and United Nations Security Council Resolutions impose minimum requirements on individual countries, the approaches led by IAEA or individual countries or private associations aim at more detailed consideration or information sharing to further improve nuclear security. 2) INFCIRC/225/Rev.5 comprises new concepts such as risk-based physical protection and nuclear security culture, as well as extended range of threats such as insiders or stand-off attacks and broader scope of measures to response. Japan should consider incorporation of INFCIRC/225/Rev.5 to its national laws and regulations putting in mind that it may have heavy influence and that Japan pledged to role leadership about nuclear security to international society. (author)

  4. Cyber Security Risk Evaluation of a Nuclear I&C Using BN and ET

    Directory of Open Access Journals (Sweden)

    Jinsoo Shin

    2017-04-01

    Full Text Available Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory agencies worldwide have announced guidelines for cyber security related to nuclear issues, including U.S. NRC Regulatory Guide 5.71. It is important to evaluate cyber security risk in accordance with these regulatory guides. In this study, we propose a cyber security risk evaluation model for nuclear instrumentation and control systems using a Bayesian network and event trees. As it is difficult to perform penetration tests on the systems, the evaluation model can inform research on cyber threats to cyber security systems for nuclear facilities through the use of prior and posterior information and backpropagation calculations. Furthermore, we suggest a methodology for the application of analytical results from the Bayesian network model to an event tree model, which is a probabilistic safety assessment method. The proposed method will provide insight into safety and cyber security risks.

  5. Threats to financial system security

    Energy Technology Data Exchange (ETDEWEB)

    McGovern, D.E.

    1997-06-01

    The financial system in the United States is slowly migrating from the bricks and mortar of banks on the city square to branch banks, ATM`s, and now direct linkage through computers to the home. Much work has been devoted to the security problems inherent in protecting property and people. The impact of attacks on the information aspects of the financial system has, however, received less attention. Awareness is raised through publicized events such as the junk bond fraud perpetrated by Milken or gross mismanagement in the failure of the Barings Bank through unsupervised trading activities by Leeson in Singapore. These events, although seemingly large (financial losses may be on the order of several billion dollars), are but small contributors to the estimated $114 billion loss to all types of financial fraud in 1993. Most of the losses can be traced to the contribution of many small attacks perpetrated against a variety of vulnerable components and systems. This paper explores the magnitude of these financial system losses and identifies new areas for security to be applied to high consequence events.

  6. Expanding the Scales and Domains of (in)Security

    DEFF Research Database (Denmark)

    Gough, Katherine V.; Chigunta, Francis; Langevang, Thilde

    2016-01-01

    Most research on issues of (in)security has tended to have a military/safety angle and focus on global/national scales linked to spectacular events. This paper addresses the overlooked insecurity realities of urban dwellers in the global South through a focus on more persistent and enduring forms...... and education. Although the youth unemployment situation is often viewed as a serious threat to human security, we show how the lack of stable employment in itself is a manifestation of insecurity......Most research on issues of (in)security has tended to have a military/safety angle and focus on global/national scales linked to spectacular events. This paper addresses the overlooked insecurity realities of urban dwellers in the global South through a focus on more persistent and enduring forms...

  7. Kaplan-Meier Survival Analysis Overestimates the Risk of Revision Arthroplasty: A Meta-analysis.

    Science.gov (United States)

    Lacny, Sarah; Wilson, Todd; Clement, Fiona; Roberts, Derek J; Faris, Peter D; Ghali, William A; Marshall, Deborah A

    2015-11-01

    Although Kaplan-Meier survival analysis is commonly used to estimate the cumulative incidence of revision after joint arthroplasty, it theoretically overestimates the risk of revision in the presence of competing risks (such as death). Because the magnitude of overestimation is not well documented, the potential associated impact on clinical and policy decision-making remains unknown. We performed a meta-analysis to answer the following questions: (1) To what extent does the Kaplan-Meier method overestimate the cumulative incidence of revision after joint replacement compared with alternative competing-risks methods? (2) Is the extent of overestimation influenced by followup time or rate of competing risks? We searched Ovid MEDLINE, EMBASE, BIOSIS Previews, and Web of Science (1946, 1980, 1980, and 1899, respectively, to October 26, 2013) and included article bibliographies for studies comparing estimated cumulative incidence of revision after hip or knee arthroplasty obtained using both Kaplan-Meier and competing-risks methods. We excluded conference abstracts, unpublished studies, or studies using simulated data sets. Two reviewers independently extracted data and evaluated the quality of reporting of the included studies. Among 1160 abstracts identified, six studies were included in our meta-analysis. The principal reason for the steep attrition (1160 to six) was that the initial search was for studies in any clinical area that compared the cumulative incidence estimated using the Kaplan-Meier versus competing-risks methods for any event (not just the cumulative incidence of hip or knee revision); we did this to minimize the likelihood of missing any relevant studies. We calculated risk ratios (RRs) comparing the cumulative incidence estimated using the Kaplan-Meier method with the competing-risks method for each study and used DerSimonian and Laird random effects models to pool these RRs. Heterogeneity was explored using stratified meta-analyses and

  8. Safeguards Summary Event List (SSEL). Pre-NRC through December 31, 1984. Revision 10

    International Nuclear Information System (INIS)

    1985-05-01

    The Safeguards Summary Event List (SSEL) provides brief summaries of several hundred safeguards-related events involving nuclear material or facilities regulated by the US Nuclear Regulatory Commission (NRC). Events are described under the categories of bomb-related, intrusion, missing and/or allegedly stolen, transportation, tampering/vandalism, arson, firearms, radiological sabotage, non-radiological sabotage and miscellaneous. The information contained in the event descriptions in derived primarily from official NRC reporting channels

  9. Study on Enhancing nuclear security cooperation in Northeast Asia

    International Nuclear Information System (INIS)

    Lee, Jounghoon; Heo, Chul

    2015-01-01

    Regional and global cooperation in nuclear security was urged. Nevertheless, it is hard to seek a successful example of regional cooperation in nuclear security, with the exception of EURATOM. Northeast Asia which includes China, Russia, Japan, ROK and, DPRK has many nuclear issues. For example, the concerns of the international community were raised when the DPRK has conducted three nuclear tests. Countries in this region also possess many nuclear power plants and materials. However, there has been no attempt at creating a community or organization for multinational security in this region. In this paper, we discuss various ways of enhancing nuclear security cooperation in Northeast Asia. We begin with an examination of current global, regional and national nuclear security cooperation efforts. We then discuss directions and strategies for nuclear security cooperation in Northeast Asia, and offer some detailed cooperation agendas to be considers. Northeast Asia countries have tried to cooperate in many areas such as energy, environment, economy, and policy. However, nuclear security issues have not been discussed seriously. We need to start cooperating on nuclear security issues, because a nuclear security event may affect several countries. One country may not be able to respond to such an event independently. In order to gain cooperate in nuclear security, we have to be able to suggest pertinent agendas to Northeast Asia countries. R and D, education and training of nuclear security may be a good suggestion for starting cooperation. And more practical and detailed agendas such as joint response and information sharing may be suggested for cooperation strengthening

  10. Study on Enhancing nuclear security cooperation in Northeast Asia

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jounghoon; Heo, Chul [Korea Institute of Nuclear Non-proliferation and Control, Daejeon (Korea, Republic of)

    2015-10-15

    Regional and global cooperation in nuclear security was urged. Nevertheless, it is hard to seek a successful example of regional cooperation in nuclear security, with the exception of EURATOM. Northeast Asia which includes China, Russia, Japan, ROK and, DPRK has many nuclear issues. For example, the concerns of the international community were raised when the DPRK has conducted three nuclear tests. Countries in this region also possess many nuclear power plants and materials. However, there has been no attempt at creating a community or organization for multinational security in this region. In this paper, we discuss various ways of enhancing nuclear security cooperation in Northeast Asia. We begin with an examination of current global, regional and national nuclear security cooperation efforts. We then discuss directions and strategies for nuclear security cooperation in Northeast Asia, and offer some detailed cooperation agendas to be considers. Northeast Asia countries have tried to cooperate in many areas such as energy, environment, economy, and policy. However, nuclear security issues have not been discussed seriously. We need to start cooperating on nuclear security issues, because a nuclear security event may affect several countries. One country may not be able to respond to such an event independently. In order to gain cooperate in nuclear security, we have to be able to suggest pertinent agendas to Northeast Asia countries. R and D, education and training of nuclear security may be a good suggestion for starting cooperation. And more practical and detailed agendas such as joint response and information sharing may be suggested for cooperation strengthening.

  11. Security and privacy qualities of medical devices: an analysis of FDA postmarket surveillance.

    Science.gov (United States)

    Kramer, Daniel B; Baker, Matthew; Ransford, Benjamin; Molina-Markham, Andres; Stewart, Quinn; Fu, Kevin; Reynolds, Matthew R

    2012-01-01

    Medical devices increasingly depend on computing functions such as wireless communication and Internet connectivity for software-based control of therapies and network-based transmission of patients' stored medical information. These computing capabilities introduce security and privacy risks, yet little is known about the prevalence of such risks within the clinical setting. We used three comprehensive, publicly available databases maintained by the Food and Drug Administration (FDA) to evaluate recalls and adverse events related to security and privacy risks of medical devices. Review of weekly enforcement reports identified 1,845 recalls; 605 (32.8%) of these included computers, 35 (1.9%) stored patient data, and 31 (1.7%) were capable of wireless communication. Searches of databases specific to recalls and adverse events identified only one event with a specific connection to security or privacy. Software-related recalls were relatively common, and most (81.8%) mentioned the possibility of upgrades, though only half of these provided specific instructions for the update mechanism. Our review of recalls and adverse events from federal government databases reveals sharp inconsistencies with databases at individual providers with respect to security and privacy risks. Recalls related to software may increase security risks because of unprotected update and correction mechanisms. To detect signals of security and privacy problems that adversely affect public health, federal postmarket surveillance strategies should rethink how to effectively and efficiently collect data on security and privacy problems in devices that increasingly depend on computing systems susceptible to malware.

  12. SOR/83-77, Physical Security Regulations

    International Nuclear Information System (INIS)

    1983-01-01

    These Regulations establish and require the maintenance of security systems, equipment and procedures to implement Canada's international obligations regarding security at those nuclear facilities. The Regulations, which determine the different areas in a nuclear facility, provide for the establishment of security barriers around the ''protected areas'' occupied by facilities and prescribe that the licensees (operators) are required to keep the facilities for which they hold a licence under constant surveillance. They must also make arrangements for a response force - a local, provincial or federal police force detachment or similar force - to provide assistance where necessary. No person may enter a protected area without written authorization from the licensee concerned. Inspectors appointed under the Atomic Energy Control Regulations or designated under an agreement between Canada and the IAEA may be granted an authorization to enter such areas to discharge their duties. The Regulations have been amended by SOR/84-81 of 12 January 1988 to add certain requirements concerning documentary evidence and the duties of the board; by SOR/85-1016 of 25 October 1985 to revise the definition of response force and provide other clarifications; by SOR/91-585 of 10 October 1991 to clarify wording in French. (NEA)

  13. 75 FR 4894 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and...

    Science.gov (United States)

    2010-01-29

    ... processing accounts will be revised from a tiered structure to a flat monthly charge per account. A change...-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and Immediate...-Regulatory Organization's Statement of the Terms of Substance of the Proposed Rule Change The purpose of the...

  14. Security improvement by using a modified coherent state for quantum cryptography

    International Nuclear Information System (INIS)

    Lu, Y.J.; Zhu, Luobei; Ou, Z.Y.

    2005-01-01

    Weak coherent states as a photon source for quantum cryptography have a limit in secure data rate and transmission distance because of the presence of multiphoton events and loss in transmission line. Two-photon events in a coherent state can be taken out by a two-photon interference scheme. We investigate the security issue of utilizing this modified coherent state in quantum cryptography. A 4-dB improvement in the secure data rate or a nearly twofold increase in transmission distance over the coherent state are found. With a recently proposed and improved encoding strategy, further improvement is possible

  15. Infectious disease protection for healthcare security officers.

    Science.gov (United States)

    D'Angelo, Michael S; Arias, Jean

    2015-01-01

    Healthcare Security should be considered an active component in an infectious disease event, the authors maintain, and security officers must be included in an Employee Health screening and N95 fit testing initiative to safely welcome the incoming infected patients. In this article, they spell out the different levels of precautions officers should become familiar with in order to protect themselves.

  16. Validity of administrative database code algorithms to identify vascular access placement, surgical revisions, and secondary patency.

    Science.gov (United States)

    Al-Jaishi, Ahmed A; Moist, Louise M; Oliver, Matthew J; Nash, Danielle M; Fleet, Jamie L; Garg, Amit X; Lok, Charmaine E

    2018-03-01

    We assessed the validity of physician billing codes and hospital admission using International Classification of Diseases 10th revision codes to identify vascular access placement, secondary patency, and surgical revisions in administrative data. We included adults (≥18 years) with a vascular access placed between 1 April 2004 and 31 March 2013 at the University Health Network, Toronto. Our reference standard was a prospective vascular access database (VASPRO) that contains information on vascular access type and dates of placement, dates for failure, and any revisions. We used VASPRO to assess the validity of different administrative coding algorithms by calculating the sensitivity, specificity, and positive predictive values of vascular access events. The sensitivity (95% confidence interval) of the best performing algorithm to identify arteriovenous access placement was 86% (83%, 89%) and specificity was 92% (89%, 93%). The corresponding numbers to identify catheter insertion were 84% (82%, 86%) and 84% (80%, 87%), respectively. The sensitivity of the best performing coding algorithm to identify arteriovenous access surgical revisions was 81% (67%, 90%) and specificity was 89% (87%, 90%). The algorithm capturing arteriovenous access placement and catheter insertion had a positive predictive value greater than 90% and arteriovenous access surgical revisions had a positive predictive value of 20%. The duration of arteriovenous access secondary patency was on average 578 (553, 603) days in VASPRO and 555 (530, 580) days in administrative databases. Administrative data algorithms have fair to good operating characteristics to identify vascular access placement and arteriovenous access secondary patency. Low positive predictive values for surgical revisions algorithm suggest that administrative data should only be used to rule out the occurrence of an event.

  17. An Updated Comprehensive Risk Analysis for Radioisotopes Identified of High Risk to National Security in the Event of a Radiological Dispersion Device Scenario

    Science.gov (United States)

    Robinson, Alexandra R.

    An updated global survey of radioisotope production and distribution was completed and subjected to a revised "down-selection methodology" to determine those radioisotopes that should be classified as potential national security risks based on availability and key physical characteristics that could be exploited in a hypothetical radiological dispersion device. The potential at-risk radioisotopes then were used in a modeling software suite known as Turbo FRMAC, developed by Sandia National Laboratories, to characterize plausible contamination maps known as Protective Action Guideline Zone Maps. This software also was used to calculate the whole body dose equivalent for exposed individuals based on various dispersion parameters and scenarios. Derived Response Levels then were determined for each radioisotope using: 1) target doses to members of the public provided by the U.S. EPA, and 2) occupational dose limits provided by the U.S. Nuclear Regulatory Commission. The limiting Derived Response Level for each radioisotope also was determined.

  18. Computer Security at Nuclear Facilities (French Edition)

    International Nuclear Information System (INIS)

    2013-01-01

    The possibility that nuclear or other radioactive material could be used for malicious purposes cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear or other radioactive material is used or transported. Through its Nuclear Security Programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises Nuclear Security Fundamentals, which include objectives and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security, specifically: to provide for the security of nuclear and other radioactive material and associated facilities and activities; to ensure the security of such material in use, storage or in transport; to combat illicit trafficking and the inadvertent movement of such material; and to be prepared to respond to a nuclear security event. This publication is in the Technical Guidance

  19. Cyber security risk evaluation of a nuclear I and C using BN and ET

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Jin Soo; Heo, Gyun Young [Dept. of Nuclear Engineering, Kyung Hee University, Yongin (Korea, Republic of); Son, Han Seong [Computer and Game Science, Joongbu University, Geumsan (Korea, Republic of)

    2017-04-15

    Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory agencies worldwide have announced guidelines for cyber security related to nuclear issues, including U.S. NRC Regulatory Guide 5.71. It is important to evaluate cyber security risk in accordance with these regulatory guides. In this study, we propose a cyber security risk evaluation model for nuclear instrumentation and control systems using a Bayesian network and event trees. As it is difficult to perform penetration tests on the systems, the evaluation model can inform research on cyber threats to cyber security systems for nuclear facilities through the use of prior and posterior information and backpropagation calculations. Furthermore, we suggest a methodology for the application of analytical results from the Bayesian network model to an event tree model, which is a probabilistic safety assessment method. The proposed method will provide insight into safety and cyber security risks.

  20. Cyber security risk evaluation of a nuclear I and C using BN and ET

    International Nuclear Information System (INIS)

    Shin, Jin Soo; Heo, Gyun Young; Son, Han Seong

    2017-01-01

    Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory agencies worldwide have announced guidelines for cyber security related to nuclear issues, including U.S. NRC Regulatory Guide 5.71. It is important to evaluate cyber security risk in accordance with these regulatory guides. In this study, we propose a cyber security risk evaluation model for nuclear instrumentation and control systems using a Bayesian network and event trees. As it is difficult to perform penetration tests on the systems, the evaluation model can inform research on cyber threats to cyber security systems for nuclear facilities through the use of prior and posterior information and backpropagation calculations. Furthermore, we suggest a methodology for the application of analytical results from the Bayesian network model to an event tree model, which is a probabilistic safety assessment method. The proposed method will provide insight into safety and cyber security risks

  1. 11. Argentine Congress of Radiological and Nuclear Security

    International Nuclear Information System (INIS)

    2017-01-01

    The 11. Argentine Congress of Radiological and Nuclear Security was organized by the Radioprotection Argentine Society, in Buenos Aires, between the 5 and 6, October 2017. In this event, were presented documents about any of these topics: security systems, licensing of nuclear power plants, criticality accidents, biological radiation effects, NORM, acute radiation syndrome, etc.

  2. OPINIONS ABOUT MILITARY LOGISTICS IN A TURBULENT MEDIUM SECURITY

    Directory of Open Access Journals (Sweden)

    Mircea UDRESCU

    2013-06-01

    Full Text Available In the natural world, turbulence involves violent demonstrations, random appearances, unpredictability. Scientists have developed chaos theory to explain some possible variants of development of events that have a given initial state and a number of deterministic assumptions. In these cases, the initial process can take the exponential expression as a form of incorporation of disturbances. Turbulence, for any social environment, especially for the security environment, means extra risk and uncertainty. Policy makers use the security risks to cover their uncertainties, subordinating national security of an umbrella collective, which makes collective security risks to become national security and safety risks.

  3. Mission Assurance Modeling and Simulation: A Cyber Security Roadmap

    Science.gov (United States)

    Gendron, Gerald; Roberts, David; Poole, Donold; Aquino, Anna

    2012-01-01

    This paper proposes a cyber security modeling and simulation roadmap to enhance mission assurance governance and establish risk reduction processes within constrained budgets. The term mission assurance stems from risk management work by Carnegie Mellon's Software Engineering Institute in the late 19905. By 2010, the Defense Information Systems Agency revised its cyber strategy and established the Program Executive Officer-Mission Assurance. This highlights a shift from simply protecting data to balancing risk and begins a necessary dialogue to establish a cyber security roadmap. The Military Operations Research Society has recommended a cyber community of practice, recognizing there are too few professionals having both cyber and analytic experience. The authors characterize the limited body of knowledge in this symbiotic relationship. This paper identifies operational and research requirements for mission assurance M&S supporting defense and homeland security. M&S techniques are needed for enterprise oversight of cyber investments, test and evaluation, policy, training, and analysis.

  4. A study on the promotion of Japan's Nuclear Security Culture. Based on the Implementing Guide of IAEA and actually-occurred threat cases

    International Nuclear Information System (INIS)

    Inamura, Tomoaki

    2014-01-01

    The ministerial ordinance relating to the Nuclear Reactor Regulation Law, revised in 2012, requires licensees of nuclear facilities to establish a system to foster Nuclear Security Culture. However, such measures are introduced without thorough consideration of essentials of Nuclear Security Culture. This report aims to provide deeper understanding of the concept and raise issues relating to implementation of nuclear security measures by reviewing the Implementing Guide of Nuclear Security Culture published by International Atomic Energy Agency and related documents, as well as analyzing security threats that actually happened recently. The results are summarized as follows: 1) Two beliefs, namely, 'a credible threat exists' and 'nuclear security is important', form the basis of Nuclear Security Culture. Nuclear Security Culture bears a high degree of resemblance to Nuclear Safety Culture because the both assume the same organizational culture model. The differences between the two are derived from whether the malevolence of adversaries should be taken into consideration or not. As the questioning attitude plays an important role to implant the two beliefs, a proper management system of Nuclear Security Culture is necessary to cultivate it. 2) Based on the related documents and an analysis of the cases of actual threats, the following viewpoints should be made clear: (a) the role of the actors of Nuclear Security Culture, (b) flexible sensitivity to share the same understanding about the credible threat, (c) systematic revision of the related regulation about sensitive information management and security clearance of the personnel, and complementary measures such as hotline, (d) measures to encourage the positive action of the personnel, (e) how to construct continuous cycle of improvement of Nuclear Security Culture at state level. (author)

  5. Security and Privacy Qualities of Medical Devices: An Analysis of FDA Postmarket Surveillance

    Science.gov (United States)

    Kramer, Daniel B.; Baker, Matthew; Ransford, Benjamin; Molina-Markham, Andres; Stewart, Quinn; Fu, Kevin; Reynolds, Matthew R.

    2012-01-01

    Background Medical devices increasingly depend on computing functions such as wireless communication and Internet connectivity for software-based control of therapies and network-based transmission of patients’ stored medical information. These computing capabilities introduce security and privacy risks, yet little is known about the prevalence of such risks within the clinical setting. Methods We used three comprehensive, publicly available databases maintained by the Food and Drug Administration (FDA) to evaluate recalls and adverse events related to security and privacy risks of medical devices. Results Review of weekly enforcement reports identified 1,845 recalls; 605 (32.8%) of these included computers, 35 (1.9%) stored patient data, and 31 (1.7%) were capable of wireless communication. Searches of databases specific to recalls and adverse events identified only one event with a specific connection to security or privacy. Software-related recalls were relatively common, and most (81.8%) mentioned the possibility of upgrades, though only half of these provided specific instructions for the update mechanism. Conclusions Our review of recalls and adverse events from federal government databases reveals sharp inconsistencies with databases at individual providers with respect to security and privacy risks. Recalls related to software may increase security risks because of unprotected update and correction mechanisms. To detect signals of security and privacy problems that adversely affect public health, federal postmarket surveillance strategies should rethink how to effectively and efficiently collect data on security and privacy problems in devices that increasingly depend on computing systems susceptible to malware. PMID:22829874

  6. Establishing a National Nuclear Security Support Centre

    International Nuclear Information System (INIS)

    2014-02-01

    : Combating Illicit Trafficking in Nuclear and Other Radioactive Material, IAEA Nuclear Security Series No. 6; Nuclear Security Recommendations on Physical Protection of Nuclear Material and Nuclear Facilities (INFCIRC/225/Revision 5), IAEA Nuclear Security Series No. 13; Nuclear Security Recommendations on Radioactive Material and Associated Facilities, IAEA Nuclear Security Series No. 14; Nuclear Security Recommendations on Nuclear and Other Radioactive Material out of Regulatory Control, IAEA Nuclear Security Series No. 15. This publication is been based on material presented during meetings and workshops that focused on State requests to establish NSSCs and the International Network for Nuclear Security Training and Support Centres

  7. Analysis and Improvement of Large Payload Bidirectional Quantum Secure Direct Communication Without Information Leakage

    Science.gov (United States)

    Liu, Zhi-Hao; Chen, Han-Wu

    2018-02-01

    As we know, the information leakage problem should be avoided in a secure quantum communication protocol. Unfortunately, it is found that this problem does exist in the large payload bidirectional quantum secure direct communication (BQSDC) protocol (Ye Int. J. Quantum. Inf. 11(5), 1350051 2013) which is based on entanglement swapping between any two Greenberger-Horne-Zeilinger (GHZ) states. To be specific, one half of the information interchanged in this protocol is leaked out unconsciously without any active attack from an eavesdropper. Afterward, this BQSDC protocol is revised to the one without information leakage. It is shown that the improved BQSDC protocol is secure against the general individual attack and has some obvious features compared with the original one.

  8. The public transportation system security and emergency preparedness planning guide

    Science.gov (United States)

    2003-01-01

    Recent events have focused renewed attention on the vulnerability of the nation's critical infrastructure to major events, including terrorism. The Public Transportation System Security and Emergency Preparedness Planning Guide has been prepared to s...

  9. Nuclear and Radiological Event Scale Turns 20. INES Helps Authorities Rate Events and Communicate Their Significance

    International Nuclear Information System (INIS)

    Verlini, Giovanni

    2011-01-01

    Originally developed in the 1990s jointly by IAEA and Nuclear Energy Agency of the Organization for Economic Co-operation and Development (OECD/NEA) and Member States experts, INES was last revised in 2008 to become a more versatile and informative tool. INES is now designed to address events associated with the transport, storage and use of radioactive material and radiation sources, whether they occur at a nuclear installation or not.

  10. Security and the networked society

    CERN Document Server

    Gregory, Mark

    2013-01-01

    This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, and the ubiquity of social networks. It covers key technological issues such as hacking, cyber-crime, cyber-security and cyber-warfare, the internet, smart phones, electronic security, and information privacy. This book traces the rise into prominence of these issues while also exploring the resulting cultural reaction. The authors' analysis forms the basis of a discussion on future technological directions and their potential impact on society. T

  11. Dynamic Security Assessment Of Computer Networks In Siem-Systems

    Directory of Open Access Journals (Sweden)

    Elena Vladimirovna Doynikova

    2015-10-01

    Full Text Available The paper suggests an approach to the security assessment of computer networks. The approach is based on attack graphs and intended for Security Information and Events Management systems (SIEM-systems. Key feature of the approach consists in the application of the multilevel security metrics taxonomy. The taxonomy allows definition of the system profile according to the input data used for the metrics calculation and techniques of security metrics calculation. This allows specification of the security assessment in near real time, identification of previous and future attacker steps, identification of attackers goals and characteristics. A security assessment system prototype is implemented for the suggested approach. Analysis of its operation is conducted for several attack scenarios.

  12. [The concept of death in the revised Organ Transplant Law in Japan].

    Science.gov (United States)

    Ida, Makoto

    2010-12-01

    The Organ Transplant Law of Japan, enacted in 1997, did not allow organs to be taken from a brain-dead person unless he or she left written consent. The concept of brain death was controversial. It was a product of compromise that a brain-dead person could be recognized as dead only if he/she had given consent to allow organs to be taken in the event of brain death. This law was revised in 2009. It became possible to take organs from a brain-dead person with the consent of the patient's family, even if the wishes of the person who died were not clear. This revision, which took effect in July 2010, also legalizes the removal of organs from brain-dead children under the age of 15. The author of this article considers whether and how the legal definition of brain death was changed through this revision.

  13. 75 FR 6413 - Office of New Reactors; Proposed Revision to Standard Review Plan, Section 14.3.12 on Physical...

    Science.gov (United States)

    2010-02-09

    ... Standard Review Plan, Section 14.3.12 on Physical Security Hardware Inspections, Tests, Analyses, and.... SUMMARY: The NRC is soliciting public comment on NUREG-0800, ``Standard Review Plan for the Review of Safety Analysis Reports for Nuclear Power Plants,'' on a proposed Revision 1 to Standard Review Plan (SRP...

  14. Nevada National Security Site Radiological Control Manual

    International Nuclear Information System (INIS)

    2012-01-01

    This document supersedes DOE/NV/25946--801, 'Nevada Test Site Radiological Control Manual,' Revision 1 issued in February 2010. Brief Description of Revision: A complete revision to reflect a recent change in name for the NTS; changes in name for some tenant organizations; and to update references to current DOE policies, orders, and guidance documents. Article 237.2 was deleted. Appendix 3B was updated. Article 411.2 was modified. Article 422 was re-written to reflect the wording of DOE O 458.1. Article 431.6.d was modified. The glossary was updated. This manual contains the radiological control requirements to be used for all radiological activities conducted by programs under the purview of the U.S. Department of Energy (DOE) and the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). Compliance with these requirements will ensure compliance with Title 10 Code of Federal Regulations (CFR) Part 835, 'Occupational Radiation Protection.' Programs covered by this manual are located at the Nevada National Security Site (NNSS); Nellis Air Force Base and North Las Vegas, Nevada; Santa Barbara and Livermore, California; and Andrews Air Force Base, Maryland. In addition, fieldwork by NNSA/NSO at other locations is covered by this manual. Current activities at NNSS include operating low-level radioactive and mixed waste disposal facilities for United States defense-generated waste, assembly and execution of subcritical experiments, assembly/disassembly of special experiments, the storage and use of special nuclear materials, performing criticality experiments, emergency responder training, surface cleanup and site characterization of contaminated land areas, environmental activity by the University system, and nonnuclear test operations, such as controlled spills of hazardous materials at the Hazardous Materials Spill Center. Currently, the major potential for occupational radiation exposure is associated with the burial of

  15. Nevada National Security Site Radiological Control Manual

    Energy Technology Data Exchange (ETDEWEB)

    Radiological Control Managers’ Council

    2012-03-26

    This document supersedes DOE/NV/25946--801, 'Nevada Test Site Radiological Control Manual,' Revision 1 issued in February 2010. Brief Description of Revision: A complete revision to reflect a recent change in name for the NTS; changes in name for some tenant organizations; and to update references to current DOE policies, orders, and guidance documents. Article 237.2 was deleted. Appendix 3B was updated. Article 411.2 was modified. Article 422 was re-written to reflect the wording of DOE O 458.1. Article 431.6.d was modified. The glossary was updated. This manual contains the radiological control requirements to be used for all radiological activities conducted by programs under the purview of the U.S. Department of Energy (DOE) and the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). Compliance with these requirements will ensure compliance with Title 10 Code of Federal Regulations (CFR) Part 835, 'Occupational Radiation Protection.' Programs covered by this manual are located at the Nevada National Security Site (NNSS); Nellis Air Force Base and North Las Vegas, Nevada; Santa Barbara and Livermore, California; and Andrews Air Force Base, Maryland. In addition, fieldwork by NNSA/NSO at other locations is covered by this manual. Current activities at NNSS include operating low-level radioactive and mixed waste disposal facilities for United States defense-generated waste, assembly and execution of subcritical experiments, assembly/disassembly of special experiments, the storage and use of special nuclear materials, performing criticality experiments, emergency responder training, surface cleanup and site characterization of contaminated land areas, environmental activity by the University system, and nonnuclear test operations, such as controlled spills of hazardous materials at the Hazardous Materials Spill Center. Currently, the major potential for occupational radiation exposure is associated with the burial of

  16. Power system security enhancement with unified power flow controller under multi-event contingency conditions

    Directory of Open Access Journals (Sweden)

    S. Ravindra

    2017-03-01

    Full Text Available Power system security analysis plays key role in enhancing the system security and to avoid the system collapse condition. In this paper, a novel severity function is formulated using transmission line loadings and bus voltage magnitude deviations. The proposed severity function and generation fuel cost objectives are analyzed under transmission line(s and/or generator(s contingency conditions. The system security under contingency conditions is analyzed using optimal power flow problem. An improved teaching learning based optimization (ITLBO algorithm has been presented. To enhance the system security under contingency conditions in the presence of unified power flow controller (UPFC, it is necessary to identify an optimal location to install this device. Voltage source based power injection model of UPFC, incorporation procedure and optimal location identification strategy based on line overload sensitivity indexes are proposed. The entire proposed methodology is tested on standard IEEE-30 bus test system with supporting numerical and graphical results.

  17. Development of quantitative security optimization approach for the picture archives and carrying system between a clinic and a rehabilitation center

    Science.gov (United States)

    Haneda, Kiyofumi; Kajima, Toshio; Koyama, Tadashi; Muranaka, Hiroyuki; Dojo, Hirofumi; Aratani, Yasuhiko

    2002-05-01

    The target of our study is to analyze the level of necessary security requirements, to search for suitable security measures and to optimize security distribution to every portion of the medical practice. Quantitative expression must be introduced to our study, if possible, to enable simplified follow-up security procedures and easy evaluation of security outcomes or results. Using fault tree analysis (FTA), system analysis showed that system elements subdivided into groups by details result in a much more accurate analysis. Such subdivided composition factors greatly depend on behavior of staff, interactive terminal devices, kinds of services provided, and network routes. Security measures were then implemented based on the analysis results. In conclusion, we identified the methods needed to determine the required level of security and proposed security measures for each medical information system, and the basic events and combinations of events that comprise the threat composition factors. Methods for identifying suitable security measures were found and implemented. Risk factors for each basic event, a number of elements for each composition factor, and potential security measures were found. Methods to optimize the security measures for each medical information system were proposed, developing the most efficient distribution of risk factors for basic events.

  18. Analysis of postulated events for the revised ALMR/PRISM design

    International Nuclear Information System (INIS)

    Slovik, G.C.; Van Tuyle, G.J.

    1991-01-01

    The PRISM reactor is presently under pre-application licensing review by the NRC, with Brookhaven National Laboratory (BNL) providing technical assistance. In this paper, the authors describe the latest set of results from their SSC and MINET code calculations. Series of postulated events were analyzed, for the most current PRISM design, to evaluate the system performance under unscrammed conditions. The PRISM reactor utilizes a metal fuel composed of 27% Pu, 10% Zr, and 63% U, based on the fuel developed by Argonne National Laboratory as part of the Integral Fast Reactor program. The fuel has a small power and temperature defect as a result of the high fuel thermal conductivity of metal and a hard neutron spectrum. The reactivity feedbacks of the core are designed to provide a negative response to off-normal, high temperature conditions, by invoking negative responses from the thermal expansion of the fuel, control rods, and core radial dimensions. The core restraint system incorporates the limited free bowing feature, which generates an outward bow of the in-core portion of the fuel assembly when a temperature gradient exits. The core also has three Gas Expansion Modules (GEMs) placed around the periphery, which will remove a combined worth of -69 cents of reactivity when the pumps are tripped from full power conditions. In evaluating this passive shutdown response, in which the PRISM reactor power should decrease significantly in response to overheated conditions, one considers three classes of unscrammed events. These include the unscrammed loss of flow (ULOF), loss of heat sink (ULOHS), and transient over power (UTOP) events

  19. Proceedings and Presentations from the 2015 Homeland Security Education Summit

    OpenAIRE

    2015-01-01

    Proceedings: 9th Annual Homeland Defense and Security Education Summit The 9th Annual Homeland Defense and Security Education Summit was held on September 25-26, 2015 at the Hyatt Regency Hotel in Orlando Florida. The theme of the event was Evolving Homeland Security…

  20. Tsunami Research Status in IAEA after Fukushima Event

    International Nuclear Information System (INIS)

    Kim, Min Kyu; Choi, In Kil

    2012-01-01

    On March 11 th , 2011, a tremendous earthquake and tsunami occurred on the east coast of Japan. This 9.0 magnitude earthquake was the fifth greatest earthquake ever experienced on the planet. The most remarkable problem was that the Fukishima NPP sites. After Japan earthquake, many international researches about tsunami and earthquake event were started or revised. Especially, the most remarkable point of the great earthquake in east coast of Japan was tsunami event. Before this earthquake, the Niigata earthquake occurred in 2007 and the Kashiwazaki Kariwa nuclear power plant had little damaged. The research about the safety of nuclear power plant against earthquake events was activated by 2007 Niigata earthquake. However, the researches about a tsunami event were very few and only tsunami simulation was only focused. After the Fukushima accident, the international society became very interested in tsunami event as a major external event. Therefore in this study, the tsunami research status in IAEA after Fukushima event and the role of Korea are introduced

  1. Securing South Africa during the 2010 FIFA World Cup: Legacy ...

    African Journals Online (AJOL)

    African Journal for Physical Activity and Health Sciences ... Africa during the 2010 FIFA World Cup: Legacy implications for post-event safety and security ... can be sustained to benefit local residents and businesses when the event is over.

  2. Security assessment in harbours: parameters to be considered

    Energy Technology Data Exchange (ETDEWEB)

    Romero Faz, D.; Camarero Orive, A.

    2016-07-01

    The ports are the main node in the supply chain and freight transportation. The terrorist attacks of September 11, 2001 marked a turning point in global security. Following this event, and from then on, there is a widespread fear of an attack on commercial ports. The development of the International Ship and Port Facility Security (ISPS) Code of the International Maritime Organization (IMO), and the implementation of the measures derived from it, have significantly improved security at port facilities. However, the experience in recent decades indicates the need for adjustments in the security assessment, in order to improve risk assessment, which is sometimes either underestimated or overestimated. As a first result of the investigation, new parameters for assessing security are proposed considering new aspects on the basis of an analysis of the main methodologies specific to port facilities, the analysis of surveys of the responsible managers for the security of the Spanish port system, and the analysis of the security statistics obtained through security forces. (Author)

  3. Anatomy of a Security Operations Center

    Science.gov (United States)

    Wang, John

    2010-01-01

    Many agencies and corporations are either contemplating or in the process of building a cyber Security Operations Center (SOC). Those Agencies that have established SOCs are most likely working on major revisions or enhancements to existing capabilities. As principle developers of the NASA SOC; this Presenters' goals are to provide the GFIRST community with examples of some of the key building blocks of an Agency scale cyber Security Operations Center. This presentation viII include the inputs and outputs, the facilities or shell, as well as the internal components and the processes necessary to maintain the SOC's subsistence - in other words, the anatomy of a SOC. Details to be presented include the SOC architecture and its key components: Tier 1 Call Center, data entry, and incident triage; Tier 2 monitoring, incident handling and tracking; Tier 3 computer forensics, malware analysis, and reverse engineering; Incident Management System; Threat Management System; SOC Portal; Log Aggregation and Security Incident Management (SIM) systems; flow monitoring; IDS; etc. Specific processes and methodologies discussed include Incident States and associated Work Elements; the Incident Management Workflow Process; Cyber Threat Risk Assessment methodology; and Incident Taxonomy. The Evolution of the Cyber Security Operations Center viII be discussed; starting from reactive, to proactive, and finally to proactive. Finally, the resources necessary to establish an Agency scale SOC as well as the lessons learned in the process of standing up a SOC viII be presented.

  4. Environmental security and sustainable development

    International Nuclear Information System (INIS)

    Kok, M.T.J.

    1996-01-01

    Environmental security has become an important problem area for the social sciences and is becoming a key concept in long-term environmental policy and global environmental change issues. In taking Environmental Security on board, the International Human Dimensions Programme (IHDP) intends to stimulate research on approaches to solve global environmental issues, responses to climate change, food and water security, extreme weather events, etc. Both the Netherlands and Canadian HDP committee have placed environmental security and sustainable development on their national agendas. However, a research agenda for the role of social sciences in environmental security and societal impacts of global change has not been sufficiently elaborated yet, except for economic research on the impacts of climate change. This was the main reason for holding the title workshop. The aims of the workshop were: (1) to define environmental security as a research theme; (2) to explore the research agenda on environmental security for the social sciences; and (3) to establish and reinforce (inter)national research networks in this field. Two papers served as input for the participants of the workshop. First, in the Scoping Report Global Environmental Change and Human Security a brief overview is given of research conducted so far, as well as a working plan for the recently formed ad hoc Working Group on Environmental Security and Global Environmental Change. Secondly, the preliminary results of a programming study on Environmental Security and the societal impacts of climate change are presented. Special attention was given to the involvement of policymakers in the workshop. figs., tabs., 3 appendices, refs

  5. Security and Political Stability in the Mediterranean

    Directory of Open Access Journals (Sweden)

    Antonio Marquina

    1997-09-01

    Full Text Available The author revises with a critical eye the treatment given the issue of security during the Euro-Mediterranean process from the Declaration of Barcelona to the Conference at Malta. According to Marquina, no idea of security exists which gives backbone to theEuro-Mediterranen process and the documents themselves contain incoherencies and significant imprecisions, especially regarding the concepts of cooperative security, preventative diplomacy and ‘good neighbor’ relations. These principles appear to be rather underexplained in both their conceptual and operative aspects. On one hand, the information about matters that affect security is exchanged on both a voluntary and official basis and can be, as such, thus opaque and not always reliable; on the other hand, the issues thataffect security are so wide-ranging that the operative approach - the communications network, mechanisms for early-warning, the conciliation and peaceful resolution of controversies - seems hardly realistic. With respect to confidence-building measures, the author considers that these should be linked to arms control agreements, which are more in accord with the stated objectives of defense sufficiency and the non-proliferation of weapons of mass destruction. Marquina also maintains that the role of civil society and the importance of cultural dialogue - both fundamental to conflict prevention - have not been reinforced even though the principal problems of security in the region are due to structural imbalances –military, economical, political– and, precisely the disparities amongcultures. In this sense, the EU states might consider putting forward unilateral policies that restrict such disparities, provided that a certain reciprocity of policy is put forth from the southern states in the Mediterranean.

  6. The Effect of Flipped Learning (Revised Learning) on Iranian Students' Learning Outcomes

    Science.gov (United States)

    Yousefzadeh, Malahat; Salimi, Asghar

    2015-01-01

    The purpose of this study was to investigate whether the flipped (revised) learning had effect on student learning outcome. Lage et al (2000) describes the flipped classroom as " Inverting the classroom means that events that have traditionally take place inside the classroom now take place outside the class and vice versa" (p.32). The…

  7. [Przystanek Woodstock 2009 and 2010--danger to life and health and medical security of mass event].

    Science.gov (United States)

    Hajduczenia, Joanna; Kleszczyński, Jacek; Braksator, Marcin

    2011-01-01

    Przystanek Woodstock Festival is one of the biggest polish music festivals, which gathers nearly half million participants each year. The aim of the article was presentation of number and type of the medical cases and the medical interventions in the main field hospital - OAZA. The second aim was assessment of medical cover of XV and XVI Przystanek Woodstock Festival. The book with description of medical interventions and plan of medical cover prepared for the festival were retrospectively analyzed. The medical staff has given medical aid to 1433 patients in 2009 and to 1414 in the next year. The main reason of medical interventions were: injuries, allergic reactions after insect bite, foreign bodies in the saccus conjunctivalis, gastro-intestinal disorders, pain ailments (among other things: headache, back pain). The organization of the Przystanek Woodstock Festival is tied with appearing of peculiar health threats and the early diagnosis of them is essential for correct protecting this mass events. Medical security turned out to be sufficient in relation to predicted threats.

  8. Secure Software Configuration Management Processes for nuclear safety software development environment

    International Nuclear Information System (INIS)

    Chou, I.-Hsin

    2011-01-01

    Highlights: → The proposed method emphasizes platform-independent security processes. → A hybrid process based on the nuclear SCM and security regulations is proposed. → Detailed descriptions and Process Flow Diagram are useful for software developers. - Abstract: The main difference between nuclear and generic software is that the risk factor is infinitely greater in nuclear software - if there is a malfunction in the safety system, it can result in significant economic loss, physical damage or threat to human life. However, secure software development environment have often been ignored in the nuclear industry. In response to the terrorist attacks on September 11, 2001, the US Nuclear Regulatory Commission (USNRC) revised the Regulatory Guide (RG 1.152-2006) 'Criteria for use of computers in safety systems of nuclear power plants' to provide specific security guidance throughout the software development life cycle. Software Configuration Management (SCM) is an essential discipline in the software development environment. SCM involves identifying configuration items, controlling changes to those items, and maintaining integrity and traceability of them. For securing the nuclear safety software, this paper proposes a Secure SCM Processes (S 2 CMP) which infuses regulatory security requirements into proposed SCM processes. Furthermore, a Process Flow Diagram (PFD) is adopted to describe S 2 CMP, which is intended to enhance the communication between regulators and developers.

  9. Nuclear Security Education in Morocco

    International Nuclear Information System (INIS)

    Hakam, O.K.

    2015-01-01

    Morocco has made significant progress in the field of nuclear security by supporting the efforts and activities of the International Atomic Energy Agency (IAEA), promoting nuclear security under international initiatives and continues to undertake actions aiming at strengthening capacity building in nuclear security. As well, Morocco has developed a new law on radiological and nuclear safety and security which was promulgated in 2014. Some Moroccan universities in cooperation with the IAEA-International Nuclear Security Education Network (INSEN) and the US-DoS Partnership for Nuclear Security (PNS) are working to develop their nuclear security educational programmes. In this regard, faculties who have been involved in INSEN Professional Development Courses (PDCs) have acquired a high-quality of knowledge and teaching tools in nuclear security topics that led them to be able to develop and teach their nuclear security curriculum as is the case at the University of Ibn Tofail. Furthermore, University of Ibn Tofail has developed in 2014 with collaboration with CRDFGlobal the first Institute of Nuclear Material Management (INMM) Student Chapter in Africa. This Chapter has organized many events to promote best practices among the young generation. Moreover, University of Ibn Tofail and Brandenburg University in Germany are working to develop a PDC on Nuclear IT/Cyber Security to be held in Kenitra, Morocco. This PDC aims at building capacity among the academic communities from Africa and MENA Region in order to further raise awareness, develop and disseminate best practices, increase professional standards and therefore enhance nuclear security culture. So, this paper will present some nuclear security education activities in Morocco and more specifically at the University of Ibn Tofail. These activities involve women as leaders but also contribute in education and training of young generation of women in nuclear field. (author)

  10. Influenza preparedness and the bureaucratic reflex: anticipating and generating the 2009 H1N1 event.

    Science.gov (United States)

    Barker, Kezia

    2012-07-01

    This paper draws together work on the event to problematise the generative implications of anticipatory governance in the management of emerging infectious disease. Through concerns for preparedness, the need to anticipate outbreaks of disease has taken on a new urgency. With the identification of the H1N1 virus circulating amongst human populations in 2009, public health measures and security practices at regional, national and international levels were rapidly put into play. However, as the ensuing event demonstrated, the social, political and economic disruptions of emerging infectious diseases can be matched by those of anticipatory actions. I argue that the event-making potential of surveillance practices and the pre-determined arrangements of influenza preparedness planning, when triggered by the H1N1 virus, caused an event acceleration through the hyper-sensitised global health security architecture. In the UK, this led to a bureaucratic reflex, a security response event that overtook the present actualities of the disease. This raises questions about the production of forms of insecurity by the security apparatus itself. Copyright © 2012. Published by Elsevier Ltd.

  11. Situational Awareness Analysis Tools for Aiding Discovery of Security Events and Patterns

    National Research Council Canada - National Science Library

    Kumar, Vipin; Kim, Yongdae; Srivastava, Jaideep; Zhang, Zhi-Li; Shaneck, Mark; Chandola, Varun; Liu, Haiyang; Choi, Changho; Simon, Gyorgy; Eilertson, Eric

    2005-01-01

    .... The University of Minnesota team has developed a comprehensive, multi-stage analysis framework which provides tools and analysis methodologies to aid cyber security analysts in improving the quality...

  12. Revising and editing for translators

    CERN Document Server

    Mossop, Brian

    2014-01-01

    Revising and Editing for Translators provides guidance and learning materials for translation students learning to edit texts written by others, and professional translators wishing to improve their self-revision ability or learning to revise the work of others. Editing is understood as making corrections and improvements to texts, with particular attention to tailoring them to the given readership. Revising is this same task applied to draft translations. The linguistic work of editors and revisers is related to the professional situations in which they work. Mossop offers in-depth coverage of a wide range of topics, including copyediting, style editing, structural editing, checking for consistency, revising procedures and principles, and translation quality assessment. This third edition provides extended coverage of computer aids for revisers, and of the different degrees of revision suited to different texts. The inclusion of suggested activities and exercises, numerous real-world examples, a proposed gra...

  13. Accomplishments and future suggestions of 2012 seoul nuclear security summit

    International Nuclear Information System (INIS)

    Kim, Jae San

    2012-01-01

    The second Seoul Nuclear Security Summit was held in Seoul, March 26∼27, 2012. It was a very big political event for nuclear security. National and International organization leaders had a time to discuss in depth issues about nuclear security; nuclear terrorism, illicit trafficking of nuclear /radiological materials, sabotages for nuclear facilities, etc. Why did many national leaders still take part in the second nuclear security summit compared to Washington summit and what is the importance of nuclear security? This paper will be the answer from those questions and handle the background, outcomes and future tasks of nuclear security summit. And suggestions for the next summits were considered in the conclusion part

  14. Accomplishments and future suggestions of 2012 seoul nuclear security summit

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jae San [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2012-10-15

    The second Seoul Nuclear Security Summit was held in Seoul, March 26{approx}27, 2012. It was a very big political event for nuclear security. National and International organization leaders had a time to discuss in depth issues about nuclear security; nuclear terrorism, illicit trafficking of nuclear /radiological materials, sabotages for nuclear facilities, etc. Why did many national leaders still take part in the second nuclear security summit compared to Washington summit and what is the importance of nuclear security? This paper will be the answer from those questions and handle the background, outcomes and future tasks of nuclear security summit. And suggestions for the next summits were considered in the conclusion part.

  15. 75 FR 18755 - Security Zone; Calcasieu River and Ship Channel, LA

    Science.gov (United States)

    2010-04-13

    ...The Coast Guard is disestablishing the permanent safety zone at Trunkline LNG in Lake Charles, LA and replacing it with a security zone with new boundaries. The Coast Guard is also establishing two additional permanent security zones on the waters of the Calcasieu River for the mooring basins at Cameron LNG in Hackberry, LA and PPG Industries in Lake Charles, LA. The Coast Guard is also disestablishing the Calcasieu River ship channel moving safety zone and replacing it with a moving security zone. The revised moving security zone extends channel edge to channel edge on the Calcasieu Channel and shoreline to shoreline on the Calcasieu River, 2 miles ahead and 1 mile astern of certain designated vessels while in transit on the Calcasieu Channel or Calcasieu River. Meeting, crossing or overtaking situations are not permitted within the security zone unless specifically authorized by the Captain of the Port. The moving security zone may commence at any point while certain vessels are transiting the Calcasieu Channel or Calcasieu River on U.S. territorial waters (12 nautical miles) in the Captain of the Port (COTP) Port Arthur zone. These security zones are needed to protect vessels, waterfront facilities, the public, and other surrounding areas from destruction, loss, or injury caused by sabotage, subversive acts, accidents, or other actions of a similar nature. Unless exempted under this rule, entry into or movement within these security zones is prohibited without permission from the Captain of the Port or a designated representative.

  16. Present situation and problems of nuclear-security-related legislation in Japan

    International Nuclear Information System (INIS)

    Irie, Kazutomo

    2013-01-01

    This paper shows surveys of current Japanese regulations relevant to nuclear security, including regulations for nuclear damage compensation. It also shows the regulatory issues still left unresolved, particularly the question of whether existing laws are broad enough, or whether new legislation will be needed. The largest unresolved issue is how to establish a system of physical protection of nuclear materials for broader nuclear security purposes within a system that was originally introduced only to control nuclear proliferation. Such a system will necessitate a radical revision of the relevant law. Moreover, the current regulations have left unresolved the physical protection of radioactive materials used in research, medical, and non-nuclear-power-related industrial operations. Japanese legislation has already authorized an integrated Nuclear Regulatory Commission. Its mandate should include introduction of a physical protection system for currently unregulated radioactive materials. This will also necessitate a radical revision of the relevant law. Comprehensive consideration should also be given to transportation of nuclear materials away from the site of nuclear material processing businesses. Current regulation also leaves this issue unresolved. There is a possibility that consistent protective measures may not be possible across transportation modes even under the recent legislation that authorized reorganization of nuclear regulatory authorities. (author)

  17. Evaluating the Security Risks of System Using Hidden Markov Models

    African Journals Online (AJOL)

    System security assessment tools are either restricted to manual risk evaluation methodologies that are not appropriate for real-time application or used to determine the impact of certain events on the security status of networked systems. In this paper, we determine the strength of computer systems from the perspective of ...

  18. Why there is a need to revise the design basis threat concept

    International Nuclear Information System (INIS)

    Kondratov, S.; Steinhaeusler, F.

    2005-01-01

    Full text: The coordinated terrorist attacks in the United States on September 11, 2001, necessitated the review of the proven concept of the Design Basis Threat (DBT) for nuclear installations. It is safe to assume that revised and upgraded DBT will result in costly technical solutions. Since infrastructure deficits and financial limitations in many countries have already limited the practical application of the DBT in many instances, the revised threat assessment is likely to worsen the current dissatisfactory situation further. Therefore, a new realism in the use of the DBT concept is proposed, based on a three-level approach. This will enable countries to tailor the design of their physical protection systems in accordance with their means by implementing either a minimum required security level protecting only against the most probable threat, or aiming for an intermediate protection level reflecting the newly introduced AHARA - as high as reasonably achievable - principle, or providing the optimum protection level based on an externally reviewed, fully comprehensive DBT. (author)

  19. Why there is a need to revise the Design Basis Threat concept

    International Nuclear Information System (INIS)

    Kondratov, S.; Steinhausler, F.

    2006-01-01

    The terrorist attacks in the USA on 11 September 2001 necessitated a review of the proven concept of the Design Basis Threat (DBT) for nuclear installations. It can be assumed that revised and upgraded DBT will result in costly technical solutions. Since infrastructure deficits and financial limitations in many countries have already limited the practical application of the DBT, the revised threat assessment is likely to worsen the current unsatisfactory situation. Therefore, a new realism in the use of the DBT concept is proposed based on a three-level approach. This will enable countries to tailor the design of their physical protection systems in accordance with their means by implementing either a minimum required security level protecting only against the most probable threat, or an intermediate protection level reflecting the newly introduced AHARA (As High As Reasonably Achievable) principle, or the optimum protection level based on an externally reviewed, fully comprehensive DBT. (author)

  20. Perspective on Secure Development Activities and Features of Safety I and C Systems

    International Nuclear Information System (INIS)

    Kang, Youngdoo; Yu, Yeong Jin; Kim, Hyungtae; Kwon, Yong il; Park, Yeunsoo; Choo, Jaeyul; Son, Jun Young; Jeong, Choong Heui

    2015-01-01

    The Enforcement Decree of the Act on Physical Protection and Radiological Emergency (ED-APPRE) was revised December 2013 to include security requirements on computer systems at nuclear facilities to protect those systems against malicious cyber-attacks. It means Cyber-Security-related measures, controls and activities of safety I and C systems against cyber-attacks shall meet the requirements of ED-APPRE. Still regulation upon inadvertent access or non-malicious modifications to the safety I and C systems is covered under the Nuclear Safety Act. The objective of this paper is to propose KINS' regulatory perspective on secure development and features against non-malicious access or modification of safety I and C systems. Secure development activities and features aim to prevent inadvertent and non-malicious access, and to prevent unwanted action from personnel or connected systems for ensuring reliable operation of safety I and C systems. Secure development activities of safety I and C systems are life cycle activities to ensure unwanted, unneeded and undocumented code is not incorporated into the systems. Secure features shall be developed, verified and qualified throughout the development life cycle

  1. Perspective on Secure Development Activities and Features of Safety I and C Systems

    Energy Technology Data Exchange (ETDEWEB)

    Kang, Youngdoo; Yu, Yeong Jin; Kim, Hyungtae; Kwon, Yong il; Park, Yeunsoo; Choo, Jaeyul; Son, Jun Young; Jeong, Choong Heui [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2015-05-15

    The Enforcement Decree of the Act on Physical Protection and Radiological Emergency (ED-APPRE) was revised December 2013 to include security requirements on computer systems at nuclear facilities to protect those systems against malicious cyber-attacks. It means Cyber-Security-related measures, controls and activities of safety I and C systems against cyber-attacks shall meet the requirements of ED-APPRE. Still regulation upon inadvertent access or non-malicious modifications to the safety I and C systems is covered under the Nuclear Safety Act. The objective of this paper is to propose KINS' regulatory perspective on secure development and features against non-malicious access or modification of safety I and C systems. Secure development activities and features aim to prevent inadvertent and non-malicious access, and to prevent unwanted action from personnel or connected systems for ensuring reliable operation of safety I and C systems. Secure development activities of safety I and C systems are life cycle activities to ensure unwanted, unneeded and undocumented code is not incorporated into the systems. Secure features shall be developed, verified and qualified throughout the development life cycle.

  2. Loosening After Acetabular Revision

    DEFF Research Database (Denmark)

    Beckmann, Nicholas A.; Weiss, Stefan; Klotz, Matthias C.M.

    2014-01-01

    The best method of revision acetabular arthroplasty remains unclear. Consequently, we reviewed the literature on the treatment of revision acetabular arthroplasty using revision rings (1541 cases; mean follow-up (FU) 5.7 years) and Trabecular Metal, or TM, implants (1959 cases; mean FU 3.7 years...

  3. The Latent Structure of Psychopathy: A Taxometric Investigation of the Psychopathy Checklist-Revised in a Heterogeneous Sample of Male Prison Inmates

    Science.gov (United States)

    Walters, Glenn D.; Duncan, Scott A.; Mitchell-Perez, Kari

    2007-01-01

    A taxometric analysis of the Psychopathy Checklist-Revised (PCL-R) is conducted on a group of 409 male maximum-, medium-, and minimum-security federal prison inmates using the four PCL-R facet scores (interpersonal, affective, impulsive lifestyle, and antisocial behavior) as indicators. Results obtained from three quasi-independent taxometric…

  4. International Efforts for the Nuclear Security

    International Nuclear Information System (INIS)

    Yoo, Ho Sik; Kwak, Sung Woo; Lee, Ho Jin; Shim, Hye Won; Lee, Jong Uk

    2005-01-01

    Many concerns have been focused on the nuclear security since the 9.11. With increasing the threat related to nuclear material and nuclear facilities, the demand of strengthening the international physical protection system has been raised. Along with this, the international communities are making their efforts to increase nuclear security. The agreement of revising the 'Convention on Physical Protection of Nuclear Materials'(hereafter, CPPNM), which was held in Vienna on the July of 2005, was one of these efforts. U.N is also preparing the 'International Convention for the Suppression of Acts of Nuclear Terrorism' to show its firm resolution against nuclear terror. It is important to understand what measures should be taken to meet the international standard for establishing national physical protection system. To do this, international trend on the physical protection system such as CPPNM and U.N. convention should be followed. This paper explains about the content of the CPPNM and U.N convention. They will be helpful to consolidate the physical protection system in Korea

  5. Network Security Visualization

    Science.gov (United States)

    1999-09-27

    performing SQL generation and result-set binding, inserting acquired security events into the database and gathering the requested data for Console scene...objects is also auto-generated by a VBA script. Built into the auto-generated table access objects are the preferred join paths between tables. This...much of the Server itself) never have to deal with SQL directly. This is one aspect of laying the groundwork for supporting RDBMSs from multiple vendors

  6. Development of a national sport event risk management training program for college command groups.

    Science.gov (United States)

    Hall, Stacey A

    2013-01-01

    The US Department of Homeland Security identified college sport venues as terrorist targets due to the potential for mass casualties and catastrophic social and economic impact. Therefore, it is critical for college sport safety and security personnel to implement effective risk management practices. However, deficiencies have been identified in the level of preparedness of college sport event security personnel related to risk management training and effective emergency response capabilities. To address the industry need, the National Center for Spectator Sports Safety and Security designed, developed, and evaluated a national sport event risk management training program for National Collegiate Athletic Association command groups. The purpose of this article was to provide an overview of the design, development, and evaluation process.

  7. 76 FR 45184 - Revisions to Direct Fee Payment Rules

    Science.gov (United States)

    2011-07-28

    ... quality, utility, and clarity; and ways to minimize the burden on respondents, including the use of... Security numbers or medical information. 1. Internet: We strongly recommend that you submit your comments... event of malpractice by the representative; (4) Undergo a criminal background check to ensure the...

  8. Basel liquidity regulation: was it improved with the 2013 revisions?

    OpenAIRE

    Kowalik, Michal

    2013-01-01

    The Basel III Accord of December 2010, aiming to reduce the chances of systemic financial crises, included provisions regulating the liquid assets held by financial institutions. The Accord included provisions requiring financial institutions to maintain liquidity buffers: stocks of liquid assets sufficient to cover 30 days of cash outflow in a financial "stress event." ; The Accord was revised in January 2013, with new provisions regarding the size, composition and availability of liquidity ...

  9. Homeland Security: Air Passenger Prescreening and Counterterrorism

    National Research Council Canada - National Science Library

    Elias, Bart; Krouse, William; Rappaport, Ed

    2005-01-01

    ... of their persons or baggage, or to prevent them from boarding an aircraft in the event of a terrorist watch list hit, is likely to be a difficult proposition for the federal agencies tasked with aviation security...

  10. Knowledge of Practice: A Multi-sited Event Ethnography of Border Security Fairs in Europe and North America

    NARCIS (Netherlands)

    Baird, T.E.

    2017-01-01

    This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce

  11. Security Scenario Generator (SecGen): A Framework for Generating Randomly Vulnerable Rich-scenario VMs for Learning Computer Security and Hosting CTF Events

    OpenAIRE

    Schreuders, ZC; Shaw, T; Shan-A-Khuda, M; Ravichandran, G; Keighley, J; Ordean, M

    2017-01-01

    Computer security students benefit from hands-on experience applying security tools and techniques to attack and defend vulnerable systems. Virtual machines (VMs) provide an effective way of sharing targets for hacking. However, developing these hacking challenges is time consuming, and once created, essentially static. That is, once the challenge has been "solved" there is no remaining challenge for the student, and if the challenge is created for a competition or assessment, the challenge c...

  12. Education and Training, and Knowledge Networks for Capacity-Building in Nuclear Security

    International Nuclear Information System (INIS)

    Mrabit, Khammar

    2014-01-01

    Conclusions: • Capacity Building (CB) is critical for States to establish and maintain effective and sustainable nuclear security regime. • IAEA is a worldwide platform promoting international cooperation for CB in nuclear security involving more than 160 countries and over 20 Organizations and Initiatives. • IAEA Division of Nuclear Security is ready to continue supporting States in developing their CB through: – Comprehensive Training Programme: more than 80 training events annually – International Nuclear Security Training and Support Centre Network (NSSC) – Comprehensive Education Programme – International Nuclear Security Network (INSEN)

  13. Understanding the Value of a Computer Emergency Response Capability for Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Gasper, Peter Donald [Idaho National Laboratory; Rodriguez, Julio Gallardo [Idaho National Laboratory

    2015-06-01

    The international nuclear community has a great understanding of the physical security needs relating to the prevention, detection, and response of malicious acts associated with nuclear facilities and radioactive material. International Atomic Energy Agency (IAEA) Nuclear Security Recommendations (INFCIRC_225_Rev 5) outlines specific guidelines and recommendations for implementing and maintaining an organization’s nuclear security posture. An important element for inclusion into supporting revision 5 is the establishment of a “Cyber Emergency Response Team (CERT)” focused on the international communities cybersecurity needs to maintain a comprehensive nuclear security posture. Cybersecurity and the importance of nuclear cybersecurity require that there be a specific focus on developing an International Nuclear CERT (NS-CERT). States establishing contingency plans should have an understanding of the cyber threat landscape and the potential impacts to systems in place to protect and mitigate malicious activities. This paper will outline the necessary components, discuss the relationships needed within the international community, and outline a process by which the NS-CERT identifies, collects, processes, and reports critical information in order to establish situational awareness (SA) and support decision-making

  14. Computer Security at Nuclear Facilities. Reference Manual (Arabic Edition)

    International Nuclear Information System (INIS)

    2011-01-01

    The possibility that nuclear or other radioactive material could be used for malicious purposes cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear or other radioactive material is used or transported. Through its Nuclear Security Programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises Nuclear Security Fundamentals, which include objectives and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security, specifically: to provide for the security of nuclear and other radioactive material and associated facilities and activities; to ensure the security of such material in use, storage or in transport; to combat illicit trafficking and the inadvertent movement of such material; and to be prepared to respond to a nuclear security event. This publication is in the Technical Guidance

  15. Computer Security at Nuclear Facilities. Reference Manual (Russian Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    The possibility that nuclear or other radioactive material could be used for malicious purposes cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear or other radioactive material is used or transported. Through its Nuclear Security Programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises Nuclear Security Fundamentals, which include objectives and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security, specifically: to provide for the security of nuclear and other radioactive material and associated facilities and activities; to ensure the security of such material in use, storage or in transport; to combat illicit trafficking and the inadvertent movement of such material; and to be prepared to respond to a nuclear security event. This publication is in the Technical Guidance

  16. Computer Security at Nuclear Facilities. Reference Manual (Chinese Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    The possibility that nuclear or other radioactive material could be used for malicious purposes cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear or other radioactive material is used or transported. Through its Nuclear Security Programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises Nuclear Security Fundamentals, which include objectives and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security, specifically: to provide for the security of nuclear and other radioactive material and associated facilities and activities; to ensure the security of such material in use, storage or in transport; to combat illicit trafficking and the inadvertent movement of such material; and to be prepared to respond to a nuclear security event. This publication is in the Technical Guidance

  17. Eventos de Agosto (August Events).

    Science.gov (United States)

    Toro, Leonor; Pla, Myrna

    Written in Spanish, this booklet contains brief information on seven August events celebrated by Puerto Ricans: Herbert Hoover's birthdate (August 10); Acta del Seguro Social (Social Security Act, August 14); Julian E. Blanco (August 14), Enmienda 19 Sufragia de la Mujer (Amendment 19, Women's Suffrage, August 26); Benjamin Harrison (August 20);…

  18. Cloud Security Audit for Migration and Continuous Monitoring

    OpenAIRE

    Ismail, Umar Mukhtar; Islam, Shareeful; Mouratidis, Haralambos

    2015-01-01

    Security assurance in cloud computing is one of the main barriers for wider cloud adoption. Potential cloud computing consumers like to know whether the controls in cloud environments can adequately protect critical assets migrated into the cloud. We present a cloud security audit approach to enable users' evaluate cloud service provider offerings before migration, as well as monitoring of events after migration. Our approach entails a set of concepts such as actor, goals, monitoring, conditi...

  19. Safeguards Summary Event List (SSEL). January 1, 1990--December 31, 1994, Volume 2, Revision 3

    International Nuclear Information System (INIS)

    1995-07-01

    The Safeguards Summary Event List provides brief summaries of hundreds of safeguards-related events involving nuclear material or facilities regulated by the US Nuclear Regulatory Commission. Events are described under the categories: Bomb-related, Intrusion, Missing/Allegedly Stolen, Transportation-related, Tampering/Vandalism, Arson, Firearms-related, Radiological Sabotage, Non-radiological Sabotage, and Miscellaneous. Because of the public interest, the Miscellaneous category also includes events reported involving source material, byproduct material, and natural uranium, which are exempt from safeguards requirements. Information in the event descriptions was obtained from official NRC sources

  20. Event Discrimination Using Seismoacoustic Catalog Probabilities

    Science.gov (United States)

    Albert, S.; Arrowsmith, S.; Bowman, D.; Downey, N.; Koch, C.

    2017-12-01

    Presented here are three seismoacoustic catalogs from various years and locations throughout Utah and New Mexico. To create these catalogs, we combine seismic and acoustic events detected and located using different algorithms. Seismoacoustic events are formed based on similarity of origin time and location. Following seismoacoustic fusion, the data is compared against ground truth events. Each catalog contains events originating from both natural and anthropogenic sources. By creating these seismoacoustic catalogs, we show that the fusion of seismic and acoustic data leads to a better understanding of the nature of individual events. The probability of an event being a surface blast given its presence in each seismoacoustic catalog is quantified. We use these probabilities to discriminate between events from natural and anthropogenic sources. Sandia National Laboratories is a multimission laboratory managed and operated by National Technology and Engineering Solutions of Sandia, LLC., a wholly owned subsidiary of Honeywell International, Inc., for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-NA-0003525.

  1. Securing the energy industry : perspectives in security risk management

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, G.L. [Anadarko Canada Corp., Calgary, AB (Canada)

    2003-07-01

    This presentation offered some perspectives in security risk management as it relates to the energy sector. Since the events of September 11, 2001 much attention has been given to terrorism and the business is reviewing protection strategies. The paper made reference to each of the following vulnerabilities in the energy sector: information technology, globalization, business restructuring, interdependencies, political/regulatory change, and physical/human factors. The vulnerability of information technology is that it can be subject to cyber and virus attacks. Dangers of globalization lie in privacy and information security, forced nationalization, organized crime, and anti-globalization efforts. It was noted that the Y2K phenomenon provided valuable lessons regarding interdependencies and the effects of power outages, water availability, transportation disruption, common utility corridor accidents, and compounding incidents. The paper also noted the conflict between the government's desire to have a resilient infrastructure that can withstand and recover from attacks versus a company's ability to afford this capability. The physical/human factors that need to be considered in risk management include crime, domestic terrorism, and disasters such as natural disasters, industrial disasters and crisis. The energy industry has geographically dispersed vulnerable systems. It has done a fair job of physical security and has good emergency management practices, but it was noted that the industry cannot protect against all threats. A strategy of vigilance and awareness is needed to deal with threats. Other strategies include contingency planning, physical security, employee communication, and emergency response plans. tabs., figs.

  2. A Bayesian Model for Event-based Trust

    DEFF Research Database (Denmark)

    Nielsen, Mogens; Krukow, Karl; Sassone, Vladimiro

    2007-01-01

    The application scenarios envisioned for ‘global ubiquitous computing’ have unique requirements that are often incompatible with traditional security paradigms. One alternative currently being investigated is to support security decision-making by explicit representation of principals' trusting...... of the systems from the computational trust literature; the comparison is derived formally, rather than obtained via experimental simulation as traditionally done. With this foundation in place, we formalise a general notion of information about past behaviour, based on event structures. This yields a flexible...

  3. Revising Lecture Notes: How Revision, Pauses, and Partners Affect Note Taking and Achievement

    Science.gov (United States)

    Luo, Linlin; Kiewra, Kenneth A.; Samuelson, Lydia

    2016-01-01

    Note taking has been categorized as a two-stage process: the recording of notes and the review of notes. We contend that note taking might best involve a three-stage process where the missing stage is revision. This study investigated the benefits of revising lecture notes and addressed two questions: First, is revision more effective than…

  4. Sources Of Incidental Events In Collective Water Supply System

    Directory of Open Access Journals (Sweden)

    Szpak Dawid

    2015-11-01

    Full Text Available The publication presents the main types of incidental events in collective water supply system. The special attention was addressed to the incidental events associated with a decrease in water quality, posing a threat to the health and life of inhabitants. The security method against incidental contamination in the water source was described.

  5. IAEA Nuclear Security - Achievements 2002-2011

    International Nuclear Information System (INIS)

    2012-03-01

    The possibility that nuclear or other radioactive material could be used for malicious purposes is real. This calls for a collective commitment to the control of, and accountancy for, material, as well as to adequate levels of protection in order to prevent criminal or unauthorized access to the material or associated facilities. Sharing of knowledge and experience, coordination among States and collaboration with other international organizations, initiatives and industries supports an effective international nuclear security framework. In 2001, the Board of Governors tasked the IAEA with improving nuclear security worldwide. The report that follows provides an overview of accomplishments over the last decade and reflects the importance that States assign to keeping material in the right hands. The IAEA has established a comprehensive nuclear security programme, described first in the Nuclear Security Plan of 2002-2005 and subsequently in the second plan of 2006- 2009. Activities included developing internationally accepted nuclear security guidance, supporting international legal instruments, protecting material and facilities, securing transport and borders, detecting and interdicting illicit nuclear trafficking, strengthening human resource capacity and preparing response plans should a nuclear security event occur. The IAEA has begun the implementation of its third Nuclear Security Plan, to be completed at the end of 2013. This approach to nuclear security recognizes that an effective national nuclear security regime builds on a number of factors: the implementation of relevant international legal instruments; IAEA guidance and standards; information protection; physical protection; material accounting and control; detection of, and response to, trafficking in such material; national response plans and contingency measures. Implemented in a systematic manner, these building blocks make up a sustainable national nuclear security regime and contribute to global

  6. A design pattern for event-based processing of security-enriched SOAP messages

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko; Lo Iacono, Luigi

    2010-01-01

    For Web Services in Cloud Computing contexts, the efficient processing of XML documents is a major topic of interest. Especially for WS-Security-enriched messages, processing performance nowadays tends to become a major issue. Streaming XML processing approaches lead to valuable optimization due ...

  7. Acetabular Cup Revision.

    Science.gov (United States)

    Kim, Young-Ho

    2017-09-01

    The use of acetabular cup revision arthroplasty is on the rise as demands for total hip arthroplasty, improved life expectancies, and the need for individual activity increase. For an acetabular cup revision to be successful, the cup should gain stable fixation within the remaining supportive bone of the acetabulum. Since the patient's remaining supportive acetabular bone stock plays an important role in the success of revision, accurate classification of the degree of acetabular bone defect is necessary. The Paprosky classification system is most commonly used when determining the location and degree of acetabular bone loss. Common treatment options include: acetabular liner exchange, high hip center, oblong cup, trabecular metal cup with augment, bipolar cup, bulk structural graft, cemented cup, uncemented cup including jumbo cup, acetabular reinforcement device (cage), trabecular metal cup cage. The optimal treatment option is dependent upon the degree of the discontinuity, the amount of available bone stock and the likelihood of achieving stable fixation upon supportive host bone. To achieve successful acetabular cup revision, accurate evaluation of bone defect preoperatively and intraoperatively, proper choice of method of acetabular revision according to the evaluation of acetabular bone deficiency, proper technique to get primary stability of implant such as precise grafting technique, and stable fixation of implant are mandatory.

  8. The Swedish police as a part of the security systems of nuclear material and other radioactive materials

    International Nuclear Information System (INIS)

    Nylen, L.

    2001-01-01

    Full text: In Sweden a special transport system has been developed for transport of nuclear substances and nuclear waste. This system in itself includes a high security level. Extraordinary circumstances can give cause for protective police measures and intervention. In concerned provinces an incident and emergency response planning take place of the police actions that may be needed at the following types of event: a) bomb threat; b) attack or threat of attack on transport vehicle; c) demonstrations. If a Swedish nuclear power plant is the subject of a bomb threat or other criminal assault, it is in Sweden, according to the Police Act, the task of the police to intervene, interrupt criminal acts and to restore order and security. The role of the Swedish police as regards the physical protection is, among other things, to carry out a certain control within protected area by special trained police personnel before a reactor is put into operation or restarted after revision or repair. Police authorities that have a nuclear power station within its jurisdiction should establish a plan for police actions at the nuclear power station in consultation with legal owner or management of the plant, the Swedish Nuclear Power Administration and the county administration. Special training and frequent practice of response personnel is crucial as well as co-training with key personnel at nuclear power stations. The National Criminal Investigation Department coordinates and commands police measures concerning different types of nuclear transports. Close co-operation with security and operational personnel at the nuclear power stations, operators of the transport system, the Swedish Nuclear Power Administration and the Swedish Radiation Protection Institute is very important. (author)

  9. Authentic execution of distributed event-driven applications with a small TCB

    OpenAIRE

    Noorman, Job; Mühlberg, Tobias; Piessens, Frank

    2017-01-01

    This paper presents an approach to provide strong assurance of the secure execution of distributed event-driven applications on shared infrastructures, while relying on a small Trusted Computing Base. We build upon and extend security primitives provided by a Protected Module Architecture (PMA) to guarantee authenticity and integrity properties of applications, and to secure control of input and output devices used by these applications. More specifically, we want to guarantee that if an outp...

  10. The Development and Recognition of Homeland Security Law

    National Research Council Canada - National Science Library

    McDaniel, Michael C

    2007-01-01

    .... Just as Congress passed thousands of pages of legislation in response to the events of 9/11, the Department of Homeland Security, created by one of those new laws, is churning out thousands of pages...

  11. Failure of aseptic revision total knee arthroplasties.

    Science.gov (United States)

    Leta, Tesfaye H; Lygre, Stein Håkon L; Skredderstuen, Arne; Hallan, Geir; Furnes, Ove

    2015-02-01

    In Norway, the proportion of revision knee arthroplasties increased from 6.9% in 1994 to 8.5% in 2011. However, there is limited information on the epidemiology and causes of subsequent failure of revision knee arthroplasty. We therefore studied survival rate and determined the modes of failure of aseptic revision total knee arthroplasties. This study was based on 1,016 aseptic revision total knee arthroplasties reported to the Norwegian Arthroplasty Register between 1994 and 2011. Revisions done for infections were not included. Kaplan-Meier and Cox regression analyses were used to assess the survival rate and the relative risk of re-revision with all causes of re-revision as endpoint. 145 knees failed after revision total knee arthroplasty. Deep infection was the most frequent cause of re-revision (28%), followed by instability (26%), loose tibial component (17%), and pain (10%). The cumulative survival rate for revision total knee arthroplasties was 85% at 5 years, 78% at 10 years, and 71% at 15 years. Revision total knee arthroplasties with exchange of the femoral or tibial component exclusively had a higher risk of re-revision (RR = 1.7) than those with exchange of the whole prosthesis. The risk of re-revision was higher for men (RR = 2.0) and for patients aged less than 60 years (RR = 1.6). In terms of implant survival, revision of the whole implant was better than revision of 1 component only. Young age and male sex were risk factors for re-revision. Deep infection was the most frequent cause of failure of revision of aseptic total knee arthroplasties.

  12. Ultra-Low-Power Event-Driven Radio Design

    NARCIS (Netherlands)

    Huang, X.

    2014-01-01

    The emerging field of internet of things promises mankind an enhanced life quality, produc-tivity and security. One critical technology enabler is ubiquitous and unobtrusive wireless connectivity activated by ambient events and operated with little human intervention for con-figuration and

  13. Education and Training Networks as a Tool for Nuclear Security Human Resource Development and Capacity Building

    International Nuclear Information System (INIS)

    Nikonov, D.

    2014-01-01

    Human Resource Development for Capacity Building for Nuclear Security: • Comprehensive Training Programme Objective: To raise awareness, to fill gaps between the actual performance of personnel and the required competencies and skills and, to build-up qualified instructors/trainers. • Promoting Nuclear Security Education Objective: To support the development of teaching material, faculty expertise and preparedness, and the promotion of nuclear security education in collaboration with the academic and scientific community. Ultimate Goal: To develop capabilities for supporting sustainable implementation of the international legal instruments and IAEA guidelines for nuclear security worldwide, and to foster nuclear security culture. Education priorities for the future: • Incorporate feedback from the first pilot program into future academic activities in nuclear security; • Based on feedback from pilot program: • Revise the NSS12 guidance document; • Update educational materials and textbooks. • Support INSEN members, which consider launching MSc programs at their institutions; • Continue promoting nuclear security education as part of existing degree programs (through certificate or concentration options); • Support the use of new forms of teaching and learning in nuclear security education: • Online e-learning degree programmes and modules; • Learning by experience; • Problem-oriented learning tailored to nuclear security functions

  14. AUDITING THE SECURITY OF INFORMATION SYSTEMS WITHIN AN ORGANIZATION

    Directory of Open Access Journals (Sweden)

    STEGĂROIU CARINA-ELENA

    2013-02-01

    Full Text Available The safety provided by a well configured firewall is no excuse for neglecting the standard security procedures;setting up and installing a firewall is the first line of defense and not a full proof solution, auditing being only onecomponent of the system, whilst the other is protecting the resources and when we consider auditing as being theprocess of recording certain events that take place on a computer or within a network, we must come to the conclusionthat this is the only technique that allows us to identify the source of a possible issue within the network.Information security is used as a means to protect the intellectual property rights, whilst the main objective insetting up an information security system is to enlist the confidence of prospective business partners. In accordancewith the legal requisites and the principle of maximizing one’s investment, regardless of the many forms it could take,or the means through which it is stored, transmitted or distributed, information must be protected.Information security is not only a technical problem, but mainly a managerial issue, as the security standard,ISO/IEC 17799 meets the needs of any type of organization, be it public or private, through a series of practices relatedto the management of information security.This paper aims to present the process of taking entry data from a plethora of programs and storing it in acentral location. Due to its flexibility, this process can be a useful auditing instrument, as long as we are familiar withthe way it works and how the events are recorded.

  15. (Human Security in Central America: A Return to the Past?

    Directory of Open Access Journals (Sweden)

    Jordi Urgell García

    2007-02-01

    Full Text Available After having become one of the principal scenarios of the Cold War, the pacification and democratisation of Central America in the 1990s were forged under the protection of the Esquipulas Process and the birth of the concept of human security. The resulting model of security was founded on the Framework Treaty on Democratic Security, which incorporated some of the basic postulates of human security and became one of its first institutional implementations. Nevertheless, the performance of this model has been eclipsed and questioned by the evolution of events in Central America (such as the impact of 9-11 on security agendas or the emergence of new forms of violence in the region, which open the door to a new security instrument (the Rapid Reaction Force, generate fears about an eventual regression of Central America in the area of security and raise doubts about the habitual assumptions of human security.

  16. Campus Security Authorities, a New Look

    Science.gov (United States)

    McCauley, Terry

    2012-01-01

    Recent high-profile events created the need for institutions in the United States to heighten concerns about how those responsible for compliance with the Clery Act handle Campus Security Authority (CSA) issues. Not expressly but realistically those responsible for integrating this complicated set of laws within institutions have likely just been…

  17. 49 CFR 659.25 - Annual review of system safety program plan and system security plan.

    Science.gov (United States)

    2010-10-01

    ... system security plan. 659.25 Section 659.25 Transportation Other Regulations Relating to Transportation... and system security plan. (a) The oversight agency shall require the rail transit agency to conduct an annual review of its system safety program plan and system security plan. (b) In the event the rail...

  18. 78 FR 74048 - Eleventh Coast Guard District Annual Fireworks Events

    Science.gov (United States)

    2013-12-10

    ... activities so that your message can be received without jeopardizing the safety or security of people, places... from navigable waters of the United States and may have potential for negative impact on the safety or... Laughlin Tourism Committee. Event Description Fireworks Display. Two events over the 4th of July Weekend...

  19. Cyber Security Risk Evaluation of a Nuclear I&C Using BN and ET

    OpenAIRE

    Jinsoo Shin; Hanseong Son; Gyunyoung Heo

    2017-01-01

    Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory agencies worldwide have announced guidelines for cyber security related to nuclear issues, including U.S. NRC Regulatory Guide 5.71. It is important to evaluate cyber security risk in accordance with these regulatory guides. In this study, we propose a cyber security risk evaluatio...

  20. Security programs for Category I or II nuclear material or certain nuclear facilities. Regulatory guide G-274

    International Nuclear Information System (INIS)

    2003-03-01

    The purpose of this regulatory guide is to help applicants for a Canadian Nuclear Safety Commission (CNSC) licence in respect of Category I or II nuclear material - other than a licence to transport - , or a nuclear facility consisting of a nuclear reactor that may exceed 10 MW thermal power during normal operation, prepare and submit the security information to be included with the application, pursuant to the Nuclear Safety and Control Act (NSCA). Category I and II nuclear material are defined in Appendix B to this guide. This guide describes: the security information that should typically be included with the application for any licence referred to above; how the security information may be organized and presented in a separate document (hereinafter 'the security program description'), in order to assist CNSC review and processing of the application; and, the administrative procedures to be followed when preparing, submitting or revising the security program description. (author)

  1. Food security policies in India and China

    DEFF Research Database (Denmark)

    Yu, Wusheng; Elleby, Christian; Zobbe, Henrik

    2015-01-01

    dependence on price-based measures causes relatively larger and more volatile fiscal burdens, thereby likely making it more vulnerable in dealing with similar events in the future. These findings have important implications for food policy and food security in the two countries in the future.......Food insecurity is a much more serious concern in India than China. In addition to income and poverty differences, we argue in this paper that differences in food policies can further explain the different food security outcomes across the two countries. First, India mostly uses price-based input...

  2. Evaluation of a Cyber Security System for Hospital Network.

    Science.gov (United States)

    Faysel, Mohammad A

    2015-01-01

    Most of the cyber security systems use simulated data in evaluating their detection capabilities. The proposed cyber security system utilizes real hospital network connections. It uses a probabilistic data mining algorithm to detect anomalous events and takes appropriate response in real-time. On an evaluation using real-world hospital network data consisting of incoming network connections collected for a 24-hour period, the proposed system detected 15 unusual connections which were undetected by a commercial intrusion prevention system for the same network connections. Evaluation of the proposed system shows a potential to secure protected patient health information on a hospital network.

  3. Methodology development for quantitative optimization of security enhancement in medical information systems -Case study in a PACS and a multi-institutional radiotherapy database-.

    Science.gov (United States)

    Haneda, Kiyofumi; Umeda, Tokuo; Koyama, Tadashi; Harauchi, Hajime; Inamura, Kiyonari

    2002-01-01

    The target of our study is to establish the methodology for analyzing level of security requirements, for searching suitable security measures and for optimizing security distribution to every portion of medical practice. Quantitative expression must be introduced to our study as possible for the purpose of easy follow up of security procedures and easy evaluation of security outcomes or results. Results of system analysis by fault tree analysis (FTA) clarified that subdivided system elements in detail contribute to much more accurate analysis. Such subdivided composition factors very much depended on behavior of staff, interactive terminal devices, kinds of service, and routes of network. As conclusion, we found the methods to analyze levels of security requirements for each medical information systems employing FTA, basic events for each composition factor and combination of basic events. Methods for searching suitable security measures were found. Namely risk factors for each basic event, number of elements for each composition factor and candidates of security measure elements were found. Method to optimize the security measures for each medical information system was proposed. Namely optimum distribution of risk factors in terms of basic events were figured out, and comparison of them between each medical information systems became possible.

  4. A non-linear dynamical approach to belief revision in cognitive behavioral therapy

    Science.gov (United States)

    Kronemyer, David; Bystritsky, Alexander

    2014-01-01

    Belief revision is the key change mechanism underlying the psychological intervention known as cognitive behavioral therapy (CBT). It both motivates and reinforces new behavior. In this review we analyze and apply a novel approach to this process based on AGM theory of belief revision, named after its proponents, Carlos Alchourrón, Peter Gärdenfors and David Makinson. AGM is a set-theoretical model. We reconceptualize it as describing a non-linear, dynamical system that occurs within a semantic space, which can be represented as a phase plane comprising all of the brain's attentional, cognitive, affective and physiological resources. Triggering events, such as anxiety-producing or depressing situations in the real world, or their imaginal equivalents, mobilize these assets so they converge on an equilibrium point. A preference function then evaluates and integrates evidentiary data associated with individual beliefs, selecting some of them and comprising them into a belief set, which is a metastable state. Belief sets evolve in time from one metastable state to another. In the phase space, this evolution creates a heteroclinic channel. AGM regulates this process and characterizes the outcome at each equilibrium point. Its objective is to define the necessary and sufficient conditions for belief revision by simultaneously minimizing the set of new beliefs that have to be adopted, and the set of old beliefs that have to be discarded or reformulated. Using AGM, belief revision can be modeled using three (and only three) fundamental syntactical operations performed on belief sets, which are expansion; revision; and contraction. Expansion is like adding a new belief without changing any old ones. Revision is like adding a new belief and changing old, inconsistent ones. Contraction is like changing an old belief without adding any new ones. We provide operationalized examples of this process in action. PMID:24860491

  5. Research on Visual Analysis Methods of Terrorism Events

    Science.gov (United States)

    Guo, Wenyue; Liu, Haiyan; Yu, Anzhu; Li, Jing

    2016-06-01

    Under the situation that terrorism events occur more and more frequency throughout the world, improving the response capability of social security incidents has become an important aspect to test governments govern ability. Visual analysis has become an important method of event analysing for its advantage of intuitive and effective. To analyse events' spatio-temporal distribution characteristics, correlations among event items and the development trend, terrorism event's spatio-temporal characteristics are discussed. Suitable event data table structure based on "5W" theory is designed. Then, six types of visual analysis are purposed, and how to use thematic map and statistical charts to realize visual analysis on terrorism events is studied. Finally, experiments have been carried out by using the data provided by Global Terrorism Database, and the results of experiments proves the availability of the methods.

  6. 78 FR 41125 - Interim Enforcement Policy for Permanent Implant Brachytherapy Medical Event Reporting

    Science.gov (United States)

    2013-07-09

    ... NUCLEAR REGULATORY COMMISSION [NRC-2013-0114] Interim Enforcement Policy for Permanent Implant Brachytherapy Medical Event Reporting AGENCY: Nuclear Regulatory Commission. ACTION: Policy statement; revision. SUMMARY: The U.S. Nuclear Regulatory Commission (NRC) is issuing an interim Enforcement Policy that allows...

  7. The Market Value of Information System (IS) Security: An Event Study of E-Banking Service Providers

    Science.gov (United States)

    Brock, Linda

    2012-01-01

    Understanding the financial value resulting from IS security investments is critically important to organizations focused on protecting service confidentiality, integrity, and availability in order to preserve firm revenues and reputations. Quantifying the financial effect from IS security investments is difficult to derive. This study…

  8. Measuring Human Performance within Computer Security Incident Response Teams

    Energy Technology Data Exchange (ETDEWEB)

    McClain, Jonathan T. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Silva, Austin Ray [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Avina, Glory Emmanuel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Forsythe, James C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-09-01

    Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. These events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.

  9. International Regulations for Transport of Radioactive Materials, History and Security

    International Nuclear Information System (INIS)

    EL-Shinawy, R.M.K.

    2013-01-01

    International Regulations for the transport of radioactive materials have been published by International Atomic Energy Agency (IAEA) since 1961. These Regulations have been widely adopted into national Regulations. Also adopted into different modal Regulations such as International Air Transport Association (IATA) and International Martime Organization (IMO). These Regulations provide standards for insuring a high level of safety of general public, transport workers, property and environment against radiation, contamination, criticality hazard and thermal effects associated with the transport of radioactive wastes and materials. Several reviews conducted in consultation with Member States (MS) and concerned international organizations, resulted in comprehensive revisions till now. Radioactive materials are generally transported by specialized transport companies and experts. Shippers and carriers have designed their transport operations to comply with these international Regulations. About 20 million consignments of radioactive materials take place around the world each year. These materials were used in different fields such as medicine, industry, agriculture, research, consumer product and electric power generation. After September 11,2001, the IAEA and MS have worked together to develop a new guidance document concerning the security in the transport of radioactive materials. IAEA have initiated activities to assist MS in addressing the need for transport security in a comprehensive manner. The security guidance and measures were mentioned and discussed. The transport security becomes more developed and integrated into national Regulations of many countries beside the safety Regulations. IAEA and other International organizations are working with MS to implement transport security programs such as guidance, training, security assessments and upgrade assistance in these fields.

  10. Equilibrium between resources and expenditure of health sector of Social Security Fund: a case study of Iran

    Directory of Open Access Journals (Sweden)

    Azadeh Ahmadi Dashtian

    2017-10-01

    Full Text Available In Iran, Social Security is the most important institution of social insurance fund, currently insuring more than a half of country population, and it has a significant role in fulfilling short-term and long-term commitments. Therefore investigation of the balance of resources and expenditure of health sector of the fund can be a scientific process of the funding the future and can pave the way to provide necessary revisions in this sector. Analyzing equilibrium between resources and expenditure of health sector of Social Security Fund in the past years, the present study offers recommendations for improving it in terms of parametric and structural dimensions. The methodology includes documentary library methods and statistical part is descriptive using Excel. Findings indicated that, regarding the present lack of balance of resources and expenditure of health sector, keeping on with the present conditions can lead to many crises. As a result, to escape from the present conditions of the funds where lack of balance of resources and expenditure exists, carrying out parametric and management-structural revisions seems necessary.

  11. Saudi Security: Challenges in the Post-Saddam Era

    National Research Council Canada - National Science Library

    Burke, David

    2004-01-01

    Events at the beginning of the 2lst century have brought a fundamental change to the security environment in the Kingdom of Saudi Arabia of a significance not witnessed in the region since the Iranian Revolution in 1979...

  12. Bibliocable. Revised Edition.

    Science.gov (United States)

    Cable Television Information Center, Washington, DC.

    This selective, annotated bibliography is a revision of the original published in 1972 (ED 071 402). Some 104 books, articles, and reports included here deal with access, applications, franchising, regulation, technology, and other aspects of cable television. The listings are of two types in each category. First are revisions of the original…

  13. 77 FR 12897 - Self-Regulatory Organizations; Pacific Securities Depository Trust Company; Order Cancelling...

    Science.gov (United States)

    2012-03-02

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66460; File No. 600-10] Self-Regulatory Organizations; Pacific Securities Depository Trust Company; Order Cancelling Clearing Agency Registration...(a)(3) of the Act \\14\\ provides that in the event any self-regulatory organization is no longer in...

  14. Chemical Sniffing Instrumentation for Security Applications.

    Science.gov (United States)

    Giannoukos, Stamatios; Brkić, Boris; Taylor, Stephen; Marshall, Alan; Verbeck, Guido F

    2016-07-27

    Border control for homeland security faces major challenges worldwide due to chemical threats from national and/or international terrorism as well as organized crime. A wide range of technologies and systems with threat detection and monitoring capabilities has emerged to identify the chemical footprint associated with these illegal activities. This review paper investigates artificial sniffing technologies used as chemical sensors for point-of-use chemical analysis, especially during border security applications. This article presents an overview of (a) the existing available technologies reported in the scientific literature for threat screening, (b) commercially available, portable (hand-held and stand-off) chemical detection systems, and (c) their underlying functional and operational principles. Emphasis is given to technologies that have been developed for in-field security operations, but laboratory developed techniques are also summarized as emerging technologies. The chemical analytes of interest in this review are (a) volatile organic compounds (VOCs) associated with security applications (e.g., illegal, hazardous, and terrorist events), (b) chemical "signatures" associated with human presence, and (c) threat compounds (drugs, explosives, and chemical warfare agents).

  15. AP1000 Design for Security

    International Nuclear Information System (INIS)

    Long, L.B.; Cummins, W.E.; Winters, J.W.

    2006-01-01

    is less vulnerable to security threats such as malevolent use of vehicles (land, water or air), than are conventional PWRs. Further, the AP1000 is less vulnerable to external events (e.g., loss of transmission) than conventional PWRs. For some of the threats evaluated the AP1000 is comparable to conventional PWRs, while for other threats the AP1000 is inherently less vulnerable. (authors)

  16. The Web Application Hacker's Handbook Finding and Exploiting Security Flaws

    CERN Document Server

    Stuttard, Dafydd

    2011-01-01

    The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack technique

  17. Nuclear Power Plant Cyber Security Discrete Dynamic Event Tree Analysis (LDRD 17-0958) FY17 Report

    Energy Technology Data Exchange (ETDEWEB)

    Wheeler, Timothy A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Denman, Matthew R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Williams, R. A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Martin, Nevin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jankovsky, Zachary Kyle [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-09-01

    Instrumentation and control of nuclear power is transforming from analog to modern digital assets. These control systems perform key safety and security functions. This transformation is occurring in new plant designs as well as in the existing fleet of plants as the operation of those plants is extended to 60 years. This transformation introduces new and unknown issues involving both digital asset induced safety issues and security issues. Traditional nuclear power risk assessment tools and cyber security assessment methods have not been modified or developed to address the unique nature of cyber failure modes and of cyber security threat vulnerabilities. iii This Lab-Directed Research and Development project has developed a dynamic cyber-risk in- formed tool to facilitate the analysis of unique cyber failure modes and the time sequencing of cyber faults, both malicious and non-malicious, and impose those cyber exploits and cyber faults onto a nuclear power plant accident sequence simulator code to assess how cyber exploits and cyber faults could interact with a plants digital instrumentation and control (DI&C) system and defeat or circumvent a plants cyber security controls. This was achieved by coupling an existing Sandia National Laboratories nuclear accident dynamic simulator code with a cyber emulytics code to demonstrate real-time simulation of cyber exploits and their impact on automatic DI&C responses. Studying such potential time-sequenced cyber-attacks and their risks (i.e., the associated impact and the associated degree of difficulty to achieve the attack vector) on accident management establishes a technical risk informed framework for developing effective cyber security controls for nuclear power.

  18. Reactive In-flight Multisensor Security System (RIMSS), Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — The need for in-flight event detection and monitoring systems is clear. To address this and other safety and security needs, IEM proposed the Reactive In-flight...

  19. Abolishing the Security Dilemma: Why we need to integrate the militaries

    Directory of Open Access Journals (Sweden)

    Anna Cornelia Beyer

    2018-01-01

    Full Text Available This article argues that the Security Dilemma can in fact be abolished by integrating the militaries into one common global organisation, possibly under one common command. The existence and workings of North Atlantic Treaty Organization (NATO are an approximate example of this ideal in a geographically limited space. For illustrating this argument, this article discusses the logic of the Prisoners Dilemma, as the intellectual model underlying the Security Dilemma, and proposes an alternative version of the Prisoners Dilemma. It is then argued that the Security Dilemma only persists in a politically and economically ever farther integrated world because the international militaries are not integrated and hence partial anarchy persists at least in the military realm. The solution to remaining international conflicts, such as arguably one between NATO and Russia recently, would be to expand NATO to include “threatening” states’ militaries until all militaries are joined in a global organisation, a truly global NATO. Finally, revised non-violent functions for NATO, as well as a global welfare state and an early warning system for civil wars, are proposed and discussed.

  20. A novel technique to extract events from access control system and locate persons

    International Nuclear Information System (INIS)

    Vincent, M.; Vaidyanathan, Mythili; Patidar, Suresh Chandra; Prabhakara Rao, G.

    2011-01-01

    Indira Gandhi Centre for Atomic Research houses many laboratories which handle radioactive materials and classified materials. Protection and accounting of men and material and critical facilities are important aspect of nuclear security. Access Control System (ACS) is used to enhance the protective measures against elevated threat environment. Access control system hardware consists of hand geometry readers, RFID readers, Controllers, Electromagnetic door locks, Turnstiles, fiber cable laying and termination etc. Access Control System controls and monitors the people accessing the secured facilities. Access Control System generates events on: 1. Showing of RFID card, 2. Rotation of turnstile, 3. Download of valid card numbers, 4. Generation of alarms etc. Access control system turnstiles are located in main entrance of a facility, entrance of inside laboratory and door locks are fixed on secured facilities. Events are stored in SQL server database. From the events stored in database a novel technique is developed to extract events and list the persons in a particular facility, list all entry/exit events on one day, list the first in and last out entries. This paper discusses the complex multi level group by queries and software developed to extract events from database, locate persons and generate reports. Software is developed as a web application in ASP.Net and query is written in SQL. User can select the doors, type of events and generate reports. Reports are generated using the master data stored about employees RFID cards and events data stored in tables. Four types of reports are generated 1. Plant Emergency Report, 2. Locate User Report, 3. Entry - Exit Report, 4. First in Last out Report. To generate plant emergency report for whole plant only events generated in outer gates have to be considered. To generate plant emergency report for inside laboratory, events generated in entrance gates have to be ignored. (author)

  1. Weather, Climate and Food Security

    Science.gov (United States)

    Beer, T.

    2016-12-01

    To climatologists food security is dominated by the impacts of weather and climate on food systems. But the link between the atmosphere and food security is more complex. Extreme weather events such as tropical cyclones impact directly on agriculture, but they also impact on the logistical distribution of food and can thus disrupt the food supply chain, especially in urban areas. Drought affects human life and health as well as impacting dramatically on the sustainable development of society. It represents a pending danger for vulnerable agricultural systems that depend on the rainfall, water supply and reservoirs. Developed countries are affected, but the impact is disproportionate within the developing world. Drought, especially when it results in famine, can change the life and economic development of developing nations and stifle their development for decades. A holistic approach is required to understand the phenomena, to forecast catastrophic events such as drought and famine and to predict their societal consequences. In the Food Security recommendations of the Rio+20 Forum on Science, Technology and Innovation for Sustainable Development it states that it is important "To understand fully how to measure, assess and reduce the impacts of production on the natural environment including climate change, recognizing that different measures of impact (e.g. water, land, biodiversity, carbon and other greenhouse gases, etc) may trade-off against each other..." This talk will review the historical link between weather, climate, drought and food supplies; examine the international situation; and summarise the response of the scientific community

  2. Geomagnetic polarity epochs: age and duration of the olduvai normal polarity event

    Science.gov (United States)

    Gromme, C.S.; Hay, R.L.

    1971-01-01

    New data show that the Olduvai normal geomagnetic polarity event is represented in Olduvai Gorge, Tanzania, by rocks covering a time span of roughly from 0.1 to 0.2 my and is no older than 2.0 my. Hence the long normal polarity event of this age that is seen in deep-sea sediment cores and in magnetic profiles over oceanic ridges should be called the Olduvai event. The lava from which the Gilsa?? event was defined may have been erupted during the Olduvai event and, if so, the term Gilsa?? should now be abandoned. Many dated lavas that were originally assigned to the Olduvai event represent one or two much shorter normal polarity events that preceded the Olduvai event; these are herein named the Re??union normal polarity events. This revision brings the geomagnetic reversal time scale into conformity with the one implied by assumptions of uniform sedimentation rates on the ocean floor and uniform rates of sea-floor spreading. ?? 1971.

  3. Nuclear security assessment with Markov model approach

    International Nuclear Information System (INIS)

    Suzuki, Mitsutoshi; Terao, Norichika

    2013-01-01

    Nuclear security risk assessment with the Markov model based on random event is performed to explore evaluation methodology for physical protection in nuclear facilities. Because the security incidences are initiated by malicious and intentional acts, expert judgment and Bayes updating are used to estimate scenario and initiation likelihood, and it is assumed that the Markov model derived from stochastic process can be applied to incidence sequence. Both an unauthorized intrusion as Design Based Threat (DBT) and a stand-off attack as beyond-DBT are assumed to hypothetical facilities, and performance of physical protection and mitigation and minimization of consequence are investigated to develop the assessment methodology in a semi-quantitative manner. It is shown that cooperation between facility operator and security authority is important to respond to the beyond-DBT incidence. (author)

  4. Towards a Strategic Approach to Special Events Management in the Post-9/11 World

    National Research Council Canada - National Science Library

    Jones, G. B

    2005-01-01

    ... by the Department of Homeland Security and the FBI to categorize and resource special events, and it evaluates whether the current approach to major event planning is sufficient for contemporary counterterrorism challenges...

  5. An Improved Protocol for Controlled Deterministic Secure Quantum Communication Using Five-Qubit Entangled State

    Science.gov (United States)

    Kao, Shih-Hung; Lin, Jason; Tsai, Chia-Wei; Hwang, Tzonelih

    2018-03-01

    In early 2009, Xiu et al. (Opt. Commun. 282(2) 333-337 2009) presented a controlled deterministic secure quantum communication (CDSQC) protocol via a newly constructed five-qubit entangled quantum state. Later, Qin et al. (Opt. Commun. 282(13), 2656-2658 2009) pointed out two security loopholes in Xiu et al.'s protocol: (1) A correlation-elicitation (CE) attack can reveal the entire secret message; (2) A leakage of partial information for the receiver is noticed. Then, Xiu et al. (Opt. Commun. 283(2), 344-347 2010) presented a revised CDSQC protocol to remedy the CE attack problem. However, the information leakage problem still remains open. This work proposes a new CDSQC protocol using the same five-qubit entangled state which can work without the above mentioned security problems. Moreover, the Trojan Horse attacks can be automatically avoided without using detecting devices in the new CDSQC.

  6. An Improved Protocol for Controlled Deterministic Secure Quantum Communication Using Five-Qubit Entangled State

    Science.gov (United States)

    Kao, Shih-Hung; Lin, Jason; Tsai, Chia-Wei; Hwang, Tzonelih

    2018-06-01

    In early 2009, Xiu et al. (Opt. Commun. 282(2) 333-337 2009) presented a controlled deterministic secure quantum communication (CDSQC) protocol via a newly constructed five-qubit entangled quantum state. Later, Qin et al. (Opt. Commun. 282(13), 2656-2658 2009) pointed out two security loopholes in Xiu et al.'s protocol: (1) A correlation-elicitation (CE) attack can reveal the entire secret message; (2) A leakage of partial information for the receiver is noticed. Then, Xiu et al. (Opt. Commun. 283(2), 344-347 2010) presented a revised CDSQC protocol to remedy the CE attack problem. However, the information leakage problem still remains open. This work proposes a new CDSQC protocol using the same five-qubit entangled state which can work without the above mentioned security problems. Moreover, the Trojan Horse attacks can be automatically avoided without using detecting devices in the new CDSQC.

  7. Facility Decontamination and Decommissioning Program Surveillance and Maintenance Plan, Revision 2

    Energy Technology Data Exchange (ETDEWEB)

    Poderis, Reed J. [NSTec; King, Rebecca A. [NSTec

    2013-09-30

    This Surveillance and Maintenance (S&M) Plan describes the activities performed between deactivation and final decommissioning of the following facilities located on the Nevada National Security Site, as documented in the Federal Facility Agreement and Consent Order under the Industrial Sites program as decontamination and decommissioning sites: ? Engine Maintenance, Assembly, and Disassembly (EMAD) Facility: o EMAD Building (Building 25-3900) o Locomotive Storage Shed (Building 25-3901) ? Test Cell C (TCC) Facility: o Equipment Building (Building 25-3220) o Motor Drive Building (Building 25-3230) o Pump Shop (Building 25-3231) o Cryogenic Lab (Building 25-3232) o Ancillary Structures (e.g., dewars, water tower, piping, tanks) These facilities have been declared excess and are in various stages of deactivation (low-risk, long-term stewardship disposition state). This S&M Plan establishes and implements a solid, cost-effective, and balanced S&M program consistent with federal, state, and regulatory requirements. A graded approach is used to plan and conduct S&M activities. The goal is to maintain the facilities in a safe condition in a cost-effective manner until their final end state is achieved. This plan accomplishes the following: ? Establishes S&M objectives and framework ? Identifies programmatic guidance for S&M activities to be conducted by National Security Technologies, LLC, for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) ? Provides present facility condition information and identifies hazards ? Identifies facility-specific S&M activities to be performed and their frequency ? Identifies regulatory drivers, NNSA/NFO policies and procedures, and best management practices that necessitate implementation of S&M activities ? Provides criteria and frequencies for revisions and updates ? Establishes the process for identifying and dispositioning a condition that has not been previously identified or

  8. Failing States as Epidemiologic Risk Zones: Implications for Global Health Security.

    Science.gov (United States)

    Hirschfeld, Katherine

    Failed states commonly experience health and mortality crises that include outbreaks of infectious disease, violent conflict, reductions in life expectancy, and increased infant and maternal mortality. This article draws from recent research in political science, security studies, and international relations to explore how the process of state failure generates health declines and outbreaks of infectious disease. The key innovation of this model is a revised definition of "the state" as a geographically dynamic rather than static political space. This makes it easier to understand how phases of territorial contraction, collapse, and regeneration interrupt public health programs, destabilize the natural environment, reduce human security, and increase risks of epidemic infectious disease and other humanitarian crises. Better understanding of these dynamics will help international health agencies predict and prepare for future health and mortality crises created by failing states.

  9. Cementless One-Stage Revision in Chronic Periprosthetic Hip Joint Infection. Ninety-One Percent Infection Free Survival in 56 Patients at Minimum 2-Year Follow-Up

    DEFF Research Database (Denmark)

    Lange, Jeppe; Troelsen, Anders; Solgaard, Søren

    2018-01-01

    was re-revision performed due to infection and was evaluated by competing risk analysis, with death and aseptic revision as competing events. All-cause mortality was evaluated by Kaplan-Meier survival analysis. Oxford Hip Score (OHS) was used as disease-specific patient-reported outcome measure. RESULTS......BACKGROUND: Cementless 1-stage revision in chronic periprosthetic hip joint infections is limited evaluated. The purpose of this study was to evaluate a specific treatment protocol in this patient group. METHODS: The study was performed as a multicenter, proof-of-concept, observational study...

  10. Secure base scripts are associated with maternal parenting behavior across contexts and reflective functioning among trauma-exposed mothers.

    Science.gov (United States)

    Huth-Bocks, Alissa C; Muzik, Maria; Beeghly, Marjorie; Earls, Lauren; Stacks, Ann M

    2014-01-01

    There is growing evidence that "secure-base scripts" are an important part of the cognitive underpinnings of internal working models of attachment. Recent research in middle class samples has shown that secure-base scripts are linked to maternal attachment-oriented behavior and child outcomes. However, little is known about the correlates of secure base scripts in higher-risk samples. Participants in the current study included 115 mothers who were oversampled for childhood maltreatment and their infants. Results revealed that a higher level of secure base scriptedness was significantly related to more positive and less negative maternal parenting in both unstructured free play and structured teaching contexts, and to higher reflective functioning scores on the Parent Development Interview-Revised Short Form. Associations with parent-child secure base scripts, specifically, indicate some level of relationship-specificity in attachment scripts. Many, but not all, significant associations remained after controlling for family income and maternal age. Findings suggest that assessing secure base scripts among mothers known to be at risk for parenting difficulties may be important for interventions aimed at altering problematic parental representations and caregiving behavior.

  11. Guidance document for revision of DOE Order 5820.2A, Radioactive Waste Technical Support Program. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Kudera, D.E.; McMurtrey, C.D.; Meagher, B.G.

    1993-04-01

    This document provides guidance for the revision of DOE Order 5820.2A, ``Radioactive Waste Management.`` Technical Working Groups have been established and are responsible for writing the revised order. The Technical Working Groups will use this document as a reference for polices and procedures that have been established for the revision process. The overall intent of this guidance is to outline how the order will be revised and how the revision process will be managed. In addition, this document outlines technical issues considered for inclusion by a Department of Energy Steering Committee.

  12. Security measures in transport of radiation source in Jordan

    Energy Technology Data Exchange (ETDEWEB)

    Mohammad, Alslman [Korea Advanced Institute of Science and Technology, Kaist Daejeon (Korea, Republic of); Choi, Kwang Sik [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2011-05-15

    Radioactive materials are used in Jordan for peaceful applications in medicine, industry, agriculture, environmental science, education and research and military applications. Most of these radioactive sources used are imported, therefore trans-boundary movement is a significant factor in consideration of security measures during movement of these sources. After 11/9 2001 event, IAEA efforts began to focus and concentrate on security in transport of radioactive materials, after the emergence of risks of using these sources in terrorist activities. In 2002, Efforts were initiated by the IAEA to provide additional guidance for security in the transport of radioactive materials, based upon the new security requirements in the Recommendations on the Transport of Dangerous Goods. This paper reviews some of the measures relating to the transport of radioactive materials in Jordan

  13. Evaluations of 1990 PRISM design revisions

    International Nuclear Information System (INIS)

    Van Tuyle, G.J.; Slovik, G.C.; Chan, B.C.; Aronson, A.L.; Kennett, R.J.

    1992-03-01

    Analyses of the 1990 version of the PRISM Advanced Liquid Metal Reactor (ALMR) design are presented and discussed. Most of the calculations were performed using BNL computer codes, particularly SSC and MINET. In many cases, independent BNL calculations were compared against analyses presented by General Electric when they submitted the PRISM design revisions for evaluation by the Nuclear Regulatory Commission (NRC). The current PRISM design utilizes the metallic fuel developed by Argonne National Laboratory (ANL) which facilitates the passive/''inherent'' shutdown mechanism that acts to shut down reactor power production whenever the system overheats. There are a few vulnerabilities in the passive shutdown, with the most worrisome being the positive feedback from sodium density decreases or sodium voiding. Various postulated unscrammed events were examined by GE and/or BNL, and much of the analysis discussed in this report is focused on this category of events. For the most part, the BNL evaluations confirm the information submitted by General Electric. The principal areas of concern are related to the performance of the ternary metal fuel, and may be resolved as ANL continues with its fuel development and testing program

  14. Measuring the Effect of Using Simulated Security Awareness Training and Testing on Members of Virtual Communities of Practice

    Directory of Open Access Journals (Sweden)

    Craig L. Tidwell

    2010-12-01

    Full Text Available Information security (Infosec has become a major challenge for all private and public organizations. The protecting of proprietary and secret data and the proper awareness of what is entailed in protecting this data is necessary in all organizations. How does simulation and training influence virtual communities of practice information security awareness over time and with a variety of security scenarios. Can members of a virtual community be significantly changed in how they respond to routine security processes and attempts to breach security or violate the security policy of their organization? How does deterrence play a role in this prevention and education? A study is planned that will train and test users of a virtual community of practice over a 3 month period of time, via a web interface, and using simulated events, to see if the planned security awareness training will be effective in changing their responses to the events and further testing.

  15. Food Security and Extreme Events: Evidence from Smallholder Farmers in Central America

    Science.gov (United States)

    Saborio-Rodriguez, M.; Alpizar, F.; Harvey, C.; Martinez, R.; Vignola, R.; Viguera, B.; Capitan, T.

    2016-12-01

    Extreme weather events, which are expected to increase in magnitude and frequency due to climate change, are one of the main threats for smallholder farmers in Central America. Using a rich dataset from carefully selected subsistence farm households, we explore the determinants and severity of food insecurity resulting from extreme hydrometeorological hazards. In addition, we analyze farmerś coping strategies. Our analysis sheds light over food insecurity as an expression of vulnerability in a region that is expected to be increasingly exposed to extreme events and in a population already stressed by poverty and lack of opportunities. Regarding food insecurity, multivariate analyses indicate that education, having at least one migrant in the household, labor allocation, number of plots, and producing coffee are determinants of the probability of experiencing lack of food after an extreme weather event. Once the household is lacking food, the duration of the episode is related to access to credit, number of plots, producing coffee, ownership of land and gender of the head of the household. This results are in line with previous literature on the determinants of food insecurity in particular, and vulnerability, in general. Our dataset also allows us to analyze coping strategies. Households experiencing lack of food after an extreme weather event report mainly changes in their habits, as decreasing the amount of food consumed (54%) and modifying their diet (35%). A low proportion of household (between 10% and 15%, depending on the nature of the event) use their assets, by redirecting their savings, migrating, and selling items from the house. Asking money or food from family and friends or from an organization is reported for 4% of the households. This general results are connected to the specific coping strategies related to damages in crops, which are explored in detail. Our results indicate that there are patterns among the household experiencing lack of food

  16. International Conference on the Safe and Secure Transport of Radioactive Material: The Next Fifty Years of Transport - Creating a Safe, Secure and Sustainable Framework. Papers and Presentations

    International Nuclear Information System (INIS)

    2011-01-01

    The objective of the conference is to encourage application of appropriate levels of safety and security during transport by: Promoting international discussion on the safety and security of radioactive material transport; Identifying and sharing best practices; Identifying issues and problems; Identifying opportunities, such as providing assistance, to support national adoption of comprehensive transport safety and security frameworks; Developing ideas for coordinating and enhancing transport safety and security. Scope of the Conference: Nuclear and other radioactive material in legal regulated transport (not illicit trafficking, smuggling, etc.); All modes of transport; Safety; Security; Domestic and international movements, including transit; Response to accidents and security events; Legislative and regulatory requirements and approaches; Practical issues such as transport logistics; Regional networks; and Information security and the need for transparency. The conference is not intended to cover the technical topics covered in the PATRAM conference (package design and analysis).

  17. IAEA to Cooperate with Japan on Nuclear Security at 2020 Olympic Games in Tokyo

    International Nuclear Information System (INIS)

    2018-01-01

    The International Atomic Energy Agency (IAEA) and the Government of Japan signed an agreement today aimed at enhancing nuclear security measures for the summer Olympic Games and Paralympic Games in Tokyo in 2020. The agreement follows previous IAEA support to major public events, including the 2016 Olympic Games in Rio de Janeiro and the 2012 European soccer championship in Poland and Ukraine. IAEA Director General Yukiya Amano and Japanese Foreign Minister Taro Kono presided over the signing ceremony at the Agency’s headquarters in Vienna. Practical Arrangements outlining the planned cooperation were signed by IAEA Deputy Director General Juan Carlos Lentijo, head of the Department of Nuclear Safety and Security, and H.E. Mitsuru Kitano, Japan’s Ambassador to the International Organizations in Vienna. “The IAEA has extensive experience in supporting Member States on nuclear security for major public events,” Amano said at the ceremony. “The Agency welcomes the cooperation to support the Olympic and Paralympic Games in Tokyo, and is already cooperating with Japan by sharing the experiences of Member States which previously hosted the Olympics.” The details of the cooperation will be decided in due course, but the possible areas of cooperation include the IAEA offering Japanese authorities training courses, workshops, technical visits and exercises related to nuclear security, hosting preparatory technical meetings and lending supplementary radiation detection equipment. The IAEA and Japan may also exchange information related to nuclear security events as appropriate and through the cooperation, the IAEA will also benefit from Japan’s good practices on nuclear security.

  18. COLLABORATIVE NETWORK SECURITY MANAGEMENT SYSTEM BASED ON ASSOCIATION MINING RULE

    Directory of Open Access Journals (Sweden)

    Nisha Mariam Varughese

    2014-07-01

    Full Text Available Security is one of the major challenges in open network. There are so many types of attacks which follow fixed patterns or frequently change their patterns. It is difficult to find the malicious attack which does not have any fixed patterns. The Distributed Denial of Service (DDoS attacks like Botnets are used to slow down the system performance. To address such problems Collaborative Network Security Management System (CNSMS is proposed along with the association mining rule. CNSMS system is consists of collaborative Unified Threat Management (UTM, cloud based security centre and traffic prober. The traffic prober captures the internet traffic and given to the collaborative UTM. Traffic is analysed by the Collaborative UTM, to determine whether it contains any malicious attack or not. If any security event occurs, it will reports to the cloud based security centre. The security centre generates security rules based on association mining rule and distributes to the network. The cloud based security centre is used to store the huge amount of tragic, their logs and the security rule generated. The feedback is evaluated and the invalid rules are eliminated to improve the system efficiency.

  19. 77 FR 12898 - Self-Regulatory Organizations; Midwest Securities Trust Company; Order Cancelling Clearing Agency...

    Science.gov (United States)

    2012-03-02

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66461; File No. 600-7] Self-Regulatory Organizations; Midwest Securities Trust Company; Order Cancelling Clearing Agency Registration February 24, 2012... the event any self-regulatory organization is no longer in existence or has ceased to do business in...

  20. Designing and Securing an Event Processing System for Smart Spaces

    Science.gov (United States)

    Li, Zang

    2011-01-01

    Smart spaces, or smart environments, represent the next evolutionary development in buildings, banking, homes, hospitals, transportation systems, industries, cities, and government automation. By riding the tide of sensor and event processing technologies, the smart environment captures and processes information about its surroundings as well as…

  1. Overview of the terrorist threat to international peace and security

    International Nuclear Information System (INIS)

    Wilkinson, P.

    2001-01-01

    This contribution deals with the implications of terrorism for international peace and security and the escalation to mass terrorism. The topics covered are: impact of the latest terrorist events on the United States, impact on the international community; illegitimacy of terrorism; need for global action; the role of the united Nations; the crucial role for disarmament and counter-proliferation activities, especially in finding means of enhancing the security of materials that could easily be misused

  2. THE INFORMATION CONFIDENTIALITY AND CYBER SECURITY IN MEDICAL INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    SABAU-POPA CLAUDIA DIANA

    2015-07-01

    Full Text Available The information confidentiality and cyber security risk affects the right to confidentiality and privacy of the patient, as regulated in Romania by the Law 46/2002. The manifestation of the cyber security risk event affects the reputation of the healthcare institution and is becoming more and more complex and often due to the: development of network technology, the medical equipment connected to wifi and the electronic databases. The databases containing medical records were implemented due to automation. Thus, transforming data into medical knowledge contribute to a better understanding of the disease. Due to these factors, the measures taken by the hospital management for this type of risk are adapted to the cyber changes. The hospital objectives aim: the implementation of a robust information system, the early threats identifications and the incident reporting. Neglecting this type of risk can generate financial loss, inability to continue providing health care services for a certain period of time, providing an erroneous diagnosis, medical equipment errors etc. Thus, in a digital age the appropriate risk management for the information security and cyber risk represent a necessity. The main concern of hospitals worldwide is to align with international requirements and obtain credentials in terms of data security from the International Organisation for Standardization, which regulates the management of this type of risk. Romania is at the beginning in terms of concerns regarding the management, avoidance and mitigation of information security, the health system being most highly exposed to its manifestation. The present paper examines the concerns of the health system to the confidentiality of information and cyber security risk and its management arrangements. Thus, a set of key risk indicators is implemented and monitored for 2011-2013, using a user interface, a Dashboard, which acts as an early warning system of the manifestation of the

  3. 78 FR 73202 - Review and Revision of the National Critical Infrastructure Security and Resilience (NCISR...

    Science.gov (United States)

    2013-12-05

    ... critical physical and cyber infrastructure. IV. NCISR R&D Plan Outline Below is the list of the topic areas... research and development topics are welcomed. V. Specific Questions Answers to the below specific questions... Critical Infrastructure Security and Resilience (NCISR) Research and Development (R&D) Plan Outline and...

  4. FOILFEST :community enabled security.

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological

  5. Event patterns extracted from anisotropic spectra of charged particles produced in Pb-Pb collisions at 2.76 TeV

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Ya-Hui; Liu, Fu-Hu [Shanxi University, Institute of Theoretical Physics and State Key Laboratory of Quantum Optics and Quantum Optics Devices, Taiyuan, Shanxi (China)

    2017-11-15

    Event patterns extracted from anisotropic spectra of charged particles produced in lead-lead collisions at 2.76 TeV are investigated. We use an inverse power-law resulted from the QCD calculus to describe the transverse momentum spectrum in the hard scattering process, and a revised Erlang distribution resulted from a multisource thermal model to describe the transverse momentum spectrum and anisotropic flow in the soft excitation process. The pseudorapidity distribution is described by a three-Gaussian function which is a revision of the Landau hydrodynamic model. Thus, the event patterns at the kinetic freeze-out are displayed by the scatter plots of the considered particles in the three-dimensional velocity, momentum, and rapidity spaces. (orig.)

  6. Event patterns extracted from anisotropic spectra of charged particles produced in Pb-Pb collisions at 2.76 TeV

    Science.gov (United States)

    Chen, Ya-Hui; Liu, Fu-Hu

    2017-11-01

    Event patterns extracted from anisotropic spectra of charged particles produced in lead-lead collisions at 2.76 TeV are investigated. We use an inverse power-law resulted from the QCD calculus to describe the transverse momentum spectrum in the hard scattering process, and a revised Erlang distribution resulted from a multisource thermal model to describe the transverse momentum spectrum and anisotropic flow in the soft excitation process. The pseudorapidity distribution is described by a three-Gaussian function which is a revision of the Landau hydrodynamic model. Thus, the event patterns at the kinetic freeze-out are displayed by the scatter plots of the considered particles in the three-dimensional velocity, momentum, and rapidity spaces.

  7. Food & nutrition security: Challenges in the new millennium

    Directory of Open Access Journals (Sweden)

    Prema Ramachandran

    2013-01-01

    Full Text Available The World Food Summit in 1996 provided a comprehensive definition for food security which brings into focus the linkage between food, nutrition and health. India has been self sufficient in food production since seventies and low household hunger rates. India compares well with developing countries with similar health profile in terms of infant mortality rate (IMR and under five mortality rate (U5 MR. India fares poorly when underweight in under five children is used as an indicator for food insecurity with rates comparable to that of Subsaharan Africa. If wasting [low body mass index (BMI for age in children and low BMI in adults] which is closely related to adequacy of current food intake is used as an indictor for the assessment of household food security, India fares better. The nineties witnessed the emergence of dual nutrition burden with persistent inadequate dietary intake and undernutrition on one side and low physical activity / food intake above requirements and overnutrition on the other side. Body size and physical activity levels are two major determinants of human nutrient requirements. The revised recommended dietary allowances (RDA for Indians takes cognisance of the current body weight and physical activity while computing the energy and nutrient requirements. As both under- and overnutrition are associated with health hazards, perhaps time has come for use of normal BMI as an indicator for food security.

  8. Review of July 2013 Nuclear Security Insider Threat Exercise November 2013

    Energy Technology Data Exchange (ETDEWEB)

    Pederson, Ann C. [ORNL; Snow, Catherine L. [ORNL; Townsend, Jeremy [ORNL; Shannon, Michael [ORNL

    2013-11-01

    This document is a review of the Nuclear Security Insider Threat Exercise which was hosted at ORNL in July 2013. Nuclear security culture and the insider threat are best learned through experience. Culture is inherently difficult to teach, and as such is best learned through modeled behaviors and learning exercise. This TTX, NSITE, is a tool that strives to aid students in learning what an effective (and ineffective) nuclear security culture might look like by simulating dynamic events that strengthen or weaken the nuclear security regime. The goals of NSITE are to stimulate complex thought and discussion and assist decision makers and management in determining the most effective policies and procedures for their country or facility.

  9. Children’s Security in the Context of Family Instability and Maternal Communications

    OpenAIRE

    Winter, Marcia A.; Davies, Patrick T.; Cummings, E. Mark

    2010-01-01

    This multi-method study examined the association between family instability and children’s internal representations of security in the family system within the context of maternal communications about disruptive family events. Participants included 224 kindergarten children (100 boys and 124 girls) and their parents. Parents reported on the frequency of unstable family events, mothers reported their patterns of communication to children following disruptive events, and children completed a st...

  10. 48 CFR 15.307 - Proposal revisions.

    Science.gov (United States)

    2010-10-01

    ... AND CONTRACT TYPES CONTRACTING BY NEGOTIATION Source Selection 15.307 Proposal revisions. (a) If an... allow proposal revisions to clarify and document understandings reached during negotiations. At the... submit a final proposal revision. The contracting officer is required to establish a common cut-off date...

  11. Reconciling Malicious and Accidental Risk in Cyber Security

    NARCIS (Netherlands)

    Pieters, Wolter; Lukszo, Zofia; Hadziosmanovic, D.; van den Berg, Jan

    Consider the question whether a cyber security investment is cost-effective. The result will depend on the expected frequency of attacks. Contrary to what is referred to as threat event frequencies or hazard rates in safety risk management, frequencies of targeted attacks are not independent from

  12. The Water Security Hydra

    Science.gov (United States)

    Lall, U.

    2017-12-01

    As the editor of a new journal on water security, I have been pondering what it can mean theoretically and practically. At one level, it is pretty aobvious that it refers to the ability to affordably and reliably access water of appropriate quality, and to be protected from the water related ravages of nature, such as floods, droughts and water borne disease. The concept of water security can apply to a family, a company, a state or globally. Of course, since we value the environment, water security embraces the needs of the environment. Where, we consider economic development or energy production, water security also emerges as a critical factor. So, in short it touches almost all things about water that pertain to our lives. New stresses are created by a changing climate, growing populations and an ever changing society, economic activity and environment. Thus, if assuring water security is a goal at any of the scales of interest, many factors need to be considered, and what can really be assured, where and for how long emerges as an interesting question. Local (place, time, individuals, politics) as well as global (climate, economics, hydrology) factors interact to determine outcomes, not all of which are readily mapped in our mathematical or cognitive models to a functional notion of what constitutes security in the face of changing conditions and actors. Further, assurance implies going beyond characterization to developing actions, responses to stressors and risk mitigation strategies. How these perform in the short and long run, and what are the outcomes and strategies for impact mitigation in the event of failure then determines water security. Recognizing that providing assurance of water security has always been the goal of water management, regulation and development, perhaps the challenge is to understand what this means from the perspective of not just the "water managers" but the individuals who are the unwitting beneficiaries, or the instruments for

  13. Grid and Data Analyzing and Security

    Directory of Open Access Journals (Sweden)

    Fatemeh SHOKRI

    2012-12-01

    Full Text Available This paper examines the importance of secure structures in the process of analyzing and distributing information with aid of Grid-based technologies. The advent of distributed network has provided many practical opportunities for detecting and recording the time of events, and made efforts to identify the events and solve problems of storing information such as being up-to-date and documented. In this regard, the data distribution systems in a network environment should be accurate. As a consequence, a series of continuous and updated data must be at hand. In this case, Grid is the best answer to use data and resource of organizations by common processing.

  14. 7 CFR 3015.115 - Budget revisions.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Budget revisions. 3015.115 Section 3015.115..., DEPARTMENT OF AGRICULTURE UNIFORM FEDERAL ASSISTANCE REGULATIONS Programmatic Changes and Budget Revisions § 3015.115 Budget revisions. (a) Nonconstruction projects. (1) Except as provided in paragraph (a)(2) of...

  15. General statement of policy and procedures for NRC enforcement actions: Enforcement policy. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-05-01

    This document includes the US Nuclear Regulatory Commission`s (NRC`s or Commission`s) revised General Statement of Policy and Procedure for Enforcement Actions (Enforcement Policy) as it was published in the Federal Register on May 13, 1998 (63 ER 26630). The Enforcement Policy is a general statement of policy explaining the NRC`s policies and procedures in initiating enforcement actions, and of the presiding officers and the Commission in reviewing these actions. This policy statement is applicable to enforcement matters involving the radiological health and safety of the public, including employees` health and safety, the common defense and security, and the environment.

  16. General statement of policy and procedures for NRC enforcement actions: Enforcement policy. Revision 1

    International Nuclear Information System (INIS)

    1998-05-01

    This document includes the US Nuclear Regulatory Commission's (NRC's or Commission's) revised General Statement of Policy and Procedure for Enforcement Actions (Enforcement Policy) as it was published in the Federal Register on May 13, 1998 (63 ER 26630). The Enforcement Policy is a general statement of policy explaining the NRC's policies and procedures in initiating enforcement actions, and of the presiding officers and the Commission in reviewing these actions. This policy statement is applicable to enforcement matters involving the radiological health and safety of the public, including employees' health and safety, the common defense and security, and the environment

  17. A study on scar revision

    Directory of Open Access Journals (Sweden)

    Ashutosh Talwar

    2016-04-01

    Full Text Available Introduction: Scars are psychologically distressing for the patients and have an impact on the quality of life and self esteem of the patients. Scar revision is an aesthetic skill which is mastered by plastic surgeons and encroached now by dermatosurgeons. Scars on the face are aesthetically unacceptable and various techniques have been improvised for making a scar aesthetically acceptable. Various types of techniques are used for scar revision like W plasty, Z plasty and VY plasty. Aims: To see the efficacy of various scar revision techniques including Z plasty, VY plasty and W plasty in 30 patients with disfiguring scars. Methods: We selected twenty patients of disfiguring scars for the study. The scars from various causes including trauma and burns were included in our study. Various techniques of scar revision include Z plasty, W plasty and VY plasty were performed according to the type and site of scar. Results: Male: female was 1.5: 1. The scar revision surgery yielded excellent results with minimal complications including haematoma formation, secondary infection and delayed healing seen in 5% patients each. Regarding the efficacy of scar revision, excellent improvement was seen in 60% patients, moderate improvement was seen in 30% patients and mild improvement was seen in 10% patients. Conclusions: Dermatologists can employ a number of surgical scar revision techniques. While some are better suited to treat specific types of scars, they can be used in combination with each other or with adjunctive therapies to achieve optimal results.

  18. Underground Test Area Activity Communication/Interface Plan, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro, Las Vegas, NV (United States); Rehfeldt, Kenneth [Navarro, Las Vegas, NV (United States)

    2016-10-01

    The purpose of this plan is to provide guidelines for effective communication and interfacing between Underground Test Area (UGTA) Activity participants, including the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) and its contractors. This plan specifically establishes the following: • UGTA mission, vision, and core values • Roles and responsibilities for key personnel • Communication with stakeholders • Guidance in key interface areas • Communication matrix

  19. Background Information for the Nevada National Security Site Integrated Sampling Plan, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene; Marutzky, Sam

    2014-12-01

    This document describes the process followed to develop the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan). It provides the Plan’s purpose and objectives, and briefly describes the Underground Test Area (UGTA) Activity, including the conceptual model and regulatory requirements as they pertain to groundwater sampling. Background information on other NNSS groundwater monitoring programs—the Routine Radiological Environmental Monitoring Plan (RREMP) and Community Environmental Monitoring Program (CEMP)—and their integration with the Plan are presented. Descriptions of the evaluations, comments, and responses of two Sampling Plan topical committees are also included.

  20. Secure and interoperable communication infrastructures for PPDR organisations

    Science.gov (United States)

    Müller, Wilmuth; Marques, Hugo; Pereira, Luis; Rodriguez, Jonathan; Brouwer, Frank; Bouwers, Bert; Politis, Ilias; Lykourgiotis, Asimakis; Ladas, Alexandros; Adigun, Olayinka; Jelenc, David

    2016-05-01

    The growing number of events affecting public safety and security (PS&S) on a regional scale with potential to grow up to large scale cross border disasters puts an increased pressure on agencies and organisation responsible for PS&S. In order to respond timely and in an adequate manner to such events, Public Protection and Disaster Relief (PPDR) organisations need to cooperate, align their procedures and activities, share the needed information and be interoperable. Existing PPDR/PMR technologies such as TETRA, TETRAPOL or P25, do not currently provide broadband capability nor is expected such technologies to be upgraded in the future. This presents a major limitation in supporting new services and information flows. Furthermore, there is no known standard that addresses interoperability of these technologies. In this contribution the design of a next generation communication infrastructure for PPDR organisations which fulfills the requirements of secure and seamless end-to-end communication and interoperable information exchange within the deployed communication networks is presented. Based on Enterprise Architecture of PPDR organisations, a next generation PPDR network that is backward compatible with legacy communication technologies is designed and implemented, capable of providing security, privacy, seamless mobility, QoS and reliability support for mission-critical Private Mobile Radio (PMR) voice and broadband data services. The designed solution provides a robust, reliable, and secure mobile broadband communications system for a wide variety of PMR applications and services on PPDR broadband networks, including the ability of inter-system, interagency and cross-border operations with emphasis on interoperability between users in PMR and LTE.

  1. Clinical and Radiological Results over the Medium Term of Isolated Acetabular Revision

    Directory of Open Access Journals (Sweden)

    Nicola Piolanti

    2014-01-01

    Full Text Available Acetabular cup loosening is associated with pain, reduced function, and instability of the implant. If such event happens while the femoral implant is in a satisfactory position and is well fixed to the bone, isolated acetabular revision surgery is indicated. The aim of this single-center retrospective study was to evaluate the clinical and radiological results over the medium term (12-month follow-up mean 36, max 60 of isolated acetabular revisions surgery using a porous hemispheric revision shell matched with a cemented all-poly cup and large diameter femoral head (>32. 33 patients were enrolled. We collect any relevant data from the clinical board. Routine clinical and radiographic examinations were performed preoperatively; the postoperative follow-up was made at 1, 3, and 6 months and yearly thereafter. At the last available follow-up, we report satisfactory improvement of functional scores in all the patients; 2 patients (6.1% showed thigh pain and only 4 hips (12.11% presented mild groin pain; all the femoral components are well fixed and there were no potential or pending rerevisions. With bias due to the follow-up and to the retrospective design of the study, we report clinical, functional, and radiological satisfactory results.

  2. A legislative history of the Social Security Protection Act of 2004.

    Science.gov (United States)

    Hansen, Erik

    2008-01-01

    Passage of the original Social Security Act in 1935, Public Law (P.L.) 74-271, represented one of the watershed achievements of social welfare reform in American history. For the first time, workers were guaranteed a basic floor of protection against the hardships of poverty. In the ensuing decades, more than 100 million beneficiaries have realized the value of this protection through the receipt of monthly Social Security payments. As this guarantee has endured and progressed, the policies and administration of such a vast and complex program have required ongoing modifications-more than 150 such revisions over the past 73 years. To some extent, these amendments can be seen as an ongoing refinement process, with the Social Security Protection Act of 2004 (SSPA) being another incremental step in the development of a social insurance program that best meets the evolving needs of American society. This article discusses the legislative history of the SSPA in detail. It includes summaries of the provisions and a chronology of the modification of these proposals as they passed through the House and Senate, and ultimately to the president's desk.

  3. Electronic security device

    Science.gov (United States)

    Eschbach, Eugene A.; LeBlanc, Edward J.; Griffin, Jeffrey W.

    1992-01-01

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  4. Electronic security device

    International Nuclear Information System (INIS)

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-01-01

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs

  5. WE-G-BRA-02: SafetyNet: Automating Radiotherapy QA with An Event Driven Framework

    International Nuclear Information System (INIS)

    Hadley, S; Kessler, M; Litzenberg, D; Lee, C; Irrer, J; Chen, X; Acosta, E; Weyburne, G; Lam, K; Younge, K; Matuszak, M; Keranen, W; Covington, E; Moran, J

    2015-01-01

    Purpose: Quality assurance is an essential task in radiotherapy that often requires many manual tasks. We investigate the use of an event driven framework in conjunction with software agents to automate QA and eliminate wait times. Methods: An in house developed subscription-publication service, EventNet, was added to the Aria OIS to be a message broker for critical events occurring in the OIS and software agents. Software agents operate without user intervention and perform critical QA steps. The results of the QA are documented and the resulting event is generated and passed back to EventNet. Users can subscribe to those events and receive messages based on custom filters designed to send passing or failing results to physicists or dosimetrists. Agents were developed to expedite the following QA tasks: Plan Revision, Plan 2nd Check, SRS Winston-Lutz isocenter, Treatment History Audit, Treatment Machine Configuration. Results: Plan approval in the Aria OIS was used as the event trigger for plan revision QA and Plan 2nd check agents. The agents pulled the plan data, executed the prescribed QA, stored the results and updated EventNet for publication. The Winston Lutz agent reduced QA time from 20 minutes to 4 minutes and provided a more accurate quantitative estimate of radiation isocenter. The Treatment Machine Configuration agent automatically reports any changes to the Treatment machine or HDR unit configuration. The agents are reliable, act immediately, and execute each task identically every time. Conclusion: An event driven framework has inverted the data chase in our radiotherapy QA process. Rather than have dosimetrists and physicists push data to QA software and pull results back into the OIS, the software agents perform these steps immediately upon receiving the sentinel events from EventNet. Mr Keranen is an employee of Varian Medical Systems. Dr. Moran’s institution receives research support for her effort for a linear accelerator QA project from

  6. WE-G-BRA-02: SafetyNet: Automating Radiotherapy QA with An Event Driven Framework

    Energy Technology Data Exchange (ETDEWEB)

    Hadley, S; Kessler, M [The University of Michigan, Ann Arbor, MI (United States); Litzenberg, D [Univ Michigan, Ann Arbor, MI (United States); Lee, C; Irrer, J; Chen, X; Acosta, E; Weyburne, G; Lam, K; Younge, K; Matuszak, M [University of Michigan, Ann Arbor, MI (United States); Keranen, W [Varian Medical Systems, Palo Alto, CA (United States); Covington, E [University of Michigan Hospital and Health System, Ann Arbor, MI (United States); Moran, J [Univ Michigan Medical Center, Ann Arbor, MI (United States)

    2015-06-15

    Purpose: Quality assurance is an essential task in radiotherapy that often requires many manual tasks. We investigate the use of an event driven framework in conjunction with software agents to automate QA and eliminate wait times. Methods: An in house developed subscription-publication service, EventNet, was added to the Aria OIS to be a message broker for critical events occurring in the OIS and software agents. Software agents operate without user intervention and perform critical QA steps. The results of the QA are documented and the resulting event is generated and passed back to EventNet. Users can subscribe to those events and receive messages based on custom filters designed to send passing or failing results to physicists or dosimetrists. Agents were developed to expedite the following QA tasks: Plan Revision, Plan 2nd Check, SRS Winston-Lutz isocenter, Treatment History Audit, Treatment Machine Configuration. Results: Plan approval in the Aria OIS was used as the event trigger for plan revision QA and Plan 2nd check agents. The agents pulled the plan data, executed the prescribed QA, stored the results and updated EventNet for publication. The Winston Lutz agent reduced QA time from 20 minutes to 4 minutes and provided a more accurate quantitative estimate of radiation isocenter. The Treatment Machine Configuration agent automatically reports any changes to the Treatment machine or HDR unit configuration. The agents are reliable, act immediately, and execute each task identically every time. Conclusion: An event driven framework has inverted the data chase in our radiotherapy QA process. Rather than have dosimetrists and physicists push data to QA software and pull results back into the OIS, the software agents perform these steps immediately upon receiving the sentinel events from EventNet. Mr Keranen is an employee of Varian Medical Systems. Dr. Moran’s institution receives research support for her effort for a linear accelerator QA project from

  7. Intelligent Security Auditing Based on Access Control of Devices in Ad Hoc Network

    Institute of Scientific and Technical Information of China (English)

    XU Guang-wei; SHI You-qun; ZHU Ming; WU Guo-wen; CAO Qi-ying

    2006-01-01

    Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated.

  8. Revision surgery due to magnet dislocation in cochlear implant patients: an emerging complication.

    Science.gov (United States)

    Hassepass, Frederike; Stabenau, Vanessa; Maier, Wolfgang; Arndt, Susan; Laszig, Roland; Beck, Rainer; Aschendorff, Antje

    2014-01-01

    To analyze the cause and effect of magnet dislocation in cochlear implant (CI) recipients requiring magnet revision surgery for treatment. Retrospective study. Tertiary referral center. Case reports from 1,706 CI recipients consecutively implanted from January 2000 to December 2011 were reviewed. The number of cases requiring magnet revision surgery was assessed. Revision surgery involving magnet removal or replacement was indicated in 1.23% (21/1,706), of all CI recipients. Magnet dislocation occurring during magnetic resonance tomography (MRI), at 1.5 Tesla (T), with the magnet in place and with the application of compression bandaging around the head, was the main cause for revision surgery in 47.62% (10/21) of the affected cases. All 10 cases were implanted with Cochlear Nucleus cochlear implants. These events occurred, despite adherence to current recommendations of the manufacturer. The present study underlines that MRI examination is the main cause of magnet dislocation. The use of compressive bandaging when using 1.5-T MRI does not eliminate the risk of magnet dislocation. Additional cautionary measures are for required for conditional MRI. We recommend X-ray examination after MRI to determine magnet dislocation and avoid major complications in all cases reporting pain during or after MRI. Additional research regarding silicon magnet pocket design for added retention is needed. Effective communication of guidelines for precautionary measures during MRI examination in CI patients is mandatory for all clinicians involved. MRI in CI recipients should be indicated with caution.

  9. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  10. MAS Based Event-Triggered Hybrid Control for Smart Microgrids

    DEFF Research Database (Denmark)

    Dou, Chunxia; Liu, Bin; Guerrero, Josep M.

    2013-01-01

    This paper is focused on an advanced control for autonomous microgrids. In order to improve the performance regarding security and stability, a hierarchical decentralized coordinated control scheme is proposed based on multi-agents structure. Moreover, corresponding to the multi-mode and the hybrid...... haracteristics of microgrids, an event-triggered hybrid control, including three kinds of switching controls, is designed to intelligently reconstruct operation mode when the security stability assessment indexes or the constraint conditions are violated. The validity of proposed control scheme is demonstrated...

  11. Nuclear security culture in comparison with nuclear safety culture. Resemblances and differences

    International Nuclear Information System (INIS)

    Kawata, Norio

    2015-01-01

    Since the terrorist attacks on the U.S. on September 11th, 2001, Nuclear Security has been focused on and treated as a global issue in the international community and it has also been discussed as a real and serious threat to nuclear power plants in the world since 'The Great East Japan Earthquake' in March, 2011. The International Atomic Energy Agency (IAEA) issued a document including Nuclear Security Recommendations (INFCIRC/225/Rev.5) (NSS 13) in the Nuclear Security Series and emphasized the necessity of fostering Nuclear Security Culture. Nuclear Security Culture has been frequently discussed at various kinds of seminars and events. Since the officials in charge of Nuclear Security are familiar with the area of Nuclear Safety, the relationships between Nuclear Safety Culture and Nuclear Security Culture have been the point in controversy. This paper clarifies relevance between Nuclear Safety and Security, considers resemblances and differences of their concepts and lessons learned for each culture from nuclear power plant accidents, and promotes deeper understanding of Nuclear Safety and Nuclear Security Culture. (author)

  12. Ventriculoperitoneal shunt complications needing shunt revision in children: A review of 5 years of experience with 48 revisions

    Directory of Open Access Journals (Sweden)

    Rajendra K Ghritlaharey

    2012-01-01

    Full Text Available Background: The aim of this study was to review the management of ventriculoperitoneal (VP shunt complications in children. Patients and Methods: During the last 5 years (January 1, 2006 to December 31, 2010, 236 VP shunt operations were performed in children under 12 years of age; of these, 40 (16.94% developed shunt complications and those who underwent VP shunt revisions were studied. Results: This prospective study included 40 (28 boys and 12 girls children and required 48 shunt revisions. Complications following VP shunts that required shunt revisions were peritoneal catheter/peritoneal end malfunction (18, shunt/shunt tract infections (7, extrusion of peritoneal catheter through anus (5, ventricular catheter malfunction (4, cerebrospinal fluid (CSF leak from abdominal wound (4, shunt system failure (2, ventricular end/shunt displacement (2, CSF pseudocysts peritoneal cavity (2, extrusion of peritoneal catheter from neck, chest, abdominal scar and through umbilicus, one each. Four-fifth of these shunt complications occurred within 6 months of previous surgery. Surgical procedures done during shunt revisions in order of frequency were revision of peritoneal part of shunt (27, 56.25%, revision of entire shunt system (6, 12.5%, extra ventricular drainage and delayed re-shunt (5, 10.41%, shunt removal and delayed re-shunt (5, 10.41%, opposite side shunting (2, 4.16%, cysts excision and revision of peritoneal catheter (2, 4.16% and revision of ventricular catheter (1, 2.08%. The mortalities following VP shunt operations were 44 (18.64% and following shunt revisions were 4 (10%. Conclusions: VP shunt done for hydrocephalus in children is not only prone for complications and need for revision surgery but also associated with considerable mortality.

  13. Security of radioactive sources in radiation facilities

    International Nuclear Information System (INIS)

    2011-03-01

    Safety codes and safety standards are formulated on the basis of internationally accepted safety criteria for design, construction and operation of specific equipment, systems, structures and components of nuclear and radiation facilities. Safety codes establish the objectives and set requirements that shall be fulfilled to provide adequate assurance for safety. Safety guides and guidelines elaborate various requirements and furnish approaches for their implementation. Safety manuals deal with specific topics and contain detailed scientific and technical information on the subject. These documents are prepared by experts in the relevant fields and are extensively reviewed by advisory committees of the Board before they are published. The documents are revised when necessary, in the light of experience and feedback from users as well as new developments in the field. In India, radiation sources are being widely used for societal benefits in industry, medical practices, research, training and agriculture. It has been reported from all over the world that unsecured radioactive sources caused serious radiological accidents involving radiation injuries and fatalities. Particular concern was expressed regarding radioactive sources that have become orphaned (not under regulatory control) or vulnerable (under weak regulatory control and about to be orphaned). There is a concern about safety and security of radioactive sources and hence the need of stringent regulatory control over the handling of the sources and their security. In view of this, this guide is prepared which gives provisions necessary to safeguard radiation installations against theft of radioactive sources and other malevolent acts that may result in radiological consequences. It is, therefore, required that the radiation sources are used safely and managed securely by only authorised personnel. This guide is intended to be used by users of radiation sources in developing the necessary security plan for

  14. 17 CFR 240.15Ba2-4 - Registration of successor to registered municipal securities dealer.

    Science.gov (United States)

    2010-04-01

    ... event that a municipal securities dealer succeeds to and continues the business of a registered... registration of the successor if the successor, within 30 days after such succession, files an application for... municipal securities dealer succeeds to and continues the business of a registered predecessor municipal...

  15. Review on 18th Revision of 'Notice on Export and Import of Strategic Items'

    International Nuclear Information System (INIS)

    Jeon, Jihye; Lee, Chansuh

    2014-01-01

    Nuclear Suppliers Group (NSG) has established a guideline and continued to revise it in accordance with ever-changing international situation and developing technology. The Part 1 of guideline, 'Guidelines of Nuclear Transfers' covers the Trigger List items which triggers safeguards as a condition of supply. Currently NSG has published the 12 th revised guideline (INFCIRC/254/Rev.12/Part1) in November 2013. Korean government fully reflected the guideline to its national legislation to implement in accordance with internationally agreed standard. The export control of nuclear strategic items in Korea is responsibility of Nuclear Safety and Security Commission (NSSC), which entrusted the technical review of the work to Korea Institute of Nonproliferation and Control (KINAC). The specific guidelines for the technical review are stipulated in Notice on Export and Import of Strategic Items with other strategic items usable to other Weapons of Mass Destruction. The Ministry of Trade, Industry and Energy approved the 18 th revision of Notice on Export and Import of Strategic Items on 31 January 2014 as Notice no. 2014-15, which strictly follows the NSG guideline. The 18 th revision of the notice reflects the final proposals agreed from the last Dedicated Meeting of Technical Experts (DMTE) of NSG's Consultative Group (CG) in April 2013. The 3-year-DMTE offered the 'fundamental, holistic approach to the technical review' within the international framework of NSG, rather than sporadic endeavors by individual states in the past. The 18 th version itself has meaning in that the final products of the international technical review were reflected in the Korean national legislation of nuclear export control. It addressed various changes in control text in technical, contextual, and editorial aspects. The revision is analyzed herein concentrating only on technical and semantic changes in control text

  16. Determining Storm Surge Return Periods: The Use of Evidence of Historic Events

    DEFF Research Database (Denmark)

    Madsen, Kristine S.; Sørensen, Carlo Sass; Schmith, Torben

    for tide gauge measurements, with 120 years of data available for the calculations. However, the oldest of these tide gauge stations was set up after a major storm surge in 1872, and no events of similar severity have occurred since. Including the evidence of the historic events from the 18th century...... changes the return period statistics, with a best estimate of a 100 year event changing from 1.5 meters (Sørensen et al. 2013) to 2.6 [2.2 – 2.8] meters (present study) in Køge just south of Copenhagen. Thus, with the tide gauge-based statistics, the storm surge on January 4 2017 was a 100 year event......, but with the revised statistics using historic evidence, much larger events can be expected. Further, we assess the very large impact of sea level rise on the storm surge statistics. As an example, according to the official statistics of southern Copenhagen, the flooding of a present day 100 year event...

  17. Cochlear implant revision surgeries in children.

    Science.gov (United States)

    Amaral, Maria Stella Arantes do; Reis, Ana Cláudia Mirândola B; Massuda, Eduardo T; Hyppolito, Miguel Angelo

    2018-02-16

    The surgery during which the cochlear implant internal device is implanted is not entirely free of risks and may produce problems that will require revision surgeries. To verify the indications for cochlear implantation revision surgery for the cochlear implant internal device, its effectiveness and its correlation with certain variables related to language and hearing. A retrospective study of patients under 18 years submitted to cochlear implant Surgery from 2004 to 2015 in a public hospital in Brazil. Data collected were: age at the time of implantation, gender, etiology of the hearing loss, audiological and oral language characteristics of each patient before and after Cochlear Implant surgery and any need for surgical revision and the reason for it. Two hundred and sixty-five surgeries were performed in 236 patients. Eight patients received a bilateral cochlear implant and 10 patients required revision surgery. Thirty-two surgeries were necessary for these 10 children (1 bilateral cochlear implant), of which 21 were revision surgeries. In 2 children, cochlear implant removal was necessary, without reimplantation, one with cochlear malformation due to incomplete partition type I and another due to trauma. With respect to the cause for revision surgery, of the 8 children who were successfully reimplanted, four had cochlear calcification following meningitis, one followed trauma, one exhibited a facial nerve malformation, one experienced a failure of the cochlear implant internal device and one revision surgery was necessary because the electrode was twisted. The incidence of the cochlear implant revision surgery was 4.23%. The period following the revision surgeries revealed an improvement in the subject's hearing and language performance, indicating that these surgeries are valid in most cases. Copyright © 2018 Associação Brasileira de Otorrinolaringologia e Cirurgia Cérvico-Facial. Published by Elsevier Editora Ltda. All rights reserved.

  18. A game theoretic framework for evaluation of the impacts of hackers diversity on security measures

    International Nuclear Information System (INIS)

    Zare Moayedi, Behzad; Azgomi, Mohammad Abdollahi

    2012-01-01

    Game theoretical methods offer new insights into quantitative evaluation of dependability and security. Currently, there is a wide range of useful game theoretic approaches to model the behaviour of intelligent agents. However, it is necessary to revise these approaches if there is a community of hackers with significant diversity in their behaviours. In this paper, we introduce a novel approach to extend the basic ideas of applying game theory in stochastic modelling. The proposed method classifies the community of hackers based on two main criteria used widely in hacker classifications, which are motivation and skill. We use Markov chains to model the system and compute the transition rates between the states based on the preferences and the skill distributions of hacker classes. The resulting Markov chains can be solved to obtain the desired security measures. We also present the results of an illustrative example using the proposed approach, which examines the relation between the attributes of the community of hackers and the security measures.

  19. Underground Test Area Fiscal Year 2013 Annual Quality Assurance Report Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Krenzien, Susan [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Marutzky, Sam [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2014-01-01

    This report is required by the Underground Test Area (UGTA) Quality Assurance Plan (QAP) and identifies the UGTA quality assurance (QA) activities for fiscal year (FY) 2013. All UGTA organizations—U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO); Desert Research Institute (DRI); Lawrence Livermore National Laboratory (LLNL); Los Alamos National Laboratory (LANL); Navarro-Intera, LLC (N-I); National Security Technologies, LLC (NSTec); and the U.S. Geological Survey (USGS)—conducted QA activities in FY 2013. The activities included conducting assessments, identifying findings and completing corrective actions, evaluating laboratory performance, and publishing documents. In addition, integrated UGTA required reading and corrective action tracking was instituted.

  20. Implementing Physical Protection Education for an Enhanced Nuclear Security Culture

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jeong Ho; Kim, Hyun Chul; Shin, Ick Hyun; Lee, Hyung Kyung; Choe, Kwan Kyoo [KINAC, Daejeon (Korea, Republic of)

    2013-10-15

    In this paper, we are going to outline our efforts and experiences at implementing physical protection education. KINAC (as the only designated educational institute) places great effort in delivering an effective and a high-quality education program for physical protection. We have also provided a way for nuclear operators to share the lessons they have gained through their own experiences. We made physical protection education an important communication channel, not only among nuclear operators but also between operators and a regulatory body. There is growing attention given to education and training on the subject of physical protection in order to enhance the nuclear security culture. The IAEA recommends that all personnel in organizations directly involved with the nuclear industry receive regularly education in physical protection according to the recently revised INFCIRC/225/Rev.5. The Korea Institute of Nuclear Nonproliferation and Control (KINAC) and the Nuclear Safety and Security Commission (NSSC), which are mainly responsible for the national nuclear security regime, have already recognized the importance of education and training in physical protection. The NSSC enacted its decree on physical protection education and training in 2010. KINAC was designated as the first educational institute in 2011 and implemented physical protection education as mandatory from 2012.

  1. Implementing Physical Protection Education for an Enhanced Nuclear Security Culture

    International Nuclear Information System (INIS)

    Lee, Jeong Ho; Kim, Hyun Chul; Shin, Ick Hyun; Lee, Hyung Kyung; Choe, Kwan Kyoo

    2013-01-01

    In this paper, we are going to outline our efforts and experiences at implementing physical protection education. KINAC (as the only designated educational institute) places great effort in delivering an effective and a high-quality education program for physical protection. We have also provided a way for nuclear operators to share the lessons they have gained through their own experiences. We made physical protection education an important communication channel, not only among nuclear operators but also between operators and a regulatory body. There is growing attention given to education and training on the subject of physical protection in order to enhance the nuclear security culture. The IAEA recommends that all personnel in organizations directly involved with the nuclear industry receive regularly education in physical protection according to the recently revised INFCIRC/225/Rev.5. The Korea Institute of Nuclear Nonproliferation and Control (KINAC) and the Nuclear Safety and Security Commission (NSSC), which are mainly responsible for the national nuclear security regime, have already recognized the importance of education and training in physical protection. The NSSC enacted its decree on physical protection education and training in 2010. KINAC was designated as the first educational institute in 2011 and implemented physical protection education as mandatory from 2012

  2. 24 CFR 968.225 - Budget revisions.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Budget revisions. 968.225 Section... Fewer Than 250 Units) § 968.225 Budget revisions. (a) A PHA shall not incur any modernization cost in excess of the total HUD-approved CIAP budget. A PHA shall submit a budget revision, in a form prescribed...

  3. Safeguards Summary Event List (SSEL), pre-NRC through December 31, 1989

    International Nuclear Information System (INIS)

    1990-07-01

    The Safeguards Summary Event List (SSEL) provides brief summaries of several hundred safeguards-related events involving nuclear material or facilities regulated by the US Nuclear Regulatory Commission (NRC). Because of public interest, the Miscellaneous category includes a few events which involve either source material, byproduct material, or natural uranium which are exempt from safeguards requirements. Events are described under the categories of bomb-related, intrusion, missing and/or allegedly stolen, transportation, tampering/vandalism, arson, firearms, radiological sabotage, nonradiological sabotage, alcohol and drugs (involving reactor operators, security force members, or management persons), and miscellaneous. The information contained in the event descriptions is derived primarily from official NRC reporting channels

  4. Ghana's Integrated Nuclear Security Support Plan

    International Nuclear Information System (INIS)

    Dahlstrom, Danielle

    2013-01-01

    At the Korle Bu Teaching Hospital outside Accra, Pearl Lovelyn Lawson checks the records of the next patient to undergo radiotherapy and adjusts the dose settings of the teletherapy machine. It is business as usual at the facility that treats over fifty patients each day. But Lawson's routine now includes additional procedures to ensure that the highly radioactive cobalt-60 source located inside the machine remains secure. Nuclear security devices and systems such as double locks, motion sensors, and cameras that transmit images to a central alarm system have been installed to ensure that the source cannot be stolen, the facility sabotaged, or unauthorized access gained. At Korle Bu physical protection measures were upgraded as part of Ghana's Integrated Nuclear Security Support Plan (INSSP). Preventing, detecting and responding to criminal acts like the theft or illegal transfer of a radioactive source, is an international priority that could be addressed through an INSSP. As one of its key nuclear security services, the IAEA assists Member States in drafting such plans. An INSSP is developed jointly with the Member State, using a holistic approach to nuclear security capacity building. It reinforces the primary objective of a State's nuclear security regime to protect people, society, and the environment from the harmful consequences of a nuclear security event. Addressing five components - the legal and regulatory framework, prevention, detection, and sustainability - the jointly developed plan identifies the needs, responsible entities and organizations within the State, as well as the timeframe for the implementation of agreed nuclear security related activities. Ghana's INSSP, tailored to its specific needs, is based on findings and recommendations from advisory service missions carried out in Ghana, including an International Nuclear Security Advisory Service mission and an International Physical Protection Advisory Service mission. Ghana's INSSP was

  5. LHCb Online event processing and filtering

    Science.gov (United States)

    Alessio, F.; Barandela, C.; Brarda, L.; Frank, M.; Franek, B.; Galli, D.; Gaspar, C.; Herwijnen, E. v.; Jacobsson, R.; Jost, B.; Köstner, S.; Moine, G.; Neufeld, N.; Somogyi, P.; Stoica, R.; Suman, S.

    2008-07-01

    The first level trigger of LHCb accepts one million events per second. After preprocessing in custom FPGA-based boards these events are distributed to a large farm of PC-servers using a high-speed Gigabit Ethernet network. Synchronisation and event management is achieved by the Timing and Trigger system of LHCb. Due to the complex nature of the selection of B-events, which are the main interest of LHCb, a full event-readout is required. Event processing on the servers is parallelised on an event basis. The reduction factor is typically 1/500. The remaining events are forwarded to a formatting layer, where the raw data files are formed and temporarily stored. A small part of the events is also forwarded to a dedicated farm for calibration and monitoring. The files are subsequently shipped to the CERN Tier0 facility for permanent storage and from there to the various Tier1 sites for reconstruction. In parallel files are used by various monitoring and calibration processes running within the LHCb Online system. The entire data-flow is controlled and configured by means of a SCADA system and several databases. After an overview of the LHCb data acquisition and its design principles this paper will emphasize the LHCb event filter system, which is now implemented using the final hardware and will be ready for data-taking for the LHC startup. Control, configuration and security aspects will also be discussed.

  6. LHCb Online event processing and filtering

    International Nuclear Information System (INIS)

    Alessio, F; Barandela, C; Brarda, L; Frank, M; Gaspar, C; Herwijnen, E v; Jacobsson, R; Jost, B; Koestner, S; Moine, G; Neufeld, N; Somogyi, P; Stoica, R; Suman, S; Franek, B; Galli, D

    2008-01-01

    The first level trigger of LHCb accepts one million events per second. After preprocessing in custom FPGA-based boards these events are distributed to a large farm of PC-servers using a high-speed Gigabit Ethernet network. Synchronisation and event management is achieved by the Timing and Trigger system of LHCb. Due to the complex nature of the selection of B-events, which are the main interest of LHCb, a full event-readout is required. Event processing on the servers is parallelised on an event basis. The reduction factor is typically 1/500. The remaining events are forwarded to a formatting layer, where the raw data files are formed and temporarily stored. A small part of the events is also forwarded to a dedicated farm for calibration and monitoring. The files are subsequently shipped to the CERN Tier0 facility for permanent storage and from there to the various Tier1 sites for reconstruction. In parallel files are used by various monitoring and calibration processes running within the LHCb Online system. The entire data-flow is controlled and configured by means of a SCADA system and several databases. After an overview of the LHCb data acquisition and its design principles this paper will emphasize the LHCb event filter system, which is now implemented using the final hardware and will be ready for data-taking for the LHC startup. Control, configuration and security aspects will also be discussed

  7. PCI Compliance Understand and Implement Effective PCI Data Security Standard Compliance

    CERN Document Server

    Chuvakin, Anton

    2010-01-01

    Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant?. Now in its second edition, PCI Compliance has been revised to follow the new PCI DSS standard 1.2.1. Also new to this edition: Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data. This book provides the information that you need to understand the curre

  8. Validation of Monte Carlo event generators in the ATLAS Collaboration for LHC Run 2

    CERN Document Server

    The ATLAS collaboration

    2016-01-01

    This note reviews the main steps followed by the ATLAS Collaboration to validate the properties of particle-level simulated events from Monte Carlo event generators in order to ensure the correctness of all event generator configurations and production samples used in physics analyses. A central validation procedure is adopted which permits the continual validation of the functionality and the performance of the ATLAS event simulation infrastructure. Revisions and updates of the Monte Carlo event generators are also monitored. The methodology behind the validation and tools developed for that purpose, as well as various usage cases, are presented. The strategy has proven to play an essential role in identifying possible problems or unwanted features within a restricted timescale, verifying their origin and pointing to possible bug fixes before full-scale processing is initiated.

  9. Evolution of Security Identity of Domestic Antimilitarism and Roles of Political Parties: Case Studies of Japan and Germany

    Science.gov (United States)

    2009-12-01

    concerned. However, the political crisis engenered by the collapse of the Yugoslav Republic shaped conditions calling for revision of the German security...offered a proposal to build a cooperative mechanism in the Asia-Pacific region. When it came to presenting a detailed initiative for establishment... mechanism focused on non-military measurement such as “trade, finance, energy, the environment, disaster relief and measures to control infectious

  10. Nuclear Security Recommendations on Physical Protection of Nuclear Material and Nuclear Facilities (INFCIRC/225/Revision 5): Recommendations

    International Nuclear Information System (INIS)

    2011-01-01

    This publication, Revision 5 of Physical Protection of Nuclear Material and Nuclear Facilities (INFCIRC/225), is intended to provide guidance to States and their competent authorities on how to develop or enhance, implement and maintain a physical protection regime for nuclear material and nuclear facilities, through the establishment or improvement of their capabilities to implement legislative and regulatory programmes. The recommendations presented in this publication reflect a broad consensus among IAEA Member States on the requirements which should be met for the physical protection of nuclear materials and nuclear facilities.

  11. The enhancement of security in healthcare information systems.

    Science.gov (United States)

    Liu, Chia-Hui; Chung, Yu-Fang; Chen, Tzer-Shyong; Wang, Sheng-De

    2012-06-01

    With the progress and the development of information technology, the internal data in medical organizations have become computerized and are further established the medical information system. Moreover, the use of the Internet enhances the information communication as well as affects the development of the medical information system that a lot of medical information is transmitted with the Internet. Since there is a network within another network, when all networks are connected together, they will form the "Internet". For this reason, the Internet is considered as a high-risk and public environment which is easily destroyed and invaded so that a relevant protection is acquired. Besides, the data in the medical network system are confidential that it is necessary to protect the personal privacy, such as electronic patient records, medical confidential information, and authorization-controlled data in the hospital. As a consequence, a medical network system is considered as a network requiring high security that excellent protections and managerial strategies are inevitable to prevent illegal events and external attacks from happening. This study proposes secure medical managerial strategies being applied to the network environment of the medical organization information system so as to avoid the external or internal information security events, allow the medical system to work smoothly and safely that not only benefits the patients, but also allows the doctors to use it more conveniently, and further promote the overall medical quality. The objectives could be achieved by preventing from illegal invasion or medical information being stolen, protecting the completeness and security of medical information, avoiding the managerial mistakes of the internal information system in medical organizations, and providing the highly-reliable medical information system.

  12. Revised National Pressure Ulcer Advisory Panel Pressure Injury Staging System: Revised Pressure Injury Staging System.

    Science.gov (United States)

    Edsberg, Laura E; Black, Joyce M; Goldberg, Margaret; McNichol, Laurie; Moore, Lynn; Sieggreen, Mary

    Our understanding of pressure injury etiology and development has grown in recent years through research, clinical expertise, and global interdisciplinary expert collaboration. Therefore, the National Pressure Ulcer Advisory Panel (NPUAP) has revised the definition and stages of pressure injury. The revision was undertaken to incorporate the current understanding of the etiology of pressure injuries, as well as to clarify the anatomical features present or absent in each stage of injury. An NPUAP-appointed Task Force reviewed the literature and created drafts of definitions, which were then reviewed by stakeholders and the public, including clinicians, educators, and researchers around the world. Using a consensus-building methodology, these revised definitions were the focus of a multidisciplinary consensus conference held in April 2016. As a result of stakeholder and public input, along with the consensus conference, important changes were made and incorporated into the new staging definitions. The revised staging system uses the term injury instead of ulcer and denotes stages using Arabic numerals rather than Roman numerals. The revised definition of a pressure injury now describes the injuries as usually occurring over a bony prominence or under a medical or other device. The revised definition of a Stage 2 pressure injury seeks to clarify the difference between moisture-associated skin damage and injury caused by pressure and/or shear. The term suspected has been removed from the Deep Tissue Pressure Injury diagnostic label. Each definition now describes the extent of tissue loss present and the anatomical features that may or may not be present in the stage of injury. These important revisions reflect the methodical and collaborative approach used to examine the available evidence and incorporate current interdisciplinary clinical expertise into better defining the important phenomenon of pressure injury etiology and development.

  13. Microcomputers and the Improvement of Revision Skills.

    Science.gov (United States)

    Balajthy, Ernest; And Others

    1987-01-01

    Discusses use of word processing software as an effective tool in writing and revision instruction, and describes the role of the teacher. Examples of exercises that encourage revision and of software designed to teach effective revision skills are reviewed. (MBR)

  14. Hospital security and patient elopement: protecting patients and your healthcare facility.

    Science.gov (United States)

    Smith, Thomas A

    2012-01-01

    Regulatory and financial consequences of adverse events associated with patient elopements are bringing new challenges to healthcare security to develop policies and procedures to prevent and respond to such incidents. This article provides an overview of the problem of elopement in healthcare and what it means to the security function; gives a working knowledge of healthcare related standards and guidelines aimed at reducing patient elopement; and reviews the elements of an elopement prevention and response plan for your organization.

  15. Individual questions of financial control and revision

    Directory of Open Access Journals (Sweden)

    В. М. Глібко

    2015-05-01

    Full Text Available Problem setting. In modern conditions at investigation and gathering of proofs in criminal proceedings according to item 93 CPC of Ukraine collecting of proofs which is carried out by the criminal proceedings parties, victim is important, the representative of the legal person, in which relation carries out manufacture, including a way истребования and receptions from public authorities, local governments, the enterprises, establishments and organisations, official and physical persons of things, documents, data, conclusions of experts, conclusions of revisions and certificates of checks. Recent research and publications analisis. In scientific sources questions of carrying out of revisions S. B.Zhivko, V.V.Akimov, G.Demjanchuk, J.Buzdugan is considered. Paper objective. Article purpose is studying and definition of a place of revision among forms of inspection of the state control and use of results of revision in criminal proceedings. Paper main body. Off-schedule exit revision that is revision which is not provided in plans of work of body of the state financial control is considered and is spent at presence at least one of the circumstances listed in item 11 of the Law of Ukraine «About main principles of realisation of the state financial control in Ukraine». If revision is carried out on request of investigating bodies it is spent on the basis of the petition of the inspector and accepted by the results of consideration of this petition of the decision of the investigatory judge. The primary goal of revision on request of investigating bodies or on the basis of court definition is reception of proofs on business. Therefore the revision certificate admits the written proof as on the basis of its conclusion of the inspector, the public prosecutor receives the information on a perfect crime, abusing, and also on the persons who have committed a crime, on the period of commission of crime and an amount of damage. In criminal

  16. Water security and societal impacts of tropical cyclones in northwestern Mexico, 1970-2010

    Science.gov (United States)

    Scott, C. A.; Farfan, L.

    2012-12-01

    Hydroclimatic variability is one of several potential threats to water security, defined as sustainable quantities and qualities of water for resilient societies and ecosystems in the face of uncertain global environmental change. Other threats can stem from human dimensions of global change, e.g., long-distance trade of water-intensive agricultural commodities or pollution resulting from industrial production and mining in response to rising global market demand. Drought and water scarcity are considered the principal, chronic, hydroclimatic drivers of water insecurity in arid and semi-arid regions. In these conditions, however, rainfall is both the water-supply lifeline and, in extreme events, the cause of flood hazard. In this study, we consider the monsoon-dominated Pacific coast of Mexico and assess the human impacts from tropical cyclone landfall over the past four decades (1970-2010). Storm data from the U.S. National Hurricane Center, rainfall reports from Mexico's National Meteorological Service, and indicators from an international disaster database at Belgium's Université Catholique de Louvain are used to assess the impacts of more than 30 landfall events. For the ten events with the greatest population impact, between 20,000 to 800,000 people were affected by each landfalling cyclone. Strong winds and heavy rainfall, particularly when sustained over periods of 1-3 days, result in significant property damage and loss of life. Results indicate that, in densely populated areas, excessive rainfall accumulations and high daily rates are important causes of cyclone disasters. Strengthening water security associated with extreme events requires planning via structured exchanges between scientists and decision-makers. Adaptive management that accounts for uncertainties, initiates responses, and iteratively assesses outcomes is the thrust of an emerging water-security initiative for the arid Americas that seeks to strengthen water security in northwestern

  17. Security Management and Safeguards Office

    Science.gov (United States)

    Bewley, Nathaniel M.

    2004-01-01

    The Security Management and Safeguards Office at NASA is here to keep the people working in a safe environment. They also are here to protect the buildings and documents from sabotage, espionage, and theft. During the summer of 2004, I worked with Richard Soppet in Physical Security. While I was working here I helped out with updating the map that we currently use at NASA Glenn Research Center, attended meetings for homeland security, worked with the security guards and the locksmith. The meetings that I attended for homeland security talked about how to protect ourselves before something happened, they told us to always be on the guard and look for anything suspicious, and the different ways that terrorist groups operate. When I was with the security guards I was taught how to check someone into the base, showed how to use a radar gun, observed a security guard make a traffic stop for training and was with them while they patrolled NASA Glenn Research Center to make sure things were running smooth and no one was in danger. When I was with the lock smith I was taught how to make keys and locks for the employees here at NASA. The lock smith also showed me that he had inventory cabinets of files that show how many keys were out to people and who currently has access to the rooms that they keys were made for. I also helped out the open house at NASA Glenn Research Center. I helped out by showing the Army Reserves, and Brook Park's SWAT team where all the main events were going to take place a week before the open house was going to begin. Then during the open house I helped out by making sure people had there IDS, checked through there bags, and handed out a map to them that showed where the different activities were going to take place. So the main job here at NASA Glenn Research Center for the Security Management and Safeguards Office is to make sure that nothing is stolen, sabotaged, and espionaged. Also most importantly make sure all the employees here at NASA are

  18. Outcome, revision rate and indication for revision following resurfacing hemiarthroplasty for osteoarthritis of the shoulder

    DEFF Research Database (Denmark)

    Rasmussen, J V; Polk, A; Sorensen, A K

    2014-01-01

    In this study, we evaluated patient-reported outcomes, the rate of revision and the indications for revision following resurfacing hemiarthroplasty of the shoulder in patients with osteoarthritis. All patients with osteoarthritis who underwent primary resurfacing hemiarthroplasty and reported...... to the Danish Shoulder Arthroplasty Registry (DSR), between January 2006 and December 2010 were included. There were 772 patients (837 arthroplasties) in the study. The Western Ontario Osteoarthritis of the Shoulder (WOOS) index was used to evaluate patient-reported outcome 12 months (10 to 14) post......-operatively. The rates of revision were calculated from the revisions reported to the DSR up to December 2011 and by checking deaths with the Danish National Register of Persons. A complete questionnaire was returned by 688 patients (82.2%). The mean WOOS was 67 (0 to 100). A total of 63 hemiarthroplasties (7...

  19. Expedited technology demonstration project (Revised mixed waste management facility project) Project baseline revision 4.0 and FY98 plan

    International Nuclear Information System (INIS)

    Adamson, M. G.

    1997-01-01

    The re-baseline of the Expedited Technology Demonstration Project (Revised Mixed Waste Facility Project) is designated as Project Baseline Revision 4.0. The last approved baseline was identified as Project Baseline Revision 3.0 and was issued in October 1996. Project Baseline Revision 4.0 does not depart from the formal DOE guidance followed by, and contained in, Revision 3.0. This revised baseline document describes the MSO and Final Forms testing activities that will occur during FY98, the final year of the ETD Project. The cost estimate for work during FY98 continues to be $2.OM as published in Revision 3.0. However, the funds will be all CENRTC rather than the OPEX/CENTRC split previously anticipated. LLNL has waived overhead charges on ETD Project CENRTC funds since the beginning of project activities. By requesting the $2.OM as all CENTRC a more aggressive approach to staffing and testing can be taken. Due to a cost under- run condition during FY97 procurements were made and work was accomplished, with the knowledge of DOE, in the Feed Preparation and Final Forms areas that were not in the scope of Revision 3.0. Feed preparation activities for FY98 have been expanded to include the drum opening station/enclosure previously deleted

  20. Security Events and Vulnerability Data for Cybersecurity Risk Estimation.

    Science.gov (United States)

    Allodi, Luca; Massacci, Fabio

    2017-08-01

    Current industry standards for estimating cybersecurity risk are based on qualitative risk matrices as opposed to quantitative risk estimates. In contrast, risk assessment in most other industry sectors aims at deriving quantitative risk estimations (e.g., Basel II in Finance). This article presents a model and methodology to leverage on the large amount of data available from the IT infrastructure of an organization's security operation center to quantitatively estimate the probability of attack. Our methodology specifically addresses untargeted attacks delivered by automatic tools that make up the vast majority of attacks in the wild against users and organizations. We consider two-stage attacks whereby the attacker first breaches an Internet-facing system, and then escalates the attack to internal systems by exploiting local vulnerabilities in the target. Our methodology factors in the power of the attacker as the number of "weaponized" vulnerabilities he/she can exploit, and can be adjusted to match the risk appetite of the organization. We illustrate our methodology by using data from a large financial institution, and discuss the significant mismatch between traditional qualitative risk assessments and our quantitative approach. © 2017 Society for Risk Analysis.

  1. An integrated approach to validation of safeguards and security program performance

    International Nuclear Information System (INIS)

    Altman, W.D.; Hunt, J.S.; Hockert, J.W.

    1988-01-01

    Department of Energy (DOE) requirements for safeguards and security programs are becoming increasingly performance oriented. Master Safeguards and Security Agreemtns specify performance levels for systems protecting DOE security interests. In order to measure and validate security system performance, Lawrence Livermore National Laboratory (LLNL) has developed cost effective validation tools and a comprehensive validation approach that synthesizes information gained from different activities such as force on force exercises, limited scope performance tests, equipment testing, vulnerability analyses, and computer modeling; into an overall assessment of the performance of the protection system. The analytic approach employs logic diagrams adapted from the fault and event trees used in probabilistic risk assessment. The synthesis of the results from the various validation activities is accomplished using a method developed by LLNL, based upon Bayes' theorem

  2. What is Security? A perspective on achieving security

    Energy Technology Data Exchange (ETDEWEB)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  3. PROMOTION AS AN ELEMENT OF MARKETING IN SPORTING EVENT

    Directory of Open Access Journals (Sweden)

    Miodrag Koprivica

    2009-11-01

    Full Text Available The events are happening at the present time on million different tv and radio sta- tions. Every marketer should be aware of that, each and every marketer in situations like this is using different elements of marketing mix, such as: advertising, personal sales, promotional development, publicity and public relations, and of course direct marketing. Organizers of sporting events are using many different ways to bring in visitors. By using marketing mix good position and design of event is secured, and of course vi- sitors are guaranteed. Promotion is by definition one of the elements of marketing mix. This work is exploring promotion goals, rational usage of means, and usage of internet as an media in promotion of sporting event

  4. Nuclear security: strategies and techniques

    International Nuclear Information System (INIS)

    Khan, I.K.

    2010-05-01

    The modern society, whether in developed or in developing countries, depend on the availability of nuclear energy and on the day-to-day use of radioactive materials in medicine, agriculture, industry and for research. Before 9/11, these activities were mainly covered by safety rules regarding health and environment. Since 9/ 11, it is clear, that these activities also require adequate security. For the continued and expanded use of nuclear energy or radioactive materials, nuclear security is indispensable and an important prerequisite for successful and sustainable development. Many of our nuclear security services, expert assistance and training events, we have assisted Member States in their efforts to improve their preparedness and response capabilities and acquired a much better understanding of Member States prob and the need for further support. The end of the Cold War was marked by a shift from a bi-polar structure of global security into a more complex and unpredictable configuration of world affairs. It also brought about new security challenges, i.e. an increased probability for low-density regional, national or sub-national conflicts with new and more dispersed threats emanating from a larger number of actors, including non-state actors; terrorists or criminals. The audio-visual impact of modern media has enhanced the socio-psychological impact on a global scale of such conflicts. The number of cases of illicit trafficking in nuclear materials that were recorded since the 90's raised concern about the international physical protection regime and triggered an effort to enhance our capabilities for prevention, detection and responses regarding terrorist acts, as well as to strengthen the Convention on the Physical Protection of Nuclear Material

  5. Exploring the nexus between climate change, food security, and deforestation in Q'eqchi' Maya communities, Guatemala

    Science.gov (United States)

    Pope, I.; Harbor, J.

    2013-12-01

    The challenges of food security in the central Highlands of Guatemala are linked to deforestation, land degradation, and climate change. The Q'eqchi' Maya people that inhabit this region are smallholder farmers who rely on subsistence agriculture for survival. The Q'eqchi' support themselves with timber products and ecosystem services provided by the cloud forest, a unique ecosystem where a substantial portion of water is obtained through the condensation of water droplets onto vegetation via cloud filtration. Over the past 30 years, small-scale deforestation of the cloud forest in the Sierra Yalijux and Sacranix has increased as demand for agricultural land has risen. A link between the decline of cloud forest cover and an increase in severe precipitation events that drive soil erosion has been observed in the study area. As a result, land degradation poses a serious threat to the long-term food security of Q'eqchi' communities. We have examined the social, cultural, and land tenure dynamics that impact the ability of the Q'eqchi' to adapt to the rapidly changing climate, as well as to implement recommendations for grassroots initiatives to enhance these adaptations. Using remote-sensing we constructed three land use change maps that show that deforestation rates have increased by over 200% between 1986-2006 in the Sierra Yaljux and Sacranix mountain ranges, largely due to slash and burn agriculture. Using these land use change maps as an input into the Revised Universal Soil Loss Equation we show that implementation of agroecological techniques to counter the impacts of land use change drastically reduces soil erosion and is the best management practice. Surveys and focus groups in several Q'eqchi' villages revealed that precipitation events have become less frequent and more intense over the past 30 years, and temperatures have generally been increasing as well. Q'eqchi' people have observed that increasing severe precipitation events have accelerated soil

  6. Review on 18{sup th} Revision of 'Notice on Export and Import of Strategic Items'

    Energy Technology Data Exchange (ETDEWEB)

    Jeon, Jihye; Lee, Chansuh [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2014-05-15

    Nuclear Suppliers Group (NSG) has established a guideline and continued to revise it in accordance with ever-changing international situation and developing technology. The Part 1 of guideline, 'Guidelines of Nuclear Transfers' covers the Trigger List items which triggers safeguards as a condition of supply. Currently NSG has published the 12{sup th} revised guideline (INFCIRC/254/Rev.12/Part1) in November 2013. Korean government fully reflected the guideline to its national legislation to implement in accordance with internationally agreed standard. The export control of nuclear strategic items in Korea is responsibility of Nuclear Safety and Security Commission (NSSC), which entrusted the technical review of the work to Korea Institute of Nonproliferation and Control (KINAC). The specific guidelines for the technical review are stipulated in Notice on Export and Import of Strategic Items with other strategic items usable to other Weapons of Mass Destruction. The Ministry of Trade, Industry and Energy approved the 18{sup th} revision of Notice on Export and Import of Strategic Items on 31 January 2014 as Notice no. 2014-15, which strictly follows the NSG guideline. The 18{sup th} revision of the notice reflects the final proposals agreed from the last Dedicated Meeting of Technical Experts (DMTE) of NSG's Consultative Group (CG) in April 2013. The 3-year-DMTE offered the 'fundamental, holistic approach to the technical review' within the international framework of NSG, rather than sporadic endeavors by individual states in the past. The 18{sup th} version itself has meaning in that the final products of the international technical review were reflected in the Korean national legislation of nuclear export control. It addressed various changes in control text in technical, contextual, and editorial aspects. The revision is analyzed herein concentrating only on technical and semantic changes in control text.

  7. Circumcision revision in male children

    Directory of Open Access Journals (Sweden)

    Mohammed A. Al-Ghazo

    2006-08-01

    Full Text Available OBJECTIVE: To determine indications for circumcision revision and to identify the specialty of the person who performed unsatisfactory primary circumcision. MATERIALS AND METHODS: The authors reviewed medical records of 52 cases that underwent circumcision revision over a 6-year period (1998 to 2004. Sleeve surgical technique was used for revision in patients with redundant foreskin or concealed penis, penoplasty for partial or complete degloving of the penis and meatotomy for external meatal stenosis. The mean age of children was 32 months (range 6 months to 9 years. RESULTS: Most of unsatisfactory primary circumcisions (86.7% were performed by laymen. All patients who underwent circumcision revision had good to excellent cosmetic results. CONCLUSION: Primary circumcision performed by laymen carry a high complication rate and serious complications may occur. A period of training and direct supervision by physicians is required before allowing laymen to perform circumcision independently.

  8. ENERGY IN THE CONTEXT OF THE PRESENT CHALLENGES TO THE EUROPEAN COMMON SECURITY AND DEFENCE POLICY

    Directory of Open Access Journals (Sweden)

    Gabriel ANDRUSEAC

    2014-10-01

    Full Text Available The Common Security and Defence Policy is a part of the European Union’s Common Foreign and Security Policy (CFSP and establishes the policy framework for the institutional structures and military instruments which have to deal with the security challenges in Europe’s geopolitical neighborhood. The article aims to identify and analyze the role of energy as one of the present challenges to the European Common Security and Defence Policy in the context of the recent events in the world economy.

  9. The economic impact of revision otologic surgery.

    Science.gov (United States)

    Nadimi, Sahar; Leonetti, John P; Pontikis, George

    2016-03-01

    Revision otologic surgery places a significant economic burden on patients and the healthcare system. We conducted a retrospective chart analysis to estimate the economic impact of revision canal-wall-down (CWD) mastoidectomy. We reviewed the medical records of all 189 adults who had undergone CWD mastoidectomy performed by the senior author between June 2006 and August 2011 at Loyola University Medical Center in Maywood, Ill. Institutional charges and collections for all patients were extrapolated to estimate the overall healthcare cost of revision surgery in Illinois and at the national level. Of the 189 CWD mastoidectomies, 89 were primary and 100 were revision procedures. The total charge for the revision cases was $2,783,700, and the net reimbursement (collections) was $846,289 (30.4%). Using Illinois Hospital Association data, we estimated that reimbursement for 387 revision CWD mastoidectomies that had been performed in fiscal year 2011 was nearly $3.3 million. By extrapolating our data to the national level, we estimated that 9,214 patients underwent revision CWD mastoidectomy in the United States during 2011, which cost the national healthcare system roughly $76 million, not including lost wages and productivity. Known causes of failed CWD mastoidectomies that often result in revision surgery include an inadequate meatoplasty, a facial ridge that is too high, residual diseased air cells, and recurrent cholesteatoma. A better understanding of these factors can reduce the need for revision surgery, which could have a positive impact on the economic strain related to this procedure at the local, state, and national levels.

  10. Analysis of health professional security behaviors in a real clinical setting: an empirical study.

    Science.gov (United States)

    Fernández-Alemán, José Luis; Sánchez-Henarejos, Ana; Toval, Ambrosio; Sánchez-García, Ana Belén; Hernández-Hernández, Isabel; Fernandez-Luque, Luis

    2015-06-01

    The objective of this paper is to evaluate the security behavior of healthcare professionals in a real clinical setting. Standards, guidelines and recommendations on security and privacy best practices for staff personnel were identified using a systematic literature review. After a revision process, a questionnaire consisting of 27 questions was created and responded to by 180 health professionals from a public hospital. Weak passwords were reported by 62.2% of the respondents, 31.7% were unaware of the organization's procedures for discarding confidential information, and 19.4% did not carry out these procedures. Half of the respondents (51.7%) did not take measures to ensure that the personal health information on the computer monitor could not be seen by unauthorized individuals, and 57.8% were unaware of the procedure established to report a security violation. The correlation between the number of years in the position and good security practices was not significant (Pearson's r=0.085, P=0.254). Age was weakly correlated with good security practices (Pearson's r=-0.169, P=0.028). A Mann-Whitney test showed no significant difference between the respondents' security behavior as regards gender (U=2536, P=0.792, n=178). The results of the study suggest that more efforts are required to improve security education for health personnel. It was found that both preventive and corrective actions are needed to prevent health staff from causing security incidents. Healthcare organizations should: identify the types of information that require protection, clearly communicate the penalties that will be imposed, promote security training courses, and define what the organization considers improper behavior to be and communicate this to all personnel. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  11. The Revised Academic Consensus Definition of Terrorism

    Directory of Open Access Journals (Sweden)

    Alex P. Schmid

    2012-05-01

    Full Text Available Terrorism is a contested concept. While there are many national and regional definitions, there is no universal legal definition approved by the General Assembly of the United Nations (the one proposed by the Security Council in Res. 1566 (2004 is non-binding, lacking legal authority in international law. The Ad Hoc Committee on Terrorism of the 6th (legal Committee of the General Assembly has, with some interruptions, been trying to reach a legal definition since 1972 - but in vain. In the absence of a legal definition, attempts have been made since the 1980s to reach agreement on an academic consensus definition. The latest outcome is the revised definition reprinted below. It is the result of three rounds of consultations among academics and other professionals. A description how it was arrived at can be found on pp. 39 - 98 of Alex P. Schmid (Ed.. The Routledge Handbook of Terrorism Research. London and New York: Routledge, 2011. The same volume also contains 260 other definitions compiled by Joseph J. Easson and Alex P. Schmid on pp. 99 -200.

  12. The Trend of Women in Nuclear Security in Zimbabwe

    International Nuclear Information System (INIS)

    Sithole, P.; Chipuru, J.

    2015-01-01

    With the increase in the use of radiation technologies, each country now has a potential risk from nuclear related offenses or malicious use of radioactive material. Despite the major advancements women have made in becoming a significant part of the workforce in all the other fields, women in the field of Nuclear Security are underrepresented in Zimbabwe. Nuclear security contributes to global security and there are a number of things that constitute this field. In the past 10 years, in developing countries, a few women have been taking part in Nuclear Security activities at Major Public events. Less than 1% of women in Zimbabwe are employed and take part in Nuclear Security related work. This study provides the trend in statistics of women employed in the field of Nuclear Security in Zimbabwe and it has identified possible factors why women are underrepresented in that field. It shows the trend of women taking part in Nuclear Security related activities for the past 10 years. Women’s experiences of employment and career development in nuclear security were studied. The factors which hinder or support the career development of women employees in Nuclear Security or related work were identified. Practices which encourage and support women’s involvement in Nuclear Security were explored. A statistical analysis of local authority employment, using the Ministry of Labour, census of women in science and nuclear security related studies in the Population of Zimbabwe, and other relevant sources was carried out. This was to describe the wider context of women’s employment in Nuclear Security. A self-completion questionnaire to get information on personal attributes, age and preferred career paths for women was used. Solutions to the trend are suggested in the study. (author)

  13. THE NATIONAL SECURITY - MEDIA POWER LINKAGE. A THEORETICAL FRAMEWORK

    Directory of Open Access Journals (Sweden)

    KARIN MEGHEŞAN

    2013-05-01

    Full Text Available The mechanism of national security policy is an issue of increasing interests in post cold war era. But what is the impact of the media upon national security policy decision making? New world wide events show us that more than ever national policy is often at the mercy of the media. The Wiki leaks, the Murdoch inquiry, the impact of new social media on Arab democratic movements are just some examples regarding the effect of nearly simultaneous presentation of information around the world. The world is changing, and the processes by which national policy is developed may also be changing especially in the security domain. The essence of this study, as the title suggests is the idea of a „dual use” media in the national security issues. This study employs a relatively narrow definition of national security issues as only those which are concerned with national survival and preservation of our society. The media affects us as individuals and as a collective body so we will like to focus on a realistic understanding of the media-secrecy-security linkage, noting that we will do nothing else but advance and underline the main points of view from the public and scientific discourse.

  14. How to Revise, and Revise Really Well, for Premier Academic Journals

    DEFF Research Database (Denmark)

    LaPlaca, Peter J.; Lindgreen, Adam; Vanhamme, Joelle

    2018-01-01

    Most of the premier academic journals in all fields routinely have rejection rates of 80%, 95%, or higher. All journals prefer articles that make significant contributions to the field. Revising a manuscript and responding properly to the comments of reviewers and editors often is challenging....... This article discusses how to revise effectively a manuscript according to the (minor or major) comments of reviewers and editors for premier academic journals. We provide a series of tips for helping the authors in their endeavor, making the process less arduous and improving the possibility of a positive...

  15. A taxonomic revision of the genus Podocarpus

    NARCIS (Netherlands)

    Laubenfels, de D.J.

    1985-01-01

    In connection with the forthcoming revision of the Coniferae for the Flora Malesiana, the author thought it necessary to revise the genus Podocarpus. Although this genus has a substantial representation in Malesia (30 species), the revision is too involved to be appropriate with the Flora Malesiana

  16. Secure Threat Information Exchange across the Internet of Things for Cyber Defense in a Fog Computing Environment

    Directory of Open Access Journals (Sweden)

    Mihai-Gabriel IONITA

    2016-01-01

    Full Text Available Threat information exchange is a critical part of any security system. Decisions regarding security are taken with more confidence and with more results when the whole security context is known. The fog computing paradigm enhances the use cases of the already used cloud computing systems by bringing all the needed resources to the end-users towards the edge of the network. While fog decentralizes the cloud, it is very important to correlate security events which happen in branch offices around the globe for correct and timely decisions. In this article, we propose an infrastructure based on custom locally installed OSSEC agents which communicate with a central AlienVault deployment for event correlation. The agents are based on a neural network which takes actions based on risk assessment inspired by the human immune system. All of the threat information is defined by STIX expressions and a TAXII server can share this information with foreign organizations. The proposed implementation can successfully be implemented in an IoT scenario, with added security for the “brownfiled” devices.

  17. Nevada Test Site Radiological Control Manual. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2010-02-09

    This document supersedes DOE/NV/25946--801, “Nevada Test Site Radiological Control Manual,” Revision 0 issued in October 2009. Brief Description of Revision: A minor revision to correct oversights made during revision to incorporate the 10 CFR 835 Update; and for use as a reference document for Tenant Organization Radiological Protection Programs.

  18. : Principles of safety measures of sports events organizers without the involvement of police

    OpenAIRE

    Buchalová, Kateřina

    2013-01-01

    Title: Principles of safety measures of sports events organizers without the involvement of police Objectives: The aim of this thesis is a description of security measures at sporting events organizers. Methods: The thesis theoretical style is focused on searching for available sources of study and research, and writing their summary comparing safety measures of the organizers. Results: This work describes the activities of the organizers of sports events and precautions that must be provided...

  19. Revision of an automated microseismic location algorithm for DAS - 3C geophone hybrid array

    Science.gov (United States)

    Mizuno, T.; LeCalvez, J.; Raymer, D.

    2017-12-01

    Application of distributed acoustic sensing (DAS) has been studied in several areas in seismology. One of the areas is microseismic reservoir monitoring (e.g., Molteni et al., 2017, First Break). Considering the present limitations of DAS, which include relatively low signal-to-noise ratio (SNR) and no 3C polarization measurements, a DAS - 3C geophone hybrid array is a practical option when using a single monitoring well. Considering the large volume of data from distributed sensing, microseismic event detection and location using a source scanning type algorithm is a reasonable choice, especially for real-time monitoring. The algorithm must handle both strain rate along the borehole axis for DAS and particle velocity for 3C geophones. Only a small quantity of large SNR events will be detected throughout a large aperture encompassing the hybrid array; therefore, the aperture is to be optimized dynamically to eliminate noisy channels for a majority of events. For such hybrid array, coalescence microseismic mapping (CMM) (Drew et al., 2005, SPE) was revised. CMM forms a likelihood function of location of event and its origin time. At each receiver, a time function of event arrival likelihood is inferred using an SNR function, and it is migrated to time and space to determine hypocenter and origin time likelihood. This algorithm was revised to dynamically optimize such a hybrid array by identifying receivers where a microseismic signal is possibly detected and using only those receivers to compute the likelihood function. Currently, peak SNR is used to select receivers. To prevent false results due to small aperture, a minimum aperture threshold is employed. The algorithm refines location likelihood using 3C geophone polarization. We tested this algorithm using a ray-based synthetic dataset. Leaney (2014, PhD thesis, UBC) is used to compute particle velocity at receivers. Strain rate along the borehole axis is computed from particle velocity as DAS microseismic

  20. One-year results of a prospective randomized, evaluator-blinded, multicenter study comparing TVT and TVT Secur.

    Science.gov (United States)

    Andrada Hamer, Maria; Larsson, Per-Göran; Teleman, Pia; Bergqvist, Christina Eten; Persson, Jan

    2013-02-01

    The aim of this prospective randomized multicenter study was to compare retropubic tension-free vaginal tape (TVT) with TVT Secur in terms of efficacy and safety. We set out to enrol 280 stress urinary incontinent (SUI) women with a half-time interim analysis of short-term cure and adverse events. The short-term results have previously been published. Of the 133 randomized women, 125 underwent surgery, and 121 (TVT n = 61, TVT Secur n = 60) were available for follow-up 1 year postsurgery. No significant differences were found between groups regarding demographics or incontinence grade. One year after surgery, both subjective and objective cure rates were significantly lower for TVT Secur than for TVT (subjective cure: TVT 98 %, TVT Secur 80 %, p = 0.03; objective cure: TVT 94 %, TVT Secur 71 % for cough test, p = 0.01; TVT 76 %, TVT Secur 58 % for pad test, p = 0.05 ). Three major complications occurred in the TVT Secur group: one tape erosion into the urethra, one tape inadvertently placed into the bladder, and one immediate postoperative bleeding due to injury to the corona mortis. No major complications occurred in the TVT group. No significant differences were found between groups regarding peroperative bleeding, hospital stay, urge symptoms, residual urinary volume, subjective bladder emptying problems, postoperative urinary tract infections, and minor complications. The TVT Secur group used more antimuscarine medication after surgery than the TVT group (p = 0.03). Median time for surgery was 13 and 22 min for TVT Secur and TVT, respectively (p TVT Secur procedure had significantly inferior subjective and objective cure rates compared with the retropubic TVT procedure. Three serious adverse events occurred in the TVT Secur group. We therefore discourage further use of TVT Secur.

  1. Five-Year Safety Data for More than 55,000 Subjects following Breast Implantation: Comparison of Rare Adverse Event Rates with Silicone Implants versus National Norms and Saline Implants.

    Science.gov (United States)

    Singh, Navin; Picha, George J; Hardas, Bhushan; Schumacher, Andrew; Murphy, Diane K

    2017-10-01

    The U.S. Food and Drug Administration has required postapproval studies of silicone breast implants to evaluate the incidence of rare adverse events over 10 years after implantation. The Breast Implant Follow-Up Study is a large 10-year study (>1000 U.S. sites) evaluating long-term safety following primary augmentation, revision-augmentation, primary reconstruction, or revision-reconstruction with Natrelle round silicone breast implants compared with national norms and outcomes with saline implants. Targeted adverse events in subjects followed for 5 to 8 years included connective tissue diseases, neurologic diseases, cancer, and suicide. The safety population comprised 55,279 women (primary augmentation, n = 42,873; revision-augmentation, n = 6837; primary reconstruction, n = 4828; and revision-reconstruction, n = 741). No targeted adverse events occurred at significantly greater rates in silicone implant groups versus national norms across all indications. The standardized incidence rate (observed/national norm) for all indications combined was 1.4 for cervical/vulvar cancer, 0.8 for brain cancer, 0.3 for multiple sclerosis, and 0.1 for lupus/lupus-like syndrome. Silicone implants did not significantly increase the risk for any targeted adverse events compared with saline implants. The risk of death was similar with silicone versus saline implants across all indications. The suicide rate (10.6 events per 100,000 person-years) was not significantly higher than the national norm. No implant-related deaths occurred. Results from 5 to 8 years of follow-up for a large number of subjects confirmed the safety of Natrelle round silicone implants, with no increased risk of systemic disease or suicide versus national norms or saline implants. Therapeutic, II.

  2. Cyber Security Research Frameworks For Coevolutionary Network Defense

    Energy Technology Data Exchange (ETDEWEB)

    Rush, George D. [Missouri Univ. of Science and Technology, Rolla, MO (United States); Tauritz, Daniel Remy [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-12-03

    Several architectures have been created for developing and testing systems used in network security, but most are meant to provide a platform for running cyber security experiments as opposed to automating experiment processes. In the first paper, we propose a framework termed Distributed Cyber Security Automation Framework for Experiments (DCAFE) that enables experiment automation and control in a distributed environment. Predictive analysis of adversaries is another thorny issue in cyber security. Game theory can be used to mathematically analyze adversary models, but its scalability limitations restrict its use. Computational game theory allows us to scale classical game theory to larger, more complex systems. In the second paper, we propose a framework termed Coevolutionary Agent-based Network Defense Lightweight Event System (CANDLES) that can coevolve attacker and defender agent strategies and capabilities and evaluate potential solutions with a custom network defense simulation. The third paper is a continuation of the CANDLES project in which we rewrote key parts of the framework. Attackers and defenders have been redesigned to evolve pure strategy, and a new network security simulation is devised which specifies network architecture and adds a temporal aspect. We also add a hill climber algorithm to evaluate the search space and justify the use of a coevolutionary algorithm.

  3. Global energy issues and Swedish security policy; Globala energifraagor och svensk saekerhetspolitik

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    An important part of the Swedish Energy Agency's world surveillance is to identify trends that may affect Sweden's security of energy supply. Sweden can not be considered in isolation with its own energy supply, but is affected much by what happens if the global energy flows are disturbed by conflicts or weather-related events. Several different policy areas influence the energy markets, in addition to the energy and environmental policy. Geopolitical events of the last few years have more and more focused on power over energy resources. To get a comprehensive picture of the global energy situation, the Agency has engaged the Royal Military Sciences to produce a report that describes the 'Global Energy Issues and Swedish Security Policy'. The report's starting point is to describe how global events affect European and Swedish energy supply and security policy. Descriptions and analysis in the report are the authors own conclusions and need not always be the Agency's official views. The political environment that the report deals with is constantly changing, why some facts and circumstances may have changed since the report was completed. During the final preparation of the report, the scene changed in Moscow. On May 8, Vladimir Putin once again was appointed a position as Russia's president. The former president Medvedev, at the same time, takes over as Prime Minister.

  4. Catalogue of extreme wave events in Ireland: revised and updated for 14 680 BP to 2017

    Science.gov (United States)

    O'Brien, Laura; Renzi, Emiliano; Dudley, John M.; Clancy, Colm; Dias, Frédéric

    2018-03-01

    This paper aims to extend and update the survey of extreme wave events in Ireland that was previously carried out by O'Brien et al. (2013). The original catalogue highlighted the frequency of such events dating back as far as the turn of the last ice age and as recent as 2012. Ireland's marine territory extends far beyond its coastline and is one of the largest seabed territories in Europe. It is therefore not surprising that extreme waves have continued to occur regularly since 2012, particularly considering the severity of weather during the winters of 2013-2014 and 2015-2016. In addition, a large number of storm surges have been identified since the publication of the original catalogue. This paper updates the O'Brien et al. (2013) catalogue to include events up to the end of 2017. Storm surges are included as a new category and events are categorised into long waves (tsunamis and storm surges) and short waves (storm and rogue waves). New results prior to 2012 are also included and some of the events previously documented are reclassified. Important questions regarding public safety, services and the influence of climate change are also highlighted. An interactive map has been created to allow the reader to navigate through events: https://drive.google.com/open?id=19cZ59pDHfDnXKYIziYAVWV6AfoE&usp=sharing" target="_blank">https://drive.google.com/open?id=19cZ59pDHfDnXKYIziYAVWV6AfoE&usp=sharing.

  5. CoreFlow: Enriching Bro security events using network traffic monitoring data

    NARCIS (Netherlands)

    Koning, R.; Buraglio, N.; de Laat, C.; Grosso, P.

    Attacks against network infrastructures can be detected by Intrusion Detection Systems (IDS). Still reaction to these events are often limited by the lack of larger contextual information in which they occurred. In this paper we present CoreFlow, a framework for the correlation and enrichment of IDS

  6. Revising the security organisation at Forsmark NPP - A case study from the point of view of the operator and the regulatory and supervisory authority

    International Nuclear Information System (INIS)

    Roeden, B.; Strandberg, L.; Isaksson, S.

    2001-01-01

    Forsmark Nuclear Power Plant consists of three reactor-units. Each unit has separate shift crews and separate control rooms for operation of the plant. During 1996, Forsmarks Kraftgrupp AB (FKA) decided to change the organisation of Security at the site in Forsmark, Sweden. Reasons for changing the Organisation Experiences pointed out that it was necessary to have a Security supervisor present at site 24 hours per day. Experiences were basically gained from occasions when malfunctions in the technical security systems occurred. Another experience was that the procedures describing counter measures to different malfunctions in the technical security systems, did not meet the same high requirements, that would be expected in comparison with the Standard Operational and Emergency Operational Procedures, which are used for operation of the Nuclear Power Plant. It was decided to integrate the Security guards in the shift crew, one guard for each reactor unit and shift. Some of the regular Field Operators in the shift-crews for operating the plant were educated to competent Security Guards. The Shift Supervisor on each reactor unit became in charge for one Security Guard. One of the units also became in charge of the Security Central and the Security Guard operating the technical security systems. During incidents the supervisor from the fire brigade takes the responsibility for the security. He also has additionally two Security Guards at disposal from the fire brigade. In case of a major incident, this arrangement let the Shift Supervisors proceed taking the necessary counter measures concerning the process in the power plant. The attitude to new duties among the regular Field Operators educated to Security Guards were not positive, this problem affected also the attitude among the Shift supervisors. It was difficult to bring the different reactor units to work in the same direction and at the same time, generally speaking. The procedures and standards at each unit

  7. Nuclear Security and Nuclear Safeguards; Differences, Commonalities and Synergies

    International Nuclear Information System (INIS)

    Jorant, C.

    2015-01-01

    Reference to the three S's in the nuclear world is recurring and much has been said about the need to build on synergies to reinforce safeguards, safety and security. In practice, the 3S's communities are seldom interconnected even though some interaction can be observed between safety and security and security and safeguards. Ensuring a better understanding between those three sectors about their scope, requirements, implementation methods and tools would stimulate cooperation. The second Nuclear Security Summit and particularly the industry related event stressed the synergies between safety and security. The first IAEAs Security Conference organized in July 2013 did not address specifically nuclear safeguards and security relations. Last Security Summit took place in The Hague in March 2014 and this type of issue was not really raised either. The safeguards Symposium provides a timely opportunity to tackle possible enhanced cooperation between safeguards and security communities and assess the prospect for addressing such issue at the next and allegedly last security summit in 2016. This presentation will analyze the differences and commonalities between those two sectors, in particular with regards to the objectives and actors, the organization and technicalities, or to the conceptual approaches (DBT and APA/SLC, attractiveness/accessibility). It will then assess the possible synergies or cooperation between both communities. It will discuss the merits of a global and comprehensive involvement of the different actors, (State, industry and international bodies including the NGOs) and of exchanges on good practices to contribute to a common understanding and references while allowing for an adaptable and national approach. Indeed the need to reassure the stakeholders, including the general public, that security, as well as safeguards are addressed in a consistent manner worldwide is of utmost importance for building future nuclear energy programmes on a

  8. [An overview on the collation and revision of medical books by the Bureau for Revising Medical Books in the Northern Song Dynasty].

    Science.gov (United States)

    Meng, Yongliang; Liang, Yongxuan

    2014-07-01

    The Bureau for Revising Medical Books was a temporary agency established by the government of the Northern Song Dynasty in 1057, the 2nd year of Jiayou of Emperor Renzong, exclusively for the edition, revision and publishing of ancient medical books. 11 medical books were revised and edited by 13 Bureau members in a period of 12 years until 1069, the 2nd year of Xining of Emperor ShenZong, which eventually became the final versions until today. 8 medical books were initially planned for the revision, but 11 were actually completed in the end. The time for completing a revision varied from over 10 years at most to less than 1 year at least. Instead of working in the office, the officers of the Bureau for Revising Medical Books did their works at home. The members of the said Bureau came from the Tiju officer of the Bureau for Revising Medical Books and the officials of revising medical books, consisting of both Confucian ministers and medical officers. Confucian ministers played an important role in revising medical books. The Bureau had a strict workflow in electing revising officials, making the project, and the determination of the principles and arrangements of the tasks of editing and proofreading.

  9. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  10. Emotion Processes in Knowledge Revision

    Science.gov (United States)

    Trevors, Gregory J.; Kendeou, Panayiota; Butterfuss, Reese

    2017-01-01

    In recent years, a number of insights have been gained into the cognitive processes that explain how individuals overcome misconceptions and revise their previously acquired incorrect knowledge. The current study complements this line of research by investigating the moment-by-moment emotion processes that occur during knowledge revision using a…

  11. New safety and security requirements for the transport of nuclear and other radioactive materials in Hungary

    International Nuclear Information System (INIS)

    Katona, T.; Horvath, K.; Safar, J.

    2016-01-01

    In addition to the promulgation of mode-specific regulations of international transport of dangerous goods, some Hungarian governmental and ministerial decrees impose further conditions upon the transport of nuclear and other radioactive materials. One of these ministerial decrees on the transport, carriage and packaging of radioactive materials is under revision and it will require • approval of emergency response plan (including security and safety contingency plan); • report on transport incidents and accidents for classifying them in accordance with the INES scale; • the competent authority to request experts’ support for the approval of package designs, radioactive material designs and shipments. Regarding the security of the transport of nuclear and other radioactive materials a new Hungarian governmental decree and a related guidance are about to be published which will supply additional requirements in the field of the transport security especially concerning radioactive materials, implementing - among others - IAEA recommendations of the NSS No9 and No14. The main and relevant features of the Hungarian nuclear regulatory system and the details of both new decrees regarding the safety and security issues of transport of nuclear and other radioactive materials will be discussed. (author)

  12. 75 FR 57597 - Revised Proposal for Revisions to the Schedules of Civil Penalties for a Violation of a Federal...

    Science.gov (United States)

    2010-09-21

    ... Revisions to the Schedules of Civil Penalties for a Violation of a Federal Railroad Safety Law or Federal... railroad safety laws and regulations are necessary because many of FRA's civil penalties have not been..., et al. Revised Proposal for Revisions to the Schedules of Civil Penalties for a Violation of a...

  13. Homeland security: safeguarding America's future with energy efficiency and renewable energy technologies

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2002-08-01

    The State Energy Advisory Board (STEAB) presents this 10th annual report following the one-year anniversary of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. This event has had profound impacts on all segments of American society, not the least of which is this country’s energy sector. Long before September 11, a number of energy issues grabbed the nation’s attention, including opening the Arctic National Wildlife Refuge to oil and natural gas exploration, the power crisis in California, nationwide natural gas and gasoline price increases, and the administration’s May 2001 National Energy Policy. However, the events of September 11 refocused attention on the prominent role energy plays in the country’s homeland security. For the most part, the energy aspects of homeland security have focused on the physical security of critical energy emergency planning and energy infrastructure, such as power plants, refineries, and power and fuel transmission systems. While STEAB recognizes the importance of protecting our existing energy infrastructure, this should not be the sole focus of homeland security as it relates to energy.

  14. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  15. Children's Vantage Point of Recalling Traumatic Events.

    Science.gov (United States)

    Dawson, Katie S; Bryant, Richard A

    2016-01-01

    This study investigated the recollections of child survivors of the 2004 Asian tsunami in terms of their vantage point and posttraumatic stress disorder (PTSD) responses. Five years after the tsunami, 110 children (aged 7-13 years) living in Aceh, Indonesia were assessed for source of memories of the tsunami (personal memory or second-hand source), vantage point of the memory, and were administered the Children's Revised Impact of Event Scale-13. Fifty-three children (48%) met criteria for PTSD. Two-thirds of children reported direct memories of the tsunami and one-third reported having memories based on reports from other people. More children (97%) who reported an indirect memory of the tsunami recalled the event from an onlooker's perspective to some extent than those who recalled the event directly (63%). Boys were more likely to rely on stories from others to reconstruct their memory of the tsunami, and to adopt an observer perspective. Boys who adopted an observer's perspective had less severe PTSD than those who adopted a field perspective. These findings suggest that, at least in the case of boys, an observer perspectives of trauma can be associated with levels of PTSD.

  16. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  17. Printing Insecurity? The Security Implications of 3D-Printing of Weapons

    OpenAIRE

    Walther, Gerald

    2014-01-01

    In 2013, the first gun printed out of plastic by a 3D-printer was successfully fired in the US. This event caused a major media hype about the dangers of being able to print a gun. Law enforcement agencies worldwide were concerned about this development and the potentially huge security implications of these functional plastic guns. As a result, politicians called for a ban of these weapons and a control of 3D-printing technology. This paper reviews the security implications of 3D-printing te...

  18. Reviewing and reforming policy in health enterprise information security

    Science.gov (United States)

    Sostrom, Kristen; Collmann, Jeff R.

    2001-08-01

    Health information management policies usually address the use of paper records with little or no mention of electronic health records. Information Technology (IT) policies often ignore the health care business needs and operational use of the information stored in its systems. Representatives from the Telemedicine & Advanced Technology Research Center, TRICARE and Offices of the Surgeon General of each Military Service, collectively referred to as the Policies, Procedures and Practices Work Group (P3WG), examined military policies and regulations relating to computer-based information systems and medical records management. Using a system of templates and matrices created for the purpose, P3WG identified gaps and discrepancies in DoD and service compliance with the proposed Health Insurance Portability and Accountability Act (HIPAA) Security Standard. P3WG represents an unprecedented attempt to coordinate policy review and revision across all military health services and the Office of Health Affairs. This method of policy reform can identify where changes need to be made to integrate health management policy and IT policy in to an organizational policy that will enable compliance with HIPAA standards. The process models how large enterprises may coordinate policy revision and reform across broad organizational and work domains.

  19. Statin-associated muscular and renal adverse events: data mining of the public version of the FDA adverse event reporting system.

    Directory of Open Access Journals (Sweden)

    Toshiyuki Sakaeda

    Full Text Available OBJECTIVE: Adverse event reports (AERs submitted to the US Food and Drug Administration (FDA were reviewed to assess the muscular and renal adverse events induced by the administration of 3-hydroxy-3-methylglutaryl coenzyme A (HMG-CoA reductase inhibitors (statins and to attempt to determine the rank-order of the association. METHODS: After a revision of arbitrary drug names and the deletion of duplicated submissions, AERs involving pravastatin, simvastatin, atorvastatin, or rosuvastatin were analyzed. Authorized pharmacovigilance tools were used for quantitative detection of signals, i.e., drug-associated adverse events, including the proportional reporting ratio, the reporting odds ratio, the information component given by a Bayesian confidence propagation neural network, and the empirical Bayes geometric mean. Myalgia, rhabdomyolysis and an increase in creatine phosphokinase level were focused on as the muscular adverse events, and acute renal failure, non-acute renal failure, and an increase in blood creatinine level as the renal adverse events. RESULTS: Based on 1,644,220 AERs from 2004 to 2009, signals were detected for 4 statins with respect to myalgia, rhabdomyolysis, and an increase in creatine phosphokinase level, but these signals were stronger for rosuvastatin than pravastatin and atorvastatin. Signals were also detected for acute renal failure, though in the case of atorvastatin, the association was marginal, and furthermore, a signal was not detected for non-acute renal failure or for an increase in blood creatinine level. CONCLUSIONS: Data mining of the FDA's adverse event reporting system, AERS, is useful for examining statin-associated muscular and renal adverse events. The data strongly suggest the necessity of well-organized clinical studies with respect to statin-associated adverse events.

  20. Statin-associated muscular and renal adverse events: data mining of the public version of the FDA adverse event reporting system.

    Science.gov (United States)

    Sakaeda, Toshiyuki; Kadoyama, Kaori; Okuno, Yasushi

    2011-01-01

    Adverse event reports (AERs) submitted to the US Food and Drug Administration (FDA) were reviewed to assess the muscular and renal adverse events induced by the administration of 3-hydroxy-3-methylglutaryl coenzyme A (HMG-CoA) reductase inhibitors (statins) and to attempt to determine the rank-order of the association. After a revision of arbitrary drug names and the deletion of duplicated submissions, AERs involving pravastatin, simvastatin, atorvastatin, or rosuvastatin were analyzed. Authorized pharmacovigilance tools were used for quantitative detection of signals, i.e., drug-associated adverse events, including the proportional reporting ratio, the reporting odds ratio, the information component given by a Bayesian confidence propagation neural network, and the empirical Bayes geometric mean. Myalgia, rhabdomyolysis and an increase in creatine phosphokinase level were focused on as the muscular adverse events, and acute renal failure, non-acute renal failure, and an increase in blood creatinine level as the renal adverse events. Based on 1,644,220 AERs from 2004 to 2009, signals were detected for 4 statins with respect to myalgia, rhabdomyolysis, and an increase in creatine phosphokinase level, but these signals were stronger for rosuvastatin than pravastatin and atorvastatin. Signals were also detected for acute renal failure, though in the case of atorvastatin, the association was marginal, and furthermore, a signal was not detected for non-acute renal failure or for an increase in blood creatinine level. Data mining of the FDA's adverse event reporting system, AERS, is useful for examining statin-associated muscular and renal adverse events. The data strongly suggest the necessity of well-organized clinical studies with respect to statin-associated adverse events.

  1. Student-initiated revision in child health.

    Science.gov (United States)

    Alfaham, M; Gray, O P; Davies, D P

    1994-03-01

    Most teaching of child health in Cardiff takes place in block attachments of 8 weeks. There is an introductory seminar of 2 days followed by a 6-week clinical attachment in a district general hospital in Wales, and then a revision period of one week designed to help students formalize and structure their basic knowledge and to clarify aspects of child health which they may have had difficulty in understanding. The revision programme has to take into account: the short time available, the small number of teaching staff, the most relevant basic knowledge and active participation by the student. This paper describes how this week has been improved through the use of student-initiated revision (SIR). The students' appraisal of this revision and in particular SIR is presented.

  2. Secure Dynamic access control scheme of PHR in cloud computing.

    Science.gov (United States)

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    scheme in Cloud computing environments is proven flexible and secure and could effectively correspond to real-time appending and deleting user access authorization and appending and revising PHR records.

  3. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  4. Verification and nuclear material security

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2001-01-01

    Full text: The Director General will open the symposium by presenting a series of challenges facing the international safeguards community: the need to ensure a robust system, with strong verification tools and a sound research and development programme; the importance of securing the necessary support for the system, in terms of resources; the effort to achieve universal participation in the non-proliferation regime; and the necessity of re-energizing disarmament efforts. Special focus will be given to the challenge underscored by recent events, of strengthening international efforts to combat nuclear terrorism. (author)

  5. Security management of water supply

    Directory of Open Access Journals (Sweden)

    Tchórzewska-Cieślak Barbara

    2017-03-01

    Full Text Available The main aim of this work is to present operational problems concerning the safety of the water supply and the procedures for risk management systems functioning public water supply (CWSS and including methods of hazard identification and risk assessment. Developed a problem analysis and risk assessment, including procedures called. WSP, which is recommended by the World Health Organization (WHO as a tool for comprehensive security management of water supply from source to consumer. Water safety plan is a key element of the strategy for prevention of adverse events in CWSS.

  6. Security Policy and Developments in Central Asia : Security Documents Compared with Security Challenges

    NARCIS (Netherlands)

    Haas, de M.

    2016-01-01

    This article examines the security policy of the Central Asian (CA) states, by comparing theory (security documents) with practice (the actual security challenges). The lack of CA regional (security) cooperation and authoritarian rule puts political and economic stability at stake. The internal and

  7. On the Security of Data Collection and Transmission from Wireless Sensor Networks in the Context of Internet of Things

    OpenAIRE

    Yu, Hong; He, Jingsha; Liu, Ruohong; Ji, Dajie

    2013-01-01

    In the context of Internet of Things (IoT), multiple cooperative nodes in wireless sensor networks (WSNs) can be used to monitor an event, jointly generate a report and then send it to one or more Internet nodes for further processing. A primary security requirement in such applications is that every event data report be authenticated to intended Internet users and effectively filtered on its way to the Internet users to realize the security of data collection and transmission from the WSN. H...

  8. NATO-EU PARTNERSHIP: FOSTERING RESILIENCE FOR A COOPERATIVE SECURITY SPACE

    Directory of Open Access Journals (Sweden)

    Octavia MOISE

    2017-12-01

    Full Text Available Present events indicate an encompassing process of multi-level changes - political, military, economic, and technological that highlights the idea that we are going through a phase of transition at systemic level that is redesigning the structure of power of the 21st century. This paper will try to find out first if the cooperative security concept can be seen as a security theory according to Baldwin’s criteria and second if NATO’s partnership policy in general and the NATO EU partnership in particular can foster resilience. The objectives of this article are to envisage the role of the NATO-EU partnership in the future by: reviewing the theoretical approaches on cooperative security, analysing NATO’s partnership policy, analysing the ability of NATO-EU partnership to foster resilience.

  9. Clinical and Economic Burden of Revision Knee Arthroplasty

    Directory of Open Access Journals (Sweden)

    Mohit Bhandari

    2012-01-01

    Full Text Available Surgery is indicated for symptomatic knee osteoarthritis (OA when conservative measures are unsuccessful. High tibial osteotomy (HTO, unicompartmental knee arthroplasty (UKA, and total knee arthroplasty (TKA are surgical options intended to relieve knee OA pain and dysfunction. The choice of surgical intervention is dependent on several factors such as disease location, patient age, comorbidities, and activity levels. Regardless of surgical treatment, complications such as infection, loosening or lysis, periprosthetic fracture, and postoperative pain are known risks and are indications for revision surgery. The clinical and economic implications for revision surgery are underappreciated. Over 55,000 revision surgeries were performed in 2010 in the US, with 48% of these revisions in patients under 65 years. Total costs associated with each revision TKA surgery have been estimated to be in excess of $49,000. The current annual economic burden of revision knee OA surgery is $2.7 billion for hospital charges alone. By 2030, assuming a 5-fold increase in the number of revision procedures, this economic burden will exceed $13 billion annually. It is appealing to envision a therapy that could delay or obviate the need for arthroplasty. From an actuarial standpoint, this would have the theoretical downstream effect of substantially reducing the number of revision procedures. Although no known therapies currently meet these criteria, such a breakthrough would have a tremendous impact in lessening the clinical and economic burden of knee OA revision surgery.

  10. Distinguishing Between Private Law and Social-Security Law in ...

    African Journals Online (AJOL)

    This article attempts to highlight the potential danger in applying private-law principles to social-security law in deciding whether or not social grants should be deducted from awards for damages. Typically, this issue comes to the fore where a damage-causing event, such as death, sets into motion a system that provides for ...

  11. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  12. Insurance Cover for Revised Nuclear Liability

    International Nuclear Information System (INIS)

    Reitsma, S. M. S.

    2008-01-01

    The financial security to be provided to victims of an incident at a nuclear installation is the main objective of international nuclear liability conventions. As from the introduction of the Paris Convention on Third Party Liability in the Field of Nuclear Energy in 1960 and the Vienna Convention on Liability for Nuclear Damage in 1963 insurers have been prepared to provide the financial capacity needed to cover the liability under both conventions. They did so in close co-operation with the competent national and international authorities, which has resulted in the insurability of as much of the nuclear liability under the conventions as possible. This tradition of co-operation between authorities and insurers was extended to include the revision negotiations regarding the above conventions, which were concluded in 1997 and 2004 respectively. This has resulted in the insurability of by far the largest part of the convention based liability. However, some heads of damage have been introduced about which insurers had expressed concerns as to their likelihood to attract insurance support. In view of the explicit choice by Convention States to include the uninsurable heads of damage into the revised conventions one would expect that liability for them would fall upon national Governments. This would reflect practice in a number of States, which already assume liability for uninsurable mandatory liabilities for a long time. Nonetheless some other States now seem reluctant to do so, the resulting deadlock having a tendency to manifest itself in a negative perception of the insurance industry. Insurers are therefore appreciative of the forum provided by the CNS to once again explain the areas where problems as regards insurability have arisen and why this is the case. This presentation will show that those areas are few in number and notably relate to a limited number of environmental damages as well as the extension of prescription periods. Furthermore, thoughts will

  13. Humeral windows in revision total elbow arthroplasty.

    Science.gov (United States)

    Peach, Chris A; Salama, Amir; Stanley, David

    2016-04-01

    The use of cortical windows for revision elbow arthroplasty has not previously been widely reported. Their use aids safe revision of a well fixed humeral prosthesis and can be used in the setting of dislocation, periprosthetic fracture or aseptic loosening of the ulnar component. We describe our technique and results of cortical windows in the distal humerus for revision elbow arthroplasty surgery.

  14. Upgrading the electrical system of the IEA-R1 reactor to avoid triggering event of accidents

    International Nuclear Information System (INIS)

    Mello, Jose Roberto de; Madi Filho, Tufic

    2015-01-01

    The IEA-R1 research reactor at the Institute of Energy and Nuclear Research (IPEN) is a research reactor open pool type, built and designed by the American firm 'Babcox and Wilcox', having as coolant and moderator demineralized light water and Beryllium and graphite, as reflectors. The power supply system is designed to meet the electricity demand required by the loads of the reactor (Security systems and systems not related to security) in different situations the plant can meet, such as during startup, normal operation at power, shutdown, maintenance, exchange of fuel elements and accident situations. Studies have been done on possible accident initiating events and deterministic techniques were applied to assess the consequences of such incidents. Thus, the methods used to identify and select the accident initiating events, the methods of analysis of accidents, including sequence of events, transient analysis and radiological consequences, have been described. Finally, acceptance criteria of radiological doses are described. Only a brief summary of the item concerning loss of electrical power will be presented. The loss of normal electrical power at the IEA-R1 reactor is very common. In the case of Electric External Power Loss, at the IEA-R1 reactor building, there may be different sequences of events, as described below. When the supply of external energy in the IEA-R1 facility fails, the Electrical Distribution Vital System, consisting of 4 (four) generators type 'UPS', starts operation, immediately and it will continue supplying power to the reactor control table, core cooling system and other security systems. To contribute to security, in the electric power failure, starts to operate the Emergency Cooling System (SRE). SRE has the function of removing residual heat from the core to prevent the melting of fuel elements in the event of loss of refrigerant to the core. Adding to the generators with batteries group system, new auxiliary

  15. Diet History Questionnaire: Database Revision History

    Science.gov (United States)

    The following details all additions and revisions made to the DHQ nutrient and food database. This revision history is provided as a reference for investigators who may have performed analyses with a previous release of the database.

  16. Information support for major public events

    International Nuclear Information System (INIS)

    2010-01-01

    The unique capabilities of the IAEA illicit trafficking database is used to provide information on and assesment of illicit trafficking and other unauthorized activities involving nuclear and other radioactive materials to national authorities in charge of nuclear security of major public events. The information communicated to state parties cooperating with IAEA is on incidences confirmed to the agency on illicit trafficking of nuclear and other radioactive materials and also incidences reported in open sources which have not been confirmed.

  17. The Change in The Activity of The American Intelligence Services in The Security Context of the Last 24 Years

    Directory of Open Access Journals (Sweden)

    Georgescu - Stefan

    2014-11-01

    Full Text Available The security events dynamics poses an overwhelming challenge for the decision makers’political agenda, priorities. The wide range of risks and rhythm of significant security events determine a difficult enterprise for security theories. A scientific analysis of the security evolutions entails a profound historical introspection and an appropriate understanding of the security events with significant impact over the global evolutions. Probably in the next period of time, hundreds of papers will be written regarding the period since 9/11. The aim of this paper is to provide a perspective over the security context, and the intelligence services activity of the last 15 years, period of time dramatically divided by the unprecedented shock and suffering in the history of the from 9/11. The reorganization of the Western Intelligence Community was ordered as a result of the September 11th attacks and with future counterterrorism efforts in mind. Specifically, the 9/11 terrorists exploited the wall between the U.S.’s foreign and domestic intelligence collection efforts, and yet the IRTPA and EO 12333 avoid the issue of how to best integrate foreign and domestic intelligence while minimizing the threat to civil liberties. This manner in which the Western Countries separates its foreign and domestic intelligence collection is particularly exploitable by terrorists and non-state actors–those currently posing one of the most serious threats to international security. To ensure both the best intelligence integration possible as well as the defense of civil liberties, clear and sensible rules should be formed which dictate how intelligence from these two spheres is collected and in what way and at what level it is integrated and disseminated.

  18. Revision surgery for failed thermal capsulorrhaphy.

    Science.gov (United States)

    Park, Hyung Bin; Yokota, Atsushi; Gill, Harpreet S; El Rassi, George; McFarland, Edward G

    2005-09-01

    With the failure of thermal capsulorrhaphy for shoulder instability, there have been concerns with capsular thinning and capsular necrosis affecting revision surgery. To report the findings at revision surgery for failed thermal capsulorrhaphy and to evaluate the technical effects on subsequent revision capsular plication. Case series; Level of evidence, 4. Fourteen patients underwent arthroscopic evaluation and open reconstruction for a failed thermal capsulorrhaphy. The cause of the failure, the quality of the capsule, and the ability to suture the capsule were recorded. The patients were evaluated at follow-up for failure, which was defined as recurrent subluxations or dislocations. The origin of the instability was traumatic (n = 6) or atraumatic (n = 8). At revision surgery in the traumatic group, 4 patients sustained failure of the Bankart repair with capsular laxity, and the others experienced capsular laxity alone. In the atraumatic group, all patients experienced capsular laxity as the cause of failure. Of the 14 patients, the capsule quality was judged to be thin in 5 patients and ablated in 1 patient. A glenoid-based capsular shift could be accomplished in all 14 patients. At follow-up (mean, 35.4 months; range, 22 to 48 months), 1 patient underwent revision surgery and 1 patient had a subluxation, resulting in a failure rate of 14%. Recurrent capsular laxity after failed thermal capsular shrinkage is common and frequently associated with capsular thinning. In most instances, the capsule quality does not appear to technically affect the revision procedure.

  19. Physical Protection of Nuclear Material and Nuclear Facilities (Implementation of INFCIRC/225/Revision 5). Implementing Guide

    International Nuclear Information System (INIS)

    2018-01-01

    This publication is the lead Implementing Guide in a suite of guidance on implementing the Nuclear Security Recommendations on Physical Protection of Nuclear Material and Nuclear Facilities (INFCIRC/225/Revision 5), IAEA Nuclear Security Series No. 13. It provides guidance and suggestions to assist States and their competent authorities in establishing, strengthening and sustaining their national physical protection regime and implementing the associated systems and measures, including operators’ physical protection systems. The structure of this publication is as follows. After this introduction, Section 2 describes the objectives of physical protection and the overall approach to managing the risks of the unauthorized removal of nuclear material and the sabotage of nuclear facilities. Section 3 provides guidance for the State and its competent authorities on the physical protection elements of the nuclear security regime; this guidance is based on the fundamental principles set out in the Recommendations publication. Section 4 provides guidance on the operator’s physical protection system and describes a systematic, integrated approach. Appendix I gives an annotated outline of the typical contents of an operator’s security plan. Appendix II provides similar guidance for the contingency plan. Appendix III provides a description of nuclear material aggregation that can be used to categorize nuclear material and determine the appropriate level of protection against unauthorized removal. Appendix IV presents a table of paragraph cross-references between the Recommendations publication and this Implementing Guide.

  20. Security for Show? The Militarisation of Public Space in Light of the 2016 Rio Olympic Games

    Directory of Open Access Journals (Sweden)

    Veronica F. Azzi

    Full Text Available Abstract This article aims to analyse the increasing militarisation of public space in the Brazilian city of Rio de Janeiro, particularly on the eve of the 2016 Olympics. To this end, I briefly discuss how the concept of militarisation has been historically approached in the International Relations literature, namely within the security field. In the first section, I address the nature of the domestic security challenges Brazil faces as a developing country. In the second section, I show that the public security challenge of organised crime in Rio was securitised and confronted by increasing militarisation over the years as a result of a specific model of neo-liberal social control carried out by the country. I then analyse Brazil’s Olympics security scheme carried out in order to portray Rio as a safe city to the world. In the last section, I highlight the contradictions between accounts on the collapse in domestic security vis-à-vis official government statements to the international media to assure that ‘nothing would go wrong’ during the mega sports event. The idea is to show how the militarisation of public security, rather than mere governmental efforts to signal stability to the international community during the Olympics, is a trend likely to outlast the event that implies not only, but mainly, the perpetuation of insecurity.

  1. Lawsuits After Primary and Revision Total Hip Arthroplasties: A Malpractice Claims Analysis.

    Science.gov (United States)

    Patterson, Diana C; Grelsamer, Ronald P; Bronson, Michael J; Moucha, Calin S

    2017-10-01

    As the prevalence of total hip arthroplasty (THA) expands, so too will complications and patient dissatisfaction. The goal of this study was to identify the common etiologies of malpractice suits and costs of claims after primary and revision THAs. Analysis of 115 malpractice claims filed for alleged neglectful primary and revision THA surgeries by orthopedic surgeons insured by a large New York state malpractice carrier between 1983 and 2011. The incidence of malpractice claims filed for negligent THA procedures is only 0.15% per year in our population. In primary cases, nerve injury ("foot drop") was the most frequent allegation with 27 claims. Negligent surgery causing dislocation was alleged in 18 and leg length discrepancy in 14. Medical complications were also reported, including 3 thromboembolic events and 6 deaths. In revision cases, dislocation and infection were the most common source of suits. The average indemnity payment was $386,153 and the largest single settlement was $4.1 million for an arterial injury resulting in amputation after a primary hip replacement. The average litigation cost to the insurer was $61,833. Nerve injury, dislocation, and leg length discrepancy are the most common reason for malpractice after primary THA. Orthopedic surgeons should continue to focus on minimizing the occurrence of these complications while adequately incorporating details about the risks and limitations of surgery into their preoperative education. Copyright © 2017 Elsevier Inc. All rights reserved.

  2. NEPP Update of Independent Single Event Upset Field Programmable Gate Array Testing

    Science.gov (United States)

    Berg, Melanie; Label, Kenneth; Campola, Michael; Pellish, Jonathan

    2017-01-01

    This presentation provides a NASA Electronic Parts and Packaging (NEPP) Program update of independent Single Event Upset (SEU) Field Programmable Gate Array (FPGA) testing including FPGA test guidelines, Microsemi RTG4 heavy-ion results, Xilinx Kintex-UltraScale heavy-ion results, Xilinx UltraScale+ single event effect (SEE) test plans, development of a new methodology for characterizing SEU system response, and NEPP involvement with FPGA security and trust.

  3. IAEA Activities in Nuclear Security, 18 April 2013, Delft, The Netherlands

    International Nuclear Information System (INIS)

    Amano, Y.

    2013-01-01

    I am pleased to take part in this event marking the launch of the new Masters Programme in Nuclear Security at the Reactor Institute Delft. The Institute has been an IAEA Collaborating Centre for nearly four years. Our two organisations have worked closely together in training and research, as well as in areas such as establishing quality management systems at nuclear analytical laboratories in IAEA Member States. The launch of the new Masters Programme in Nuclear Security by the Delft University of Technology marks a new stage in our cooperation. Four other European universities are also taking part in the programme: the University of Oslo, the Technical University of Vienna, the Brandenburg University of Applied Sciences, and the University of Manchester Dalton Nuclear Institute. I am pleased that the syllabus for the course has been developed from the IAEA's Educational Programme in Nuclear Security. I commend this effort to train a new generation of experts who can help to improve global nuclear security. Strengthening nuclear security throughout the world remains a challenge for all of us. National governments have primary responsibility for nuclear security, but international cooperation is vital.

  4. Conference on the security of electricity supply: France-Germany crossed views

    International Nuclear Information System (INIS)

    Caron, Antoine; Kaelble, Laure; Maurer, Christoph; Veyrenc, Thomas; Roques, Fabien; Jacquemart, Yannick; John, Oliver

    2015-01-01

    The French-German office for Renewable energies (OFAEnR), in cooperation with the French transmission system operator - RTE, organised a conference on security of electricity supply in France and in Germany. In the framework of this French-German exchange of experience, about 160 participants exchanged their views on the following topics: the regulatory framework and the legal instruments for ensuring the security of supply, the role of energy transmission system operators, the role of renewable energies in the electricity market and their impact on the security of supplies. This document brings together the available presentations (slides) made during this event: 1 - Security of supply and electricity markets (Antoine Caron); 2 - White Paper on electricity Market Design (Laure Kaelble); 3 - Security of Supply - Concept and Definition: On the Way to a Common Understanding? (Christoph Maurer); 4 - The French capacity market: lessons learnt and way forward (Thomas Veyrenc); 5 - electricity market evolutions: divergencies and compatibilities between French and German models? (Fabien Roques); 6 - Infrastructures and European coordination: action of the French transmission system operator - RTE (Yannick Jacquemart); 7 - Interconnection and Security of Supply - experiences of the German TSO Amprion at the French-German Border (Oliver John)

  5. Global energy issues and Swedish security policy; Globala energifraagor och svensk saekerhetspolitik

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    An important part of the Swedish Energy Agency's world surveillance is to identify trends that may affect Sweden's security of energy supply. Sweden can not be considered in isolation with its own energy supply, but is affected much by what happens if the global energy flows are disturbed by conflicts or weather-related events. Several different policy areas influence the energy markets, in addition to the energy and environmental policy. Geopolitical events of the last few years have more and more focused on power over energy resources. To get a comprehensive picture of the global energy situation, the Agency has engaged the Royal Military Sciences to produce a report that describes the 'Global Energy Issues and Swedish Security Policy'. The report's starting point is to describe how global events affect European and Swedish energy supply and security policy. Descriptions and analysis in the report are the authors own conclusions and need not always be the Agency's official views. The political environment that the report deals with is constantly changing, why some facts and circumstances may have changed since the report was completed. During the final preparation of the report, the scene changed in Moscow. On May 8, Vladimir Putin once again was appointed a position as Russia's president. The former president Medvedev, at the same time, takes over as Prime Minister.

  6. World Health Organization definition of myocardial infarction: 2008-09 revision.

    Science.gov (United States)

    Mendis, Shanthi; Thygesen, Kristian; Kuulasmaa, Kari; Giampaoli, Simona; Mähönen, Markku; Ngu Blackett, Kathleen; Lisheng, Liu

    2011-02-01

    WHO has played a leading role in the formulation and promulgation of standard criteria for the diagnosis of coronary heart disease and myocardial infarction since early 1970s. The revised definition takes into consideration the following: well-resourced settings can use the ESC/ACC/AHA/WHF definition, which has new biomarkers as a compulsory feature; in resource-constrained settings, a typical biomarker pattern cannot be made a compulsory feature as the necessary assays may not be available; the definition must also have provision for diagnosing non-fatal events with incomplete information on cardiac biomarkers and the ECG; to facilitate epidemiologic monitoring definition must recognize fatal events with incomplete or no information on cardiac biomarkers and/or ECG and/or autopsy and/or coronary angiography. Category A definition is the same as ESC/ACC/AHA/WHF definition of MI, and can be applied to settings with no resource constraints. Category B definition of MI is to be applied whenever there is incomplete information on cardiac bio-markers together with symptoms of ischaemia and the development of unequivocal pathological Q waves. Category C definition (probable MI) is to be applied when individuals with MI may not satisfy Category A or B definitions because of delayed access to medical services and/or unavailability of electrocardiography and/or laboratory assay of cardiac biomarkers. In these situations, the term probable MI should be used when there is either ECG changes suggestive of MI or incomplete information on cardiac biomarkers in a person with symptoms of ischaemia with no evidence of a non-coronary reason. This article presents the 2008-09 revision of the World Health Organization (WHO) definition of myocardial infarction (MI) developed at a WHO expert consultation.

  7. 17 CFR 240.10b-18 - Purchases of certain equity securities by the issuer and others.

    Science.gov (United States)

    2010-04-01

    ... authorize Rule 10b-18 purchases by or on behalf of the issuer. (4) Agent independent of the issuer has the... trading volume for that security or, in the event that trading volume data are unavailable, is at least 20... of the security, exclusive of any shares owned by any affiliate; Provided, however, That a block...

  8. Threats or threads: from usable security to secure experience

    DEFF Research Database (Denmark)

    Bødker, Susanne; Mathiasen, Niels Raabjerg

    2008-01-01

    While the domain of security dependent technologies brings new challenges to HCI research it seems that the results and breakthroughs of HCI have not been used in design of security dependent technologies. With exceptions, work in the research field of usable security may be criticized for focusing...... mainly on adjusting user behavior to behave securely. With our background in newer HCI perspectives we address secure interaction from the perspective of security technology as experience. We analyze a number of collected user stories to understand what happens when everyday users encounter security...... dependent technologies. We apply McCarthy & Wright's [12] experience framework to the security domain and our collected stories. We point out that there are significant differences between being secure and having a secure experience, and conclude that classical usable security, focus on people's immediate...

  9. Alendronate treatment in the revision setting, with and without controlled implant motion

    DEFF Research Database (Denmark)

    Søballe, Kjeld; Chen, Xinqian; Jensen, Thomas B

    2007-01-01

    Introduction Bisphosphonates have been proposed to delay or prevent loosening of joint replacement implants by reducing bone resorption. It is known, however, that implant motion prevents the bone anchorage necessary to maintain secure implant fixation. Methods We used our experimental implant...... conditions, even with alendronate. With alendronate and stabilized implants, increased bone was observed near the sclerotic shell of the revision cavity, but it was reduced with alendronate when the implant was unstable. Interpretation Our findings suggest that it may be difficult for alendronate...... administration alone to rescue implants that are already loose. In implants that have not progressed to loosening, alendronate may increase bone density at the border with the sclerotic shell, but the effect of this bone in delaying eventual loosening is not known. Udgivelsesdato: 2007-Dec...

  10. Scenario-based approach to risk analysis in support of cyber security

    Energy Technology Data Exchange (ETDEWEB)

    Gertman, D. I.; Folkers, R.; Roberts, J. [Idaho National Laboratory, Roberts and Folkers Associates, LLC, Idaho Falls, ID 83404 (United States)

    2006-07-01

    The US infrastructure is continually challenged by hostile nation states and others who would do us harm. Cyber vulnerabilities and weaknesses are potential targets and are the result of years of construction and technological improvement in a world less concerned with security than is currently the case. As a result, cyber attack presents a class of challenges for which we are just beginning to prepare. What has been done in the nuclear, chemical and energy sectors as a means of anticipating and preparing for randomly occurring accidents and off-normal events is to develop scenarios as a means by which to prioritize and quantify risk and to take action. However, the number of scenarios risk analysts can develop is almost limitless. How do we ascertain which scenario has the greatest merit? One of the more important contributions of probabilistic risk analysis (PRA) has been to quantify the initiating event probability associated with various classes of accidents; and to quantify the occurrence of various conditions, i.e., end-states, as a function of these important accident sequences. Typically, various classes of conditions are represented by scenarios and are quantified in terms of cut sets and binned into end states. For example, the nuclear industry has a well-defined set of initiating events that are studied in assessing risk. The maturation of risk analysis for cyber security from accounting for barriers or looking at conditions statically to one of ascertaining the probability associated with certain events is, in part, dependent upon the adoption of a scenario-based approach. For example, scenarios take into account threats to personnel and public safety; economic damage, and compromises to major operational and safety functions. Scenarios reflect system, equipment, and component configurations as well as key human-system interactions related to event detection, diagnosis, mitigation and restoration of systems. As part of a cyber attack directed toward

  11. Scenario-based approach to risk analysis in support of cyber security

    International Nuclear Information System (INIS)

    Gertman, D. I.; Folkers, R.; Roberts, J.

    2006-01-01

    The US infrastructure is continually challenged by hostile nation states and others who would do us harm. Cyber vulnerabilities and weaknesses are potential targets and are the result of years of construction and technological improvement in a world less concerned with security than is currently the case. As a result, cyber attack presents a class of challenges for which we are just beginning to prepare. What has been done in the nuclear, chemical and energy sectors as a means of anticipating and preparing for randomly occurring accidents and off-normal events is to develop scenarios as a means by which to prioritize and quantify risk and to take action. However, the number of scenarios risk analysts can develop is almost limitless. How do we ascertain which scenario has the greatest merit? One of the more important contributions of probabilistic risk analysis (PRA) has been to quantify the initiating event probability associated with various classes of accidents; and to quantify the occurrence of various conditions, i.e., end-states, as a function of these important accident sequences. Typically, various classes of conditions are represented by scenarios and are quantified in terms of cut sets and binned into end states. For example, the nuclear industry has a well-defined set of initiating events that are studied in assessing risk. The maturation of risk analysis for cyber security from accounting for barriers or looking at conditions statically to one of ascertaining the probability associated with certain events is, in part, dependent upon the adoption of a scenario-based approach. For example, scenarios take into account threats to personnel and public safety; economic damage, and compromises to major operational and safety functions. Scenarios reflect system, equipment, and component configurations as well as key human-system interactions related to event detection, diagnosis, mitigation and restoration of systems. As part of a cyber attack directed toward

  12. Introductory Business Textbook Revision Cycles: Are They Getting Shorter?

    Science.gov (United States)

    Zinser, Brian; Brunswick, Gary

    2010-01-01

    The rate of textbook revision cycles is examined in light of the recent trend towards more rapid revisions (and adoptions of textbooks). The authors conduct background research to better understand the context for textbook revision cycles and the environmental forces that have been influencing what appears to be more rapid textbook revisions. A…

  13. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  14. Revised Rules for Concrete Bridges

    DEFF Research Database (Denmark)

    Thoft-Christensen, Palle; Jensen, F. M.; Middleton, C.

    This paper is based on research performed for the Highway Agency, London, UK under the project DPU/9/44 "Revision of Bridge Assessment Rules Based on Whole Life Performance: Concrete Bridges" It contains details of a methodology which can be used to generate Whole Life (WL) reliability profiles....... These WL reliability profiles may be used to establish revised rules for Concrete Bridges....

  15. Bayesian analysis of rare events

    Energy Technology Data Exchange (ETDEWEB)

    Straub, Daniel, E-mail: straub@tum.de; Papaioannou, Iason; Betz, Wolfgang

    2016-06-01

    In many areas of engineering and science there is an interest in predicting the probability of rare events, in particular in applications related to safety and security. Increasingly, such predictions are made through computer models of physical systems in an uncertainty quantification framework. Additionally, with advances in IT, monitoring and sensor technology, an increasing amount of data on the performance of the systems is collected. This data can be used to reduce uncertainty, improve the probability estimates and consequently enhance the management of rare events and associated risks. Bayesian analysis is the ideal method to include the data into the probabilistic model. It ensures a consistent probabilistic treatment of uncertainty, which is central in the prediction of rare events, where extrapolation from the domain of observation is common. We present a framework for performing Bayesian updating of rare event probabilities, termed BUS. It is based on a reinterpretation of the classical rejection-sampling approach to Bayesian analysis, which enables the use of established methods for estimating probabilities of rare events. By drawing upon these methods, the framework makes use of their computational efficiency. These methods include the First-Order Reliability Method (FORM), tailored importance sampling (IS) methods and Subset Simulation (SuS). In this contribution, we briefly review these methods in the context of the BUS framework and investigate their applicability to Bayesian analysis of rare events in different settings. We find that, for some applications, FORM can be highly efficient and is surprisingly accurate, enabling Bayesian analysis of rare events with just a few model evaluations. In a general setting, BUS implemented through IS and SuS is more robust and flexible.

  16. ORDER SECURITY – NATIONAL SECURITY ADMINISTRATION. NATIONAL SECURITY DEFENSE AS SPECIAL ADMINISTRATION

    OpenAIRE

    Zoltán BALLA

    2009-01-01

    National security administration is the special executivedisposal activity of the national security agencies, the section of the state administration that helps the governmental work by reconnoitering and preventing with secret-servicing methods of the risks that shall harm or endanger the national security’s interests. The main operational principles of national security governing are the followings among others: - controlling the operation of national security organization belongs to the ex...

  17. Computer Security: Security operations at CERN (4/4)

    CERN Document Server

    CERN. Geneva

    2012-01-01

    Stefan Lueders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and infrastructure control systems against cyber-threats. Subsequently, he joined the CERN Computer Security Incident Response Team and is today heading this team as CERN's Computer Security Officer with the mandate to coordinate all aspects of CERN's computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN's operational needs. Dr. Lueders has presented on these topics at many different occasions to international bodies, governments, and companies, and published several articles. With the prevalence of modern information technologies and...

  18. NS [Nuclear Safety] update. Current safety and security activities and developments taking place in the Department of Nuclear Safety and Security, Issue no. 11, June 2009

    International Nuclear Information System (INIS)

    2009-06-01

    The current issue presents information about the following topics: Nuclear Safety Review for the Year 2008; Feedback from IRS Topical Studies and Events Applied to Safety Standards; Education and Training Programmes at the IAEA Department of Nuclear Safety and Security; Peer Review of Operational Safety Performance (PROSPER)

  19. Inferential revision in narrative texts: An ERP study.

    Science.gov (United States)

    Pérez, Ana; Cain, Kate; Castellanos, María C; Bajo, Teresa

    2015-11-01

    We evaluated the process of inferential revision during text comprehension in adults. Participants with high or low working memory read short texts, in which the introduction supported two plausible concepts (e.g., 'guitar/violin'), although one was more probable ('guitar'). There were three possible continuations: a neutral sentence, which did not refer back to either concept; a no-revise sentence, which referred to a general property consistent with either concept (e.g., '…beautiful curved body'); and a revise sentence, which referred to a property that was consistent with only the less likely concept (e.g., '…matching bow'). Readers took longer to read the sentence in the revise condition, indicating that they were able to evaluate their comprehension and detect a mismatch. In a final sentence, a target noun referred to the alternative concept supported in the revise condition (e.g., 'violin'). ERPs indicated that both working memory groups were able to evaluate their comprehension of the text (P3a), but only high working memory readers were able to revise their initial incorrect interpretation (P3b) and integrate the new information (N400) when reading the revise sentence. Low working memory readers had difficulties inhibiting the no-longer-relevant interpretation and thus failed to revise their situation model, and they experienced problems integrating semantically related information into an accurate memory representation.

  20. CHANGES IN THE SECURITY AGENDA: CRITICAL SECURITY STUDIES AND HUMAN SECURITY. THE CASE OF CHINA

    Directory of Open Access Journals (Sweden)

    Nguyen THI THUY HANG

    2012-06-01

    Full Text Available Since the end of the Cold War the meaning of security has fundamentally changed. Issues which are labeled as non-traditional security namely human development, economic crises, environmental degradation, natural disaster, poverty, epidemics… have become a crucial part of the security agenda. These changes have been intensified with the development of the two approaches: Critical Security Studies and Human Security. This article explores how the meaning of security has changed and how the boundaries between traditional and non-traditional security have become blurred. The case of China is taken as empirical evidence to support the assertion that security has evolved beyond its traditional focus on the state.

  1. Programme for the Environmental Control at the Swedish Nuclear Facilities, Revision; Omgivningskontrollprogram foer de kaerntekniska anlaeggningarna, revision

    Energy Technology Data Exchange (ETDEWEB)

    Linden, Ann-Marie

    2004-12-01

    This report contains a revised version of the Environmental Monitoring Programme for the Swedish Nuclear Facilities. The revision is based on earlier experiences and evaluations. Some samples have been excluded. Some have been added, for example spruce cone and the food products apple and currant. The sediment samples of 2 cm length have been completed with samples of 10 cm length every fourth year to follow the migration of radio nuclides down the sediment layers over time. The revised Environmental Monitoring Programme is valid from the 1st of January 2005.

  2. An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment

    Science.gov (United States)

    Dorairaj, Sudha Devi; Kaliannan, Thilagavathy

    2015-01-01

    Cloud computing is renowned for delivering information technology services based on internet. Nowadays, organizations are interested in moving their massive data and computations into cloud to reap their significant benefits of on demand service, resource pooling, and rapid elasticity that helps to satisfy the dynamically changing infrastructure demand without the burden of owning, managing, and maintaining it. Since the data needs to be secured throughout its life cycle, security of the data in cloud is a major challenge to be concentrated on because the data is in third party's premises. Any uniform simple or high level security method for all the data either compromises the sensitive data or proves to be too costly with increased overhead. Any common multiple method for all data becomes vulnerable when the common security pattern is identified at the event of successful attack on any information and also encourages more attacks on all other data. This paper suggests an adaptive multilevel security framework based on cryptography techniques that provide adequate security for the classified data stored in cloud. The proposed security system acclimates well for cloud environment and is also customizable and more reliant to meet the required level of security of data with different sensitivity that changes with business needs and commercial conditions. PMID:26258165

  3. An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment

    Directory of Open Access Journals (Sweden)

    Sudha Devi Dorairaj

    2015-01-01

    Full Text Available Cloud computing is renowned for delivering information technology services based on internet. Nowadays, organizations are interested in moving their massive data and computations into cloud to reap their significant benefits of on demand service, resource pooling, and rapid elasticity that helps to satisfy the dynamically changing infrastructure demand without the burden of owning, managing, and maintaining it. Since the data needs to be secured throughout its life cycle, security of the data in cloud is a major challenge to be concentrated on because the data is in third party’s premises. Any uniform simple or high level security method for all the data either compromises the sensitive data or proves to be too costly with increased overhead. Any common multiple method for all data becomes vulnerable when the common security pattern is identified at the event of successful attack on any information and also encourages more attacks on all other data. This paper suggests an adaptive multilevel security framework based on cryptography techniques that provide adequate security for the classified data stored in cloud. The proposed security system acclimates well for cloud environment and is also customizable and more reliant to meet the required level of security of data with different sensitivity that changes with business needs and commercial conditions.

  4. An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment.

    Science.gov (United States)

    Dorairaj, Sudha Devi; Kaliannan, Thilagavathy

    2015-01-01

    Cloud computing is renowned for delivering information technology services based on internet. Nowadays, organizations are interested in moving their massive data and computations into cloud to reap their significant benefits of on demand service, resource pooling, and rapid elasticity that helps to satisfy the dynamically changing infrastructure demand without the burden of owning, managing, and maintaining it. Since the data needs to be secured throughout its life cycle, security of the data in cloud is a major challenge to be concentrated on because the data is in third party's premises. Any uniform simple or high level security method for all the data either compromises the sensitive data or proves to be too costly with increased overhead. Any common multiple method for all data becomes vulnerable when the common security pattern is identified at the event of successful attack on any information and also encourages more attacks on all other data. This paper suggests an adaptive multilevel security framework based on cryptography techniques that provide adequate security for the classified data stored in cloud. The proposed security system acclimates well for cloud environment and is also customizable and more reliant to meet the required level of security of data with different sensitivity that changes with business needs and commercial conditions.

  5. Mother-Child Attachment From Infancy to the Preschool Years: Predicting Security and Stability.

    Science.gov (United States)

    Meins, Elizabeth; Bureau, Jean-François; Fernyhough, Charles

    2018-05-01

    Relations between maternal mind-mindedness (appropriate and nonattuned mind-related comments), children's age-2 perspective-taking abilities, and attachment security at 44 (n = 165) and 51 (n = 128) months were investigated. Nonattuned comments predicted insecure preschool attachment, via insecure 15-month attachment security (44-month attachment) and poorer age-2 perspective-taking abilities (51-month attachment). With regard to attachment stability, higher perspective-taking abilities distinguished the stable secure groups from (a) the stable insecure groups and (b) children who changed from secure to insecure (at trend level). These effects were independent of child gender, stressful life events, and socioeconomic status (SES). The contribution of these findings to our understanding of stability and change in attachment security from infancy to the preschool years is discussed. © 2017 The Authors. Child Development © 2017 Society for Research in Child Development, Inc.

  6. THE INTRASTATE CONFLICT AND ITS EFFECTS TO THE INTERNATIONAL SECURITY: SOMALIA BETWEEN 2007 AND 2010

    Directory of Open Access Journals (Sweden)

    ALEJANDRO AMIGO TOSSI

    2017-12-01

    Full Text Available In the current international system there are a number of intra-state situations that prevent the consolidation of a safe global environment. These states are stage of a series of events whose effects go beyond its borders. Somalia represented one of these cases between 2007 and 2010 as a series of internal events generated impacts in its neighbors, the region, and the international system. According to the above, the purpose of this article is “to analyze the cause-effect relationship between phenomena occurring within Somalia and stability of neighboring countries, the Horn of Africa and international security. As a methodology, in a first phase it is described the historical background of Somalia prior to the period analyzed, then it is analyzed internal phenomena that occurred in Somalia relevant from the perspective of international security, and finally, it is stated how these phenomena caused effects on neighboring states, the region’s stability and international security.

  7. Revising Nabokov Revising”

    Directory of Open Access Journals (Sweden)

    Marie Bouchet

    2010-10-01

    Full Text Available Nabokov revised his works as he translated them and, on another plane, canon revisionism has been having its backlash and provoked other refracting waves. The purpose of the conference was to advance Nabokov studies through the discussion of how our view of Nabokov’s standing and his works today should be revised, especially after the publication of The Original of Laura. However the conference was not confined to just this theme, since “revising” is a word rich with implications. To borrow s...

  8. Rotting from Within: American Education and National Security

    Science.gov (United States)

    2011-03-04

    advantage and place its future prosperity and security at risk. Problems in America‘s Education System (K-12) Why are U.S. student doing poorly? A...nation‘s education problems. Students are fatter, slower, and weaker than their international counterparts in developed nations. Our children have...national, and international issues and events into the classroom on a regular basis.50 Additionally, educators should design programs that give

  9. Attachment security representations in institutionalized children and children living with their families: links to problem behaviour.

    Science.gov (United States)

    Torres, Nuno; Maia, Joana; Veríssimo, Manuela; Fernandes, Marilia; Silva, Filipa

    2012-01-01

    The present work analyses differences in the attachment representations of institutionalized children as compared with children from low and high educational level living with their natural families. Participants were 91 Portuguese children, 52% girls, aged 48-96 months. There were three different groups: 19 institutionalized children, 16 low educational level families' children and 56 from high educational level families'. Attachment representations were assessed for Security of the narratives of the Attachment Story Completion Task (ASCT). Psychopathological symptoms were assessed using the Child Behaviour Checklist for parents and caretakers. Verbal skills were assessed using the Wechsler Preschool and Primary Scale of Intelligence--Revised. Results show that institutionalized children have significantly lower security of attachment representations, less verbal skills and higher aggressive behaviour than the other two groups. Attachment representations were associated with social/withdrawal and aggression, independently of age, verbal skills and parents' education. The main effect of institutionalization on externalizing aggressive behaviour was completely mediated by the security of attachment representations.  Copyright © 2010 John Wiley & Sons, Ltd.

  10. Generating WS-SecurityPolicy documents via security model transformation

    DEFF Research Database (Denmark)

    Jensen, Meiko

    2009-01-01

    When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriat...... security model definition and transformation approach, targeting the WS-SecurityPolicy and WS-BPEL specifications, in order to enable a Web-Service-based secure business process development.......When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriate...

  11. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  12. Revision of failed shoulder hemiarthroplasty to reverse total arthroplasty: analysis of 157 revision implants.

    Science.gov (United States)

    Merolla, Giovanni; Wagner, Eric; Sperling, John W; Paladini, Paolo; Fabbri, Elisabetta; Porcellini, Giuseppe

    2018-01-01

    There remains a paucity of studies examining the conversion of failed hemiarthroplasty (HA) to reverse total shoulder arthroplasty (RTSA). Therefore, the purpose of this study was to examine a large series of revision HA to RTSA. A population of 157 patients who underwent conversion of a failed HA to a revision RTSA from 2006 through 2014 were included. The mean follow-up was 49 months (range, 24-121 months). The indications for revision surgery included instability with rotator cuff insufficiency (n = 127) and glenoid wear (n = 30); instability and glenoid wear were associated in 38 cases. Eight patients with infection underwent 2-stage reimplantation. Patients experienced significant improvements in their preoperative to postoperative pain and shoulder range of motion (P surgeries, secondary to glenoid component loosening (n = 3), instability (n = 3), humeral component disassembly (n = 2), humeral stem loosening (n = 1), and infection (n = 2). Implant survivorship was 95.5% at 2 years and 93.3% at 5 years. There were 4 reoperations including axillary nerve neurolysis (n = 2), heterotopic ossification removal (n = 1), and hardware removal for rupture of the metal cerclage for an acromial fracture (n = 1). At final follow-up, there were 5 "at-risk" glenoid components. Patients experience satisfactory pain relief and recovery of reasonable shoulder function after revision RTSA from a failed HA. There was a relatively low revision rate, with glenoid loosening and instability being the most common causes. Copyright © 2017 Journal of Shoulder and Elbow Surgery Board of Trustees. Published by Elsevier Inc. All rights reserved.

  13. Shaping a novel security approach in chemical industrial clusters to prevent large-scale domino events

    NARCIS (Netherlands)

    Reniers, Genserik L L; Dullaert, Wout; Soudan, Karel

    2009-01-01

    Two aspects are important when it comes to guaranteeing an effective and efficient security policy in a chemical industrial cluster. The first issue involves obtaining an acceptable level of collaboration between the different enterprises forming the cluster. The second topic is to ensure that an

  14. ENGINEERED BARRIER SYSTEM FEATURES, EVENTS AND PROCESSES

    International Nuclear Information System (INIS)

    Jaros, W.

    2005-01-01

    The purpose of this report is to evaluate and document the inclusion or exclusion of engineered barrier system (EBS) features, events, and processes (FEPs) with respect to models and analyses used to support the total system performance assessment for the license application (TSPA-LA). A screening decision, either Included or Excluded, is given for each FEP along with the technical basis for exclusion screening decisions. This information is required by the U.S. Nuclear Regulatory Commission (NRC) at 10 CFR 63.114 (d, e, and f) [DIRS 173273]. The FEPs addressed in this report deal with those features, events, and processes relevant to the EBS focusing mainly on those components and conditions exterior to the waste package and within the rock mass surrounding emplacement drifts. The components of the EBS are the drip shield, waste package, waste form, cladding, emplacement pallet, emplacement drift excavated opening (also referred to as drift opening in this report), and invert. FEPs specific to the waste package, cladding, and drip shield are addressed in separate FEP reports: for example, ''Screening of Features, Events, and Processes in Drip Shield and Waste Package Degradation'' (BSC 2005 [DIRS 174995]), ''Clad Degradation--FEPs Screening Arguments (BSC 2004 [DIRS 170019]), and Waste-Form Features, Events, and Processes'' (BSC 2004 [DIRS 170020]). For included FEPs, this report summarizes the implementation of the FEP in the TSPA-LA (i.e., how the FEP is included). For excluded FEPs, this analysis provides the technical basis for exclusion from TSPA-LA (i.e., why the FEP is excluded). This report also documents changes to the EBS FEPs list that have occurred since the previous versions of this report. These changes have resulted due to a reevaluation of the FEPs for TSPA-LA as identified in Section 1.2 of this report and described in more detail in Section 6.1.1. This revision addresses updates in Yucca Mountain Project (YMP) administrative procedures as they

  15. Pragmatic security metrics applying metametrics to information security

    CERN Document Server

    Brotby, W Krag

    2013-01-01

    Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, PRAGMATIC Security Metrics: Applying Metametrics to Information Security breaks the mold. This is the ultimate how-to-do-it guide for security metrics.Packed with time-saving tips, the book offers easy-to-follow guidance for those struggling with security metrics. Step by step, it clearly explains how to specify, develop, use, and maintain an information security measurement system (a comprehensive suite of metrics) to

  16. Revision of the DELFIC Particle Activity Module

    Energy Technology Data Exchange (ETDEWEB)

    Hooper, David A [ORNL; Jodoin, Vincent J [ORNL

    2010-09-01

    The Defense Land Fallout Interpretive Code (DELFIC) was originally released in 1968 as a tool for modeling fallout patterns and for predicting exposure rates. Despite the continual advancement of knowledge of fission yields, decay behavior of fission products, and biological dosimetry, the decay data and logic of DELFIC have remained mostly unchanged since inception. Additionally, previous code revisions caused a loss of conservation of radioactive nuclides. In this report, a new revision of the decay database and the Particle Activity Module is introduced and explained. The database upgrades discussed are replacement of the fission yields with ENDF/B-VII data as formatted in the Oak Ridge Isotope Generation (ORIGEN) code, revised decay constants, revised exposure rate multipliers, revised decay modes and branching ratios, and revised boiling point data. Included decay logic upgrades represent a correction of a flaw in the treatment of the fission yields, extension of the logic to include more complex decay modes, conservation of nuclides (including stable nuclides) at all times, and conversion of key variables to double precision for nuclide conservation. Finally, recommended future work is discussed with an emphasis on completion of the overall radiation physics upgrade, particularly for dosimetry, induced activity, decay of the actinides, and fractionation.

  17. A revised inoceramid biozonation for the Upper Cretaceous based on high-resolution carbon isotope stratigraphy in northwestern Hokkaido, Japan

    Science.gov (United States)

    Hayakawa, Tatsuya; Hirano, Hiromichi

    2013-06-01

    Hayakawa, T., Hirano, H. 2013. A revised inoceramid biozonation for the Upper Cretaceous based on high-resolution carbon isotope stratigraphy in northwestern Hokkaido, Japan. Acta Geologica Polonica, 63 (2), 239-263. Warszawa. Biostratigraphic correlations of inoceramid bivalves between the North Pacific and Euramerican provinces have been difficult because the inoceramid biostratigraphy of the Japanese strata has been based on endemic species of the northwest Pacific. In this study, carbon stable isotope fluctuations of terrestrial organic matter are assembled for the Upper Cretaceous Yezo Group in the Haboro and Obira areas, Hokkaido, Japan, in order to revise the chronology of the inoceramid biozonation in Japan. The carbon isotope curves are correlated with those of marine carbonates in English and German sections with the aid of age-diagnostic taxa. According to the correlations of the carbon isotope curves, 11 isotope events are recognised in the sections studied. As a result of these correlations, the chronology of the inoceramid biozones of the Northwest Pacific has been considerably revised. The revised inoceramid biozones suggest that the timing of the origination and extinction of the inoceramids in the North Pacific biotic province is different from the stage/substage boundaries defined by inoceramids, as used in Europe and North America.

  18. Children's Security in the Context of Family Instability and Maternal Communications

    Science.gov (United States)

    Winter, Marcia A.; Davies, Patrick T.; Cummings, E. Mark

    2010-01-01

    This multimethod study examined the association between family instability and children's internal representations of security in the family system within the context of maternal communications about disruptive family events. Participants included 224 kindergarten children (100 boys and 124 girls) and their parents. Parents reported on the…

  19. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  20. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  1. Integrating Relational Reasoning and Knowledge Revision during Reading

    Science.gov (United States)

    Kendeou, Panayiota; Butterfuss, Reese; Van Boekel, Martin; O'Brien, Edward J.

    2017-01-01

    Our goal in this theoretical contribution is to connect research on knowledge revision and relational reasoning. To achieve this goal, first, we review the "knowledge revision components framework" (KReC) that provides an account of knowledge revision processes, specifically as they unfold during reading of texts. Second, we review a…

  2. Practices on nuclear security and international cooperation

    International Nuclear Information System (INIS)

    Shen Ning

    2009-01-01

    on Integrated Management of Nuclear Materials to introduce modern technology development on nuclear safeguards, material accounting and control, and physical protection in October 2005. After the Tech Demo, a series of cooperation projects on nuclear safeguards and security were developed. To support the security of 2008 Beijing Summer Olympic Games, China Atomic Energy Authority (CAEA), worked with IAEA and the U.S. Department of Energy/National Nuclear Security Administration (DOE/NNSA), carried out trainings for the officials from public security, border control and customs, etc. for strengthening the response capabilities to the Major Public Events (MPEs) and implemented physical security upgrades and radioactive sources recovery at facilities near Olympic venues. As a partner state of the Global Initiative to Combat Nuclear Terrorism, China organized a scenario-based workshop on radioactive detection and emergency response in cooperation with U.S. in December 2007, more than 60 Participants from 20 more countries participated the workshop. To strengthen the training capability on nuclear safeguards and security, CAEA and the IAEA jointly established a 'CAEA-IAEA Joint Training Center on Nuclear Safeguards and Security' in December 2006, located at China Institute of Atomic Energy (CIAE). International Cooperation is a very important element in developing global nuclear security regime. China is willing to make continuous efforts to promoting the development of nuclear security through international cooperation. (author)

  3. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    Full Text Available The design of physical security measures is a specialized technical area that does not fall in the normal skill record and resume of commanders, architects, engineers, and project managers. This document provides guidance to those parties tasked with implementing existing and emerging physical protection system requirements: -    Creation of a single-source reference for the design and construction of physical security measures for high-risk personnel (HRP. -    Promulgation of multi-service standard recommendations and considerations. -    Potential increase of productivity of HRP and reduced temporary housing costs through clarification of considerations, guidance on planning, and provision of design solutions. -    Reduction of facility project costs. -    Better performance of modernized facilities, in terms of force protection, than original facilities. Throughout this process you must ensure: confidentiality, appropriate Public Relations, sustainability, compliance with all industrial guidelines and legal and regulatory requirement, constant review and revision to accommodate new circumstances or threats. Introduction Physical security is an extremely broad topic. It encompasses access control devices such as smart cards, air filtration and fireproofing. It is also heavily reliant on infrastructure. This means that many of the ideal physical security measures may not be economically or physically feasible for existing sites. Many businesses do not have the option of building their own facility from the ground up; thus physical security often must be integrated into an existing structure. This limits the overall set of security measures that can be installed. There is an aspect of physical security that is often overlooked; the humans that interact with it. Humans commit crime for a number of reasons. The document focuses on two building types: the HRP office and the HRP residence. HRP are personnel who are likely to be

  4. Two 'hot buttons' in gas contracting: security performance and force majeure

    International Nuclear Information System (INIS)

    Park, J.J.

    1996-01-01

    Two important developments in gas contracting issues are the 'force majeure' provisions and security for performance clauses. 'Force majeure' was defined as any acts of God or any acts of omission by a transporter of gas, which is excused by any event not within the control of the party claiming suspension. 'Force majeure' provisions need to be specifically negotiated in every case. These issues often arise in gas contracting situations, but the nature of Canada's non-litigious oil and gas industry is such that we have had little or no Canadian case law to assist in interpreting what these clauses mean. The 'force majeure' clause is basically meant to protect the parties from events outside normal business risk. The security of performance issue arises when the obligation of a supplier of gas to perform, and the obligation of a buyer of gas to pay, is unsecured, as would be the case for example, if one of the parties becomes bankrupt

  5. Sequence Coding and Search System for licensee event reports: user's guide. Volume 1, Revision 1

    International Nuclear Information System (INIS)

    Greene, N.M.; Mays, G.T.; Johnson, M.P.

    1985-04-01

    Operating experience data from nuclear power plants are essential for safety and reliability analyses, especially analyses of trends and patterns. The licensee event reports (LERs) that are submitted to the Nuclear Regulatory Commission (NRC) by the nuclear power plant utilities contain much of this data. The NRC's Office for Analysis and Evaluation of Operational Data (AEOD) has developed, under contract with NSIC, a system for codifying the events reported in the LERs. The primary objective of the Sequence Coding and Search System (SCSS) is to reduce the descriptive text of the LERs to coded sequences that are both computer-readable and computer-searchable. This system provides a structured format for detailed coding of component, system, and unit effects as well as personnel errors. The database contains all current LERs submitted by nuclear power plant utilities for events occurring since 1981 and is updated on a continual basis. This four volume report documents and describes SCSS in detail. Volume 1 is a User's Guide for searching the SCSS database. This volume contains updated material through February 1985 of the working version of ORNL/NSIC-223, Vol. 1

  6. Microsoft Security Bible A Collection of Practical Security Techniques

    CERN Document Server

    Mullen, Timothy "Thor"

    2011-01-01

    Thor's Microsoft® Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code. Detailed technical information on security processes for all major Microsoft applications

  7. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  8. EPRI BWR Water Chemistry Guidelines Revision

    International Nuclear Information System (INIS)

    Garcia, Susan E.; Giannelli, Joseph F.

    2014-01-01

    BWRVIP-190: BWR Water Chemistry Guidelines – 2008 Revision has been revised. The revision committee consisted of U.S. and non-U.S. utilities (members of the BWR Vessel and Internals Protection (BWRVIP) Mitigation Committee), reactor system manufacturers, fuel suppliers, and EPRI and industry experts. The revised document, BWRVIP-190 Revision 1, was completely reformatted into two volumes, with a simplified presentation of water chemistry control, diagnostic and good practice parameters in Volume 1 and the technical bases in Volume 2, to facilitate use. The revision was developed in parallel and in coordination with preparation of the Fuel Reliability Guidelines Revision 1: BWR Fuel Cladding Crud and Corrosion. Guidance is included for plants operating under normal water chemistry (NWC), moderate hydrogen water chemistry (HWC-M), and noble metal application (GE-Hitachi NobleChem™) plus hydrogen injection. Volume 1 includes significant changes to BWR feedwater and reactor water chemistry control parameters to provide increased assurance of intergranular stress corrosion cracking (IGSCC) mitigation of reactor materials and fuel reliability during all plant conditions, including cold shutdown (≤200°F (93°C)), startup/hot standby (>200°F (93°C) and ≤ 10%) and power operation (>10% power). Action Level values for chloride and sulfate have been tightened to minimize environmentally assisted cracking (EAC) of all wetted surfaces, including those not protected by hydrogen injection, with or without noble metals. Chemistry control guidance has been enhanced to minimize shutdown radiation fields by clarifying targets for depleted zinc oxide (DZO) injection while meeting requirements for fuel reliability. Improved tabular presentations of parameter values explicitly indicate levels at which actions are to be taken and required sampling frequencies. Volume 2 provides the technical bases for BWR water chemistry control for control of EAC, flow accelerated corrosion

  9. 40 CFR 60.4124 - Hg budget permit revisions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 6 2010-07-01 2010-07-01 false Hg budget permit revisions. 60.4124... Coal-Fired Electric Steam Generating Units Permits § 60.4124 Hg budget permit revisions. Except as provided in § 60.4123(b), the permitting authority will revise the Hg Budget permit, as necessary, in...

  10. Children’s Vantage Point of Recalling Traumatic Events

    Science.gov (United States)

    Dawson, Katie S.; Bryant, Richard A.

    2016-01-01

    This study investigated the recollections of child survivors of the 2004 Asian tsunami in terms of their vantage point and posttraumatic stress disorder (PTSD) responses. Five years after the tsunami, 110 children (aged 7–13 years) living in Aceh, Indonesia were assessed for source of memories of the tsunami (personal memory or second-hand source), vantage point of the memory, and were administered the Children’s Revised Impact of Event Scale-13. Fifty-three children (48%) met criteria for PTSD. Two-thirds of children reported direct memories of the tsunami and one-third reported having memories based on reports from other people. More children (97%) who reported an indirect memory of the tsunami recalled the event from an onlooker’s perspective to some extent than those who recalled the event directly (63%). Boys were more likely to rely on stories from others to reconstruct their memory of the tsunami, and to adopt an observer perspective. Boys who adopted an observer’s perspective had less severe PTSD than those who adopted a field perspective. These findings suggest that, at least in the case of boys, an observer perspectives of trauma can be associated with levels of PTSD. PMID:27649299

  11. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  12. Nuclear non-proliferation and security culture within EDF nuclear fleet

    International Nuclear Information System (INIS)

    Debes, M.

    2013-01-01

    This document describes the nuclear non-proliferation strategy and the safety culture of EDF. The author lists all the mandatory rules and regulations at international and national levels EDF has to comply with. All these requirements are applied in EDF nuclear facilities through adequate procedures that assure a nuclear material accountancy, a follow-up of any item containing nuclear material in the facility, and internal controls. External independent controls are also performed. The EDF security policy goal is to protect human, material and knowledge assets, and to preserve operational capacity, competitiveness and public confidence, within national regulatory framework and regulation on 'vital importance facilities'. The treatment of events or incident (detection, analysis, lessons drawn, experience feedback) is a tool to progress, along with reporting, internal control process and audits. The security requirements cover the different related domains important to EDF industrial assets: security of employees against assaults; security of data according to their sensibility level; security of the information system and telecom; awareness and training of employees; relations with external suppliers or contractors; business premises; security of staff and projects abroad. For industrial facilities and grids (facilities of 'vital importance'...), the defense in depth principles are applied against the different threat scenarios. Security measures are studied at the design stage in a consistent way with nuclear safety measures, while taking into account the protective means deployed by public authorities. These risk analysis are periodically reassessed. The paper is followed by the slides of the presentation. (A.C.)

  13. On the Modelling of Context-Aware Security for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Tomasz Zurek

    2016-01-01

    Full Text Available Security management in wireless networks has to deal with the changing character of the environment, which can further lead to decision making problem for unexpected events. Among a huge list of devices, the mobile ones are especially vulnerable to this situation. The solution for adapting systems and applications to dynamic environments can be context-aware description of the user actions, which gives a possibility to take into account the factors that influence these actions. In the article, we propose a context-aware security adjusting model, which is based on proposition logic and incorporates mechanisms that assist in the reasoning process. The main benefits that differentiate our approach from similar ones are a formal representation of the model, the usage of the whole spectrum of context attributes, the detection and analysis of contextual data integrity, and conflicting rules’ eradication capability. All these traits transcribe into a more effective way of adjusting security measures in accordance with existing circumstances. To illustrate the proposed approach, we present the case study of context-aware security management for mobile devices.

  14. Information security of Smart Factories

    Science.gov (United States)

    Iureva, R. A.; Andreev, Y. S.; Iuvshin, A. M.; Timko, A. S.

    2018-05-01

    In several years, technologies and systems based on the Internet of things (IoT) will be widely used in all smart factories. When processing a huge array of unstructured data, their filtration and adequate interpretation are a priority for enterprises. In this context, the correct representation of information in a user-friendly form acquires special importance, for which the market today presents advanced analytical platforms designed to collect, store and analyze data on technological processes and events in real time. The main idea of the paper is the statement of the information security problem in IoT and integrity of processed information.

  15. Environment and homeland security in France

    International Nuclear Information System (INIS)

    Taithe, Alexandre

    2011-01-01

    The author comments the impact of extreme events related to global warming and climate change on the French homeland security. He comments the evolution of temperature during the last century, the various transformations notably predicted by IPCC reports, and the various climate evolutions. Then, he discusses impacts of climate change on different economic sectors. He notably addresses the impact on coast lines (risks of submersion and erosion, more particularly for overseas territories), the impact extreme events may have on soft water (a temperature rise would impact the operation of nuclear plants; sewage and water networks will be threatened by more intense rainfalls), the positive and negative impacts on forests (high productivity but loss of diversity, development of parasites, risks of forest fires), and the impacts on various economic activities (agriculture, food supply, tourism, insurance) and on health

  16. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  17. Detection of unusual events and trends in complex non-stationary data streams

    International Nuclear Information System (INIS)

    Charlton-Perez, C.; Perez, R.B.; Protopopescu, V.; Worley, B.A.

    2011-01-01

    The search for unusual events and trends hidden in multi-component, nonlinear, non-stationary, noisy signals is extremely important for diverse applications, ranging from power plant operation to homeland security. In the context of this work, we define an unusual event as a local signal disturbance and a trend as a continuous carrier of information added to and different from the underlying baseline dynamics. The goal of this paper is to investigate the feasibility of detecting hidden events inside intermittent signal data sets corrupted by high levels of noise, by using the Hilbert-Huang empirical mode decomposition method.

  18. Healthcare Blockchain System Using Smart Contracts for Secure Automated Remote Patient Monitoring.

    Science.gov (United States)

    Griggs, Kristen N; Ossipova, Olya; Kohlios, Christopher P; Baccarini, Alessandro N; Howson, Emily A; Hayajneh, Thaier

    2018-06-06

    As Internet of Things (IoT) devices and other remote patient monitoring systems increase in popularity, security concerns about the transfer and logging of data transactions arise. In order to handle the protected health information (PHI) generated by these devices, we propose utilizing blockchain-based smart contracts to facilitate secure analysis and management of medical sensors. Using a private blockchain based on the Ethereum protocol, we created a system where the sensors communicate with a smart device that calls smart contracts and writes records of all events on the blockchain. This smart contract system would support real-time patient monitoring and medical interventions by sending notifications to patients and medical professionals, while also maintaining a secure record of who has initiated these activities. This would resolve many security vulnerabilities associated with remote patient monitoring and automate the delivery of notifications to all involved parties in a HIPAA compliant manner.

  19. Real-time distributed fiber optic sensor for security systems: Performance, event classification and nuisance mitigation

    Science.gov (United States)

    Mahmoud, Seedahmed S.; Visagathilagar, Yuvaraja; Katsifolis, Jim

    2012-09-01

    The success of any perimeter intrusion detection system depends on three important performance parameters: the probability of detection (POD), the nuisance alarm rate (NAR), and the false alarm rate (FAR). The most fundamental parameter, POD, is normally related to a number of factors such as the event of interest, the sensitivity of the sensor, the installation quality of the system, and the reliability of the sensing equipment. The suppression of nuisance alarms without degrading sensitivity in fiber optic intrusion detection systems is key to maintaining acceptable performance. Signal processing algorithms that maintain the POD and eliminate nuisance alarms are crucial for achieving this. In this paper, a robust event classification system using supervised neural networks together with a level crossings (LCs) based feature extraction algorithm is presented for the detection and recognition of intrusion and non-intrusion events in a fence-based fiber-optic intrusion detection system. A level crossings algorithm is also used with a dynamic threshold to suppress torrential rain-induced nuisance alarms in a fence system. Results show that rain-induced nuisance alarms can be suppressed for rainfall rates in excess of 100 mm/hr with the simultaneous detection of intrusion events. The use of a level crossing based detection and novel classification algorithm is also presented for a buried pipeline fiber optic intrusion detection system for the suppression of nuisance events and discrimination of intrusion events. The sensor employed for both types of systems is a distributed bidirectional fiber-optic Mach-Zehnder (MZ) interferometer.

  20. Global Climate Change, Food Security and the U.S. Food System

    Science.gov (United States)

    Brown, Molly Elizabeth; Walsh, Margaret; Hauser, Rachel; Murray, Anthony; Jadin, Jenna; Baklund, Peter; Robinson, Paula

    2013-01-01

    Climate change influences on the major pillars of food security. Each of the four elements of food security (availability,access,utilization,andstability) is vulnerable to changes in climate. For example,reductions in production related to regional drought influence food availability at multiple scales. Changes in price influences the ability of certain populations to purchase food (access). Utilization maybe affected when production zones shift, reducing the availability of preferred or culturally appropriate types of food within a region. Stability of the food supply may be highly uncertain given an increased incidence of extreme climatic events and their influence on production patterns.