WorldWideScience

Sample records for security ldrd project

  1. LDRD FY2004 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Kotta, P. R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Kline, K. M. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2005-02-28

    The Laboratory Directed Research and Development (LDRD) Program is our primary means for pursuing innovative, long-term, high-risk, and potentially high-payoff research that supports the missions of the Laboratory, the Department of Energy, and the National Nuclear Security Administration in national security, homeland security, energy security, environmental management, bioscience and healthcare technology, and breakthroughs in fundamental science and technology. The LDRD Program was authorized by Congress in 1991 and is administered by the Laboratory Science and Technology Office. The accomplishments described in this Annual Report demonstrate how the LDRD portfolio is strongly aligned with these missions and contributes to the Laboratory’s success in meeting its goals. The LDRD budget of $69.8 million for FY2004 sponsored 220 projects. These projects were selected through an extensive peer-review process to ensure the highest scientific and technical quality and mission relevance. Each year, the number of meritorious proposals far exceeds the funding available, making the selection a challenging one indeed. Our ongoing investments in LDRD have reaped long-term rewards for the Laboratory and the Nation. Many Laboratory programs trace their roots to research thrusts that began several years ago under LDRD sponsorship. In addition, many LDRD projects contribute to more than one mission area, leveraging the Laboratory’s multidisciplinary team approach to science and technology. Safeguarding the Nation from terrorist activity and the proliferation of weapons of mass destruction will be an enduring mission of this Laboratory, for which LDRD will continue to play a vital role. The LDRD Program is a success story. Our projects continue to win national recognition for excellence through prestigious awards, papers published in peer-reviewed journals, and patents granted. With its reputation for sponsoring innovative projects, the LDRD Program is also a major vehicle

  2. LDRD Annual Report FY2006

    International Nuclear Information System (INIS)

    Sketchley, J A; Kotta, P; De Yoreo, J; Jackson, K; van Bibber, K

    2007-01-01

    The Laboratory Directed Research and Development (LDRD) Program, authorized by Congress in 1991 and administered by the Laboratory Science and Technology Office, is our primary means for pursuing innovative, long-term, high-risk, and potentially high-payoff research that supports the missions of the Laboratory, the Department of Energy, and National Nuclear Security Administration in national security, energy security, environmental management, bioscience and technology to improve human health, and breakthroughs in fundamental science and technology. The accomplishments described in this Annual Report demonstrate the strong alignment of the LDRD portfolio with these missions and contribute to the Laboratory's success in meeting its goals. The LDRD budget of $92 million for FY2006 sponsored 188 projects. These projects were selected through an extensive peer-review process to ensure the highest scientific quality and mission relevance. Each year, the number of deserving proposals far exceeds the funding available, making the selection a tough one indeed. Our ongoing investments in LDRD have reaped long-term rewards for the Laboratory and the nation. Many Laboratory programs trace their roots to research thrusts that began several years ago under LDRD sponsorship. In addition, many LDRD projects contribute to more than one mission area, leveraging the Laboratory's multidisciplinary team approach to science and technology. Safeguarding the nation from terrorist activity and the proliferation of weapons of mass destruction will be an enduring mission of this Laboratory, for which LDRD will continue to play a vital role. The LDRD Program is a success story. Our projects continue to win national recognition for excellence through prestigious awards, papers published in peer-reviewed journals, and patents granted. With its reputation for sponsoring innovative projects, the LDRD Program is also a major vehicle for attracting and retaining the best and the brightest

  3. Selected Examples of LDRD Projects Supporting Test Ban Treaty Verification and Nonproliferation

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Al-Ayat, R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Walter, W. R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-02-23

    The Laboratory Directed Research and Development (LDRD) Program at the DOE National Laboratories was established to ensure the scientific and technical vitality of these institutions and to enhance the their ability to respond to evolving missions and anticipate national needs. LDRD allows the Laboratory directors to invest a percentage of their total annual budget in cutting-edge research and development projects within their mission areas. We highlight a selected set of LDRD-funded projects, in chronological order, that have helped provide capabilities, people and infrastructure that contributed greatly to our ability to respond to technical challenges in support of test ban treaty verification and nonproliferation.

  4. Idaho National Laboratory Annual Report FY 2013 LDRD Project Summaries

    Energy Technology Data Exchange (ETDEWEB)

    Dena Tomchak

    2014-03-01

    The FY 2013 LDRD Annual Report is a compendium of the diverse research performed to develop and ensure the INL’s technical capabilities support the current and future DOE missions and national research priorities. LDRD is essential to INL—it provides a means for the Laboratory to maintain scientific and technical vitality while funding highly innovative, high-risk science and technology research and development (R&D) projects. The program enhances technical capabilities at the Laboratory, providing scientific and engineering staff with opportunities to explore proof-of-principle ideas, advanced studies of innovative concepts, and preliminary technical analyses. Established by Congress in 1991, the LDRD Program proves its benefit each year through new programs, intellectual property, patents, copyrights, national and international awards, and publications.

  5. Final report on LDRD project ''proliferation-resistant fuel cycles''

    International Nuclear Information System (INIS)

    Brown, N W; Hassberger, J A.

    1999-01-01

    This report provides a summary of LDRD work completed during 1997 and 1998 to develop the ideas and concepts that lead to the Secure, Transportable, Autonomous Reactor (STAR) program proposals to the DOE Nuclear Energy Research Initiative (NERI). The STAR program consists of a team of three national laboratories (LLNL, ANL, and LANL), three universities, (UC Berkeley, TAMU, and MIT) and the Westinghouse Research Center. Based on the LLNL work and their own efforts on related work this team prepared and integrated a package of twelve proposals that will carry the LDRD work outlined here into the next phase of development. We are proposing to develop a new nuclear system that meets stringent requirements for a high degree of safety and proliferation resistance, and also deals directly with the related nuclear waste and spent fuel management issues

  6. 2007 LDRD ANNUAL REPORT

    Energy Technology Data Exchange (ETDEWEB)

    French, T

    2008-12-16

    I am pleased to present the fiscal year 2007 Laboratory Directed Research and Development (LDRD) annual report. This represents the first year that SRNL has been eligible for LDRD participation and our results to date demonstrate we are off to an excellent start. SRNL became a National Laboratory in 2004, and was designated the 'Corporate Laboratory' for the DOE Office of Environmental Management (EM) in 2006. As you will see, we have made great progress since these designations. The LDRD program is one of the tools SRNL is using to enable achievement of our strategic goals for the DOE. The LDRD program allows the laboratory to blend a strong basic science component into our applied technical portfolio. This blending of science with applied technology provides opportunities for our scientists to strengthen our capabilities and delivery. The LDRD program is vital to help SRNL attract and retain leading scientists and engineers who will help build SRNL's future and achieve DOE mission objectives. This program has stimulated our research staff creativity, while realizing benefits from their participation. This investment will yield long term dividends to the DOE in its Environmental Management, Energy, and National Security missions.

  7. SRNL LDRD ANNUAL REPORT 2008

    Energy Technology Data Exchange (ETDEWEB)

    French, T

    2008-12-29

    The Laboratory Director is pleased to have the opportunity to present the 2008 Laboratory Directed Research and Development (LDRD) annual report. This is my first opportunity to do so, and only the second such report that has been issued. As will be obvious, SRNL has built upon the excellent start that was made with the LDRD program last year, and researchers have broken new ground in some important areas. In reviewing the output of this program this year, it is clear that the researchers implemented their ideas with creativity, skill and enthusiasm. It is gratifying to see this level of participation, because the LDRD program remains a key part of meeting SRNL's and DOE's strategic goals, and helps lay a solid scientific foundation for SRNL as the premier applied science laboratory. I also believe that the LDRD program's results this year have demonstrated SRNL's value as the EM Corporate Laboratory, having advanced knowledge in a spectrum of areas, including reduction of the technical risks of cleanup, separations science, packaging and transportation of nuclear materials, and many others. The research in support of Energy Security and National and Homeland Security has been no less notable. SRNL' s researchers have shown again that the nascent LDRD program is a sound investment for DOE that will pay off handsomely for the nation as time goes on.

  8. Multi-attribute criteria applied to electric generation energy system analysis LDRD.

    Energy Technology Data Exchange (ETDEWEB)

    Kuswa, Glenn W.; Tsao, Jeffrey Yeenien; Drennen, Thomas E.; Zuffranieri, Jason V.; Paananen, Orman Henrie; Jones, Scott A.; Ortner, Juergen G. (DLR, German Aerospace, Cologne); Brewer, Jeffrey D.; Valdez, Maximo M.

    2005-10-01

    This report began with a Laboratory-Directed Research and Development (LDRD) project to improve Sandia National Laboratories multidisciplinary capabilities in energy systems analysis. The aim is to understand how various electricity generating options can best serve needs in the United States. The initial product is documented in a series of white papers that span a broad range of topics, including the successes and failures of past modeling studies, sustainability, oil dependence, energy security, and nuclear power. Summaries of these projects are included here. These projects have provided a background and discussion framework for the Energy Systems Analysis LDRD team to carry out an inter-comparison of many of the commonly available electric power sources in present use, comparisons of those options, and efforts needed to realize progress towards those options. A computer aid has been developed to compare various options based on cost and other attributes such as technological, social, and policy constraints. The Energy Systems Analysis team has developed a multi-criteria framework that will allow comparison of energy options with a set of metrics that can be used across all technologies. This report discusses several evaluation techniques and introduces the set of criteria developed for this LDRD.

  9. 2013 SRNL LDRD Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    McWhorter, S. [Savannah River Site (SRS), Aiken, SC (United States)

    2014-03-07

    This report demonstrates the execution of our LDRD program within the objectives and guidelines outlined by the Department of Energy (DOE) through the DOE Order 413.2b. The projects described within the report align purposefully with SRNL’s strategic vision and provide great value to the DOE. The diversity exhibited in the research and development projects underscores the DOE Office of Environmental Management (DOE-EM) mission and enhances that mission by developing the technical capabilities and human capital necessary to support future DOE-EM national needs. As a multiprogram national laboratory, SRNL is applying those capabilities to achieve tangible results for the nation in National Security, Environmental Stewardship, Clean Energy and Nuclear Materials Management.

  10. 1999 LDRD Laboratory Directed Research and Development

    Energy Technology Data Exchange (ETDEWEB)

    Rita Spencer; Kyle Wheeler

    2000-06-01

    This is the FY 1999 Progress Report for the Laboratory Directed Research and Development (LDRD) Program at Los Alamos National Laboratory. It gives an overview of the LDRD Program, summarizes work done on individual research projects, relates the projects to major Laboratory program sponsors, and provides an index to the principal investigators. Project summaries are grouped by their LDRD component: Competency Development, Program Development, and Individual Projects. Within each component, they are further grouped into nine technical categories: (1) materials science, (2) chemistry, (3) mathematics and computational science, (4) atomic, molecular, optical, and plasma physics, fluids, and particle beams, (5) engineering science, (6) instrumentation and diagnostics, (7) geoscience, space science, and astrophysics, (8) nuclear and particle physics, and (9) bioscience.

  11. FY 2014 LDRD Annual Report Project Summaries

    Energy Technology Data Exchange (ETDEWEB)

    Tomchak, Dena [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-02-01

    The FY 2014 Laboratory Directed Research and Development (LDRD) Annual Report is a compendium of the diverse research performed to develop and ensure the INL's technical capabilities can support future DOE missions and national research priorities. LDRD is essential to INL - it provides a means for the laboratory to pursue novel scientific and engineering research in areas that are deemed too basic or risky for programmatic investments. This research enahnces technical capabilities at the laboratory, providing scientific and engineering staff with opportunities for skill building and partnership development.

  12. THz transceiver characterization : LDRD project 139363 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Nordquist, Christopher Daniel; Wanke, Michael Clement; Cich, Michael Joseph; Reno, John Louis; Fuller, Charles T.; Wendt, Joel Robert; Lee, Mark; Grine, Albert D.

    2009-09-01

    LDRD Project 139363 supported experiments to quantify the performance characteristics of monolithically integrated Schottky diode + quantum cascade laser (QCL) heterodyne mixers at terahertz (THz) frequencies. These integrated mixers are the first all-semiconductor THz devices to successfully incorporate a rectifying diode directly into the optical waveguide of a QCL, obviating the conventional optical coupling between a THz local oscillator and rectifier in a heterodyne mixer system. This integrated mixer was shown to function as a true heterodyne receiver of an externally received THz signal, a breakthrough which may lead to more widespread acceptance of this new THz technology paradigm. In addition, questions about QCL mode shifting in response to temperature, bias, and external feedback, and to what extent internal frequency locking can improve stability have been answered under this project.

  13. A Case Study in Competitive Technical and Market Intelligence Support and Lessons Learned for the uChemLab LDRD Grand Challenge Project; TOPICAL

    International Nuclear Information System (INIS)

    SOUTHWELL, EDWIN T.; GARCIA, MARIE L.; MEYERS, CHARLES E.

    2001-01-01

    The(mu)ChemLab(trademark) Laboratory Directed Research and Development (LDRD) Grand Challenge project began in October 1996 and ended in September 2000. The technical managers of the(mu)ChemLab(trademark) project and the LDRD office, with the support of a consultant, conducted a competitive technical and market demand intelligence analysis of the(mu)ChemLab(trademark). The managers used this knowledge to make project decisions and course adjustments. CTI/MDI positively impacted the project's technology development, uncovered potential technology partnerships, and supported eventual industry partner contacts. CTI/MDI analysis is now seen as due diligence and the(mu)ChemLab(trademark) project is now the model for other Sandia LDRD Grand Challenge undertakings. This document describes the CTI/MDI analysis and captures the more important ''lessons learned'' of this Grand Challenge project, as reported by the project's management team

  14. FY2014 LBNL LDRD Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Ho, Darren [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2015-06-01

    Laboratory (Berkeley Lab or LBNL) is a multi-program national research facility operated by the University of California for the Department of Energy (DOE). As an integral element of DOE’s National Laboratory System, Berkeley Lab supports DOE’s missions in fundamental science, energy resources, and environmental quality. Berkeley Lab programs advance four distinct goals for DOE and the nation. The LDRD program supports Berkeley Lab’s mission in many ways. First, because LDRD funds can be allocated within a relatively short time frame, Berkeley Lab researchers can support the mission of the Department of Energy (DOE) and serve the needs of the nation by quickly responding to forefront scientific problems. Second, LDRD enables Berkeley Lab to attract and retain highly qualified scientists and to support their efforts to carry out worldleading research. In addition, the LDRD program also supports new projects that involve graduate students and postdoctoral fellows, thus contributing to the education mission of Berkeley Lab.

  15. LDRD 2012 Annual Report: Laboratory Directed Research and Development Program Activities

    Energy Technology Data Exchange (ETDEWEB)

    Bookless, William [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2012-12-31

    Each year, Brookhaven National Laboratory (BNL) is required to provide a program description and overview of its Laboratory Directed Research and Development Program (LDRD) to the Department of Energy in accordance with DOE Order 413.2B dated April 19, 2006. This report provides a detailed look at the scientific and technical activities for each of the LDRD projects funded by BNL in FY2012, as required. In FY2012, the BNL LDRD Program funded 52 projects, 14 of which were new starts, at a total cost of $10,061,292.

  16. LDRD 2014 Annual Report: Laboratory Directed Research and Development Program Activities

    Energy Technology Data Exchange (ETDEWEB)

    Hatton, Diane [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2015-03-01

    Each year, Brookhaven National Laboratory (BNL) is required to provide a program description and overview of its Laboratory Directed Research and Development Program (LDRD) to the Department of Energy (DOE) in accordance with DOE Order 413.2B dated April 19, 2006. This report provides a detailed look at the scientific and technical activities for each of the LDRD projects funded by BNL in FY 2014, as required. In FY 2014, the BNL LDRD Program funded 40 projects, 8 of which were new starts, at a total cost of $9.6M.

  17. LDRD 2015 Annual Report: Laboratory Directed Research and Development Program Activities

    Energy Technology Data Exchange (ETDEWEB)

    Hatton, D. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2015-12-31

    Each year, Brookhaven National Laboratory (BNL) is required to provide a program description and overview of its Laboratory Directed Research and Development Program (LDRD) to the Department of Energy (DOE) in accordance with DOE Order 413.2B dated April 19, 2006. This report provides a detailed look at the scientific and technical activities for each of the LDRD projects funded by BNL in FY 2015, as required. In FY 2015, the BNL LDRD Program funded 43 projects, 12 of which were new starts, at a total cost of $9.5M.

  18. Multi-target camera tracking, hand-off and display LDRD 158819 final report

    International Nuclear Information System (INIS)

    Anderson, Robert J.

    2014-01-01

    Modern security control rooms gather video and sensor feeds from tens to hundreds of cameras. Advanced camera analytics can detect motion from individual video streams and convert unexpected motion into alarms, but the interpretation of these alarms depends heavily upon human operators. Unfortunately, these operators can be overwhelmed when a large number of events happen simultaneously, or lulled into complacency due to frequent false alarms. This LDRD project has focused on improving video surveillance-based security systems by changing the fundamental focus from the cameras to the targets being tracked. If properly integrated, more cameras shouldn't lead to more alarms, more monitors, more operators, and increased response latency but instead should lead to better information and more rapid response times. For the course of the LDRD we have been developing algorithms that take live video imagery from multiple video cameras, identifies individual moving targets from the background imagery, and then displays the results in a single 3D interactive video. In this document we summarize the work in developing this multi-camera, multi-target system, including lessons learned, tools developed, technologies explored, and a description of current capability.

  19. Multi-target camera tracking, hand-off and display LDRD 158819 final report

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Robert J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-10-01

    Modern security control rooms gather video and sensor feeds from tens to hundreds of cameras. Advanced camera analytics can detect motion from individual video streams and convert unexpected motion into alarms, but the interpretation of these alarms depends heavily upon human operators. Unfortunately, these operators can be overwhelmed when a large number of events happen simultaneously, or lulled into complacency due to frequent false alarms. This LDRD project has focused on improving video surveillance-based security systems by changing the fundamental focus from the cameras to the targets being tracked. If properly integrated, more cameras shouldn't lead to more alarms, more monitors, more operators, and increased response latency but instead should lead to better information and more rapid response times. For the course of the LDRD we have been developing algorithms that take live video imagery from multiple video cameras, identifies individual moving targets from the background imagery, and then displays the results in a single 3D interactive video. In this document we summarize the work in developing this multi-camera, multi-target system, including lessons learned, tools developed, technologies explored, and a description of current capability.

  20. Multi-Target Camera Tracking, Hand-off and Display LDRD 158819 Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Robert J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Robotic and Security Systems Dept.

    2014-10-01

    Modern security control rooms gather video and sensor feeds from tens to hundreds of cameras. Advanced camera analytics can detect motion from individual video streams and convert unexpected motion into alarms, but the interpretation of these alarms depends heavily upon human operators. Unfortunately, these operators can be overwhelmed when a large number of events happen simultaneously, or lulled into complacency due to frequent false alarms. This LDRD project has focused on improving video surveillance-based security systems by changing the fundamental focus from the cameras to the targets being tracked. If properly integrated, more cameras shouldn’t lead to more alarms, more monitors, more operators, and increased response latency but instead should lead to better information and more rapid response times. For the course of the LDRD we have been developing algorithms that take live video imagery from multiple video cameras, identify individual moving targets from the background imagery, and then display the results in a single 3D interactive video. In this document we summarize the work in developing this multi-camera, multi-target system, including lessons learned, tools developed, technologies explored, and a description of current capability.

  1. NNSA Laboratory Directed Research and Development Program 2008 Symposium--Focus on Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Kotta, P R; Sketchley, J A

    2008-08-20

    The Laboratory Directed Research and Development (LDRD) Program was authorized by Congress in 1991 to fund leading-edge research and development central to the national laboratories core missions. LDRD anticipates and engages in projects on the forefront of science and engineering at the Department of Energy (DOE) national laboratories, and has a long history of addressing pressing national security needs at the National Nuclear Security Administration (NNSA) laboratories. LDRD has been a scientific success story, where projects continue to win national recognition for excellence through prestigious awards, papers published and cited in peer-reviewed journals, mainstream media coverage, and patents granted. The LDRD Program is also a powerful means to attract and retain top researchers from around the world, to foster collaborations with other prominent scientific and technological institutions, and to leverage some of the world's most technologically advanced assets. This enables the LDRD Program to invest in high-risk and potentially high-payoff research that creates innovative technical solutions for some of our nation's most difficult challenges. Worldwide energy demand is growing at an alarming rate, as developing nations continue to expand their industrial and economic base on the back of limited global resources. The resulting international conflicts and environmental consequences pose serious challenges not only to this nation, but to the international community as well. The NNSA and its national security laboratories have been increasingly called upon to devote their scientific and technological capabilities to help address issues that are not limited solely to the historic nuclear weapons core mission, but are more expansive and encompass a spectrum of national security missions, including energy security. This year's symposium highlights some of the exciting areas of research in alternative fuels and technology, nuclear power, carbon

  2. LDRD 2016 Annual Report: Laboratory Directed Research and Development Program Activities

    Energy Technology Data Exchange (ETDEWEB)

    Hatton, D. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2017-03-31

    Each year, Brookhaven National Laboratory (BNL) is required to provide a program description and overview of its Laboratory Directed Research and Development Program (LDRD) to the Department of Energy (DOE) in accordance with DOE Order 413.2C dated October 22, 2015. This report provides a detailed look at the scientific and technical activities for each of the LDRD projects funded by BNL in FY 2016, as required. In FY 2016, the BNL LDRD Program funded 48 projects, 21 of which were new starts, at a total cost of $11.5M. The investments that BNL makes in its LDRD program support the Laboratory’s strategic goals. BNL has identified four Critical Outcomes that define the Laboratory’s scientific future and that will enable it to realize its overall vision. Two operational Critical Outcomes address essential operational support for that future: renewal of the BNL campus; and safe, efficient laboratory operations.

  3. Terahertz spectral signatures :measurement and detection LDRD project 86361 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Wanke, Michael Clement; Brener, Igal; Lee, Mark

    2005-11-01

    LDRD Project 86361 provided support to upgrade the chemical and material spectral signature measurement and detection capabilities of Sandia National Laboratories using the terahertz (THz) portion of the electromagnetic spectrum, which includes frequencies between 0.1 to 10 THz. Under this project, a THz time-domain spectrometer was completed. This instrument measures sample absorption spectra coherently, obtaining both magnitude and phase of the absorption signal, and has shown an operating signal-to-noise ratio of 10{sub 4}. Additionally, various gas cells and a reflectometer were added to an existing high-resolution THz Fourier transform spectrometer, which greatly extend the functionality of this spectrometer. Finally, preliminary efforts to design an integrated THz transceiver based on a quantum cascade laser were begun.

  4. Nanoporous Silica Templated HeteroEpitaxy: Final LDRD Report.

    Energy Technology Data Exchange (ETDEWEB)

    Burckel, David Bruce; Koleske, Daniel; Rowen, Adam M.; Williams, John Dalton; Fan, Hongyou; Arrington, Christian Lew

    2006-11-01

    This one-year out-of-the-box LDRD was focused on exploring the use of porous growth masks as a method for defect reduction during heteroepitaxial crystal growth. Initially our goal was to investigate porous silica as a growth mask, however, we expanded the scope of the research to include several other porous growth masks on various size scales, including mesoporous carbon, and the UV curable epoxy, SU-8. Use of SU-8 as a growth mask represents a new direction, unique in the extensive literature of patterned epitaxial growth, and presents the possibility of providing a single step growth mask. Additional research included investigation of pore viability via electrochemical deposition into high aspect ratio photoresist patterns and pilot work on using SU-8 as a DUV negative resist, another significant potential result. While the late start nature of this project pushed some of the initial research goals out of the time table, significant progress was made. 3 Acknowledgements This work was performed in part at the Nanoscience @ UNM facility, a member of the National Nanotechnology Infrastructure Network, which is supported by the National Science Foundation (Grant ECS 03-35765). Sandia is multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United Stated Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. This work was supported under the Sandia LDRD program (Project 99405). 4

  5. LDRD FY 2014 Program Plan

    Energy Technology Data Exchange (ETDEWEB)

    Anita Gianotto; Dena Tomchak

    2013-08-01

    As required by DOE Order 413.2B the FY 2014 Program Plan is written to communicate ares of investment and approximate amounts being requested for the upcoming fiscal year. The program plan also includes brief highlights of current or previous LDRD projects that have an opportunity to impact our Nation's current and future energy challenges.

  6. Retrospective on the Seniors' Council Tier 1 LDRD portfolio.

    Energy Technology Data Exchange (ETDEWEB)

    Ballard, William Parker

    2012-04-01

    This report describes the Tier 1 LDRD portfolio, administered by the Seniors Council between 2003 and 2011. 73 projects were sponsored over the 9 years of the portfolio at a cost of $10.5 million which includes $1.9M of a special effort in directed innovation targeted at climate change and cyber security. Two of these Tier 1 efforts were the seeds for the Grand Challenge LDRDs in Quantum Computing and Next Generation Photovoltaic conversion. A few LDRDs were terminated early when it appeared clear that the research was not going to succeed. A great many more were successful and led to full Tier 2 LDRDs or direct customer sponsorship. Over a dozen patents are in various stages of prosecution from this work, and one project is being submitted for an R and D 100 award.

  7. Development of a cryogenic EOS capability for the Z Pulsed Radiation Source: Goals and accomplishments of FY97 LDRD project

    International Nuclear Information System (INIS)

    Hanson, D.L.; Johnston, R.R.; Asay, J.R.

    1998-03-01

    Experimental cryogenic capabilities are essential for the study of ICF high-gain target and weapons effects issues involving dynamic materials response at low temperatures. This report describes progress during the period 2/97-11/97 on the FY97 LDRD project ''Cryogenic EOS Capabilities on Pulsed Radiation Sources (Z Pinch)''. The goal of this project is the development of a general purpose cryogenic target system for precision EOS and shock physics measurements at liquid helium temperatures on the Z accelerator Z-pinch pulsed radiation source. Activity during the FY97 LDRD phase of this project has focused on development of a conceptual design for the cryogenic target system based on consideration of physics, operational, and safety issues, design and fabrication of principal system components, construction and instrumentation of a cryogenic test facility for off-line thermal and optical testing at liquid helium temperatures, initial thermal testing of a cryogenic target assembly, and the design of a cryogenic system interface to the Z pulsed radiation source facility. The authors discuss these accomplishments as well as elements of the project that require further work

  8. Exploration of cloud computing late start LDRD #149630 : Raincoat. v. 2.1.

    Energy Technology Data Exchange (ETDEWEB)

    Echeverria, Victor T.; Metral, Michael David; Leger, Michelle A.; Gabert, Kasimir Georg; Edgett, Patrick Garrett; Thai, Tan Q.

    2010-09-01

    This report contains documentation from an interoperability study conducted under the Late Start LDRD 149630, Exploration of Cloud Computing. A small late-start LDRD from last year resulted in a study (Raincoat) on using Virtual Private Networks (VPNs) to enhance security in a hybrid cloud environment. Raincoat initially explored the use of OpenVPN on IPv4 and demonstrates that it is possible to secure the communication channel between two small 'test' clouds (a few nodes each) at New Mexico Tech and Sandia. We extended the Raincoat study to add IPSec support via Vyatta routers, to interface with a public cloud (Amazon Elastic Compute Cloud (EC2)), and to be significantly more scalable than the previous iteration. The study contributed to our understanding of interoperability in a hybrid cloud.

  9. 2014 SRNL LDRD Annual Report, Rev. 0

    Energy Technology Data Exchange (ETDEWEB)

    Mcwhorter, S. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2015-03-15

    Laboratory Directed Research and Development is a congressionally authorized program that provides the ‘innovation inspiration’ from which many of the Laboratory’s multi-discipline advancements are made in both science and engineering technology. The program is the backbone for insuring that scientific, technical and engineering capabilities can meet current and future needs. It is an important tool in reducing the probability of technological surprise by allowing laboratory technical staff room to innovate and keep abreast of scientific breakthroughs. Drawing from the synergism among the EM and NNSA missions, and work from other federal agencies ensures that LDRD is the key element in maintaining the vitality of SRNL’s technical programs. The LDRD program aims to position the Laboratory for new business in clean energy, national security, nuclear materials management and environmental stewardship by leveraging the unique capabilities of the Laboratory to yield foundational scientific research in core business areas, while aligning with SRS strategic initiatives and maintaining a vision for ultimate DOE applications.

  10. Final report on LDRD project: Simulation/optimization tools for system variability analysis

    Energy Technology Data Exchange (ETDEWEB)

    R. L. Bierbaum; R. F. Billau; J. E. Campbell; K. D. Marx; R. J. Sikorski; B. M. Thompson; S. D. Wix

    1999-10-01

    >This work was conducted during FY98 (Proposal Number 98-0036) and FY99 (Proposal Number 99-0818) under the auspices of the Sandia National Laboratories Laboratory-Directed Research and Development (LDRD) program. Electrical simulation typically treats a single data point in the very large input space of component properties. For electrical simulation to reach its full potential as a design tool, it must be able to address the unavoidable variability and uncertainty in component properties. Component viability is strongly related to the design margin (and reliability) of the end product. During the course of this project, both tools and methodologies were developed to enable analysis of variability in the context of electrical simulation tools. Two avenues to link relevant tools were also developed, and the resultant toolset was applied to a major component.

  11. Integrated computer control system CORBA-based simulator FY98 LDRD project final summary report

    International Nuclear Information System (INIS)

    Bryant, R M; Holloway, F W; Van Arsdall, P J.

    1999-01-01

    The CORBA-based Simulator was a Laboratory Directed Research and Development (LDRD) project that applied simulation techniques to explore critical questions about distributed control architecture. The simulator project used a three-prong approach comprised of a study of object-oriented distribution tools, computer network modeling, and simulation of key control system scenarios. This summary report highlights the findings of the team and provides the architectural context of the study. For the last several years LLNL has been developing the Integrated Computer Control System (ICCS), which is an abstract object-oriented software framework for constructing distributed systems. The framework is capable of implementing large event-driven control systems for mission-critical facilities such as the National Ignition Facility (NIF). Tools developed in this project were applied to the NIF example architecture in order to gain experience with a complex system and derive immediate benefits from this LDRD. The ICCS integrates data acquisition and control hardware with a supervisory system, and reduces the amount of new coding and testing necessary by providing prebuilt components that can be reused and extended to accommodate specific additional requirements. The framework integrates control point hardware with a supervisory system by providing the services needed for distributed control such as database persistence, system start-up and configuration, graphical user interface, status monitoring, event logging, scripting language, alert management, and access control. The design is interoperable among computers of different kinds and provides plug-in software connections by leveraging a common object request brokering architecture (CORBA) to transparently distribute software objects across the network of computers. Because object broker distribution applied to control systems is relatively new and its inherent performance is roughly threefold less than traditional point

  12. FY07 LDRD Final Report Precision, Split Beam, Chirped-Pulse, Seed Laser Technology

    Energy Technology Data Exchange (ETDEWEB)

    Dawson, J W; Messerly, M J; Phan, H H; Crane, J K; Beach, R J; Siders, C W; Barty, C J

    2009-11-12

    The goal of this LDRD ER was to develop a robust and reliable technology to seed high-energy laser systems with chirped pulses that can be amplified to kilo-Joule energies and recompressed to sub-picosecond pulse widths creating extremely high peak powers suitable for petawatt class physics experiments. This LDRD project focused on the development of optical fiber laser technologies compatible with the current long pulse National Ignition Facility (NIF) seed laser. New technologies developed under this project include, high stability mode-locked fiber lasers, fiber based techniques for reduction of compressed pulse pedestals and prepulses, new compact stretchers based on chirped fiber Bragg gratings (CFBGs), new techniques for manipulation of chirped pulses prior to amplification and new high-energy fiber amplifiers. This project was highly successful and met virtually all of its goals. The National Ignition Campaign has found the results of this work to be very helpful. The LDRD developed system is being employed in experiments to engineer the Advanced Radiographic Capability (ARC) front end and the fully engineered version of the ARC Front End will employ much of the technology and techniques developed here.

  13. LDRD 2013 Annual Report: Laboratory Directed Research and Development Program Activities

    Energy Technology Data Exchange (ETDEWEB)

    Bookless, W. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2013-12-31

    This LDRD project establishes a research program led by Jingguang Chen, who has started a new position as a Joint Appointee between BNL and Columbia University as of FY2013. Under this project, Dr. Chen will establish a new program in catalysis science at BNL and Columbia University. The LDRD program will provide initial research funding to start research at both BNL and Columbia. At BNL, Dr. Chen will initiate laboratory research, including hiring research staff, and will collaborate with the existing BNL catalysis and electrocatalysis research groups. At Columbia, a subcontract to Dr. Chen will provide startup funding for his laboratory research, including initial graduate student costs. The research efforts will be linked under a common Catalysis Program in Sustainable Fuels. The overall impact of this project will be to strengthen the BNL catalysis science program through new linked research thrusts and the addition of an internationally distinguished catalysis scientist.

  14. RF/microwave properties of nanotubes and nanowires : LDRD Project 105876 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Scrymgeour, David; Lee, Mark; Hsu, Julia W. P.; Highstrete, Clark

    2009-09-01

    LDRD Project 105876 was a research project whose primary goal was to discover the currently unknown science underlying the basic linear and nonlinear electrodynamic response of nanotubes and nanowires in a manner that will support future efforts aimed at converting forefront nanoscience into innovative new high-frequency nanodevices. The project involved experimental and theoretical efforts to discover and understand high frequency (MHz through tens of GHz) electrodynamic response properties of nanomaterials, emphasizing nanowires of silicon, zinc oxide, and carbon nanotubes. While there is much research on DC electrical properties of nanowires, electrodynamic characteristics still represent a major new frontier in nanotechnology. We generated world-leading insight into how the low dimensionality of these nanomaterials yields sometimes desirable and sometimes problematic high-frequency properties that are outside standard model electron dynamics. In the cases of silicon nanowires and carbon nanotubes, evidence of strong disorder or glass-like charge dynamics was measured, indicating that these materials still suffer from serious inhomogeneities that limit there high frequency performance. Zinc oxide nanowires were found to obey conventional Drude dynamics. In all cases, a significant practical problem involving large impedance mismatch between the high intrinsic impedance of all nanowires and nanotubes and high-frequency test equipment had to be overcome.

  15. LDRD 149045 final report distinguishing documents.

    Energy Technology Data Exchange (ETDEWEB)

    Mitchell, Scott A.

    2010-09-01

    This LDRD 149045 final report describes work that Sandians Scott A. Mitchell, Randall Laviolette, Shawn Martin, Warren Davis, Cindy Philips and Danny Dunlavy performed in 2010. Prof. Afra Zomorodian provided insight. This was a small late-start LDRD. Several other ongoing efforts were leveraged, including the Networks Grand Challenge LDRD, and the Computational Topology CSRF project, and the some of the leveraged work is described here. We proposed a sentence mining technique that exploited both the distribution and the order of parts-of-speech (POS) in sentences in English language documents. The ultimate goal was to be able to discover 'call-to-action' framing documents hidden within a corpus of mostly expository documents, even if the documents were all on the same topic and used the same vocabulary. Using POS was novel. We also took a novel approach to analyzing POS. We used the hypothesis that English follows a dynamical system and the POS are trajectories from one state to another. We analyzed the sequences of POS using support vector machines and the cycles of POS using computational homology. We discovered that the POS were a very weak signal and did not support our hypothesis well. Our original goal appeared to be unobtainable with our original approach. We turned our attention to study an aspect of a more traditional approach to distinguishing documents. Latent Dirichlet Allocation (LDA) turns documents into bags-of-words then into mixture-model points. A distance function is used to cluster groups of points to discover relatedness between documents. We performed a geometric and algebraic analysis of the most popular distance functions and made some significant and surprising discoveries, described in a separate technical report.

  16. Final report on LDRD project : coupling strategies for multi-physics applications.

    Energy Technology Data Exchange (ETDEWEB)

    Hopkins, Matthew Morgan; Moffat, Harry K.; Carnes, Brian; Hooper, Russell Warren; Pawlowski, Roger P.

    2007-11-01

    Many current and future modeling applications at Sandia including ASC milestones will critically depend on the simultaneous solution of vastly different physical phenomena. Issues due to code coupling are often not addressed, understood, or even recognized. The objectives of the LDRD has been both in theory and in code development. We will show that we have provided a fundamental analysis of coupling, i.e., when strong coupling vs. a successive substitution strategy is needed. We have enabled the implementation of tighter coupling strategies through additions to the NOX and Sierra code suites to make coupling strategies available now. We have leveraged existing functionality to do this. Specifically, we have built into NOX the capability to handle fully coupled simulations from multiple codes, and we have also built into NOX the capability to handle Jacobi Free Newton Krylov simulations that link multiple applications. We show how this capability may be accessed from within the Sierra Framework as well as from outside of Sierra. The critical impact from this LDRD is that we have shown how and have delivered strategies for enabling strong Newton-based coupling while respecting the modularity of existing codes. This will facilitate the use of these codes in a coupled manner to solve multi-physic applications.

  17. Microwave to millimeter-wave electrodynamic response and applications of semiconductor nanostructures: LDRD project 67025 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Shaner, Eric Arthur; Lee, Mark; Averitt, R. D. (Los Alamos National Laboratory); Highstrete, Clark; Taylor, A. J. (Los Alamos National Laboratory); Padilla, W. J. (Los Alamos National Laboratory); Reno, John Louis; Wanke, Michael Clement; Allen, S. James (University of California Santa Barbara)

    2006-11-01

    Solid-state lighting (SSL) technologies, based on semiconductor light emitting devices, have the potential to reduce worldwide electricity consumption by more than 10%, which could significantly reduce U.S. dependence on imported energy and improve energy security. The III-nitride (AlGaInN) materials system forms the foundation for white SSL and could cover a wide spectral range from the deep UV to the infrared. For this LDRD program, we have investigated the synthesis of single-crystalline III-nitride nanowires and heterostructure nanowires, which may possess unique optoelectronic properties. These novel structures could ultimately lead to the development of novel and highly efficient SSL nanodevice applications. GaN and III-nitride core-shell heterostructure nanowires were successfully synthesized by metal organic chemical vapor deposition (MOCVD) on two-inch wafer substrates. The effect of process conditions on nanowire growth was investigated, and characterization of the structural, optical, and electrical properties of the nanowires was also performed.

  18. Small space object imaging : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Ackermann, Mark R.; Valley, Michael T.; Kearney, Sean Patrick

    2009-10-01

    We report the results of an LDRD effort to investigate new technologies for the identification of small-sized (mm to cm) debris in low-earth orbit. This small-yet-energetic debris presents a threat to the integrity of space-assets worldwide and represents significant security challenge to the international community. We present a nonexhaustive review of recent US and Russian efforts to meet the challenges of debris identification and removal and then provide a detailed description of joint US-Russian plans for sensitive, laser-based imaging of small debris at distances of hundreds of kilometers and relative velocities of several kilometers per second. Plans for the upcoming experimental testing of these imaging schemes are presented and a preliminary path toward system integration is identified.

  19. LDRD Highlights at the National Laboratories

    Energy Technology Data Exchange (ETDEWEB)

    Alayat, R. A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-10-10

    To meet the nation’s critical challenges, the Department of Energy (DOE) national laboratories have always pushed the boundaries of science, technology, and engineering. The Atomic Energy Act of 1954 provided the basis for these laboratories to engage in the cutting edge of science and technology and respond to technological surprises, while retaining the best scientific and technological minds. To help re-energize this commitment, in 1991 the U.S. Congress authorized the national laboratories to devote a relatively small percentage of their budget to creative and innovative work that serves to maintain their vitality in disciplines relevant to DOE missions. Since then, this effort has been formally called the Laboratory Directed Research and Development (LDRD) Program. LDRD has been an essential mechanism to enable the laboratories to address DOE’s current and future missions with leading-edge research proposed independently by laboratory technical staff, evaluated through expert peer-review committees, and funded by the individual laboratories consistent with the authorizing legislation and the DOE LDRD Order 413.2C.

  20. Neurons to algorithms LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Rothganger, Fredrick H.; Aimone, James Bradley; Warrender, Christina E.; Trumbo, Derek

    2013-09-01

    Over the last three years the Neurons to Algorithms (N2A) LDRD project teams has built infrastructure to discover computational structures in the brain. This consists of a modeling language, a tool that enables model development and simulation in that language, and initial connections with the Neuroinformatics community, a group working toward similar goals. The approach of N2A is to express large complex systems like the brain as populations of a discrete part types that have specific structural relationships with each other, along with internal and structural dynamics. Such an evolving mathematical system may be able to capture the essence of neural processing, and ultimately of thought itself. This final report is a cover for the actual products of the project: the N2A Language Specification, the N2A Application, and a journal paper summarizing our methods.

  1. Efficient Probability of Failure Calculations for QMU using Computational Geometry LDRD 13-0144 Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Mitchell, Scott A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ebeida, Mohamed Salah [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Romero, Vicente J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Swiler, Laura Painton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rushdi, Ahmad A. [Univ. of Texas, Austin, TX (United States); Abdelkader, Ahmad [Univ. of Maryland, College Park, MD (United States)

    2015-09-01

    This SAND report summarizes our work on the Sandia National Laboratory LDRD project titled "Efficient Probability of Failure Calculations for QMU using Computational Geometry" which was project #165617 and proposal #13-0144. This report merely summarizes our work. Those interested in the technical details are encouraged to read the full published results, and contact the report authors for the status of the software and follow-on projects.

  2. LDRD final report : robust analysis of large-scale combinatorial applications.

    Energy Technology Data Exchange (ETDEWEB)

    Carr, Robert D.; Morrison, Todd (University of Colorado, Denver, CO); Hart, William Eugene; Benavides, Nicolas L. (Santa Clara University, Santa Clara, CA); Greenberg, Harvey J. (University of Colorado, Denver, CO); Watson, Jean-Paul; Phillips, Cynthia Ann

    2007-09-01

    Discrete models of large, complex systems like national infrastructures and complex logistics frameworks naturally incorporate many modeling uncertainties. Consequently, there is a clear need for optimization techniques that can robustly account for risks associated with modeling uncertainties. This report summarizes the progress of the Late-Start LDRD 'Robust Analysis of Largescale Combinatorial Applications'. This project developed new heuristics for solving robust optimization models, and developed new robust optimization models for describing uncertainty scenarios.

  3. Cognitive Computing for Security.

    Energy Technology Data Exchange (ETDEWEB)

    Debenedictis, Erik [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rothganger, Fredrick [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Aimone, James Bradley [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Marinella, Matthew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Evans, Brian Robert [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Warrender, Christina E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mickel, Patrick [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-12-01

    Final report for Cognitive Computing for Security LDRD 165613. It reports on the development of hybrid of general purpose/ne uromorphic computer architecture, with an emphasis on potential implementation with memristors.

  4. Laboratory Directed Research and Development FY2008 Annual Report

    International Nuclear Information System (INIS)

    Kammeraad, J.E.; Jackson, K.J.; Sketchley, J.A.; Kotta, P.R.

    2009-01-01

    The Laboratory Directed Research and Development (LDRD) Program, authorized by Congress in 1991 and administered by the Institutional Science and Technology Office at Lawrence Livermore, is our primary means for pursuing innovative, long-term, high-risk, and potentially high-payoff research that supports the full spectrum of national security interests encompassed by the missions of the Laboratory, the Department of Energy, and National Nuclear Security Administration. The accomplishments described in this annual report demonstrate the strong alignment of the LDRD portfolio with these missions and contribute to the Laboratory's success in meeting its goals. The LDRD budget of $91.5 million for fiscal year 2008 sponsored 176 projects. These projects were selected through an extensive peer-review process to ensure the highest scientific quality and mission relevance. Each year, the number of deserving proposals far exceeds the funding available, making the selection a tough one indeed. Our ongoing investments in LDRD have reaped long-term rewards for the Laboratory and the nation. Many Laboratory programs trace their roots to research thrusts that began several years ago under LDRD sponsorship. In addition, many LDRD projects contribute to more than one mission area, leveraging the Laboratory's multidisciplinary team approach to science and technology. Safeguarding the nation from terrorist activity and the proliferation of weapons of mass destruction will be an enduring mission of this Laboratory, for which LDRD will continue to play a vital role. The LDRD Program is a success story. Our projects continue to win national recognition for excellence through prestigious awards, papers published in peer-reviewed journals, and patents granted. With its reputation for sponsoring innovative projects, the LDRD Program is also a major vehicle for attracting and retaining the best and the brightest technical staff and for establishing collaborations with universities

  5. LDRD final report: photonic analog-to-digital converter (ADC) technology; TOPICAL

    International Nuclear Information System (INIS)

    Bowers, M; Deri, B; Haigh, R; Lowry, M; Sargis, P; Stafford, R; Tong, T

    1999-01-01

    We report on an LDRD seed program of novel technology development (started by an FY98 Engineering Tech-base project) that will enable extremely high-fidelity analog-to-digital converters for a variety of national security missions. High speed (l0+ GS/s ), high precision (l0+ bits) ADC technology requires extremely short aperture times ((approx)1ps ) with very low jitter requirements (sub 10fs ). These fundamental requirements, along with other technological barriers, are difficult to realize with electronics: However, we outline here, a way to achieve these timing apertures using a novel multi-wavelength optoelectronic short-pulse optical source. Our approach uses an optoelectronic feedback scheme with high optical Q to produce an optical pulse train with ultra-low jitter ( sub 5fs) and high amplitude stability ( and lt;10(sup 10)). This approach requires low power and can be integrated into an optoelectronic integrated circuit to minimize the size. Under this seed program we have demonstrated that the optical feedback mechanism can be used to generate a high Q resonator. This has reduced the technical risk for further development, making it an attractive candidate for outside funding

  6. Project Management with IT Security Focus

    OpenAIRE

    Felician Alecu; Paul Pocatilu; Sergiu Capisizu

    2011-01-01

    The paper focus on the main key points related to the IT security project management. The most important lifecycle stages are identified: IT security project proposal definition, project organization, project planning, quality planning, project team organization, IT security project activities management and project closing. The most important success factors for IT security projects are the support of top-management, customer satisfaction, prevention over remediation and continuous progress....

  7. LDRD Report: Topological Design Optimization of Convolutes in Next Generation Pulsed Power Devices.

    Energy Technology Data Exchange (ETDEWEB)

    Cyr, Eric C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); von Winckel, Gregory John [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Kouri, Drew Philip [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gardiner, Thomas Anthony [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ridzal, Denis [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Shadid, John N. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Miller, Sean [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-09-01

    This LDRD project was developed around the ambitious goal of applying PDE-constrained opti- mization approaches to design Z-machine components whose performance is governed by elec- tromagnetic and plasma models. This report documents the results of this LDRD project. Our differentiating approach was to use topology optimization methods developed for structural design and extend them for application to electromagnetic systems pertinent to the Z-machine. To achieve this objective a suite of optimization algorithms were implemented in the ROL library part of the Trilinos framework. These methods were applied to standalone demonstration problems and the Drekar multi-physics research application. Out of this exploration a new augmented Lagrangian approach to structural design problems was developed. We demonstrate that this approach has favorable mesh-independent performance. Both the final design and the algorithmic performance were independent of the size of the mesh. In addition, topology optimization formulations for the design of conducting networks were developed and demonstrated. Of note, this formulation was used to develop a design for the inner magnetically insulated transmission line on the Z-machine. The resulting electromagnetic device is compared with theoretically postulated designs.

  8. Laboratory Directed Research and Development FY2008 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Kammeraad, J E; Jackson, K J; Sketchley, J A; Kotta, P R

    2009-03-24

    The Laboratory Directed Research and Development (LDRD) Program, authorized by Congress in 1991 and administered by the Institutional Science and Technology Office at Lawrence Livermore, is our primary means for pursuing innovative, long-term, high-risk, and potentially high-payoff research that supports the full spectrum of national security interests encompassed by the missions of the Laboratory, the Department of Energy, and National Nuclear Security Administration. The accomplishments described in this annual report demonstrate the strong alignment of the LDRD portfolio with these missions and contribute to the Laboratory's success in meeting its goals. The LDRD budget of $91.5 million for fiscal year 2008 sponsored 176 projects. These projects were selected through an extensive peer-review process to ensure the highest scientific quality and mission relevance. Each year, the number of deserving proposals far exceeds the funding available, making the selection a tough one indeed. Our ongoing investments in LDRD have reaped long-term rewards for the Laboratory and the nation. Many Laboratory programs trace their roots to research thrusts that began several years ago under LDRD sponsorship. In addition, many LDRD projects contribute to more than one mission area, leveraging the Laboratory's multidisciplinary team approach to science and technology. Safeguarding the nation from terrorist activity and the proliferation of weapons of mass destruction will be an enduring mission of this Laboratory, for which LDRD will continue to play a vital role. The LDRD Program is a success story. Our projects continue to win national recognition for excellence through prestigious awards, papers published in peer-reviewed journals, and patents granted. With its reputation for sponsoring innovative projects, the LDRD Program is also a major vehicle for attracting and retaining the best and the brightest technical staff and for establishing collaborations with

  9. Final LDRD report : advanced plastic scintillators for neutron detection.

    Energy Technology Data Exchange (ETDEWEB)

    Vance, Andrew L.; Mascarenhas, Nicholas; O' Bryan, Greg; Mrowka, Stanley

    2010-09-01

    This report summarizes the results of a one-year, feasibility-scale LDRD project that was conducted with the goal of developing new plastic scintillators capable of pulse shape discrimination (PSD) for neutron detection. Copolymers composed of matrix materials such as poly(methyl methacrylate) (PMMA) and blocks containing trans-stilbene (tSB) as the scintillator component were prepared and tested for gamma/neutron response. Block copolymer synthesis utilizing tSBMA proved unsuccessful so random copolymers containing up to 30% tSB were prepared. These copolymers were found to function as scintillators upon exposure to gamma radiation; however, they did not exhibit PSD when exposed to a neutron source. This project, while falling short of its ultimate goal, demonstrated the possible utility of single-component, undoped plastics as scintillators for applications that do not require PSD.

  10. Final Report for LDRD Project 02-FS-009 Gigapixel Surveillance Camera

    Energy Technology Data Exchange (ETDEWEB)

    Marrs, R E; Bennett, C L

    2010-04-20

    The threats of terrorism and proliferation of weapons of mass destruction add urgency to the development of new techniques for surveillance and intelligence collection. For example, the United States faces a serious and growing threat from adversaries who locate key facilities underground, hide them within other facilities, or otherwise conceal their location and function. Reconnaissance photographs are one of the most important tools for uncovering the capabilities of adversaries. However, current imaging technology provides only infrequent static images of a large area, or occasional video of a small area. We are attempting to add a new dimension to reconnaissance by introducing a capability for large area video surveillance. This capability would enable tracking of all vehicle movements within a very large area. The goal of our project is the development of a gigapixel video surveillance camera for high altitude aircraft or balloon platforms. From very high altitude platforms (20-40 km altitude) it would be possible to track every moving vehicle within an area of roughly 100 km x 100 km, about the size of the San Francisco Bay region, with a gigapixel camera. Reliable tracking of vehicles requires a ground sampling distance (GSD) of 0.5 to 1 m and a framing rate of approximately two frames per second (fps). For a 100 km x 100 km area the corresponding pixel count is 10 gigapixels for a 1-m GSD and 40 gigapixels for a 0.5-m GSD. This is an order of magnitude beyond the 1 gigapixel camera envisioned in our LDRD proposal. We have determined that an instrument of this capacity is feasible.

  11. Laboratory Directed Research and Development Program FY2011

    Energy Technology Data Exchange (ETDEWEB)

    none, none

    2012-04-27

    Berkeley Lab's research and the Laboratory Directed Research and Development (LDRD) program support DOE's Strategic Themes that are codified in DOE's 2006 Strategic Plan (DOE/CF-0010), with a primary focus on Scientific Discovery and Innovation. For that strategic theme, the Fiscal Year (FY) 2011 LDRD projects support each one of the three goals through multiple strategies described in the plan. In addition, LDRD efforts support the four goals of Energy Security, the two goals of Environmental Responsibility, and Nuclear Security (unclassified fundamental research that supports stockpile safety and nonproliferation programs). Going forward in FY 2012, the LDRD program also supports the Goals codified in the new DOE Strategic Plan of May, 2011. The LDRD program also supports Office of Science strategic plans, including the 20-year Scientific Facilities Plan and the Office of Science Strategic Plan. The research also supports the strategic directions periodically under consideration and review by the Office of Science Program Offices, such as LDRD projects germane to new research facility concepts and new fundamental science directions. Brief summares of projects and accomplishments for the period for each division are included.

  12. LDRD Final Report - Investigations of the impact of the process integration of deposited magnetic films for magnetic memory technologies on radiation-hardened CMOS devices and circuits - LDRD Project (FY99)

    Energy Technology Data Exchange (ETDEWEB)

    MYERS,DAVID R.; JESSING,JEFFREY R.; SPAHN,OLGA B.; SHANEYFELT,MARTY R.

    2000-01-01

    This project represented a coordinated LLNL-SNL collaboration to investigate the feasibility of developing radiation-hardened magnetic non-volatile memories using giant magnetoresistance (GMR) materials. The intent of this limited-duration study was to investigate whether giant magnetoresistance (GMR) materials similar to those used for magnetic tunnel junctions (MTJs) were process compatible with functioning CMOS circuits. Sandia's work on this project demonstrated that deposition of GMR materials did not affect the operation nor the radiation hardness of Sandia's rad-hard CMOS technology, nor did the integration of GMR materials and exposure to ionizing radiation affect the magnetic properties of the GMR films. Thus, following deposition of GMR films on rad-hard integrated circuits, both the circuits and the films survived ionizing radiation levels consistent with DOE mission requirements. Furthermore, Sandia developed techniques to pattern deposited GMR films without degrading the completed integrated circuits upon which they were deposited. The present feasibility study demonstrated all the necessary processing elements to allow fabrication of the non-volatile memory elements onto an existing CMOS chip, and even allow the use of embedded (on-chip) non-volatile memories for system-on-a-chip applications, even in demanding radiation environments. However, funding agencies DTRA, AIM, and DARPA did not have any funds available to support the required follow-on technology development projects that would have been required to develop functioning prototype circuits, nor were such funds available from LDRD nor from other DOE program funds.

  13. LDRD Final Report - Investigations of the impact of the process integration of deposited magnetic films for magnetic memory technologies on radiation hardened CMOS devices and circuits - LDRD Project (FY99)

    International Nuclear Information System (INIS)

    Myers, David R.; Jessing, Jeffrey R.; Spahn, Olga B.; Shaneyfelt, Marty R.

    2000-01-01

    This project represented a coordinated LLNL-SNL collaboration to investigate the feasibility of developing radiation-hardened magnetic non-volatile memories using giant magnetoresistance (GMR) materials. The intent of this limited-duration study was to investigate whether giant magnetoresistance (GMR) materials similar to those used for magnetic tunnel junctions (MTJs) were process compatible with functioning CMOS circuits. Sandia's work on this project demonstrated that deposition of GMR materials did not affect the operation nor the radiation hardness of Sandia's rad-hard CMOS technology, nor did the integration of GMR materials and exposure to ionizing radiation affect the magnetic properties of the GMR films. Thus, following deposition of GMR films on rad-hard integrated circuits, both the circuits and the films survived ionizing radiation levels consistent with DOE mission requirements. Furthermore, Sandia developed techniques to pattern deposited GMR films without degrading the completed integrated circuits upon which they were deposited. The present feasibility study demonstrated all the necessary processing elements to allow fabrication of the non-volatile memory elements onto an existing CMOS chip, and even allow the use of embedded (on-chip) non-volatile memories for system-on-a-chip applications, even in demanding radiation environments. However, funding agencies DTRA, AIM, and DARPA did not have any funds available to support the required follow-on technology development projects that would have been required to develop functioning prototype circuits, nor were such funds available from LDRD nor from other DOE program funds

  14. LDRD final report : a lightweight operating system for multi-core capability class supercomputers.

    Energy Technology Data Exchange (ETDEWEB)

    Kelly, Suzanne Marie; Hudson, Trammell B. (OS Research); Ferreira, Kurt Brian; Bridges, Patrick G. (University of New Mexico); Pedretti, Kevin Thomas Tauke; Levenhagen, Michael J.; Brightwell, Ronald Brian

    2010-09-01

    The two primary objectives of this LDRD project were to create a lightweight kernel (LWK) operating system(OS) designed to take maximum advantage of multi-core processors, and to leverage the virtualization capabilities in modern multi-core processors to create a more flexible and adaptable LWK environment. The most significant technical accomplishments of this project were the development of the Kitten lightweight kernel, the co-development of the SMARTMAP intra-node memory mapping technique, and the development and demonstration of a scalable virtualization environment for HPC. Each of these topics is presented in this report by the inclusion of a published or submitted research paper. The results of this project are being leveraged by several ongoing and new research projects.

  15. A Complex Systems Approach to More Resilient Multi-Layered Security Systems

    Energy Technology Data Exchange (ETDEWEB)

    Brown, Nathanael J. K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Katherine A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Bandlow, Alisa [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nozick, Linda Karen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Waddell, Lucas [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Levin, Drew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Whetzel, Jonathan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-09-01

    In July 2012, protestors cut through security fences and gained access to the Y-12 National Security Complex. This was believed to be a highly reliable, multi-layered security system. This report documents the results of a Laboratory Directed Research and Development (LDRD) project that created a consistent, robust mathematical framework using complex systems analysis algorithms and techniques to better understand the emergent behavior, vulnerabilities and resiliency of multi-layered security systems subject to budget constraints and competing security priorities. Because there are several dimensions to security system performance and a range of attacks that might occur, the framework is multi-objective for a performance frontier to be estimated. This research explicitly uses probability of intruder interruption given detection (PI) as the primary resilience metric. We demonstrate the utility of this framework with both notional as well as real-world examples of Physical Protection Systems (PPSs) and validate using a well-established force-on-force simulation tool, Umbra.

  16. Quantifiably secure power grid operation, management, and evolution :

    Energy Technology Data Exchange (ETDEWEB)

    Gray, Genetha Anne.; Watson, Jean-Paul; Silva Monroy, Cesar Augusto; Gramacy, Robert B.

    2013-09-01

    This report summarizes findings and results of the Quantifiably Secure Power Grid Operation, Management, and Evolution LDRD. The focus of the LDRD was to develop decisionsupport technologies to enable rational and quantifiable risk management for two key grid operational timescales: scheduling (day-ahead) and planning (month-to-year-ahead). Risk or resiliency metrics are foundational in this effort. The 2003 Northeast Blackout investigative report stressed the criticality of enforceable metrics for system resiliency the grids ability to satisfy demands subject to perturbation. However, we neither have well-defined risk metrics for addressing the pervasive uncertainties in a renewable energy era, nor decision-support tools for their enforcement, which severely impacts efforts to rationally improve grid security. For day-ahead unit commitment, decision-support tools must account for topological security constraints, loss-of-load (economic) costs, and supply and demand variability especially given high renewables penetration. For long-term planning, transmission and generation expansion must ensure realized demand is satisfied for various projected technological, climate, and growth scenarios. The decision-support tools investigated in this project paid particular attention to tailoriented risk metrics for explicitly addressing high-consequence events. Historically, decisionsupport tools for the grid consider expected cost minimization, largely ignoring risk and instead penalizing loss-of-load through artificial parameters. The technical focus of this work was the development of scalable solvers for enforcing risk metrics. Advanced stochastic programming solvers were developed to address generation and transmission expansion and unit commitment, minimizing cost subject to pre-specified risk thresholds. Particular attention was paid to renewables where security critically depends on production and demand prediction accuracy. To address this

  17. Three-dimensional gyrokinetic particle-in-cell simulation of plasmas on a massively parallel computer: Final report on LDRD Core Competency Project, FY 1991--FY 1993

    International Nuclear Information System (INIS)

    Byers, J.A.; Williams, T.J.; Cohen, B.I.; Dimits, A.M.

    1994-01-01

    One of the programs of the Magnetic fusion Energy (MFE) Theory and computations Program is studying the anomalous transport of thermal energy across the field lines in the core of a tokamak. We use the method of gyrokinetic particle-in-cell simulation in this study. For this LDRD project we employed massively parallel processing, new algorithms, and new algorithms, and new formal techniques to improve this research. Specifically, we sought to take steps toward: researching experimentally-relevant parameters in our simulations, learning parallel computing to have as a resource for our group, and achieving a 100 x speedup over our starting-point Cray2 simulation code's performance

  18. Extremely secure identification documents

    International Nuclear Information System (INIS)

    Tolk, K.M.; Bell, M.

    1997-09-01

    The technology developed in this project uses biometric information printed on the document and public key cryptography to ensure that an adversary cannot issue identification documents to unauthorized individuals or alter existing documents to allow their use by unauthorized individuals. This process can be used to produce many types of identification documents with much higher security than any currently in use. The system is demonstrated using a security badge as an example. This project focused on the technologies requiring development in order to make the approach viable with existing badge printing and laminating technologies. By far the most difficult was the image processing required to verify that the picture on the badge had not been altered. Another area that required considerable work was the high density printed data storage required to get sufficient data on the badge for verification of the picture. The image processing process was successfully tested, and recommendations are included to refine the badge system to ensure high reliability. A two dimensional data array suitable for printing the required data on the badge was proposed, but testing of the readability of the array had to be abandoned due to reallocation of the budgeted funds by the LDRD office

  19. Building more powerful less expensive supercomputers using Processing-In-Memory (PIM) LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Murphy, Richard C.

    2009-09-01

    This report details the accomplishments of the 'Building More Powerful Less Expensive Supercomputers Using Processing-In-Memory (PIM)' LDRD ('PIM LDRD', number 105809) for FY07-FY09. Latency dominates all levels of supercomputer design. Within a node, increasing memory latency, relative to processor cycle time, limits CPU performance. Between nodes, the same increase in relative latency impacts scalability. Processing-In-Memory (PIM) is an architecture that directly addresses this problem using enhanced chip fabrication technology and machine organization. PIMs combine high-speed logic and dense, low-latency, high-bandwidth DRAM, and lightweight threads that tolerate latency by performing useful work during memory transactions. This work examines the potential of PIM-based architectures to support mission critical Sandia applications and an emerging class of more data intensive informatics applications. This work has resulted in a stronger architecture/implementation collaboration between 1400 and 1700. Additionally, key technology components have impacted vendor roadmaps, and we are in the process of pursuing these new collaborations. This work has the potential to impact future supercomputer design and construction, reducing power and increasing performance. This final report is organized as follow: this summary chapter discusses the impact of the project (Section 1), provides an enumeration of publications and other public discussion of the work (Section 1), and concludes with a discussion of future work and impact from the project (Section 1). The appendix contains reprints of the refereed publications resulting from this work.

  20. LDRD final report : mesoscale modeling of dynamic loading of heterogeneous materials

    Energy Technology Data Exchange (ETDEWEB)

    Robbins, Joshua [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Dingreville, Remi Philippe Michel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Voth, Thomas Eugene [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Furnish, Michael David [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2013-12-01

    Material response to dynamic loading is often dominated by microstructure (grain structure, porosity, inclusions, defects). An example critically important to Sandia's mission is dynamic strength of polycrystalline metals where heterogeneities lead to localization of deformation and loss of shear strength. Microstructural effects are of broad importance to the scientific community and several institutions within DoD and DOE; however, current models rely on inaccurate assumptions about mechanisms at the sub-continuum or mesoscale. Consequently, there is a critical need for accurate and robust methods for modeling heterogeneous material response at this lower length scale. This report summarizes work performed as part of an LDRD effort (FY11 to FY13; project number 151364) to meet these needs.

  1. Security Risk Assessment in Software Development Projects

    OpenAIRE

    Svendsen, Heidi

    2017-01-01

    Software security is increasing in importance, linearly with vulnerabilities caused by software flaws. It is not possible to spend all the project s resources on software security. To spend the resources given to security in an effective way, one should know what is most important to protect. By performing a risk analysis the project know which vulnerabilities they face. A risk analysis will prioritise the vulnerabilities, and when the vulnerabilities are prioritised the project know where th...

  2. Idaho National Laboratory LDRD Annual Report FY 2012

    Energy Technology Data Exchange (ETDEWEB)

    Dena Tomchak

    2013-03-01

    This report provides a glimpse into our diverse research and development portfolio, wwhich encompasses both advanced nuclear science and technology and underlying technologies. IN keeping with the mission, INL's LDRD program fosters technical capabilities necessary to support current and future DOE-Office of Nuclear Energy research and development needs.

  3. Laboratory Directed Research and Development FY2011 Annual Report

    International Nuclear Information System (INIS)

    Craig, W.; Sketchley, J.; Kotta, P.

    2012-01-01

    A premier applied-science laboratory, Lawrence Livermore National Laboratory (LLNL) has earned the reputation as a leader in providing science and technology solutions to the most pressing national and global security problems. The LDRD Program, established by Congress at all DOE national laboratories in 1991, is LLNL's most important single resource for fostering excellent science and technology for today's needs and tomorrow's challenges. The LDRD internally directed research and development funding at LLNL enables high-risk, potentially high-payoff projects at the forefront of science and technology. The LDRD Program at Livermore serves to: (1) Support the Laboratory's missions, strategic plan, and foundational science; (2) Maintain the Laboratory's science and technology vitality; (3) Promote recruiting and retention; (4) Pursue collaborations; (5) Generate intellectual property; and (6) Strengthen the U.S. economy. Myriad LDRD projects over the years have made important contributions to every facet of the Laboratory's mission and strategic plan, including its commitment to nuclear, global, and energy and environmental security, as well as cutting-edge science and technology and engineering in high-energy-density matter, high-performance computing and simulation, materials and chemistry at the extremes, information systems, measurements and experimental science, and energy manipulation. A summary of each project was submitted by the principal investigator. Project summaries include the scope, motivation, goals, relevance to DOE/NNSA and LLNL mission areas, the technical progress achieved in FY11, and a list of publications that resulted from the research. The projects are: (1) Nuclear Threat Reduction; (2) Biosecurity; (3) High-Performance Computing and Simulation; (4) Intelligence; (5) Cybersecurity; (6) Energy Security; (7) Carbon Capture; (8) Material Properties, Theory, and Design; (9) Radiochemistry; (10) High-Energy-Density Science; (11) Laser Inertial

  4. LDRD project final report : hybrid AI/cognitive tactical behavior framework for LVC.

    Energy Technology Data Exchange (ETDEWEB)

    Djordjevich, Donna D.; Xavier, Patrick Gordon; Brannon, Nathan Gregory; Hart, Brian E.; Hart, Derek H.; Little, Charles Quentin; Oppel, Fred John III; Linebarger, John Michael; Parker, Eric Paul

    2012-01-01

    This Lab-Directed Research and Development (LDRD) sought to develop technology that enhances scenario construction speed, entity behavior robustness, and scalability in Live-Virtual-Constructive (LVC) simulation. We investigated issues in both simulation architecture and behavior modeling. We developed path-planning technology that improves the ability to express intent in the planning task while still permitting an efficient search algorithm. An LVC simulation demonstrated how this enables 'one-click' layout of squad tactical paths, as well as dynamic re-planning for simulated squads and for real and simulated mobile robots. We identified human response latencies that can be exploited in parallel/distributed architectures. We did an experimental study to determine where parallelization would be productive in Umbra-based force-on-force (FOF) simulations. We developed and implemented a data-driven simulation composition approach that solves entity class hierarchy issues and supports assurance of simulation fairness. Finally, we proposed a flexible framework to enable integration of multiple behavior modeling components that model working memory phenomena with different degrees of sophistication.

  5. FY2007 Laboratory Directed Research and Development Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Craig, W W; Sketchley, J A; Kotta, P R

    2008-03-20

    The Laboratory Directed Research and Development (LDRD) annual report for fiscal year 2007 (FY07) provides a summary of LDRD-funded projects for the fiscal year and consists of two parts: An introduction to the LDRD Program, the LDRD portfolio-management process, program statistics for the year, and highlights of accomplishments for the year. A summary of each project, submitted by the principal investigator. Project summaries include the scope, motivation, goals, relevance to Department of Energy (DOE)/National Nuclear Security Administration (NNSA) and Lawrence Livermore National Laboratory (LLNL) mission areas, the technical progress achieved in FY07, and a list of publications that resulted from the research in FY07. Summaries are organized in sections by research category (in alphabetical order). Within each research category, the projects are listed in order of their LDRD project category: Strategic Initiative (SI), Exploratory Research (ER), Laboratory-Wide Competition (LW), and Feasibility Study (FS). Within each project category, the individual project summaries appear in order of their project tracking code, a unique identifier that consists of three elements. The first is the fiscal year the project began, the second represents the project category, and the third identifies the serial number of the proposal for that fiscal year.

  6. Network discovery, characterization, and prediction : a grand challenge LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Kegelmeyer, W. Philip, Jr.

    2010-11-01

    This report is the final summation of Sandia's Grand Challenge LDRD project No.119351, 'Network Discovery, Characterization and Prediction' (the 'NGC') which ran from FY08 to FY10. The aim of the NGC, in a nutshell, was to research, develop, and evaluate relevant analysis capabilities that address adversarial networks. Unlike some Grand Challenge efforts, that ambition created cultural subgoals, as well as technical and programmatic ones, as the insistence on 'relevancy' required that the Sandia informatics research communities and the analyst user communities come to appreciate each others needs and capabilities in a very deep and concrete way. The NGC generated a number of technical, programmatic, and cultural advances, detailed in this report. There were new algorithmic insights and research that resulted in fifty-three refereed publications and presentations; this report concludes with an abstract-annotated bibliography pointing to them all. The NGC generated three substantial prototypes that not only achieved their intended goals of testing our algorithmic integration, but which also served as vehicles for customer education and program development. The NGC, as intended, has catalyzed future work in this domain; by the end it had already brought in, in new funding, as much funding as had been invested in it. Finally, the NGC knit together previously disparate research staff and user expertise in a fashion that not only addressed our immediate research goals, but which promises to have created an enduring cultural legacy of mutual understanding, in service of Sandia's national security responsibilities in cybersecurity and counter proliferation.

  7. Final LDRD report :ultraviolet water purification systems for rural environments and mobile applications.

    Energy Technology Data Exchange (ETDEWEB)

    Banas, Michael Anthony; Crawford, Mary Hagerott; Ruby, Douglas Scott; Ross, Michael P.; Nelson, Jeffrey Scott; Allerman, Andrew Alan; Boucher, Ray

    2005-11-01

    We present the results of a one year LDRD program that has focused on evaluating the use of newly developed deep ultraviolet LEDs in water purification. We describe our development efforts that have produced an LED-based water exposure set-up and enumerate the advances that have been made in deep UV LED performance throughout the project. The results of E. coli inactivation with 270-295 nm LEDs are presented along with an assessment of the potential for applying deep ultraviolet LED-based water purification to mobile point-of-use applications as well as to rural and international environments where the benefits of photovoltaic-powered systems can be realized.

  8. Tracking of Nuclear Production using Indigenous Species: Final LDRD Report

    International Nuclear Information System (INIS)

    Alam, Todd Michael; Alam, Mary Kathleen; McIntyre, Sarah K.; Volk, David; Neerathilingam, Muniasamy; Luxon, Bruce A.; Ansari, G. A. Shakeel

    2009-01-01

    Our LDRD research project sought to develop an analytical method for detection of chemicals used in nuclear materials processing. Our approach is distinctly different than current research involving hardware-based sensors. By utilizing the response of indigenous species of plants and/or animals surrounding (or within) a nuclear processing facility, we propose tracking 'suspicious molecules' relevant to nuclear materials processing. As proof of concept, we have examined TBP, tributylphosphate, used in uranium enrichment as well as plutonium extraction from spent nuclear fuels. We will compare TBP to the TPP (triphenylphosphate) analog to determine the uniqueness of the metabonomic response. We show that there is a unique metabonomic response within our animal model to TBP. The TBP signature can further be delineated from that of TPP. We have also developed unique methods of instrumental transfer for metabonomic data sets.

  9. Tracking of Nuclear Production using Indigenous Species: Final LDRD Report

    Energy Technology Data Exchange (ETDEWEB)

    Alam, Todd Michael [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Dept. of Electronic and Nanostructured Materials; Alam, Mary Kathleen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Energetics Characterization Dept.; McIntyre, Sarah K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Dept. of Electronic and Nanostructured Materials; Volk, David [Univ. of Texas, Galveston, TX (United States). Medical Branch; Neerathilingam, Muniasamy [Univ. of Texas, Galveston, TX (United States). Medical Branch; Luxon, Bruce A. [Univ. of Texas, Galveston, TX (United States). Medical Branch; Ansari, G. A. Shakeel [Univ. of Texas, Galveston, TX (United States). Medical Branch

    2009-10-01

    Our LDRD research project sought to develop an analytical method for detection of chemicals used in nuclear materials processing. Our approach is distinctly different than current research involving hardware-based sensors. By utilizing the response of indigenous species of plants and/or animals surrounding (or within) a nuclear processing facility, we propose tracking 'suspicious molecules' relevant to nuclear materials processing. As proof of concept, we have examined TBP, tributylphosphate, used in uranium enrichment as well as plutonium extraction from spent nuclear fuels. We will compare TBP to the TPP (triphenylphosphate) analog to determine the uniqueness of the metabonomic response. We show that there is a unique metabonomic response within our animal model to TBP. The TBP signature can further be delineated from that of TPP. We have also developed unique methods of instrumental transfer for metabonomic data sets.

  10. Laboratory Directed Research and Development (LDRD) on Mono-uranium Nitride Fuel Development for SSTAR and Space Applications

    International Nuclear Information System (INIS)

    Choi, J; Ebbinghaus, B; Meiers, T; Ahn, J

    2006-01-01

    The US National Energy Policy of 2001 advocated the development of advanced fuel and fuel cycle technologies that are cleaner, more efficient, less waste-intensive, and more proliferation resistant. The need for advanced fuel development is emphasized in on-going DOE-supported programs, e.g., Global Nuclear Energy Initiative (GNEI), Advanced Fuel Cycle Initiative (AFCI), and GEN-IV Technology Development. The Directorates of Energy and Environment (E and E) and Chemistry and Material Sciences (C and MS) at Lawrence Livermore National Laboratory (LLNL) are interested in advanced fuel research and manufacturing using its multi-disciplinary capability and facilities to support a design concept of a small, secure, transportable, and autonomous reactor (SSTAR). The E and E and C and MS Directorates co-sponsored this Laboratory Directed Research and Development (LDRD) Project on Mono-Uranium Nitride Fuel Development for SSTAR and Space Applications. In fact, three out of the six GEN-IV reactor concepts consider using the nitride-based fuel, as shown in Table 1. SSTAR is a liquid-metal cooled, fast reactor. It uses nitride fuel in a sealed reactor vessel that could be shipped to the user and returned to the supplier having never been opened in its long operating lifetime. This sealed reactor concept envisions no fuel refueling nor on-site storage of spent fuel, and as a result, can greatly enhance proliferation resistance. However, the requirement for a sealed, long-life core imposes great challenges to research and development of the nitride fuel and its cladding. Cladding is an important interface between the fuel and coolant and a barrier to prevent fission gas release during normal and accidental conditions. In fabricating the nitride fuel rods and assemblies, the cladding material should be selected based on its the coolant-side corrosion properties, the chemical/physical interaction with the nitride fuel, as well as their thermal and neutronic properties. The US

  11. Laboratory Directed Research and Development FY2011 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Craig, W; Sketchley, J; Kotta, P

    2012-03-22

    A premier applied-science laboratory, Lawrence Livermore National Laboratory (LLNL) has earned the reputation as a leader in providing science and technology solutions to the most pressing national and global security problems. The LDRD Program, established by Congress at all DOE national laboratories in 1991, is LLNL's most important single resource for fostering excellent science and technology for today's needs and tomorrow's challenges. The LDRD internally directed research and development funding at LLNL enables high-risk, potentially high-payoff projects at the forefront of science and technology. The LDRD Program at Livermore serves to: (1) Support the Laboratory's missions, strategic plan, and foundational science; (2) Maintain the Laboratory's science and technology vitality; (3) Promote recruiting and retention; (4) Pursue collaborations; (5) Generate intellectual property; and (6) Strengthen the U.S. economy. Myriad LDRD projects over the years have made important contributions to every facet of the Laboratory's mission and strategic plan, including its commitment to nuclear, global, and energy and environmental security, as well as cutting-edge science and technology and engineering in high-energy-density matter, high-performance computing and simulation, materials and chemistry at the extremes, information systems, measurements and experimental science, and energy manipulation. A summary of each project was submitted by the principal investigator. Project summaries include the scope, motivation, goals, relevance to DOE/NNSA and LLNL mission areas, the technical progress achieved in FY11, and a list of publications that resulted from the research. The projects are: (1) Nuclear Threat Reduction; (2) Biosecurity; (3) High-Performance Computing and Simulation; (4) Intelligence; (5) Cybersecurity; (6) Energy Security; (7) Carbon Capture; (8) Material Properties, Theory, and Design; (9) Radiochemistry; (10) High

  12. Automated Algorithms for Quantum-Level Accuracy in Atomistic Simulations: LDRD Final Report.

    Energy Technology Data Exchange (ETDEWEB)

    Thompson, Aidan Patrick; Schultz, Peter Andrew; Crozier, Paul; Moore, Stan Gerald; Swiler, Laura Painton; Stephens, John Adam; Trott, Christian Robert; Foiles, Stephen Martin; Tucker, Garritt J. (Drexel University)

    2014-09-01

    This report summarizes the result of LDRD project 12-0395, titled "Automated Algorithms for Quantum-level Accuracy in Atomistic Simulations." During the course of this LDRD, we have developed an interatomic potential for solids and liquids called Spectral Neighbor Analysis Poten- tial (SNAP). The SNAP potential has a very general form and uses machine-learning techniques to reproduce the energies, forces, and stress tensors of a large set of small configurations of atoms, which are obtained using high-accuracy quantum electronic structure (QM) calculations. The local environment of each atom is characterized by a set of bispectrum components of the local neighbor density projected on to a basis of hyperspherical harmonics in four dimensions. The SNAP coef- ficients are determined using weighted least-squares linear regression against the full QM training set. This allows the SNAP potential to be fit in a robust, automated manner to large QM data sets using many bispectrum components. The calculation of the bispectrum components and the SNAP potential are implemented in the LAMMPS parallel molecular dynamics code. Global optimization methods in the DAKOTA software package are used to seek out good choices of hyperparameters that define the overall structure of the SNAP potential. FitSnap.py, a Python-based software pack- age interfacing to both LAMMPS and DAKOTA is used to formulate the linear regression problem, solve it, and analyze the accuracy of the resultant SNAP potential. We describe a SNAP potential for tantalum that accurately reproduces a variety of solid and liquid properties. Most significantly, in contrast to existing tantalum potentials, SNAP correctly predicts the Peierls barrier for screw dislocation motion. We also present results from SNAP potentials generated for indium phosphide (InP) and silica (SiO 2 ). We describe efficient algorithms for calculating SNAP forces and energies in molecular dynamics simulations using massively parallel computers

  13. National Security Technology Incubation Project Continuation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-09-30

    This document contains a project continuation plan for the National Security Technology Incubator (NSTI). The plan was developed as part of the National Security Preparedness Project (NSPP) funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This continuation plan describes the current status of NSTI (staffing and clients), long-term goals, strategies, and long-term financial solvency goals.The Arrowhead Center of New Mexico State University (NMSU) is the operator and manager of the NSTI. To realize the NSTI, Arrowhead Center must meet several performance objectives related to planning, development, execution, evaluation, and sustainability. This continuation plan is critical to the success of NSTI in its mission of incubating businesses with security technology products and services.

  14. Nuclear Power Plant Cyber Security Discrete Dynamic Event Tree Analysis (LDRD 17-0958) FY17 Report

    Energy Technology Data Exchange (ETDEWEB)

    Wheeler, Timothy A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Denman, Matthew R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Williams, R. A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Martin, Nevin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jankovsky, Zachary Kyle [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-09-01

    Instrumentation and control of nuclear power is transforming from analog to modern digital assets. These control systems perform key safety and security functions. This transformation is occurring in new plant designs as well as in the existing fleet of plants as the operation of those plants is extended to 60 years. This transformation introduces new and unknown issues involving both digital asset induced safety issues and security issues. Traditional nuclear power risk assessment tools and cyber security assessment methods have not been modified or developed to address the unique nature of cyber failure modes and of cyber security threat vulnerabilities. iii This Lab-Directed Research and Development project has developed a dynamic cyber-risk in- formed tool to facilitate the analysis of unique cyber failure modes and the time sequencing of cyber faults, both malicious and non-malicious, and impose those cyber exploits and cyber faults onto a nuclear power plant accident sequence simulator code to assess how cyber exploits and cyber faults could interact with a plants digital instrumentation and control (DI&C) system and defeat or circumvent a plants cyber security controls. This was achieved by coupling an existing Sandia National Laboratories nuclear accident dynamic simulator code with a cyber emulytics code to demonstrate real-time simulation of cyber exploits and their impact on automatic DI&C responses. Studying such potential time-sequenced cyber-attacks and their risks (i.e., the associated impact and the associated degree of difficulty to achieve the attack vector) on accident management establishes a technical risk informed framework for developing effective cyber security controls for nuclear power.

  15. Laboratory Directed Research and Development Program FY2016 Annual Summary of Completed Projects

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2017-03-30

    ORNL FY 2016 Annual Summary of Laboratory Directed Research and Development Program (LDRD) Completed Projects. The Laboratory Directed Research and Development (LDRD) program at ORNL operates under the authority of DOE Order 413.2C, “Laboratory Directed Research and Development” (October 22, 2015), which establishes DOE’s requirements for the program while providing the Laboratory Director broad flexibility for program implementation. The LDRD program funds are obtained through a charge to all Laboratory programs. ORNL reports its status to DOE in March of each year.

  16. Final LDRD report : development of advanced UV light emitters and biological agent detection strategies.

    Energy Technology Data Exchange (ETDEWEB)

    Figiel, Jeffrey James; Crawford, Mary Hagerott; Banas, Michael Anthony; Farrow, Darcie; Armstrong, Andrew M.; Serkland, Darwin Keith; Allerman, Andrew Alan; Schmitt, Randal L.

    2007-12-01

    We present the results of a three year LDRD project which has focused on the development of novel, compact, ultraviolet solid-state sources and fluorescence-based sensing platforms that apply such devices to the sensing of biological and nuclear materials. We describe our development of 270-280 nm AlGaN-based semiconductor UV LEDs with performance suitable for evaluation in biosensor platforms as well as our development efforts towards the realization of a 340 nm AlGaN-based laser diode technology. We further review our sensor development efforts, including evaluation of the efficacy of using modulated LED excitation and phase sensitive detection techniques for fluorescence detection of bio molecules and uranyl-containing compounds.

  17. webinos project deliverable: Phase 1 Security Framework

    OpenAIRE

    webinos consortium

    2011-01-01

    The webinos project aims to deliver a cross-device web application runtime environment, providing a unified development platform and standardized inter-device communication and interaction. This document contains the first iteration of the technical security and privacy framework designed for the webinos project. It accompanies two other documents - D3.1 System Specification and D3.2 API Specifications - and refers to concepts developed in them. The security and privacy architecture aims to p...

  18. A secure communication scheme using projective chaos synchronization

    International Nuclear Information System (INIS)

    Li Zhigang; Xu Daolin

    2004-01-01

    Most secure communication schemes using chaotic dynamics are based on identical synchronization. In this paper, we show the possibility of secure communication using projective synchronization (PS). The unpredictability of the scaling factor in projective synchronization can additionally enhance the security of communication. It is also showed that the scaling factor can be employed to improve the robustness against noise contamination. The feasibility of the communication scheme in high-dimensional chaotic systems, such as the hyperchaotic Roessler system, is demonstrated. Numerical results show the success in transmitting a sound signal through chaotic systems

  19. Real-time discriminatory sensors for water contamination events :LDRD 52595 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Borek, Theodore Thaddeus III (; ); Carrejo-Simpkins, Kimberly; Wheeler, David Roger; Adkins, Douglas Ray; Robinson, Alex Lockwood; Irwin, Adriane Nadine; Lewis, Patrick Raymond; Goodin, Andrew M.; Shelmidine, Gregory J.; Dirk, Shawn M.; Chambers, William Clayton; Mowry, Curtis Dale (1722 Micro-Total-Analytical Systems); Showalter, Steven Kedrick

    2005-10-01

    The gas-phase {mu}ChemLab{trademark} developed by Sandia can detect volatile organics and semi-volatiles organics via gas phase sampling . The goal of this three year Laboratory Directed Research and Development (LDRD) project was to adapt the components and concepts used by the {mu}ChemLab{trademark} system towards the analysis of water-borne chemicals of current concern. In essence, interfacing the gas-phase {mu}ChemLab{trademark} with water to bring the significant prior investment of Sandia and the advantages of microfabrication and portable analysis to a whole new world of important analytes. These include both chemical weapons agents and their hydrolysis products and disinfection by-products such as Trihalomethanes (THMs) and haloacetic acids (HAAs). THMs and HAAs are currently regulated by EPA due to health issues, yet water utilities do not have rapid on-site methods of detection that would allow them to adjust their processes quickly; protecting consumers, meeting water quality standards, and obeying regulations more easily and with greater confidence. This report documents the results, unique hardware and devices, and methods designed during the project toward the goal stated above. It also presents and discusses the portable field system to measure THMs developed in the course of this project.

  20. ParaText : scalable solutions for processing and searching very large document collections : final LDRD report.

    Energy Technology Data Exchange (ETDEWEB)

    Crossno, Patricia Joyce; Dunlavy, Daniel M.; Stanton, Eric T.; Shead, Timothy M.

    2010-09-01

    This report is a summary of the accomplishments of the 'Scalable Solutions for Processing and Searching Very Large Document Collections' LDRD, which ran from FY08 through FY10. Our goal was to investigate scalable text analysis; specifically, methods for information retrieval and visualization that could scale to extremely large document collections. Towards that end, we designed, implemented, and demonstrated a scalable framework for text analysis - ParaText - as a major project deliverable. Further, we demonstrated the benefits of using visual analysis in text analysis algorithm development, improved performance of heterogeneous ensemble models in data classification problems, and the advantages of information theoretic methods in user analysis and interpretation in cross language information retrieval. The project involved 5 members of the technical staff and 3 summer interns (including one who worked two summers). It resulted in a total of 14 publications, 3 new software libraries (2 open source and 1 internal to Sandia), several new end-user software applications, and over 20 presentations. Several follow-on projects have already begun or will start in FY11, with additional projects currently in proposal.

  1. Hybrid methods for cybersecurity analysis :

    Energy Technology Data Exchange (ETDEWEB)

    Davis, Warren Leon,; Dunlavy, Daniel M.

    2014-01-01

    Early 2010 saw a signi cant change in adversarial techniques aimed at network intrusion: a shift from malware delivered via email attachments toward the use of hidden, embedded hyperlinks to initiate sequences of downloads and interactions with web sites and network servers containing malicious software. Enterprise security groups were well poised and experienced in defending the former attacks, but the new types of attacks were larger in number, more challenging to detect, dynamic in nature, and required the development of new technologies and analytic capabilities. The Hybrid LDRD project was aimed at delivering new capabilities in large-scale data modeling and analysis to enterprise security operators and analysts and understanding the challenges of detection and prevention of emerging cybersecurity threats. Leveraging previous LDRD research e orts and capabilities in large-scale relational data analysis, large-scale discrete data analysis and visualization, and streaming data analysis, new modeling and analysis capabilities were quickly brought to bear on the problems in email phishing and spear phishing attacks in the Sandia enterprise security operational groups at the onset of the Hybrid project. As part of this project, a software development and deployment framework was created within the security analyst work ow tool sets to facilitate the delivery and testing of new capabilities as they became available, and machine learning algorithms were developed to address the challenge of dynamic threats. Furthermore, researchers from the Hybrid project were embedded in the security analyst groups for almost a full year, engaged in daily operational activities and routines, creating an atmosphere of trust and collaboration between the researchers and security personnel. The Hybrid project has altered the way that research ideas can be incorporated into the production environments of Sandias enterprise security groups, reducing time to deployment from months and

  2. Final Report for the Virtual Reliability Realization System LDRD

    Energy Technology Data Exchange (ETDEWEB)

    DELLIN, THEODORE A.; HENDERSON, CHRISTOPHER L.; O' TOOLE, EDWARD J.

    2000-12-01

    Current approaches to reliability are not adequate to keep pace with the need for faster, better and cheaper products and systems. This is especially true in high consequence of failure applications. The original proposal for the LDRD was to look at this challenge and see if there was a new paradigm that could make reliability predictions, along with a quantitative estimate of the risk in that prediction, in a way that was faster, better and cheaper. Such an approach would be based on the underlying science models that are the backbone of reliability predictions. The new paradigm would be implemented in two software tools: the Virtual Reliability Realization System (VRRS) and the Reliability Expert System (REX). The three-year LDRD was funded at a reduced level for the first year ($120K vs. $250K) and not renewed. Because of the reduced funding, we concentrated on the initial development of the expertise system. We developed an interactive semiconductor calculation tool needed for reliability analyses. We also were able to generate a basic functional system using Microsoft Siteserver Commerce Edition and Microsoft Sequel Server. The base system has the capability to store Office documents from multiple authors, and has the ability to track and charge for usage. The full outline of the knowledge model has been incorporated as well as examples of various types of content.

  3. High-efficiency high-energy Ka source for the critically-required maximum illumination of x-ray optics on Z using Z-petawatt-driven laser-breakout-afterburner accelerated ultrarelativistic electrons LDRD .

    Energy Technology Data Exchange (ETDEWEB)

    Sefkow, Adam B.; Bennett, Guy R.

    2010-09-01

    Under the auspices of the Science of Extreme Environments LDRD program, a <2 year theoretical- and computational-physics study was performed (LDRD Project 130805) by Guy R Bennett (formally in Center-01600) and Adam B. Sefkow (Center-01600): To investigate novel target designs by which a short-pulse, PW-class beam could create a brighter K{alpha} x-ray source than by simple, direct-laser-irradiation of a flat foil; Direct-Foil-Irradiation (DFI). The computational studies - which are still ongoing at this writing - were performed primarily on the RedStorm supercomputer at Sandia National Laboratories Albuquerque site. The motivation for a higher efficiency K{alpha} emitter was very clear: as the backlighter flux for any x-ray imaging technique on the Z accelerator increases, the signal-to-noise and signal-to-background ratios improve. This ultimately allows the imaging system to reach its full quantitative potential as a diagnostic. Depending on the particular application/experiment this would imply, for example, that the system would have reached its full design spatial resolution and thus the capability to see features that might otherwise be indiscernible with a traditional DFI-like x-ray source. This LDRD began FY09 and ended FY10.

  4. Performativity and the project: enacting urban transport security in Europe

    NARCIS (Netherlands)

    Hoijtink, M.

    2015-01-01

    In April 2011, a large consortium of European rail and security suppliers, transport operators and research organisations launched the Secured Urban Transportation - European Demonstration (SECUR-ED) project with the objective of providing public transport operators with the means to enhance urban

  5. The Secure Information Exchange (SIX) Project at the OPCW

    International Nuclear Information System (INIS)

    Gulay, M.; Milenkovic, G.

    2015-01-01

    The Chemical Weapons Convention (CWC) entered into force in 1997 and the member states of the Organisation for the Prohibition of Chemical Weapons (OPCW) have obligations for making declarations under various articles of the convention. These declarations could contain confidential information and until recently the only mechanism to submit confidential information to the OPCW Technical Secretariat was through physical delivery by the permanent representatives of the member states which introduced delays in the exchange of information in general. In 2012, the Technical Secretariat initiated a strategic project to establish a secure electronic transmission channel that could be used as an alternative option for the exchange of information between the Technical Secretariat and the member states. The Secure Information Exchange (SIX) Project has been given priority by the Director-General and it received support from the member states. A core project team comprising representatives of the main business unit, the office of legal affairs, IT security and implementation teams were established. Following a feasibility study and with continuous communication with the representatives of the member states, the pilot phase of the project was completed successfully in 2013. In the near future, the project will go live and the member states and the Technical Secretariat will benefit from this key initiative. This paper aims to provide an overview of the project: the solution approach, data gathered in order to assess the delays in communication through traditional means, IT security and implementation issues as well as the legal considerations. (author)

  6. The Nabucco Project and Communicating about Energy Security

    Directory of Open Access Journals (Sweden)

    Victor Negrescu

    2013-07-01

    Full Text Available Energy Security was considered by many of the Eastern European countries a priority in their fight for breaking the ties with the former Soviet Union. The dependence of the Eastern European countries to the Russian gas and petroleum generated for most of the local governments a feeling of inferiority that they were willing to replace if the opportunity will be offered. One of the main alternative projects to the Russian gas is the Nabucco Project designed to enable the access to Caspian gas for all the European countries. Knowing that a decision on the realization of the pipeline should be made by the end of June 2013, our article will try to illustrate the importance of the Nabucco Project for the regional and European energy security by studying the history of the project, the competing projects and the recent political evolutions of the project. This will enable researchers, decision makers and policy makers in the energy sector to better evaluate the Nabucco project and better act into promoting it.

  7. Verification of the existence of food security projects in Limpopo ...

    African Journals Online (AJOL)

    Frequency tables and charts were computed on a computer spreadsheet. The findings of this Study revealed that there are 347 food security projects in Limpopo Province with 338 declared functional. This Study will provide policy makers with policy directives on how a database of food security projects can be kept so that ...

  8. Laboratory directed research and development FY98 annual report; TOPICAL

    International Nuclear Information System (INIS)

    Al-Ayat, R; Holzrichter, J

    1999-01-01

    In 1984, Congress and the Department of Energy (DOE) established the Laboratory Directed Research and Development (LDRD) Program to enable the director of a national laboratory to foster and expedite innovative research and development (R and D) in mission areas. The Lawrence Livermore National Laboratory (LLNL) continually examines these mission areas through strategic planning and shapes the LDRD Program to meet its long-term vision. The goal of the LDRD Program is to spur development of new scientific and technical capabilities that enable LLNL to respond to the challenges within its evolving mission areas. In addition, the LDRD Program provides LLNL with the flexibility to nurture and enrich essential scientific and technical competencies and enables the Laboratory to attract the most qualified scientists and engineers. The FY98 LDRD portfolio described in this annual report has been carefully structured to continue the tradition of vigorously supporting DOE and LLNL strategic vision and evolving mission areas. The projects selected for LDRD funding undergo stringent review and selection processes, which emphasize strategic relevance and require technical peer reviews of proposals by external and internal experts. These FY98 projects emphasize the Laboratory's national security needs: stewardship of the U.S. nuclear weapons stockpile, responsibility for the counter- and nonproliferation of weapons of mass destruction, development of high-performance computing, and support of DOE environmental research and waste management programs

  9. Laboratory Directed Research and Development Program Activities for FY 2008.

    Energy Technology Data Exchange (ETDEWEB)

    Looney,J.P.; Fox, K.

    2009-04-01

    Brookhaven National Laboratory (BNL) is a multidisciplinary laboratory that maintains a primary mission focus the physical sciences, energy sciences, and life sciences, with additional expertise in environmental sciences, energy technologies, and national security. It is managed by Brookhaven Science Associates, LLC, (BSA) under contract with the U. S. Department of Energy (DOE). BNL's Fiscal year 2008 budget was $531.6 million. There are about 2,800 employees, and another 4,300 guest scientists and students who come each year to use the Laboratory's facilities and work with the staff. The BNL Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) annually in March, as required by DOE Order 413.2B, 'Laboratory Directed Research and Development,' April 19, 2006, and the Roles, Responsibilities, and Guidelines for Laboratory Directed Research and Developlnent at the Department of Energy/National Nuclear Security Administration Laboratories dated June 13, 2006. Accordingly, this is our Annual Report in which we describe the Purpose, Approach, Technical Progress and Results, and Specific Accomplishments of all LDRD projects that received funding during Fiscal Year 2008. BNL expended $12 million during Fiscal Year 2008 in support of 69 projects. The program has two categories, the annual Open Call LDRDs and Strategic LDRDs, which combine to meet the overall objectives of the LDRD Program. Proposals are solicited annually for review and approval concurrent with the next fiscal year, October 1. For the open call for proposals, an LDRD Selection Committee, comprised of the Associate Laboratory Directors (ALDs) for the Scientific Directorates, an equal number of scientists recommended by the Brookhaven Council, plus the Assistant Laboratory Director for Policy and Strategic Planning, review the proposals submitted in response to the solicitation. The Open Can LDRD category emphasizes innovative research concepts

  10. Laboratory Directed Research and Development Program FY 2008 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    editor, Todd C Hansen

    2009-02-23

    The Ernest Orlando Lawrence Berkeley National Laboratory (Berkeley Lab or LBNL) is a multi-program national research facility operated by the University of California for the Department of Energy (DOE). As an integral element of DOE's National Laboratory System, Berkeley Lab supports DOE's missions in fundamental science, energy resources, and environmental quality. Berkeley Lab programs advance four distinct goals for DOE and the nation: (1) To perform leading multidisciplinary research in the computing sciences, physical sciences, energy sciences, biosciences, and general sciences in a manner that ensures employee and public safety and protection of the environment. (2) To develop and operate unique national experimental facilities for qualified investigators. (3) To educate and train future generations of scientists and engineers to promote national science and education goals. (4) To transfer knowledge and technological innovations and to foster productive relationships among Berkeley Lab's research programs, universities, and industry in order to promote national economic competitiveness. Berkeley Lab's research and the Laboratory Directed Research and Development (LDRD) program support DOE's Strategic Themes that are codified in DOE's 2006 Strategic Plan (DOE/CF-0010), with a primary focus on Scientific Discovery and Innovation. For that strategic theme, the Fiscal Year (FY) 2008 LDRD projects support each one of the three goals through multiple strategies described in the plan. In addition, LDRD efforts support the four goals of Energy Security, the two goals of Environmental Responsibility, and Nuclear Security (unclassified fundamental research that supports stockpile safety and nonproliferation programs). The LDRD program supports Office of Science strategic plans, including the 20-year Scientific Facilities Plan and the Office of Science Strategic Plan. The research also supports the strategic directions periodically under

  11. Laboratory Directed Research and Development Program FY 2008 Annual Report

    International Nuclear Information System (INIS)

    Hansen, Todd C.

    2009-01-01

    The Ernest Orlando Lawrence Berkeley National Laboratory (Berkeley Lab or LBNL) is a multi-program national research facility operated by the University of California for the Department of Energy (DOE). As an integral element of DOE's National Laboratory System, Berkeley Lab supports DOE's missions in fundamental science, energy resources, and environmental quality. Berkeley Lab programs advance four distinct goals for DOE and the nation: (1) To perform leading multidisciplinary research in the computing sciences, physical sciences, energy sciences, biosciences, and general sciences in a manner that ensures employee and public safety and protection of the environment. (2) To develop and operate unique national experimental facilities for qualified investigators. (3) To educate and train future generations of scientists and engineers to promote national science and education goals. (4) To transfer knowledge and technological innovations and to foster productive relationships among Berkeley Lab's research programs, universities, and industry in order to promote national economic competitiveness. Berkeley Lab's research and the Laboratory Directed Research and Development (LDRD) program support DOE's Strategic Themes that are codified in DOE's 2006 Strategic Plan (DOE/CF-0010), with a primary focus on Scientific Discovery and Innovation. For that strategic theme, the Fiscal Year (FY) 2008 LDRD projects support each one of the three goals through multiple strategies described in the plan. In addition, LDRD efforts support the four goals of Energy Security, the two goals of Environmental Responsibility, and Nuclear Security (unclassified fundamental research that supports stockpile safety and nonproliferation programs). The LDRD program supports Office of Science strategic plans, including the 20-year Scientific Facilities Plan and the Office of Science Strategic Plan. The research also supports the strategic directions periodically under consideration and review by the

  12. Introduction to the Asian Energy Security project: Project organization and methodologies

    International Nuclear Information System (INIS)

    Hippel, David von; Savage, Timothy; Hayes, Peter

    2011-01-01

    The spectacular recent economic growth in the Asia-Pacific region in general, and in many of the economies of Northeast Asia in particular, has spurred a vast expansion in the need for energy services, and an expansion in the demand for the fuels that help to supply these services. Future projections suggest that the growth of fossil fuel use in Northeast Asia, especially in China, will have major consequences for financial and fuel markets and pollution both regionally and globally. Before the project described in this paper was initiated, there was no ongoing forum for energy experts from all of the countries of the region to meet, informally and in an unofficial capacity, to discuss openly and in a targeted fashion the energy situations in their countries, and to work together to evaluate the energy efficiency costs and benefits of different ways of meeting regional demand. The Asian Energy Security (AES) project provides such a forum, and as such constitutes a unique resource in the engagement of the countries of Northeast Asia on the topic of energy security.

  13. Bio-Security Proficiencies Project for Beginning Producers in 4-H

    Science.gov (United States)

    Smith, Martin H.; Meehan, Cheryl L.; Borba, John A.

    2014-01-01

    Improving bio-security practices among 4-H members who raise and show project animals is important. Bio-security measures can reduce the risk of disease spread and mitigate potential health and economic risks of disease outbreaks involving animal and zoonotic pathogens. Survey data provided statistical evidence that the Bio-Security Proficiencies…

  14. Factors Affecting Project Governance Of Arusha Archdiocesan Food Security And Livelihood Project In Monduli District Tanzania.

    Directory of Open Access Journals (Sweden)

    Kisame Deogratious

    2015-06-01

    Full Text Available Abstract This research project dealt with the factors affecting governance of Food security and livelihood projects a case study of the Food security and livelihood project that was implemented by AAIDRO in Monduli district and included 60 respondents all together. The specific objectives of this study intended to access the Leadership styles that are being used in project governance. The findings of the study indicated that 91.7 of the respondents were in favor of their leaders project governance styles it was portrayed that participative leadership style was being used by the leaders for project governance. Based on a sample of 60 project members this study had confirmed that a project leaders leadership roles like mentor facilitator innovator and coordinator are important in influencing project governance effectiveness which includes team mission goal achievement and empowerment open and honest communication

  15. Characterize and Model Final Waste Formulations and Offgas Solids from Thermal Treatment Processes - FY-98 Final Report for LDRD 2349

    Energy Technology Data Exchange (ETDEWEB)

    Kessinger, Glen Frank; Nelson, Lee Orville; Grandy, Jon Drue; Zuck, Larry Douglas; Kong, Peter Chuen Sun; Anderson, Gail

    1999-08-01

    The purpose of LDRD #2349, Characterize and Model Final Waste Formulations and Offgas Solids from Thermal Treatment Processes, was to develop a set of tools that would allow the user to, based on the chemical composition of a waste stream to be immobilized, predict the durability (leach behavior) of the final waste form and the phase assemblages present in the final waste form. The objectives of the project were: • investigation, testing and selection of thermochemical code • development of auxiliary thermochemical database • synthesis of materials for leach testing • collection of leach data • using leach data for leach model development • thermochemical modeling The progress toward completion of these objectives and a discussion of work that needs to be completed to arrive at a logical finishing point for this project will be presented.

  16. Final report for LDRD project 11-0783 : directed robots for increased military manpower effectiveness.

    Energy Technology Data Exchange (ETDEWEB)

    Rohrer, Brandon Robinson; Rothganger, Fredrick H.; Wagner, John S.; Xavier, Patrick Gordon; Morrow, James Dan

    2011-09-01

    The purpose of this LDRD is to develop technology allowing warfighters to provide high-level commands to their unmanned assets, freeing them to command a group of them or commit the bulk of their attention elsewhere. To this end, a brain-emulating cognition and control architecture (BECCA) was developed, incorporating novel and uniquely capable feature creation and reinforcement learning algorithms. BECCA was demonstrated on both a mobile manipulator platform and on a seven degree of freedom serial link robot arm. Existing military ground robots are almost universally teleoperated and occupy the complete attention of an operator. They may remove a soldier from harm's way, but they do not necessarily reduce manpower requirements. Current research efforts to solve the problem of autonomous operation in an unstructured, dynamic environment fall short of the desired performance. In order to increase the effectiveness of unmanned vehicle (UV) operators, we proposed to develop robots that can be 'directed' rather than remote-controlled. They are instructed and trained by human operators, rather than driven. The technical approach is modeled closely on psychological and neuroscientific models of human learning. Two Sandia-developed models are utilized in this effort: the Sandia Cognitive Framework (SCF), a cognitive psychology-based model of human processes, and BECCA, a psychophysical-based model of learning, motor control, and conceptualization. Together, these models span the functional space from perceptuo-motor abilities, to high-level motivational and attentional processes.

  17. Safeguards and security benefits of project straight-line

    International Nuclear Information System (INIS)

    Jaeger, C.D.; Waddoups, I.G.

    1995-01-01

    As a result of a number of events the inventory of fissile materials no longer in nuclear weapons in the United States is increasing. This has led to a growing concern regarding the potential for theft and/or diversion and accountability of this material. Straight-Line is a project whose purpose is to demonstrate a site-independent system to monitor stored nuclear material (e.g. plutonium) and integrate the collection, processing and dissemination of information regarding this material. Safeguards and security (S ampersand S) goals of this project include data transfer of information on nuclear material to appropriate users to enhance S ampersand S, continuous on-line accountability, reduction of hands-on access to nuclear materials, incorporation of information security technologies, and early detection of tampering or unauthorized material movement. This paper addresses threat considerations, S ampersand S requirements, S ampersand S objectives, and issues for the Straight-Line project. S ampersand S features and benefits of this project are discussed with respect to existing item monitoring systems and/or other material tracking systems being developed

  18. Final LDRD report : science-based solutions to achieve high-performance deep-UV laser diodes.

    Energy Technology Data Exchange (ETDEWEB)

    Armstrong, Andrew M.; Miller, Mary A.; Crawford, Mary Hagerott; Alessi, Leonard J.; Smith, Michael L.; Henry, Tanya A.; Westlake, Karl R.; Cross, Karen Charlene; Allerman, Andrew Alan; Lee, Stephen Roger

    2011-12-01

    We present the results of a three year LDRD project that has focused on overcoming major materials roadblocks to achieving AlGaN-based deep-UV laser diodes. We describe our growth approach to achieving AlGaN templates with greater than ten times reduction of threading dislocations which resulted in greater than seven times enhancement of AlGaN quantum well photoluminescence and 15 times increase in electroluminescence from LED test structures. We describe the application of deep-level optical spectroscopy to AlGaN epilayers to quantify deep level energies and densities and further correlate defect properties with AlGaN luminescence efficiency. We further review our development of p-type short period superlattice structures as an approach to mitigate the high acceptor activation energies in AlGaN alloys. Finally, we describe our laser diode fabrication process, highlighting the development of highly vertical and smooth etched laser facets, as well as characterization of resulting laser heterostructures.

  19. Timely integration of safeguards and security with projects at Los Alamos National Laboratory

    International Nuclear Information System (INIS)

    Price, R.; Blount, P.M.; Garcia, S.W.; Gonzales, R.L.; Salazar, J.B.; Campbell, C.H.

    2004-01-01

    The Safeguards and Security (S and S) Requirements Integration Team at Los Alamos National Laboratory (LANL) has developed and implemented an innovative management process that will be described in detail. This process systematically integrates S and S planning into construction, facility modifications or upgrades, mission changes, and operational projects. It extends and expands the opportunities provided by the DOE project management manual, DOE M 413.3-1. Through a series of LANL documents, a process is defined and implemented that formally identifies an S and S professional to oversee, coordinate, facilitate, and communicate among the identified S and S organizations and the project organizations over the life cycle of the project. The derived benefits, namely (1) elimination/reduction of re-work or costly retrofitting, (2) overall project cost savings because of timely and improved planning, (3) formal documentation, and (4) support of Integrated Safeguards and Security Management at LANL, will be discussed. How many times, during the construction of a new facility or the modification of an existing facility, have the persons responsible for the project waited until the last possible minute or until after construction is completed to approach the security organizations for their help in safeguarding and securing the facility? It's almost like, 'Oh, by the way, do we need access control and a fence around this building and just what are we going to do with our classified anyway?' Not only is it usually difficult; it's also typically expensive to retrofit or plan for safeguards and security after the fact. Safeguards and security organizations are often blamed for budget overruns and delays in facility occupancy and program startup, but these problems are usually due to poor front-end planning. In an effort to help projects engage safeguards and security in the pre-conceptual or conceptual stages, we implemented a high level formality of operations. We

  20. Idaho National Laboratory Directed Research and Development FY-2009

    Energy Technology Data Exchange (ETDEWEB)

    2010-03-01

    The FY 2009 Laboratory Directed Research and Development (LDRD) Annual Report is a compendium of the diverse research performed to develop and ensure the INL's technical capabilities can support the future DOE missions and national research priorities. LDRD is essential to the INL - it provides a means for the laboratory to pursue novel scientific and engineering research in areas that are deemed too basic or risky for programmatic investments. This research enhances technical capabilities at the laboratory, providing scientific and engineering staff with opportunities for skill building and partnership development. Established by Congress in 1991, LDRD proves its benefit each year through new programs, intellectual property, patents, copyrights, publications, national and international awards, and new hires from the universities and industry, which helps refresh the scientific and engineering workforce. The benefits of INL's LDRD research are many as shown in the tables below. Last year, 91 faculty members from various universities contributed to LDRD research, along with 7 post docs and 64 students. Of the total invention disclosures submitted in FY 2009, 7 are attributable to LDRD research. Sixty three refereed journal articles were accepted or published, and 93 invited presentations were attributable to LDRD research conducted in FY 2009. The LDRD Program is administered in accordance with requirements set in DOE Order 413.2B, accompanying contractor requirements, and other DOE and federal requirements invoked through the INL contract. The LDRD Program is implemented in accordance with the annual INL LDRD Program Plan, which is approved by the DOE, Nuclear Energy Program Secretarial Office. This plan outlines the method the laboratory uses to develop its research portfolio, including peer and management reviews, and the use of other INL management systems to ensure quality, financial, safety, security and environmental requirements and risks are

  1. Final LDRD report : development of sample preparation methods for ChIPMA-based imaging mass spectrometry of tissue samples.

    Energy Technology Data Exchange (ETDEWEB)

    Maharrey, Sean P.; Highley, Aaron M.; Behrens, Richard, Jr.; Wiese-Smith, Deneille

    2007-12-01

    The objective of this short-term LDRD project was to acquire the tools needed to use our chemical imaging precision mass analyzer (ChIPMA) instrument to analyze tissue samples. This effort was an outgrowth of discussions with oncologists on the need to find the cellular origin of signals in mass spectra of serum samples, which provide biomarkers for ovarian cancer. The ultimate goal would be to collect chemical images of biopsy samples allowing the chemical images of diseased and nondiseased sections of a sample to be compared. The equipment needed to prepare tissue samples have been acquired and built. This equipment includes an cyro-ultramicrotome for preparing thin sections of samples and a coating unit. The coating unit uses an electrospray system to deposit small droplets of a UV-photo absorbing compound on the surface of the tissue samples. Both units are operational. The tissue sample must be coated with the organic compound to enable matrix assisted laser desorption/ionization (MALDI) and matrix enhanced secondary ion mass spectrometry (ME-SIMS) measurements with the ChIPMA instrument Initial plans to test the sample preparation using human tissue samples required development of administrative procedures beyond the scope of this LDRD. Hence, it was decided to make two types of measurements: (1) Testing the spatial resolution of ME-SIMS by preparing a substrate coated with a mixture of an organic matrix and a bio standard and etching a defined pattern in the coating using a liquid metal ion beam, and (2) preparing and imaging C. elegans worms. Difficulties arose in sectioning the C. elegans for analysis and funds and time to overcome these difficulties were not available in this project. The facilities are now available for preparing biological samples for analysis with the ChIPMA instrument. Some further investment of time and resources in sample preparation should make this a useful tool for chemical imaging applications.

  2. Strengthening LLNL Missions through Laboratory Directed Research and Development in High Performance Computing

    Energy Technology Data Exchange (ETDEWEB)

    Willis, D. K. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-12-01

    High performance computing (HPC) has been a defining strength of Lawrence Livermore National Laboratory (LLNL) since its founding. Livermore scientists have designed and used some of the world’s most powerful computers to drive breakthroughs in nearly every mission area. Today, the Laboratory is recognized as a world leader in the application of HPC to complex science, technology, and engineering challenges. Most importantly, HPC has been integral to the National Nuclear Security Administration’s (NNSA’s) Stockpile Stewardship Program—designed to ensure the safety, security, and reliability of our nuclear deterrent without nuclear testing. A critical factor behind Lawrence Livermore’s preeminence in HPC is the ongoing investments made by the Laboratory Directed Research and Development (LDRD) Program in cutting-edge concepts to enable efficient utilization of these powerful machines. Congress established the LDRD Program in 1991 to maintain the technical vitality of the Department of Energy (DOE) national laboratories. Since then, LDRD has been, and continues to be, an essential tool for exploring anticipated needs that lie beyond the planning horizon of our programs and for attracting the next generation of talented visionaries. Through LDRD, Livermore researchers can examine future challenges, propose and explore innovative solutions, and deliver creative approaches to support our missions. The present scientific and technical strengths of the Laboratory are, in large part, a product of past LDRD investments in HPC. Here, we provide seven examples of LDRD projects from the past decade that have played a critical role in building LLNL’s HPC, computer science, mathematics, and data science research capabilities, and describe how they have impacted LLNL’s mission.

  3. CARONTE project: Creating an Agenda for Research on Transportation Security

    Energy Technology Data Exchange (ETDEWEB)

    Leon Bello, J.; Gonzalez Viosca, E.

    2016-07-01

    Europe’s prosperity relies on effective transport systems. Any attacks and disturbances to land freight and passenger transport would have significant impact on economic growth, territorial cohesion, social development and the environment. Unfortunately, there are weaknesses in the land transport security.The objective of CARONTE project is define a future research agenda for security in land transport that focuses on core gaps caused by emerging risks while avoiding any doubling-up of research elsewhere. Its research agenda will cover all threats, including cyber-crime, and security aspects across all modes of land transportation. At the same time, it will respect the fundamental human rights and privacy of European citizens. The step-by-step method of CARONTE’s consortium has analyzed the state of the art and emerging risks; has identified gaps, analyses and assessments of potential solutions; and has produced an overall research agenda for the future. CARONTE’s results will answer the following questions among others: Which existing research projects merit a follow up and extension? Where are the combinations or synergy effects to be attended? Which themes and topics should be elaborated in new research projects? Who should be involved and integrated in future research projects (stakeholders, authorities, etc.)? The CARONTE consortium includes universities and research institutes, companies, and end-users providing with experience in research and consultancy in transportation, logistics, infrastructure management, security and communications. ITENE - Instituto Tecnológico del Embalaje, Transporte y Logística-has been one of the Project partners among a total of 11 members from eight different countries in the European Union which have also been supported via a High Level Advisory Board. (Author)

  4. Secure Interoperable Open Smart Grid Demonstration Project

    Energy Technology Data Exchange (ETDEWEB)

    Magee, Thoman [Consolidated Edison Company Of New York, Inc., NY (United States)

    2014-12-28

    The Consolidated Edison, Inc., of New York (Con Edison) Secure Interoperable Open Smart Grid Demonstration Project (SGDP), sponsored by the United States (US) Department of Energy (DOE), demonstrated that the reliability, efficiency, and flexibility of the grid can be improved through a combination of enhanced monitoring and control capabilities using systems and resources that interoperate within a secure services framework. The project demonstrated the capability to shift, balance, and reduce load where and when needed in response to system contingencies or emergencies by leveraging controllable field assets. The range of field assets includes curtailable customer loads, distributed generation (DG), battery storage, electric vehicle (EV) charging stations, building management systems (BMS), home area networks (HANs), high-voltage monitoring, and advanced metering infrastructure (AMI). The SGDP enables the seamless integration and control of these field assets through a common, cyber-secure, interoperable control platform, which integrates a number of existing legacy control and data systems, as well as new smart grid (SG) systems and applications. By integrating advanced technologies for monitoring and control, the SGDP helps target and reduce peak load growth, improves the reliability and efficiency of Con Edison’s grid, and increases the ability to accommodate the growing use of distributed resources. Con Edison is dedicated to lowering costs, improving reliability and customer service, and reducing its impact on the environment for its customers. These objectives also align with the policy objectives of New York State as a whole. To help meet these objectives, Con Edison’s long-term vision for the distribution grid relies on the successful integration and control of a growing penetration of distributed resources, including demand response (DR) resources, battery storage units, and DG. For example, Con Edison is expecting significant long-term growth of DG

  5. [Principles and methodology for ecological rehabilitation and security pattern design in key project construction].

    Science.gov (United States)

    Chen, Li-Ding; Lu, Yi-He; Tian, Hui-Ying; Shi, Qian

    2007-03-01

    Global ecological security becomes increasingly important with the intensive human activities. The function of ecological security is influenced by human activities, and in return, the efficiency of human activities will also be affected by the patterns of regional ecological security. Since the 1990s, China has initiated the construction of key projects "Yangtze Three Gorges Dam", "Qinghai-Tibet Railway", "West-to-East Gas Pipeline", "West-to-East Electricity Transmission" and "South-to-North Water Transfer" , etc. The interaction between these projects and regional ecological security has particularly attracted the attention of Chinese government. It is not only important for the regional environmental protection, but also of significance for the smoothly implementation of various projects aimed to develop an ecological rehabilitation system and to design a regional ecological security pattern. This paper made a systematic analysis on the types and characteristics of key project construction and their effects on the environment, and on the basis of this, brought forward the basic principles and methodology for ecological rehabilitation and security pattern design in this construction. It was considered that the following issues should be addressed in the implementation of a key project: 1) analysis and evaluation of current regional ecological environment, 2) evaluation of anthropogenic disturbances and their ecological risk, 3) regional ecological rehabilitation and security pattern design, 4) scenario analysis of environmental benefits of regional ecological security pattern, 5) re-optimization of regional ecological system framework, and 6) establishment of regional ecosystem management plan.

  6. A secure communication system using projective-lag and/or projective-anticipating synchronizations of coupled multidelay feedback systems

    International Nuclear Information System (INIS)

    Thang Manh Hoang; Nakagawa, Masahiro

    2008-01-01

    In this paper, a chaotic secure communication system is proposed by using the schemes of projective-lag and/or projective-anticipating synchronizations of coupled multidelay feedback systems and the modulation technique of synchronization-manifold shift keying. Further, the security of the proposed system is enhanced by using non-stationary dynamics in the master and/or non-stationary synchronization manifolds. The specific examples using modified Ikeda systems demonstrate and verify the effectiveness of the proposed system

  7. Laboratory directed research and development annual report. Fiscal year 1994

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-02-01

    The Department of Energy Order DOE 5000.4A establishes DOE`s policy and guidelines regarding Laboratory Directed Research and Development (LDRD) at its multiprogram laboratories. This report represents Pacific Northwest Laboratory`s (PNL`s) LDRD report for FY 1994. During FY 1994, 161 LDRD projects were selected for support through PNL`s LDRD project selection process. Total funding allocated to these projects was $13.7 million. Consistent with the Mission Statement and Strategic Plan provided in PNL`s Institutional Plan, the LDRD investments are focused on developing new and innovative approaches in research related to our {open_quotes}core competencies.{close_quotes} Currently, PNL`s core competencies have been identified as integrated environmental research; process science and engineering; energy systems development. In this report, the individual summaries of LDRD projects (presented in Section 1.0) are organized according to these core competencies. The largest proportion of Laboratory-level LDRD funds is allocated to the core competency of integrated environmental research. Projects within the three core competency areas were approximately 91.4 % of total LDRD project funding at PNL in FY 1994. A significant proportion of PNL`s LDRD funds are also allocated to projects within the various research centers that are proposed by individual researchers or small research teams. Funding allocated to each of these projects is typically $35K or less. The projects described in this report represent PNL`s investment in its future and are vital to maintaining the ability to develop creative solutions for the scientific and technical challenges faced by DOE and the nation. The report provides an overview of PNL`s LDRD program, the management process used for the program, and project summaries for each LDRD project.

  8. Payment card industry data security standard : readiness project

    OpenAIRE

    Βεργέτης, Μιχαήλ

    2015-01-01

    This paper is my thesis as part of my studies at the Department of Informatics, at University of Piraeus for the Postgraduate Programme in “Techno-economic Management & Security of Digital Systems”. Scope of this paper is to introduce to the reader with the basics of PCI DSS and to guide and provide any sort of assistance to organizations willing to achieve compliance with the Payment Card Industry Data Security Standard (PCI DSS). As for its practical section, a PCI DSS readiness project has...

  9. Western Australian food security project

    Directory of Open Access Journals (Sweden)

    Maycock Bruce

    2007-08-01

    Full Text Available Abstract Background The aim of the Western Australian (WA Food Security Project was to conduct a preliminary investigation into issues relating to food security in one region within the Perth metropolitan area in Western Australia. The first phase of the project involved a food audit in one lower income area that was typical of the region, to identify the range, variety and availability of foods in the region. Methods A comprehensive food audit survey was provided to all food outlet owners/operators in one lower socio-economic region within the City of Mandurah (n = 132 outlets. The purpose of the survey was to investigate the range, variety and availability of foods in the Mandurah region as well as examining specific in-store characteristics such as the types of clientele and in-store promotions offered. Surveys were competed for 99 outlets (response rate = 75%. Results The range of foods available were predominantly pre-prepared with more than half of the outlets pre-preparing the majority of their food. Sandwiches and rolls were the most popular items sold in the outlets surveyed (n = 51 outlets followed by pastries such as pies, sausage rolls and pasties (n = 33 outlets. Outlets considered their healthiest food options were sandwiches or rolls (n = 51 outlets, salads (n- = 50 outlets, fruit and vegetables (n = 40 outlets, seafood (n = 27 outlets, meats such as chicken (n = 26 outlets and hot foods such as curries, soups or quiches (n = 23 outlets. The majority of outlets surveyed considered pre-prepared food including sandwiches, rolls and salads, as healthy food options regardless of the content of the filling or dressings used. Few outlets (n = 28% offered a choice of bread type other than white or wholemeal. High fat pastries and dressings were popular client choices (n = 77% as were carbonated drinks (n = 88% and flavoured milks (n = 46%. Conclusion These findings clearly indicate the need for further investigation of the impact of

  10. IAEA Nuclear Security Assessment Methodologies (NUSAM) Project for Regulated Facilities

    International Nuclear Information System (INIS)

    Jang, Sung Soon

    2016-01-01

    Nuclear Security Assessment Methodologies (NUSAM) is a coordinate research project. The objectives of the NUSAM project is to establish a risk informed, performance-based methodological framework in a systematic, structured, comprehensive and appropriately transparent manner; to provide an environment for the sharing and transfer of knowledge and experience; and to provide guidance on, and practical examples of good practices in assessing the security of nuclear and other radioactive materials, as well as associated facilities and activities. The author worked as an IAEA scientific secretary of the NUAM project from 2013 to 2015. IAEA launched this project in 2013 and performed many activities: meetings, document development, table-top exercises and computer simulations. Now the project is in the final stage and will be concluded in the late 2016. The project will produce documents on NUSAM assessment methods and case study documents on NPP, Irradiator Facility and Transport. South Korea as a main contributor to this project will get benefits from the NUSAM. In 2014, South Korea introduced force-on-force exercises, which could be used as the assessment of physical protection system by the methods of NUSAM

  11. IAEA Nuclear Security Assessment Methodologies (NUSAM) Project for Regulated Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Jang, Sung Soon [Korea Nuclear Non-proliferation and Control, Daejeon (Korea, Republic of)

    2016-05-15

    Nuclear Security Assessment Methodologies (NUSAM) is a coordinate research project. The objectives of the NUSAM project is to establish a risk informed, performance-based methodological framework in a systematic, structured, comprehensive and appropriately transparent manner; to provide an environment for the sharing and transfer of knowledge and experience; and to provide guidance on, and practical examples of good practices in assessing the security of nuclear and other radioactive materials, as well as associated facilities and activities. The author worked as an IAEA scientific secretary of the NUAM project from 2013 to 2015. IAEA launched this project in 2013 and performed many activities: meetings, document development, table-top exercises and computer simulations. Now the project is in the final stage and will be concluded in the late 2016. The project will produce documents on NUSAM assessment methods and case study documents on NPP, Irradiator Facility and Transport. South Korea as a main contributor to this project will get benefits from the NUSAM. In 2014, South Korea introduced force-on-force exercises, which could be used as the assessment of physical protection system by the methods of NUSAM.

  12. Interface physics in microporous media : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Yaklin, Melissa A.; Knutson, Chad E.; Noble, David R.; Aragon, Alicia R.; Chen, Ken Shuang; Giordano, Nicholas J. (Purdue University, West Lafayette, IN); Brooks, Carlton, F.; Pyrak-Nolte, Laura J. (Purdue University, West Lafayette, IN); Liu, Yihong (Purdue University, West Lafayette, IN)

    2008-09-01

    This document contains a summary of the work performed under the LDRD project entitled 'Interface Physics in Microporous Media'. The presence of fluid-fluid interfaces, which can carry non-zero stresses, distinguishes multiphase flows from more readily understood single-phase flows. In this work the physics active at these interfaces has been examined via a combined experimental and computational approach. One of the major difficulties of examining true microporous systems of the type found in filters, membranes, geologic media, etc. is the geometric uncertainty. To help facilitate the examination of transport at the pore-scale without this complication, a significant effort has been made in the area of fabrication of both two-dimensional and three-dimensional micromodels. Using these micromodels, multiphase flow experiments have been performed for liquid-liquid and liquid-gas systems. Laser scanning confocal microscopy has been utilized to provide high resolution, three-dimensional reconstructions as well as time resolved, two-dimensional reconstructions. Computational work has focused on extending lattice Boltzmann (LB) and finite element methods for probing the interface physics at the pore scale. A new LB technique has been developed that provides over 100x speed up for steady flows in complex geometries. A new LB model has been developed that allows for arbitrary density ratios, which has been a significant obstacle in applying LB to air-water flows. A new reduced order model has been developed and implemented in finite element code for examining non-equilibrium wetting in microchannel systems. These advances will enhance Sandia's ability to quantitatively probe the rich interfacial physics present in microporous systems.

  13. Main group adducts of carbon dioxide and related chemistry (LDRD 149938).

    Energy Technology Data Exchange (ETDEWEB)

    Barry, Brian M. (University of New Mexico, Albuquerque, NM); Kemp, Richard Alan; Stewart, Constantine A.; Dickie, Diane A. (University of New Mexico, Albuquerque, NM)

    2010-11-01

    This late-start LDRD was broadly focused on the synthetic attempts to prepare novel ligands as complexing agents for main group metals for the sequestration of CO{sub 2}. In prior work we have shown that certain main group (p block elements) metals such as tin and zinc, when ligated to phosphinoamido- ligands, can bind CO{sub 2} in a novel fashion. Rather than simple insertion into the metal-nitrogen bonds to form carbamates, we have seen the highly unusual complexation of CO{sub 2} in a mode that is more similar to a chemical 'adduct' rather than complexation schemes that have been observed previously. The overarching goal in this work is to prepare more of these complexes that can (a) sequester (or bind) CO{sub 2} easily in this adduct form, and (b) be stable to chemical or electrochemical reduction designed to convert the CO{sub 2} to useful fuels or fuel precursors. The currently used phosphinoamido- ligands appear at this point to be less-stable than desired under electrochemical reduction conditions. This instability is believed due to the more delicate, reactive nature of the ligand framework system. In order to successfully capture and convert CO{sub 2} to useful organics, this instability must be addressed and solved. Work described in the late-start LDRD was designed to screen a variety of ligand/metal complexes that a priori are believed to be more stable to polar solvents and possible mild hydrolytic conditions than are the phosphinoamido-ligands. Results from ligand syntheses and metal complexation studies are reported.

  14. 2015 Fermilab Laboratory Directed Research & Development Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Wester, W. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States)

    2016-05-26

    The Fermi National Accelerator Laboratory (FNAL) is conducting a Laboratory Directed Research and Development (LDRD) program. Fiscal year 2015 represents the first full year of LDRD at Fermilab and includes seven projects approved mid-year in FY14 and six projects approved in FY15. One of the seven original projects has been completed just after the beginning of FY15. The implementation of LDRD at Fermilab is captured in the approved Fermilab 2015 LDRD Annual Program Plan. In FY15, the LDRD program represents 0.64% of Laboratory funding. The scope of the LDRD program at Fermilab will be established over the next couple of years where a portfolio of about 20 on-going projects representing approximately between 1% and 1.5% of the Laboratory funding is anticipated. This Annual Report focuses on the status of the current projects and provides an overview of the current status of LDRD at Fermilab.

  15. Laboratory Directed Research and Development Program FY 2005 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Sjoreen, Terrence P [ORNL

    2006-04-01

    The Oak Ridge National Laboratory (ORNL) Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) in March of each year. The program operates under the authority of DOE Order 413.2A, 'Laboratory Directed Research and Development' (January 8, 2001), which establishes DOE's requirements for the program while providing the Laboratory Director broad flexibility for program implementation. LDRD funds are obtained through a charge to all Laboratory programs. This report describes all ORNL LDRD research activities supported during FY 2005 and includes final reports for completed projects and shorter progress reports for projects that were active, but not completed, during this period. The FY 2005 ORNL LDRD Self-Assessment (ORNL/PPA-2006/2) provides financial data about the FY 2005 projects and an internal evaluation of the program's management process. ORNL is a DOE multiprogram science, technology, and energy laboratory with distinctive capabilities in materials science and engineering, neutron science and technology, energy production and end-use technologies, biological and environmental science, and scientific computing. With these capabilities ORNL conducts basic and applied research and development (R&D) to support DOE's overarching national security mission, which encompasses science, energy resources, environmental quality, and national nuclear security. As a national resource, the Laboratory also applies its capabilities and skills to the specific needs of other federal agencies and customers through the DOE Work For Others (WFO) program. Information about the Laboratory and its programs is available on the Internet at . LDRD is a relatively small but vital DOE program that allows ORNL, as well as other multiprogram DOE laboratories, to select a limited number of R&D projects for the purpose of: (1) maintaining the scientific and technical vitality of the

  16. Laboratory Directed Research and Development Program FY 2004 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Sjoreen, Terrence P [ORNL

    2005-04-01

    The Oak Ridge National Laboratory (ORNL) Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) in March of each year. The program operates under the authority of DOE Order 413.2A, 'Laboratory Directed Research and Development' (January 8, 2001), which establishes DOE's requirements for the program while providing the Laboratory Director broad flexibility for program implementation. LDRD funds are obtained through a charge to all Laboratory programs. This report describes all ORNL LDRD research activities supported during FY 2004 and includes final reports for completed projects and shorter progress reports for projects that were active, but not completed, during this period. The FY 2004 ORNL LDRD Self-Assessment (ORNL/PPA-2005/2) provides financial data about the FY 2004 projects and an internal evaluation of the program's management process. ORNL is a DOE multiprogram science, technology, and energy laboratory with distinctive capabilities in materials science and engineering, neutron science and technology, energy production and end-use technologies, biological and environmental science, and scientific computing. With these capabilities ORNL conducts basic and applied research and development (R&D) to support DOE's overarching national security mission, which encompasses science, energy resources, environmental quality, and national nuclear security. As a national resource, the Laboratory also applies its capabilities and skills to the specific needs of other federal agencies and customers through the DOE Work For Others (WFO) program. Information about the Laboratory and its programs is available on the Internet at . LDRD is a relatively small but vital DOE program that allows ORNL, as well as other multiprogram DOE laboratories, to select a limited number of R&D projects for the purpose of: (1) maintaining the scientific and technical vitality of the

  17. Breaking projective chaos synchronization secure communication using filtering and generalized synchronization

    International Nuclear Information System (INIS)

    Alvarez, G.; Li Shujun; Montoya, F.; Pastor, G.; Romera, M.

    2005-01-01

    This paper describes the security weaknesses of a recently proposed secure communication method based on chaotic masking using projective synchronization of two chaotic systems. We show that the system is insecure and how to break it in two different ways, by high-pass filtering and by generalized synchronization

  18. Quantitative adaptation analytics for assessing dynamic systems of systems: LDRD Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Gauthier, John H. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). System Readiness & Sustainment Technologies (6133, M/S 1188); Miner, Nadine E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Military & Energy Systems Analysis (6114, M/S 1188); Wilson, Michael L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Resilience and Regulatory Effects (6921, M/S 1138); Le, Hai D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). System Readiness & Sustainment Technologies (6133, M/S 1188); Kao, Gio K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Networked System Survivability & Assurance (5629, M/S 0671); Melander, Darryl J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Software Systems R& D (9525, M/S 1188); Longsine, Dennis Earl [Sandia National Laboratories, Unknown, Unknown; Vander Meer, Jr., Robert C. [SAIC, Inc., Albuquerque, NM (United States)

    2015-01-01

    Our society is increasingly reliant on systems and interoperating collections of systems, known as systems of systems (SoS). These SoS are often subject to changing missions (e.g., nation- building, arms-control treaties), threats (e.g., asymmetric warfare, terrorism), natural environments (e.g., climate, weather, natural disasters) and budgets. How well can SoS adapt to these types of dynamic conditions? This report details the results of a three year Laboratory Directed Research and Development (LDRD) project aimed at developing metrics and methodologies for quantifying the adaptability of systems and SoS. Work products include: derivation of a set of adaptability metrics, a method for combining the metrics into a system of systems adaptability index (SoSAI) used to compare adaptability of SoS designs, development of a prototype dynamic SoS (proto-dSoS) simulation environment which provides the ability to investigate the validity of the adaptability metric set, and two test cases that evaluate the usefulness of a subset of the adaptability metrics and SoSAI for distinguishing good from poor adaptability in a SoS. Intellectual property results include three patents pending: A Method For Quantifying Relative System Adaptability, Method for Evaluating System Performance, and A Method for Determining Systems Re-Tasking.

  19. The theory of diversity and redundancy in information system security : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Mayo, Jackson R. (Sandia National Laboratories, Livermore, CA); Torgerson, Mark Dolan; Walker, Andrea Mae; Armstrong, Robert C. (Sandia National Laboratories, Livermore, CA); Allan, Benjamin A. (Sandia National Laboratories, Livermore, CA); Pierson, Lyndon George

    2010-10-01

    The goal of this research was to explore first principles associated with mixing of diverse implementations in a redundant fashion to increase the security and/or reliability of information systems. Inspired by basic results in computer science on the undecidable behavior of programs and by previous work on fault tolerance in hardware and software, we have investigated the problem and solution space for addressing potentially unknown and unknowable vulnerabilities via ensembles of implementations. We have obtained theoretical results on the degree of security and reliability benefits from particular diverse system designs, and mapped promising approaches for generating and measuring diversity. We have also empirically studied some vulnerabilities in common implementations of the Linux operating system and demonstrated the potential for diversity to mitigate these vulnerabilities. Our results provide foundational insights for further research on diversity and redundancy approaches for information systems.

  20. Project on National Security Reform: Forging a New Shield

    Science.gov (United States)

    2008-11-01

    quoted by Joseph Nye in ―Leaders and Managers,‖ Project Syndicate , 1 May 2008, 30 September 2008 < http://www.project-syndicate.org/commentary/nye56...Bulletin of the Atomic Scientists, 18 Sept 2007, 30 Sept 2008 < http://www.thebulletin.org/web-edition/ columnists / gordon-adams/ when-national-security... Syndication ) 1179 tagging, ambient awareness, 1180 message boards, virtual social networking, document storage, and virtual meetings. Heavy emphasis is

  1. Why Phishing Works: Project for an Information Security Capstone Course

    Science.gov (United States)

    Pollacia, Lissa; Ding, Yan Zong; Yang, Seung

    2015-01-01

    This paper presents a project which was conducted in a capstone course in Information Security. The project focused on conducting research concerning the various aspects of phishing, such as why phishing works and who is more likely to be deceived by phishing. Students were guided through the process of conducting research: finding background and…

  2. The QUANTGRID Project (RO)—Quantum Security in GRID Computing Applications

    Science.gov (United States)

    Dima, M.; Dulea, M.; Petre, M.; Petre, C.; Mitrica, B.; Stoica, M.; Udrea, M.; Sterian, R.; Sterian, P.

    2010-01-01

    The QUANTGRID Project, financed through the National Center for Programme Management (CNMP-Romania), is the first attempt at using Quantum Crypted Communications (QCC) in large scale operations, such as GRID Computing, and conceivably in the years ahead in the banking sector and other security tight communications. In relation with the GRID activities of the Center for Computing & Communications (Nat.'l Inst. Nucl. Phys.—IFIN-HH), the Quantum Optics Lab. (Nat.'l Inst. Plasma and Lasers—INFLPR) and the Physics Dept. (University Polytechnica—UPB) the project will build a demonstrator infrastructure for this technology. The status of the project in its incipient phase is reported, featuring tests for communications in classical security mode: socket level communications under AES (Advanced Encryption Std.), both proprietary code in C++ technology. An outline of the planned undertaking of the project is communicated, highlighting its impact in quantum physics, coherent optics and information technology.

  3. Final report for the protocol extensions for ATM Security Laboratory Directed Research and Development Project

    Energy Technology Data Exchange (ETDEWEB)

    Tarman, T.D.; Pierson, L.G.; Brenkosh, J.P. [and others

    1996-03-01

    This is the summary report for the Protocol Extensions for Asynchronous Transfer Mode project, funded under Sandia`s Laboratory Directed Research and Development program. During this one-year effort, techniques were examined for integrating security enhancements within standard ATM protocols, and mechanisms were developed to validate these techniques and to provide a basic set of ATM security assurances. Based on our experience during this project, recommendations were presented to the ATM Forum (a world-wide consortium of ATM product developers, service providers, and users) to assist with the development of security-related enhancements to their ATM specifications. As a result of this project, Sandia has taken a leading role in the formation of the ATM Forum`s Security Working Group, and has gained valuable alliances and leading-edge experience with emerging ATM security technologies and protocols.

  4. Nevada Test Site-Directed Research and Development: FY 2006 Report

    International Nuclear Information System (INIS)

    Wil Lewis, editor

    2007-01-01

    The Nevada Test Site Directed Research and Development (SDRD) program completed its fifth successful year of research and development activities in FY 2006. Forty new projects were selected for funding this year, and ten FY 2005 projects were brought to conclusion. The total funds expended by the SDRD program were $6 million, for an average per-project cost of $120 thousand. Beginning in May, 2006 programmatic burden rates were applied to SDRD project costs. An external audit conducted in September 2006 verified that appropriate accounting practices were applied to the SDRD program. Highlights for the year included: the filing of 27 invention disclosures for intellectual property generated by FY 2006 projects; programmatic adoption of four FY 2005 SDRD-developed technologies; participation in the tri-Lab Laboratory Directed Research and Development (LDRD) and SDRD program review that was broadly attended by NTS, NNSA, LDRD, and U.S. Department of Homeland Security representatives; peer reviews of all FY 2006 projects; and the successful completion of 50 R and D projects, as presented in this report

  5. Nevada Test Site-Directed Research and Development: FY 2006 Report

    Energy Technology Data Exchange (ETDEWEB)

    Wil Lewis, editor

    2007-08-01

    The Nevada Test Site–Directed Research and Development (SDRD) program completed its fifth successful year of research and development activities in FY 2006. Forty new projects were selected for funding this year, and ten FY 2005 projects were brought to conclusion. The total funds expended by the SDRD program were $6 million, for an average per-project cost of $120 thousand. Beginning in May, 2006 programmatic burden rates were applied to SDRD project costs. An external audit conducted in September 2006 verified that appropriate accounting practices were applied to the SDRD program. Highlights for the year included: the filing of 27 invention disclosures for intellectual property generated by FY 2006 projects; programmatic adoption of four FY 2005 SDRD-developed technologies; participation in the tri-Lab Laboratory Directed Research and Development (LDRD) and SDRD program review that was broadly attended by NTS, NNSA, LDRD, and U.S. Department of Homeland Security representatives; peer reviews of all FY 2006 projects; and the successful completion of 50 R&D projects, as presented in this report.

  6. Chemiresistor microsensors for in-situ monitoring of volatile organic compounds : final LDRD report.

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Michael Loren; Hughes, Robert Clark; Kooser, Ara S.; McGrath, Lucas K.; Ho, Clifford Kuofei; Wright, Jerome L.; Davis, Chad Edward

    2003-09-01

    This report provides a summary of the three-year LDRD (Laboratory Directed Research and Development) project aimed at developing microchemical sensors for continuous, in-situ monitoring of volatile organic compounds. A chemiresistor sensor array was integrated with a unique, waterproof housing that allows the sensors to be operated in a variety of media including air, soil, and water. Numerous tests were performed to evaluate and improve the sensitivity, stability, and discriminatory capabilities of the chemiresistors. Field tests were conducted in California, Nevada, and New Mexico to further test and develop the sensors in actual environments within integrated monitoring systems. The field tests addressed issues regarding data acquisition, telemetry, power requirements, data processing, and other engineering requirements. Significant advances were made in the areas of polymer optimization, packaging, data analysis, discrimination, design, and information dissemination (e.g., real-time web posting of data; see www.sandia.gov/sensor). This project has stimulated significant interest among commercial and academic institutions. A CRADA (Cooperative Research and Development Agreement) was initiated in FY03 to investigate manufacturing methods, and a Work for Others contract was established between Sandia and Edwards Air Force Base for FY02-FY04. Funding was also obtained from DOE as part of their Advanced Monitoring Systems Initiative program from FY01 to FY03, and a DOE EMSP contract was awarded jointly to Sandia and INEEL for FY04-FY06. Contracts were also established for collaborative research with Brigham Young University to further evaluate, understand, and improve the performance of the chemiresistor sensors.

  7. Smart Grid Communications Security Project, U.S. Department of Energy

    Energy Technology Data Exchange (ETDEWEB)

    Barnes, Frank [Univ. of Colorado, Boulder, CO (United States)

    2012-09-01

    There were four groups that worked on this project in different areas related to Smart Girds and Security. They included faculty and students from electric computer and energy engineering, law, business and sociology. The results of the work are summarized in a verity of reports, papers and thesis. A major report to the Governor of Colorado’s energy office with contributions from all the groups working on this project is given bellow. Smart Grid Deployment in Colorado: Challenges and Opportunities, Report to Colorado Governor’s Energy Office and Colorado Smart Grid Task Force(2010) (Kevin Doran, Frank Barnes, and Puneet Pasrich, eds.) This report includes information on the state of the grid cyber security, privacy, energy storage and grid stability, workforce development, consumer behavior with respect to the smart grid and safety issues.

  8. Laboratory Directed Research and Development Annual Report for 2010

    International Nuclear Information System (INIS)

    Hughes, Pamela J.

    2011-01-01

    This report documents progress made on all LDRD-funded projects during fiscal year 2010. The projects supported by LDRD funding all have demonstrable ties to DOE missions. In addition, many of the LDRD projects are relevant to the missions of other federal agencies that sponsor work at the Laboratory. The program plays a key role in attracting the best and brightest scientific staff needed to serve the highest priority DOE mission objectives. The flexibility provided by the LDRD program allows us to make rapid decisions about projects that address emerging scientific challenges so that PNNL remains a modern research facility well into the 21st century. Individual project reports comprise the bulk of this LDRD report. The Laboratory focuses its LDRD research on scientific assets that often address more than one scientific discipline. Though multidisciplinary, each project in this report appears under one of the following primary research categories: (1) Advanced Sensors and Instrumentation; (2) Biological Sciences; (3) Chemistry; (4) Earth and Space Sciences; (5) Energy Supply and Use; and (6) Engineering and Manufacturing Processes.

  9. The ESPRIT project CAFE : high security digital payment systems

    NARCIS (Netherlands)

    Boly, J.P.; Bosselaers, A.; Cramer, R.; Michelsen, R.; Mjølsnes, S.F.; Muller, F.; Pedersen, T.P.; Pfitzmann, B.; Rooij, de P.; Schoenmakers, B.; Schunter, M.; Vallée, L.; Waidner, M.; Gollmann, D.

    1994-01-01

    CAFE (“Conditional Access for Europe”) is an ongoing project in the European Community's ESPRIT program. The goal of CAFE is to develop innovative systems for conditional access, and in particular, digital payment systems. An important aspect of CAFE is high security of all parties concerned, with

  10. 2014 Fermilab Laboratory Directoed Research & Development Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Wester, W. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States)

    2016-05-26

    After initiation by the Fermilab Laboratory Director, a team from the senior Laboratory leadership and a Laboratory Directed Research and Development (LDRD) Advisory Committee developed an implementation plan for LDRD at Fermilab for the first time. This implementation was captured in the approved Fermilab 2014 LDRD Program Plan and followed directions and guidance from the Department of Energy (DOE) order, DOE O 413.2B, a “Roles, Responsibilities, and Guidelines, …” document, and examples of best practices at other DOE Office of Science Laboratories. At Fermilab, a FY14 midyear Call for Proposals was issued. A LDRD Selection Committee evaluated those proposals that were received and provided a recommendation to the Laboratory Director who approved seven LDRD projects. This Annual Report focuses on the status of those seven projects and provides an overview of the current status of LDRD at Fermilab. The seven FY14 LDRD approved projects had a date of initiation late in FY14 such that this report reflects approximately six months of effort approximately through January 2015. The progress of these seven projects, the subsequent award of six additional new projects beginning in FY15, and preparations for the issuance of the FY16 Call for Proposals indicates that LDRD is now integrated into the overall annual program at Fermilab. All indications are that LDRD is improving the scientific and technical vitality of the Laboratory and providing new, novel, or cutting edge projects carried out at the forefront of science and technology and aligned with the mission and strategic visions of Fermilab and the Department of Energy.

  11. Final report and documentation for the security enabled programmable switch for protection of distributed internetworked computers LDRD.

    Energy Technology Data Exchange (ETDEWEB)

    Van Randwyk, Jamie A.; Robertson, Perry J.; Durgin, Nancy Ann; Toole, Timothy J.; Kucera, Brent D.; Campbell, Philip LaRoche; Pierson, Lyndon George

    2010-02-01

    An increasing number of corporate security policies make it desirable to push security closer to the desktop. It is not practical or feasible to place security and monitoring software on all computing devices (e.g. printers, personal digital assistants, copy machines, legacy hardware). We have begun to prototype a hardware and software architecture that will enforce security policies by pushing security functions closer to the end user, whether in the office or home, without interfering with users' desktop environments. We are developing a specialized programmable Ethernet network switch to achieve this. Embodied in this device is the ability to detect and mitigate network attacks that would otherwise disable or compromise the end user's computing nodes. We call this device a 'Secure Programmable Switch' (SPS). The SPS is designed with the ability to be securely reprogrammed in real time to counter rapidly evolving threats such as fast moving worms, etc. This ability to remotely update the functionality of the SPS protection device is cryptographically protected from subversion. With this concept, the user cannot turn off or fail to update virus scanning and personal firewall filtering in the SPS device as he/she could if implemented on the end host. The SPS concept also provides protection to simple/dumb devices such as printers, scanners, legacy hardware, etc. This report also describes the development of a cryptographically protected processor and its internal architecture in which the SPS device is implemented. This processor executes code correctly even if an adversary holds the processor. The processor guarantees both the integrity and the confidentiality of the code: the adversary cannot determine the sequence of instructions, nor can the adversary change the instruction sequence in a goal-oriented way.

  12. Behavior-aware decision support systems : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Hirsch, Gary B.; Homer, Jack (Homer Consulting); Chenoweth, Brooke N.; Backus, George A.; Strip, David R.

    2007-11-01

    As Sandia National Laboratories serves its mission to provide support for the security-related interests of the United States, it is faced with considering the behavioral responses that drive problems, mitigate interventions, or lead to unintended consequences. The effort described here expands earlier works in using healthcare simulation to develop behavior-aware decision support systems. This report focuses on using qualitative choice techniques and enhancing two analysis models developed in a sister project.

  13. Generalized projective synchronization via the state observer and its application in secure communication

    International Nuclear Information System (INIS)

    Wu Di; Li Juan-Juan

    2010-01-01

    Based on the improved state observer and the pole placement technique, by adding a constant which extends the scope of use of the original system, a new design method of generalized projective synchronization is proposed. With this method, by changing the projective synchronization scale factor, one can achieve not only complete synchronization, but also anti-synchronization, as well as arbitrary percentage of projective synchronization, so that the system may attain arbitrary synchronization in a relatively short period of time, which makes this study more meaningful. By numerical simulation, and choosing appropriate scale factor, the results of repeated experiments verify that this method is highly effective and satisfactory. Finally, based on this method and the relevant feedback concept, a novel secure communication project is designed. Numerical simulation verifies that this secure communication project is very valid, and moreover, the experimental result has been greatly improved in decryption time. (general)

  14. FORMATION OF THE CONTENT OF THE PROJECT OF ORGANIZATION OF SECURITY SYSTEMS IN HOTEL BUSINESS

    Directory of Open Access Journals (Sweden)

    Антон Іванович РОГОВИЙ

    2015-05-01

    Full Text Available The article identified and analyzed features of the project management in systems of creating security systems for security systems for the enterprise of hotel business. We have identified the main technical means, which should provide maximum protection of people and infrastructure of hotels. In the article revealed the criteria that should guide the manager in the selection of one or other technical means. In summery we highlighted works, which have to be included in the content of the project of organization of complex security system of companies in the hotel business.

  15. Final report for LDRD Project 93633 : new hash function for data protection.

    Energy Technology Data Exchange (ETDEWEB)

    Draelos, Timothy John; Dautenhahn, Nathan; Schroeppel, Richard Crabtree; Tolk, Keith Michael; Orman, Hilarie (PurpleStreak, Inc.); Walker, Andrea Mae; Malone, Sean; Lee, Eric; Neumann, William Douglas; Cordwell, William R.; Torgerson, Mark Dolan; Anderson, Eric; Lanzone, Andrew J.; Collins, Michael Joseph; McDonald, Timothy Scott; Caskey, Susan Adele

    2009-03-01

    The security of the widely-used cryptographic hash function SHA1 has been impugned. We have developed two replacement hash functions. The first, SHA1X, is a drop-in replacement for SHA1. The second, SANDstorm, has been submitted as a candidate to the NIST-sponsored SHA3 Hash Function competition.

  16. International physical protection self-assessment tool for chemical facilities.

    Energy Technology Data Exchange (ETDEWEB)

    Tewell, Craig R.; Burdick, Brent A.; Stiles, Linda L.; Lindgren, Eric Richard

    2010-09-01

    This report is the final report for Laboratory Directed Research and Development (LDRD) Project No.130746, International Physical Protection Self-Assessment Tool for Chemical Facilities. The goal of the project was to develop an exportable, low-cost, computer-based risk assessment tool for small to medium size chemical facilities. The tool would assist facilities in improving their physical protection posture, while protecting their proprietary information. In FY2009, the project team proposed a comprehensive evaluation of safety and security regulations in the target geographical area, Southeast Asia. This approach was later modified and the team worked instead on developing a methodology for identifying potential targets at chemical facilities. Milestones proposed for FY2010 included characterizing the international/regional regulatory framework, finalizing the target identification and consequence analysis methodology, and developing, reviewing, and piloting the software tool. The project team accomplished the initial goal of developing potential target categories for chemical facilities; however, the additional milestones proposed for FY2010 were not pursued and the LDRD funding therefore was redirected.

  17. Laboratory Directed Research and Development annual report, Fiscal year 1993

    International Nuclear Information System (INIS)

    1994-01-01

    The Department of Energy Order DOE 5000.4A establishes DOE's policy and guidelines regarding Laboratory Directed Research and Development (LDRD) at its multiprogram laboratories. As described in 5000.4A, LDRD is ''research and development of a creative and innovative nature which is selected by the Laboratory Director or his or her designee, for the purpose of maintaining the scientific and technological vitality of the Laboratory and to respond to scientific and technological opportunities in conformance with the guidelines in this Order. LDRD includes activities previously defined as ER ampersand D, as well as other discretionary research and development activities not provided for in a DOE program.'' Consistent with the Mission Statement and Strategic Plan provided in PNL's Institutional Plan, the LDRD investments are focused on developing new and innovative approaches in research related to our ''core competencies.'' Currently, PNL's core competencies have been identified as integrated environmental research; process technology; energy systems research. In this report, the individual summaries of Laboratory-level LDRD projects are organized according to these core competencies. The largest proportion of Laboratory-level LDRD funds is allocated to the core competency of integrated environmental research. A significant proportion of PNL's LDRD funds are also allocated to projects within the various research centers that are proposed by individual researchers or small research teams. The projects are described in Section 2.0. The projects described in this report represent PNL's investment in its future and are vital to maintaining the ability to develop creative solutions for the scientific and technical challenges faced by DOE and the nation. In accordance with DOE guidelines, the report provides an overview of PNL's LDRD program and the management process used for the program and project summaries for each LDRD project

  18. Laboratory Directed Research and Development annual report, Fiscal year 1993

    Energy Technology Data Exchange (ETDEWEB)

    1994-01-01

    The Department of Energy Order DOE 5000.4A establishes DOE`s policy and guidelines regarding Laboratory Directed Research and Development (LDRD) at its multiprogram laboratories. As described in 5000.4A, LDRD is ``research and development of a creative and innovative nature which is selected by the Laboratory Director or his or her designee, for the purpose of maintaining the scientific and technological vitality of the Laboratory and to respond to scientific and technological opportunities in conformance with the guidelines in this Order. LDRD includes activities previously defined as ER&D, as well as other discretionary research and development activities not provided for in a DOE program.`` Consistent with the Mission Statement and Strategic Plan provided in PNL`s Institutional Plan, the LDRD investments are focused on developing new and innovative approaches in research related to our ``core competencies.`` Currently, PNL`s core competencies have been identified as integrated environmental research; process technology; energy systems research. In this report, the individual summaries of Laboratory-level LDRD projects are organized according to these core competencies. The largest proportion of Laboratory-level LDRD funds is allocated to the core competency of integrated environmental research. A significant proportion of PNL`s LDRD funds are also allocated to projects within the various research centers that are proposed by individual researchers or small research teams. The projects are described in Section 2.0. The projects described in this report represent PNL`s investment in its future and are vital to maintaining the ability to develop creative solutions for the scientific and technical challenges faced by DOE and the nation. In accordance with DOE guidelines, the report provides an overview of PNL`s LDRD program and the management process used for the program and project summaries for each LDRD project.

  19. Contribution of food security projects on poverty alleviation to the ...

    African Journals Online (AJOL)

    Despite South Africa's economic growth having been accelerated considerably in the country, poverty levels have not decreased as one would have experienced. Food Security Projects initiated by the government of South Africa in order to help alleviate poverty within Limpopo Province have proved unsustainable and ...

  20. 24 CFR 5.661 - Section 8 project-based assistance programs: Approval for police or other security personnel to...

    Science.gov (United States)

    2010-04-01

    ... personnel who will reside in the project, and the period of residence by such personnel. How owner proposes... purpose, “owner” includes a principal or other interested party. (iv) How residence by security personnel in a project unit will increase security for Section 8 assisted families residing in the project. (v...

  1. Nevada Test Site-Directed Research, Development, and Demonstration

    International Nuclear Information System (INIS)

    Will Lewis, Compiler

    2006-01-01

    The Nevada Test Site-Directed Research, Development, and Demonstration (SDRD) program completed a very successful year of research and development activities in FY 2005. Fifty new projects were selected for funding this year, and five FY 2004 projects were brought to conclusion. The total funds expended by the SDRD program were $5.4 million, for an average per project cost of just under $100,000. Two external audits of SDRD accounting practices were conducted in FY 2005. Both audits found the program's accounting practices consistent with the requirements of DOE Order 413.2A, and one included the observation that the NTS contractor ''did an exceptional job in planning and executing year-start activities.'' Highlights for the year included: the filing of 18 invention disclosures for intellectual property generated by FY 2005 projects; programmatic adoption of 17 FY 2004 SDRD-developed technologies; participation in the tri-lab Laboratory Directed Research and Development (LDRD) and SDRD program review that was broadly attended by NTS, NNSA, LDRD, and U.S. Department of Homeland Security representatives; peer reviews of all FY 2005 projects; and the successful completion of 55 R and D projects, as presented in this report

  2. Optimisation of Critical Infrastructure Protection: The SiVe Project on Airport Security

    Science.gov (United States)

    Breiing, Marcus; Cole, Mara; D'Avanzo, John; Geiger, Gebhard; Goldner, Sascha; Kuhlmann, Andreas; Lorenz, Claudia; Papproth, Alf; Petzel, Erhard; Schwetje, Oliver

    This paper outlines the scientific goals, ongoing work and first results of the SiVe research project on critical infrastructure security. The methodology is generic while pilot studies are chosen from airport security. The outline proceeds in three major steps, (1) building a threat scenario, (2) development of simulation models as scenario refinements, and (3) assessment of alternatives. Advanced techniques of systems analysis and simulation are employed to model relevant airport structures and processes as well as offences. Computer experiments are carried out to compare and optimise alternative solutions. The optimality analyses draw on approaches to quantitative risk assessment recently developed in the operational sciences. To exploit the advantages of the various techniques, an integrated simulation workbench is build up in the project.

  3. Final report for the mobile node authentication LDRD project.

    Energy Technology Data Exchange (ETDEWEB)

    Michalski, John T.; Lanzone, Andrew J.

    2005-09-01

    In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authentication is critical. In a wired infrastructure, this authentication service is typically facilitated by a centrally-located ''authentication certificate generator'' such as a Certificate Authority (CA) server. This centralized approach is ill-suited to meet the needs of mobile ad hoc networks, such as those required by military systems, because of the unpredictable connectivity and dynamic routing. There is a need for a secure and robust approach to mobile node authentication. Current mechanisms either assign a pre-shared key (shared by all participating parties) or require that each node retain a collection of individual keys that are used to communicate with other individual nodes. Both of these approaches have scalability issues and allow a single compromised node to jeopardize the entire mobile node community. In this report, we propose replacing the centralized CA with a distributed CA whose responsibilities are shared between a set of select network nodes. To that end, we develop a protocol that relies on threshold cryptography to perform the fundamental CA duties in a distributed fashion. The protocol is meticulously defined and is implemented it in a series of detailed models. Using these models, mobile wireless scenarios were created on a communication simulator to test the protocol in an operational environment and to gather statistics on its scalability and performance.

  4. New Capabilities for Hostile Environments on Z Grand Challenge LDRD - Final Status

    Energy Technology Data Exchange (ETDEWEB)

    Cuneo, Michael E. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Griffin, P. J. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Balch, D. K. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Bell, K. S. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Bierner, J. A. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Coverdale, C. A. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Flanagan, T. M. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Hansen, S. B. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Slaboszewicz, V. Harper- [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Jones, B. M. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Lamppa, D. C. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Martin, W. J. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); McKenney, J. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Moore, N. W. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Parma, E. J. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Peebles, H. C. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Rovang, D. C. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Savage, M. E. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Tang, R. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Vesey, R. A. [Sandia National Lab. (SNL-CA), Livermore, CA (United States)

    2016-10-01

    The purpose of this project was to develop new physical simulation capabilities in order to support the science-based qualification of nonnuclear weapon components in hostile radiation environments. The project contributes directly to the goals of maintaining a safe, secure, and effective US nuclear stockpile, maintaining strategic deterrence at lower nuclear force levels, extending the life of the nuclear deterrent capability, and to be ready for technological surprise.

  5. Laboratory directed research and development annual report: Fiscal year 1992

    International Nuclear Information System (INIS)

    1993-01-01

    The Department of Energy Order DOE 5000.4A establishes DOE's policy and guidelines regarding Laboratory Directed Research and Development (LDRD) at its multiprogram laboratories. As described in 5000.4A, LDRD is ''research and development of a creative and innovative nature which is selected by the Laboratory Director or his or her designee, for the purpose of maintaining the scientific and technological vitality of the Laboratory and to respond to scientific and technological opportunities in conformance with the guidelines in this order. Consistent with the Mission Statement and Strategic Plan provided in PNL's Institutional Plan, the LDRD investments are focused on developing new and innovative approaches to research related to our ''core competencies.'' Currently, PNL's core competencies have been identified as: integrated environmental research; process science and engineering; energy distribution and utilization. In this report, the individual summaries of Laboratory-level LDRD projects are organized according to these corecompetencies. The largest proportion of Laboratory-level LDRD funds is allocated to the core competency of integrated environmental research. The projects described in this report represent PNL's investment in its future and are vital to maintaining the ability to develop creative solutions for the scientific and technical challenges faced by DOE and the nation. The report provides an overview of PNL's LDRD program and the management process used for the program and project summaries for each LDRD project

  6. Bypassing Russia: Nabucco project and its implications for the European gas security

    International Nuclear Information System (INIS)

    Erdogdu, Erkan

    2010-01-01

    Restrictions on CO 2 emissions, the nuclear phase-out announced by some member states, high emissions from coal-fired power plants, and barriers to rapid development of renewable generation are factors that make the European Union (EU) highly dependent on natural gas. With three non-EU countries (Russia, Algeria and Norway) currently supplying more than half the gas consumed within the EU and with projections pointing out that by 2030 internal sources will only be able to meet 25% of demand, the EU desperately looks for means to secure new sources of gas supply. In this context, the Nabucco pipeline is planned to deliver gas from Caspian and Middle East regions to the EU market. It runs across Turkey and then through Bulgaria, Romania and Hungary before connecting with a major gas hub in Austria. On paper, Nabucco project makes perfect sense, offering a new export route to the EU markets for Caspian gas producers (Azerbaijan, Turkmenistan and Kazakhstan) as well as Iran and, in time, Iraq. The project is backed by the EU and strongly supported by the United States. Perhaps most importantly, Nabucco would completely bypass Russia. This paper addresses issues surrounding Nabucco project and their implications for the European gas security. (author)

  7. Final Report on Institutional Computing Project s15_hilaserion, “Kinetic Modeling of Next-Generation High-Energy, High-Intensity Laser-Ion Accelerators as an Enabling Capability”

    Energy Technology Data Exchange (ETDEWEB)

    Albright, Brian James [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Yin, Lin [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Stark, David James [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-02-06

    This proposal sought of order 1M core-hours of Institutional Computing time intended to enable computing by a new LANL Postdoc (David Stark) working under LDRD ER project 20160472ER (PI: Lin Yin) on laser-ion acceleration. The project was “off-cycle,” initiating in June of 2016 with a postdoc hire.

  8. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  9. Nevada Test Site-Directed Research, Development, and Demonstration. FY2005 report

    Energy Technology Data Exchange (ETDEWEB)

    Lewis, Will [comp.

    2006-09-01

    The Nevada Test Site-Directed Research, Development, and Demonstration (SDRD) program completed a very successful year of research and development activities in FY 2005. Fifty new projects were selected for funding this year, and five FY 2004 projects were brought to conclusion. The total funds expended by the SDRD program were $5.4 million, for an average per project cost of just under $100,000. Two external audits of SDRD accounting practices were conducted in FY 2005. Both audits found the program's accounting practices consistent with the requirements of DOE Order 413.2A, and one included the observation that the NTS contractor ''did an exceptional job in planning and executing year-start activities.'' Highlights for the year included: the filing of 18 invention disclosures for intellectual property generated by FY 2005 projects; programmatic adoption of 17 FY 2004 SDRD-developed technologies; participation in the tri-lab Laboratory Directed Research and Development (LDRD) and SDRD program review that was broadly attended by NTS, NNSA, LDRD, and U.S. Department of Homeland Security representatives; peer reviews of all FY 2005 projects; and the successful completion of 55 R&D projects, as presented in this report.

  10. Laboratory directed research and development annual report: Fiscal year 1992

    Energy Technology Data Exchange (ETDEWEB)

    1993-01-01

    The Department of Energy Order DOE 5000.4A establishes DOE`s policy and guidelines regarding Laboratory Directed Research and Development (LDRD) at its multiprogram laboratories. As described in 5000.4A, LDRD is ``research and development of a creative and innovative nature which is selected by the Laboratory Director or his or her designee, for the purpose of maintaining the scientific and technological vitality of the Laboratory and to respond to scientific and technological opportunities in conformance with the guidelines in this order. Consistent with the Mission Statement and Strategic Plan provided in PNL`s Institutional Plan, the LDRD investments are focused on developing new and innovative approaches to research related to our ``core competencies.`` Currently, PNL`s core competencies have been identified as: integrated environmental research; process science and engineering; energy distribution and utilization. In this report, the individual summaries of Laboratory-level LDRD projects are organized according to these corecompetencies. The largest proportion of Laboratory-level LDRD funds is allocated to the core competency of integrated environmental research. The projects described in this report represent PNL`s investment in its future and are vital to maintaining the ability to develop creative solutions for the scientific and technical challenges faced by DOE and the nation. The report provides an overview of PNL`s LDRD program and the management process used for the program and project summaries for each LDRD project.

  11. Laboratory directed research and development annual report: Fiscal year 1992

    Energy Technology Data Exchange (ETDEWEB)

    1993-01-01

    The Department of Energy Order DOE 5000.4A establishes DOE's policy and guidelines regarding Laboratory Directed Research and Development (LDRD) at its multiprogram laboratories. As described in 5000.4A, LDRD is research and development of a creative and innovative nature which is selected by the Laboratory Director or his or her designee, for the purpose of maintaining the scientific and technological vitality of the Laboratory and to respond to scientific and technological opportunities in conformance with the guidelines in this order. Consistent with the Mission Statement and Strategic Plan provided in PNL's Institutional Plan, the LDRD investments are focused on developing new and innovative approaches to research related to our core competencies.'' Currently, PNL's core competencies have been identified as: integrated environmental research; process science and engineering; energy distribution and utilization. In this report, the individual summaries of Laboratory-level LDRD projects are organized according to these corecompetencies. The largest proportion of Laboratory-level LDRD funds is allocated to the core competency of integrated environmental research. The projects described in this report represent PNL's investment in its future and are vital to maintaining the ability to develop creative solutions for the scientific and technical challenges faced by DOE and the nation. The report provides an overview of PNL's LDRD program and the management process used for the program and project summaries for each LDRD project.

  12. Laboratory-directed research and development: FY 1996 progress report

    Energy Technology Data Exchange (ETDEWEB)

    Vigil, J.; Prono, J. [comps.

    1997-05-01

    This report summarizes the FY 1996 goals and accomplishments of Laboratory-Directed Research and Development (LDRD) projects. It gives an overview of the LDRD program, summarizes work done on individual research projects, and provides an index to the projects` principal investigators. Projects are grouped by their LDRD component: Individual Projects, Competency Development, and Program Development. Within each component, they are further divided into nine technical disciplines: (1) materials science, (2) engineering and base technologies, (3) plasmas, fluids, and particle beams, (4) chemistry, (5) mathematics and computational sciences, (6) atomic and molecular physics, (7) geoscience, space science, and astrophysics, (8) nuclear and particle physics, and (9) biosciences.

  13. Laboratory-directed research and development: FY 1996 progress report

    International Nuclear Information System (INIS)

    Vigil, J.; Prono, J.

    1997-05-01

    This report summarizes the FY 1996 goals and accomplishments of Laboratory-Directed Research and Development (LDRD) projects. It gives an overview of the LDRD program, summarizes work done on individual research projects, and provides an index to the projects' principal investigators. Projects are grouped by their LDRD component: Individual Projects, Competency Development, and Program Development. Within each component, they are further divided into nine technical disciplines: (1) materials science, (2) engineering and base technologies, (3) plasmas, fluids, and particle beams, (4) chemistry, (5) mathematics and computational sciences, (6) atomic and molecular physics, (7) geoscience, space science, and astrophysics, (8) nuclear and particle physics, and (9) biosciences

  14. Final Report Sustained Spheromak Physics Project FY 1997 - FY 1999

    International Nuclear Information System (INIS)

    Hooper, E.B.; Hill, D.N.

    2000-01-01

    This is the final report on the LDRD SI-funded Sustained Spheromak Physics Project for the years FY1997-FY1999, during which the SSPX spheromak was designed, built, and commissioned for operation at LLNL. The specific LDRD project covered in this report concerns the development, installation, and operation of specialized hardware and diagnostics for use on the SSPX facility in order to study energy confinement in a sustained spheromak plasma configuration. The USDOE Office of Fusion Energy Science funded the construction and routine operation of the SSPX facility. The main distinctive feature of the spheromak is that currents in the plasma itself produce the confining toroidal magnetic field, rather than external coils, which necessarily thread the vacuum vessel. There main objective of the Sustained Spheromak Physics Project was to test whether sufficient energy confinement could be maintained in a spheromak plasma sustained by DC helicity injection. Achieving central electron temperatures of several hundred eV would indicate this. In addition, we set out to determine how the energy confinement scales with T c and to relate the confinement time to the level of internal magnetic turbulence. Energy confinement and its scaling are the central technical issues for the spheromak as a fusion reactor concept. Pending the outcome of energy confinement studies now under way, the spheromak could be the basis for an attractive fusion reactor because of its compact size, simply-connected magnetic geometry, and potential for steady-state current drive

  15. Laboratory Directed Research and Development Program Assessment for FY 2008

    Energy Technology Data Exchange (ETDEWEB)

    Looney, J P; Fox, K J

    2008-03-31

    Brookhaven National Laboratory (BNL) is a multidisciplinary Laboratory that carries out basic and applied research in the physical, biomedical, and environmental sciences, and in selected energy technologies. It is managed by Brookhaven Science Associates, LLC, (BSA) under contract with the U. S. Department of Energy (DOE). BNL's Fiscal Year 2008 spending was $531.6 million. There are approximately 2,800 employees, and another 4,300 guest scientists and students who come each year to use the Laboratory's facilities and work with the staff. The BNL Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) annually in March, as required by DOE Order 413.2B, 'Laboratory Directed Research and Development,' April 19, 2006, and the Roles, Responsibilities, and Guidelines for Laboratory Directed Research and Development at the Department of Energy/National Nuclear Security Administration Laboratories dated June 13, 2006. The goals and objectives of BNL's LDRD Program can be inferred from the Program's stated purposes. These are to (1) encourage and support the development of new ideas and technology, (2) promote the early exploration and exploitation of creative and innovative concepts, and (3) develop new 'fundable' R&D projects and programs. The emphasis is clearly articulated by BNL to be on supporting exploratory research 'which could lead to new programs, projects, and directions' for the Laboratory. To be a premier scientific Laboratory, BNL must continuously foster groundbreaking scientific research and renew its research agenda. The competition for LDRD funds stimulates Laboratory scientists to think in new and creative ways, which becomes a major factor in achieving and maintaining research excellence and a means to address National needs within the overall mission of the DOE and BNL. By fostering high-risk, exploratory research, the LDRD program helps

  16. Advances in radiation modeling in ALEGRA :a final report for LDRD-67120, efficient implicit mulitgroup radiation calculations.

    Energy Technology Data Exchange (ETDEWEB)

    Mehlhorn, Thomas Alan; Kurecka, Christopher J. (University of Michigan, Ann Arbor, MI); McClarren, Ryan (University of Michigan, Ann Arbor, MI); Brunner, Thomas A.; Holloway, James Paul (University of Michigan, Ann Arbor, MI)

    2005-11-01

    The original LDRD proposal was to use a nonlinear diffusion solver to compute estimates for the material temperature that could then be used in a Implicit Monte Carlo (IMC) calculation. At the end of the first year of the project, it was determined that this was not going to be effective, partially due to the concept, and partially due to the fact that the radiation diffusion package was not as efficient as it could be. The second, and final year, of the project focused on improving the robustness and computational efficiency of the radiation diffusion package in ALEGRA. To this end, several new multigroup diffusion methods have been developed and implemented in ALEGRA. While these methods have been implemented, their effectiveness of reducing overall simulation run time has not been fully tested. Additionally a comprehensive suite of verification problems has been developed for the diffusion package to ensure that it has been implemented correctly. This process took considerable time, but exposed significant bugs in both the previous and new diffusion packages, the linear solve packages, and even the NEVADA Framework's parser. In order to manage this large suite of problem, a new tool called Tampa has been developed. It is a general tool for automating the process of running and analyzing many simulations. Ryan McClarren, at the University of Michigan has been developing a Spherical Harmonics capability for unstructured meshes. While still in the early phases of development, this promises to bridge the gap in accuracy between a full transport solution using IMC and the diffusion approximation.

  17. Advances in radiation modeling in ALEGRA: a final report for LDRD-67120, efficient implicit multigroup radiation calculations

    International Nuclear Information System (INIS)

    Mehlhorn, Thomas Alan; Kurecka, Christopher J.; McClarren, Ryan; Brunner, Thomas A.; Holloway, James Paul

    2005-01-01

    The original LDRD proposal was to use a nonlinear diffusion solver to compute estimates for the material temperature that could then be used in a Implicit Monte Carlo (IMC) calculation. At the end of the first year of the project, it was determined that this was not going to be effective, partially due to the concept, and partially due to the fact that the radiation diffusion package was not as efficient as it could be. The second, and final year, of the project focused on improving the robustness and computational efficiency of the radiation diffusion package in ALEGRA. To this end, several new multigroup diffusion methods have been developed and implemented in ALEGRA. While these methods have been implemented, their effectiveness of reducing overall simulation run time has not been fully tested. Additionally a comprehensive suite of verification problems has been developed for the diffusion package to ensure that it has been implemented correctly. This process took considerable time, but exposed significant bugs in both the previous and new diffusion packages, the linear solve packages, and even the NEVADA Framework's parser. In order to manage this large suite of problem, a new tool called Tampa has been developed. It is a general tool for automating the process of running and analyzing many simulations. Ryan McClarren, at the University of Michigan has been developing a Spherical Harmonics capability for unstructured meshes. While still in the early phases of development, this promises to bridge the gap in accuracy between a full transport solution using IMC and the diffusion approximation

  18. Vision and Displays for Military and Security Applications The Advanced Deployable Day/Night Simulation Project

    CERN Document Server

    Niall, Keith K

    2010-01-01

    Vision and Displays for Military and Security Applications presents recent advances in projection technologies and associated simulation technologies for military and security applications. Specifically, this book covers night vision simulation, semi-automated methods in photogrammetry, and the development and evaluation of high-resolution laser projection technologies for simulation. Topics covered include: advances in high-resolution projection, advances in image generation, geographic modeling, and LIDAR imaging, as well as human factors research for daylight simulation and for night vision devices. This title is ideal for optical engineers, simulator users and manufacturers, geomatics specialists, human factors researchers, and for engineers working with high-resolution display systems. It describes leading-edge methods for human factors research, and it describes the manufacture and evaluation of ultra-high resolution displays to provide unprecedented pixel density in visual simulation.

  19. Colombia: security and conflict 2000-2014. Two political projects in dispute

    Directory of Open Access Journals (Sweden)

    Fernando Galindo Rodriguez

    2016-12-01

    Full Text Available This paper analyzes, from a multi-dimensional point of view, the elements on which the concept of security in Colombia has been articulated in the last decade. Study the policy of Democratic Security of Alvaro Uribe Velez (2002-2010 and the policy of Democratic Prosperity of Juan Manuel Santos (2010-2014 from a socio-political perspective. Although both policies share military elements, each one aims to consolidate a different political country project. The first one relates to rebuild a country based on a Security State and on an authoritarian praxis. The second one aims to stop the consolidation of the first one and take up again the liberal foundations of the Political Constitution of 1991 that, in addition, allow them continued exercise of the historical hegemony of national political power that was interrupted in 2002. Elements that contribute to broaden understanding of the current national context and the peace process.

  20. Landscape ecological security assessment based on projection pursuit in Pearl River Delta.

    Science.gov (United States)

    Gao, Yang; Wu, Zhifeng; Lou, Quansheng; Huang, Huamei; Cheng, Jiong; Chen, Zhangli

    2012-04-01

    Regional landscape ecological security is an important issue for ecological security, and has a great influence on national security and social sustainable development. The Pearl River Delta (PRD) in southern China has experienced rapid economic development and intensive human activities in recent years. This study, based on landscape analysis, provides a method to discover the alteration of character among different landscape types and to understand the landscape ecological security status. Based on remotely sensed products of the Landsat 5 TM images in 1990 and the Landsat 7 ETM+ images in 2005, landscape classification maps of nine cities in the PRD were compiled by implementing Remote Sensing and Geographic Information System technology. Several indices, including aggregation, crush index, landscape shape index, Shannon's diversity index, landscape fragile index, and landscape security adjacent index, were applied to analyze spatial-temporal characteristics of landscape patterns in the PRD. A landscape ecological security index based on these outcomes was calculated by projection pursuit using genetic algorithm. The landscape ecological security of nine cities in the PRD was thus evaluated. The main results of this research are listed as follows: (1) from 1990 to 2005, the aggregation index, crush index, landscape shape index, and Shannon's diversity index of nine cities changed little in the PRD, while the landscape fragile index and landscape security adjacent index changed obviously. The landscape fragile index of nine cities showed a decreasing trend; however, the landscape security adjacent index has been increasing; (2) from 1990 to 2005, landscape ecology of the cities of Zhuhai and Huizhou maintained a good security situation. However, there was a relatively low value of ecological security in the cities of Dongguan and Foshan. Except for Foshan and Guangzhou, whose landscape ecological security situation were slightly improved, the cities had reduced

  1. Addressing the security of a future sustainable power system: The Danish SOSPO project

    DEFF Research Database (Denmark)

    Yang, Guangya; Jóhannsson, Hjörtur; Lind, Morten

    2012-01-01

    evaluated to secure the operation from both transmission and distribution levels. The Danish SOSPO project is launched from 2012 targeting at the system security assessment in the control room for the future scenarios. Methods will be developed in this project to counteract with the future challenges......Current power systems have been undergoing in depth changes by the increasing use of renewable generations. At one hand, the grid is progressively more interconnected in order to collect the renewable generation from geographically dispersed places meanwhile reduce the risks of intermittency......; on the other, the power is increasingly generated at relative low voltage networks which in turn gives rise to new challenges in the conventional system design. The high governmental objective of greenhouse gas reduction provokes accelerating adoptation of the renewables. The effect of this has to be carefully...

  2. Laboratory Directed Research and Development Program FY2004

    Energy Technology Data Exchange (ETDEWEB)

    Hansen, Todd C.

    2005-03-22

    The Ernest Orlando Lawrence Berkeley National Laboratory (Berkeley Lab or LBNL) is a multi-program national research facility operated by the University of California for the Department of Energy (DOE). As an integral element of DOE's National Laboratory System, Berkeley Lab supports DOE's missions in fundamental science, energy resources, and environmental quality. Berkeley Lab programs advance four distinct goals for DOE and the nation: (1) To perform leading multidisciplinary research in the computing sciences, physical sciences, energy sciences, biosciences, and general sciences in a manner that ensures employee and public safety and protection of the environment. (2) To develop and operate unique national experimental facilities for qualified investigators. (3) To educate and train future generations of scientists and engineers to promote national science and education goals. (4) To transfer knowledge and technological innovations and to foster productive relationships among Berkeley Lab's research programs, universities, and industry in order to promote national economic competitiveness. Berkeley Lab's research and the Laboratory Directed Research and Development (LDRD) program support DOE's Strategic Goals that are codified in DOE's September 2003 Strategic Plan, with a primary focus on Advancing Scientific Understanding. For that goal, the Fiscal Year (FY) 2004 LDRD projects support every one of the eight strategies described in the plan. In addition, LDRD efforts support the goals of Investing in America's Energy Future (six of the fourteen strategies), Resolving the Environmental Legacy (four of the eight strategies), and Meeting National Security Challenges (unclassified fundamental research that supports stockpile safety and nonproliferation programs). The LDRD supports Office of Science strategic plans, including the 20 year Scientific Facilities Plan and the draft Office of Science Strategic Plan. The research also

  3. Argonne National Laboratory Annual Report of Laboratory Directed Research and Development program activities FY 2011.

    Energy Technology Data Exchange (ETDEWEB)

    (Office of The Director)

    2012-04-25

    As a national laboratory Argonne concentrates on scientific and technological challenges that can only be addressed through a sustained, interdisciplinary focus at a national scale. Argonne's eight major initiatives, as enumerated in its strategic plan, are Hard X-ray Sciences, Leadership Computing, Materials and Molecular Design and Discovery, Energy Storage, Alternative Energy and Efficiency, Nuclear Energy, Biological and Environmental Systems, and National Security. The purposes of Argonne's Laboratory Directed Research and Development (LDRD) Program are to encourage the development of novel technical concepts, enhance the Laboratory's research and development (R and D) capabilities, and pursue its strategic goals. projects are selected from proposals for creative and innovative R and D studies that require advance exploration before they are considered to be sufficiently developed to obtain support through normal programmatic channels. Among the aims of the projects supported by the LDRD Program are the following: establishment of engineering proof of principle, assessment of design feasibility for prospective facilities, development of instrumentation or computational methods or systems, and discoveries in fundamental science and exploratory development.

  4. Argonne National Laboratory Annual Report of Laboratory Directed Research and Development program activities FY 2010.

    Energy Technology Data Exchange (ETDEWEB)

    (Office of The Director)

    2012-04-25

    As a national laboratory Argonne concentrates on scientific and technological challenges that can only be addressed through a sustained, interdisciplinary focus at a national scale. Argonne's eight major initiatives, as enumerated in its strategic plan, are Hard X-ray Sciences, Leadership Computing, Materials and Molecular Design and Discovery, Energy Storage, Alternative Energy and Efficiency, Nuclear Energy, Biological and Environmental Systems, and National Security. The purposes of Argonne's Laboratory Directed Research and Development (LDRD) Program are to encourage the development of novel technical concepts, enhance the Laboratory's research and development (R and D) capabilities, and pursue its strategic goals. projects are selected from proposals for creative and innovative R and D studies that require advance exploration before they are considered to be sufficiently developed to obtain support through normal programmatic channels. Among the aims of the projects supported by the LDRD Program are the following: establishment of engineering proof of principle, assessment of design feasibility for prospective facilities, development of instrumentation or computational methods or systems, and discoveries in fundamental science and exploratory development.

  5. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  6. 2016 Fermilab Laboratory Directed Research & Development Program Plan

    Energy Technology Data Exchange (ETDEWEB)

    Wester, W. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States)

    2016-05-25

    Fermilab is executing Laboratory Directed Research and Development (LDRD) as outlined by order DOE O 413.2B in order to enhance and realize the mission of the laboratory in a manner that also supports the laboratory’s strategic objectives and the mission of the Department of Energy. LDRD funds enable scientific creativity, allow for exploration of “high risk, high payoff” research, and allow for the demonstration of new ideas, technical concepts, and devices. LDRD also has an objective of maintaining and enhancing the scientific and technical vitality of Fermilab. LDRD is able to fund employee-initiated proposals that address the current strategic objectives and better position Fermilab for future mission needs. The request for such funds is made in consideration of the investment needs, affordability, and directives from DOE and Congress. Review procedures of the proposals will insure that those proposals which most address the strategic goals of the DOE and the Laboratory or which best position Fermilab for the future will be recommended to the Laboratory Director who has responsibility for approval. The execution of each approved project will be the responsibility of the Principal Investigator, PI, who will follow existing Laboratory guidelines to ensure compliance with safety, environmental, and quality assurance practices. A Laboratory Director-appointed LDRD Coordinator will work with Committees, Laboratory Management, other Fermilab Staff, and the PI’s to oversee the implementation of policies and procedures of LDRD and provide the management and execution of this Annual Program Plan. FY16 represents third fiscal year in which LDRD has existed at Fermilab. The number of preliminary proposals (117) submitted in response to the LDRD Call for Proposals indicates very strong interest of the program within the Fermilab community. The first two Calls have resulted in thirteen active LDRD projects – and it is expected that between five and seven new

  7. Development of a gamma ray spectroscopy capability at LANSCE

    International Nuclear Information System (INIS)

    Nelson, R.O.; Strottman, D.D.; Sterbenz, S.M.

    1998-01-01

    This is the final report of a one-year, Laboratory Directed Research and Development (LDRD) project at the Los Alamos National Laboratory (LANL). The goal of this project was to explore an upgrade to the GEANIE high-resolution gamma-ray spectrometer at the Los Alamos Neutron Science Center (LANSCE) to help build additional experimental capabilities. The improvements identified have significantly added to the capabilities of GEANIE and made the facility more attractive for studies supporting the core national security mission as well as for use by outside collaborators. These benefits apply to both basic and applied studies

  8. FY 1995 research highlights: PNL accomplishments in OER programs

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-10-01

    Pacific Northwest Laboratory (PNL) conducts fundamental and applied research in support of the US Department of Energy`s (DOE) core missions in science and technology, environmental quality, energy resources, and national security. Much of this research is funded by the program offices of DOE`s Office of Energy Research (DOE-ER), primarily the Office of Basic Energy Sciences (BES) and the Office of Health and Environmental Research (OHER), and by PNL`s Laboratory Directed Research and Development (LDRD) Program. This document is a collection of research highlights that describe PNL`s accomplishments in DOE-ER funded programs during Fiscal Year 1995. Included are accomplishments in research funded by OHER`s Analytical Technologies, Environmental Research, Health Effects, General Life Sciences, and Carbon Dioxide Research programs; BES`s Materials Science, Chemical Sciences, Engineering and Geoscience, and Applied Mathematical Sciences programs; and PNL`s LDRD Program. Summaries are given for 70 projects.

  9. Impact of Inter‐Basin Water Transfer Projects on Regional Ecological Security from a Telecoupling Perspective

    Directory of Open Access Journals (Sweden)

    Yuan Quan

    2016-02-01

    Full Text Available Inter‐basin water transfer projects (IBWTPs offer one of the most important means to solve the mismatch between supply and demand of regional water resources. IBWTPs have impacts on the complex ecosystems of the areas from which water is diverted and to which water is received. These impacts increase damage or risk to regional ecological security and human wellbeing. However, current methods make it difficult to achieve comprehensive analysis of the impacts of whole ecosystems, because of the long distance between ecosystems and the inconsistency of impact events. In this study, a model was proposed for the analysis of the impacts of IBWTPs on regional ecological security. It is based on the telecoupling framework, and the Driver‐Pressure‐State‐ Impact‐Response (DPSIR model was used to improve the analysis procedure within the telecoupling framework. The Middle Line of the South‐to‐North Water Diversion Project was selected as a case study to illustrate the specific analysis procedure. We realized that information sharing is a key issue in the management of regional security, and that the ecological water requirement, in the form of a single index, could be used to quantitatively assess the impacts on ecological security from IBWTPs.

  10. Underground Test Area Quality Assurance Project Plan Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Irene Farnham

    2011-05-01

    This Quality Assurance Project Plan (QAPP) provides the overall quality assurance (QA) program requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Underground Test Area (UGTA) Sub-Project (hereafter the Sub-Project) activities. The requirements in this QAPP are consistent with DOE Order 414.1C, Quality Assurance (DOE, 2005); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). The QAPP Revision 0 supersedes DOE--341, Underground Test Area Quality Assurance Project Plan, Nevada Test Site, Nevada, Revision 4.

  11. Secure Intra-Body Wireless Communications (SIWiC) System Project

    Science.gov (United States)

    Ahmad, Aftab; Doggett, Terrence P.

    2011-01-01

    SIWiC System is a project to investigate, design and implement future wireless networks of implantable sensors in the body. This futuristic project is designed to make use of the emerging and yet-to-emerge technologies, including ultra-wide band (UWB) for wireless communications, smart implantable sensors, ultra low power networking protocols, security and privacy for bandwidth and power deficient devices and quantum computing. Progress in each of these fronts is hindered by the needs of breakthrough. But, as we will see in this paper, these major challenges are being met or will be met in near future. SIWiC system is a network of in-situ wireless devices that are implanted to coordinate sensed data inside the body, such as symptoms monitoring collected internally, or biometric data collected of an outside object from within the intra-body network. One node has the capability of communicating outside the body to send data or alarm to a relevant authority, e.g., a remote physician.

  12. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices)

    National Research Council Canada - National Science Library

    Ganger, Gregory R

    2007-01-01

    This report summarizes the results of the work on the AFOSR's Critical Infrastructure Protection Program project, entitled Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security...

  13. Laboratory Directed Research and Development Program Assessment for FY 2015

    Energy Technology Data Exchange (ETDEWEB)

    Hatton, Diane [Brookhaven National Lab. (BNL), Upton, NY (United States); Barkigia, K. [Brookhaven National Lab. (BNL), Upton, NY (United States); Giacalone, P. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2016-03-01

    This report provides an overview of the BNL LDRD program and a summary of the management processes, project peer review, a financial overview, and the relation of the portfolio of LDRD projects to BNL's mission, initiatives, and strategic plan. Also included are a summary of success indicators and a self-assessment.

  14. Laboratory Directed Research and Development FY 1998 Progress Report

    Energy Technology Data Exchange (ETDEWEB)

    John Vigil; Kyle Wheeler

    1999-04-01

    This is the FY 1998 Progress Report for the Laboratory Directed Research and Development (LDRD) Program at Los Alamos National Laboratory. It gives an overview of the LDRD Program, summarizes work done on individual research projects, relates the projects to major Laboratory program sponsors, and provides an index to the principle investigators. Project summaries are grouped by their LDRD component: Competency Development, Program Development, and Individual Projects. Within each component, they are further grouped into nine technical categories: (1) materials science, (2) chemistry, (3) mathematics and computational science, (4) atomic, molecular, optical, and plasma physics, fluids, and particle beams, (5) engineering science, (6) instrumentation and diagnostics, (7) geoscience, space science, and astrophysics, (8) nuclear and particle physics, and (9) bioscience.

  15. Laboratory directed research and development: FY 1997 progress report

    Energy Technology Data Exchange (ETDEWEB)

    Vigil, J.; Prono, J. [comps.

    1998-05-01

    This is the FY 1997 Progress Report for the Laboratory Directed Research and Development (LDRD) program at Los Alamos National Laboratory. It gives an overview of the LDRD program, summarizes work done on individual research projects, relates the projects to major Laboratory program sponsors, and provides an index to the principal investigators. Project summaries are grouped by their LDRD component: Competency Development, Program Development, and Individual Projects. Within each component, they are further grouped into nine technical categories: (1) materials science, (2) chemistry, (3) mathematics and computational science, (4) atomic and molecular physics and plasmas, fluids, and particle beams, (5) engineering science, (6) instrumentation and diagnostics, (7) geoscience, space science, and astrophysics, (8) nuclear and particle physics, and (9) bioscience.

  16. Via generalized function projective synchronization in nonlinear Schrödinger equation for secure communication

    Science.gov (United States)

    Zhao, L. W.; Du, J. G.; Yin, J. L.

    2018-05-01

    This paper proposes a novel secured communication scheme in a chaotic system by applying generalized function projective synchronization of the nonlinear Schrödinger equation. This phenomenal approach guarantees a secured and convenient communication. Our study applied the Melnikov theorem with an active control strategy to suppress chaos in the system. The transmitted information signal is modulated into the parameter of the nonlinear Schrödinger equation in the transmitter and it is assumed that the parameter of the receiver system is unknown. Based on the Lyapunov stability theory and the adaptive control technique, the controllers are designed to make two identical nonlinear Schrödinger equation with the unknown parameter asymptotically synchronized. The numerical simulation results of our study confirmed the validity, effectiveness and the feasibility of the proposed novel synchronization method and error estimate for a secure communication. The Chaos masking signals of the information communication scheme, further guaranteed a safer and secured information communicated via this approach.

  17. Laboratory Directed Research and Development Program Activities for FY 2007.

    Energy Technology Data Exchange (ETDEWEB)

    Newman,L.

    2007-12-31

    Brookhaven National Laboratory (BNL) is a multidisciplinary laboratory that carries out basic and applied research in the physical, biomedical, and environmental sciences, and in selected energy technologies. It is managed by Brookhaven Science Associates, LLC, (BSA) under contract with the U. S. Department of Energy (DOE). BNL's Fiscal year 2007 budget was $515 million. There are about 2,600 employees, and another 4,500 guest scientists and students who come each year to use the Laboratory's facilities and work with the staff. The BNL Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) annually in March, as required by DOE Order 413.2B, 'Laboratory Directed Research and Development', April 19, 2006, and the Roles, Responsibilities, and Guidelines for Laboratory Directed Research and Development at the Department of Energy/National Nuclear Security Administration Laboratories dated June 13, 2006. In accordance this is our Annual Report in which we describe the Purpose, Approach, Technical Progress and Results, and Specific Accomplishments of all LDRD projects that received funding during Fiscal Year 2007. The goals and objectives of BNL's LDRD Program can be inferred from the Program's stated purposes. These are to (1) encourage and support the development of new ideas and technology, (2) promote the early exploration and exploitation of creative and innovative concepts, and (3) develop new 'fundable' R&D projects and programs. The emphasis is clearly articulated by BNL to be on supporting exploratory research 'which could lead to new programs, projects, and directions' for the Laboratory. We explicitly indicate that research conducted under the LDRD Program should be highly innovative, and an element of high risk as to success is acceptable. In the solicitation for new proposals for Fiscal Year 2007 we especially requested innovative new projects in

  18. Security Economics in the European Context: Implications of the EUSECON Project

    OpenAIRE

    Michael Brzoska; Raphael Bossong; Eric van Um

    2011-01-01

    This paper presents key aspects and policy implications of a multi-annual research project on economic analyses of European security issues (EUSECON), with an emphasis on intentional threats of organised crime, piracy and terrorism. The first part argues that rational models can provide significant insights on the emergence and current patterns of terrorism and piracy. These findings could lead to new priorities or to more nuanced interventions in response to these threats. The second part fo...

  19. Final report for the Integrated and Robust Security Infrastructure (IRSI) laboratory directed research and development project

    Energy Technology Data Exchange (ETDEWEB)

    Hutchinson, R.L.; Hamilton, V.A.; Istrail, G.G.; Espinoza, J.; Murphy, M.D.

    1997-11-01

    This report describes the results of a Sandia-funded laboratory-directed research and development project titled {open_quotes}Integrated and Robust Security Infrastructure{close_quotes} (IRSI). IRSI was to provide a broad range of commercial-grade security services to any software application. IRSI has two primary goals: application transparency and manageable public key infrastructure. IRSI must provide its security services to any application without the need to modify the application to invoke the security services. Public key mechanisms are well suited for a network with many end users and systems. There are many issues that make it difficult to deploy and manage a public key infrastructure. IRSI addressed some of these issues to create a more manageable public key infrastructure.

  20. Anticipating the unintended consequences of security dynamics.

    Energy Technology Data Exchange (ETDEWEB)

    Backus, George A.; Overfelt, James Robert; Malczynski, Leonard A.; Saltiel, David H.; Simon Paul Moulton

    2010-01-01

    In a globalized world, dramatic changes within any one nation causes ripple or even tsunamic effects within neighbor nations and nations geographically far removed. Multinational interventions to prevent or mitigate detrimental changes can easily cause secondary unintended consequences more detrimental and enduring than the feared change instigating the intervention. This LDRD research developed the foundations for a flexible geopolitical and socioeconomic simulation capability that focuses on the dynamic national security implications of natural and man-made trauma for a nation-state and the states linked to it through trade or treaty. The model developed contains a database for simulating all 229 recognized nation-states and sovereignties with the detail of 30 economic sectors including consumers and natural resources. The model explicitly simulates the interactions among the countries and their governments. Decisions among governments and populations is based on expectation formation. In the simulation model, failed expectations are used as a key metric for tension across states, among ethnic groups, and between population factions. This document provides the foundational documentation for the model.

  1. STEM Education

    Science.gov (United States)

    & Development (LDRD) National Security Education Center (NSEC) Office of Science Programs Richard P Databases National Security Education Center (NSEC) Center for Nonlinear Studies Engineering Institute Scholarships STEM Education Programs Teachers (K-12) Students (K-12) Higher Education Regional Education

  2. Higher Education

    Science.gov (United States)

    & Development (LDRD) National Security Education Center (NSEC) Office of Science Programs Richard P Databases National Security Education Center (NSEC) Center for Nonlinear Studies Engineering Institute Scholarships STEM Education Programs Teachers (K-12) Students (K-12) Higher Education Regional Education

  3. STEM Education Programs

    Science.gov (United States)

    & Development (LDRD) National Security Education Center (NSEC) Office of Science Programs Richard P Databases National Security Education Center (NSEC) Center for Nonlinear Studies Engineering Institute Scholarships STEM Education Programs Teachers (K-12) Students (K-12) Higher Education Regional Education

  4. Regional Education Partners

    Science.gov (United States)

    & Development (LDRD) National Security Education Center (NSEC) Office of Science Programs Richard P Databases National Security Education Center (NSEC) Center for Nonlinear Studies Engineering Institute Scholarships STEM Education Programs Teachers (K-12) Students (K-12) Higher Education Regional Education

  5. About Us

    Science.gov (United States)

    & Development (LDRD) National Security Education Center (NSEC) Office of Science Programs Richard P Databases National Security Education Center (NSEC) Center for Nonlinear Studies Engineering Institute Scholarships STEM Education Programs Teachers (K-12) Students (K-12) Higher Education Regional Education

  6. Probing strategy-project alignment: The case of the South African Social Security Agency

    Directory of Open Access Journals (Sweden)

    Gerrit Van Der Waldt

    2016-12-01

    Full Text Available Public institutions, such as the South African Social Security Agency (SASSA increasingly function in multi-project environments to translate strategies successfully into service-delivery initiatives. However, this ‘projectification’ often causes projects to be designed and executed haphazardly. This can lead to budget and schedule overruns, and the general wastage of an organisation’s resources. Project failures often occur where organisations do not ensure that specific projects are aligned with their core strategies. The purpose of this article is to combine the theories and principles of organisation, management, strategic management, and project management in an effort to pinpoint core determinants that can help establish the extent to which an organisation manages the alignment of its strategic projects. In the present study, the author applied the principles of interdisciplinarity, systems thinking, and organisational integration. The combined core determinants that were uncovered were then used in an empirical investigation of SASSA. The purpose of this investigation is to identify particular challenges the organisation faces in aligning their strategies and projects successfully. Thereafter, a number of recommendations follow to address these challenges.

  7. Case Study Application of the Biodiversity Security Index to Ranking Feasibility Studies for Ecosystem Restoration Projects of the U.S. Army Corps of Engineers

    Science.gov (United States)

    2016-04-01

    ER D C/ EL C R- 16 -1 Ecosystem Management and Restoration Research Program Case Study Application of the Biodiversity Security Index... Biodiversity Security Index to Ranking Feasibility Studies for Ecosystem Restoration Projects of the U.S. Army Corps of Engineers Richard A. Cole... Biodiversity Security Index (BSI) was applied to 23 project sites ranked for restoration feasibility study annual funding by the U. S. Army Corps of

  8. Secure and Robust Iris Recognition Using Random Projections and Sparse Representations.

    Science.gov (United States)

    Pillai, Jaishanker K; Patel, Vishal M; Chellappa, Rama; Ratha, Nalini K

    2011-09-01

    Noncontact biometrics such as face and iris have additional benefits over contact-based biometrics such as fingerprint and hand geometry. However, three important challenges need to be addressed in a noncontact biometrics-based authentication system: ability to handle unconstrained acquisition, robust and accurate matching, and privacy enhancement without compromising security. In this paper, we propose a unified framework based on random projections and sparse representations, that can simultaneously address all three issues mentioned above in relation to iris biometrics. Our proposed quality measure can handle segmentation errors and a wide variety of possible artifacts during iris acquisition. We demonstrate how the proposed approach can be easily extended to handle alignment variations and recognition from iris videos, resulting in a robust and accurate system. The proposed approach includes enhancements to privacy and security by providing ways to create cancelable iris templates. Results on public data sets show significant benefits of the proposed approach.

  9. Laboratory Directed Research and Development Annual Report - Fiscal Year 2000; FINAL

    International Nuclear Information System (INIS)

    Fisher, Darrell R; Hughes, Pamela J; Pearson, Erik W

    2001-01-01

    The projects described in this report represent the Laboratory's investment in its future and are vital to maintaining the ability to develop creative solutions for the scientific and technical challenges faced by DOE and the nation. In accordance with DOE guidelines, the report provides, (a) a director's statement, (b) an overview of the laboratory's LDRD program, including PNNL's management process and a self-assessment of the program, (c) a five-year project funding table, and (d) project summaries for each LDRD project

  10. The joint European TEMPUS project 'Human Security (environment, quality of food, public health, and society) on territories contaminated by radioactive agents'

    International Nuclear Information System (INIS)

    Goncharova, N.; Butchenkow, I.; Maestri, E.

    2016-01-01

    Full text: The Joint European TEMPUS Project 'Human Security (environment, quality of food, public health, and society) on Territories Contaminated by Radioactive Agents', started in 2012. The EU project participants are the following: University of Cordoba (Spain) - Project Coordinator, University of Parma (Italy), University of Florence (Italy), Swedish University of Agricultural Sciences (Sweden) and Riga Technical University (Latvia). The project involves three partner countries - Belarus, Russia, Ukraine, represented by the following institutions: Belarusian State University, International Sakharov Environmental University, Grodno State Medical University, Grodno State Agrarian University, Voronezh State University, Tyumen State Medical Academy, Ural Federal University (Yekaterinburg), Chelyabinsk State University, Nuclear Cities Information-Education Centre, Vinnitsa National Medical University, Zhytomyr State Technological University, Kyiv International University, Sevastopol National University of Nuclear Energy and Industry, Polissya branch of G.M. Vysotsky Ukrainian Research Institute of Forestry and Forest Melioration. The main objectives of the project are: to develop interdisciplinary Master and Doctoral (PhD) programs in the field of Human Security of people living in areas affected by accidents at nuclear power plants / plant for processing nuclear fuel within the following specialties: Ecology and Environment Sciences - 'Human Security and Environment'; Food quality control - 'Human Security and Quality of Food'; Medicine - 'Human Security and Public Health'; Political and Social Sciences - 'Human Security and Society'. These programs will be implemented at 12 universities, 4 from each partner country. During the project implementation it is expected to achieve the following main results: modified interdisciplinary Master and Doctoral (PhD) programs taking into account the studied European experience and practice; joint system of upgrade of

  11. 1996 Laboratory directed research and development annual report

    Energy Technology Data Exchange (ETDEWEB)

    Meyers, C.E.; Harvey, C.L.; Lopez-Andreas, L.M.; Chavez, D.L.; Whiddon, C.P. [comp.

    1997-04-01

    This report summarizes progress from the Laboratory Directed Research and Development (LDRD) program during fiscal year 1996. In addition to a programmatic and financial overview, the report includes progress reports from 259 individual R&D projects in seventeen categories. The general areas of research include: engineered processes and materials; computational and information sciences; microelectronics and photonics; engineering sciences; pulsed power; advanced manufacturing technologies; biomedical engineering; energy and environmental science and technology; advanced information technologies; counterproliferation; advanced transportation; national security technology; electronics technologies; idea exploration and exploitation; production; and science at the interfaces - engineering with atoms.

  12. Investigating how everyday people experience security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg

    In this paper I propose a method for analyzing everyday people's experiences with IT-security. I furthermore report how I applied the method. The proposal is motivated by work of other researchers and their efforts to get beyond secure behavior, and to get an insight in secure or insecure...... experiences that everyday users of technology encounter. The background for introducing this method is a project under the heading of IT Security for Citizens, which bridges between research competencies in HCI and security. In this project we develop methods and concepts to analyze digital signature systems...... and security sensible systems in a broad sense, from the point of view of contemporary CHI. The project includes literature studies of usable security, as well as empirical investigations and design work. This paper reports on my method to target user experiences of and with security technology....

  13. FPGAs in High Perfomance Computing: Results from Two LDRD Projects.

    Energy Technology Data Exchange (ETDEWEB)

    Underwood, Keith D; Ulmer, Craig D.; Thompson, David; Hemmert, Karl Scott

    2006-11-01

    Field programmable gate arrays (FPGAs) have been used as alternative computational de-vices for over a decade; however, they have not been used for traditional scientific com-puting due to their perceived lack of floating-point performance. In recent years, there hasbeen a surge of interest in alternatives to traditional microprocessors for high performancecomputing. Sandia National Labs began two projects to determine whether FPGAs wouldbe a suitable alternative to microprocessors for high performance scientific computing and,if so, how they should be integrated into the system. We present results that indicate thatFPGAs could have a significant impact on future systems. FPGAs have thepotentialtohave order of magnitude levels of performance wins on several key algorithms; however,there are serious questions as to whether the system integration challenge can be met. Fur-thermore, there remain challenges in FPGA programming and system level reliability whenusing FPGA devices.4 AcknowledgmentArun Rodrigues provided valuable support and assistance in the use of the Structural Sim-ulation Toolkit within an FPGA context. Curtis Janssen and Steve Plimpton provided valu-able insights into the workings of two Sandia applications (MPQC and LAMMPS, respec-tively).5

  14. Laboratory Directed Research and Development FY 2000 Annual Progress Report

    Energy Technology Data Exchange (ETDEWEB)

    Los Alamos National Laboratory

    2001-05-01

    This is the FY00 Annual Progress report for the Laboratory Directed Research and Development (LDRD) Program at Los Alamos National Laboratory. It gives an overview of the LDRD Program, summarizes progress on each project conducted during FY00, characterizes the projects according to their relevance to major funding sources, and provides an index to principal investigators. Project summaries are grouped by LDRD component: Directed Research and Exploratory Research. Within each component, they are further grouped into the ten technical categories: (1) atomic, molecular, optical, and plasma physics, fluids, and beams, (2) bioscience, (3) chemistry, (4) computer science and software engineering, (5) engineering science, (6) geoscience, space science, and astrophysics, (7) instrumentation and diagnostics, (8) materials science, (9) mathematics, simulation, and modeling, and (10) nuclear and particle physics.

  15. Physics of intense, high energy radiation effects

    International Nuclear Information System (INIS)

    Hjalmarson, Harold Paul; Hartman, E. Frederick; Magyar, Rudolph J.; Crozier, Paul Stewart

    2011-01-01

    This document summarizes the work done in our three-year LDRD project titled 'Physics of Intense, High Energy Radiation Effects.' This LDRD is focused on electrical effects of ionizing radiation at high dose-rates. One major thrust throughout the project has been the radiation-induced conductivity (RIC) produced by the ionizing radiation. Another important consideration has been the electrical effect of dose-enhanced radiation. This transient effect can produce an electromagnetic pulse (EMP). The unifying theme of the project has been the dielectric function. This quantity contains much of the physics covered in this project. For example, the work on transient electrical effects in radiation-induced conductivity (RIC) has been a key focus for the work on the EMP effects. This physics in contained in the dielectric function, which can also be expressed as a conductivity. The transient defects created during a radiation event are also contained, in principle. The energy loss lead the hot electrons and holes is given by the stopping power of ionizing radiation. This information is given by the inverse dielectric function. Finally, the short time atomistic phenomena caused by ionizing radiation can also be considered to be contained within the dielectric function. During the LDRD, meetings about the work were held every week. These discussions involved theorists, experimentalists and engineers. These discussions branched out into the work done in other projects. For example, the work on EMP effects had influence on another project focused on such phenomena in gases. Furthermore, the physics of radiation detectors and radiation dosimeters was often discussed, and these discussions had impact on related projects. Some LDRD-related documents are now stored on a sharepoint site (https://sharepoint.sandia.gov/sites/LDRD-REMS/default.aspx). In the remainder of this document the work is described in catergories but there is much overlap between the atomistic calculations, the

  16. Assessing the Need for an On-Line Educational Module for Volunteer Leaders on Bio-Security in Washington State 4-H Livestock Projects

    Science.gov (United States)

    Stevenson, Jill L.; Moore, Dale A.; Newman, Jerry; Schmidt, Janet L.; Smith, Sarah M.; Smith, Jean; Kerr, Susan; Wallace, Michael; BoyEs, Pat

    2011-01-01

    4-H livestock projects present disease transmission risks that can be reduced by the use of bio-security practices. The responsibility of teaching bio-security to youth belongs primarily to volunteer leaders, who may not be aware of the importance of these practices. A needs assessment for an online educational module about bio-security revealed…

  17. Laboratory Directed Research and Development Annual Report FY 2017

    Energy Technology Data Exchange (ETDEWEB)

    Sullivan, Kelly O.

    2018-03-30

    A national laboratory must establish and maintain an environment in which creativity and innovation are encouraged and supported in order to fulfill its missions and remain viable in the long term. As such, multiprogram laboratories are given discretion to allocate a percentage of their operating budgets to support research and development projects that align to PNNL’s and DOE’s missions and support the missions of other federal agencies, including DHS, DOD, and others. DOE Order 413.2C sets forth DOE’s Laboratory Directed Research and Development (LDRD) policy and guidelines for DOE multiprogram laboratories, and it authorizes the national laboratories to allocate up to 6 percent of their operating budgets to fund the program. LDRD is innovative research and development, selected by the Laboratory Director or his/her designee, for the purpose of maintaining the scientific and technological vitality of the Laboratory. The projects supported by LDRD funding all have demonstrable ties to DOE/DHS missions and may also be relevant to the missions of other federal agencies that sponsor work at the Laboratory. The program plays a key role in attracting the best and brightest scientific staff, which is needed to serve the highest priority DOE mission objectives. Individual project reports comprise the bulk of this LDRD report. The Laboratory focuses its LDRD research on scientific assets that often address more than one scientific discipline.

  18. Laboratory Directed Research and Development Annual Report FY 2016

    Energy Technology Data Exchange (ETDEWEB)

    Sullivan, Kelly O. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2017-03-30

    A national laboratory must establish and maintain an environment in which creativity and innovation are encouraged and supported in order to fulfill its missions and remain viable in the long term. As such, multiprogram laboratories are given discretion to allocate a percentage of their operating budgets to support research and development projects that align to PNNL’s and DOE’s missions and support the missions of other federal agencies, including DHS, DOD, and others. DOE Order 413.2C sets forth DOE’s Laboratory Directed Research and Development (LDRD) policy and guidelines for DOE multiprogram laboratories, and it authorizes the national laboratories to allocate up to 6 percent of their operating budgets to fund the program. LDRD is innovative research and development, selected by the Laboratory Director or his/her designee, for the purpose of maintaining the scientific and technological vitality of the Laboratory. The projects supported by LDRD funding all have demonstrable ties to DOE/DHS missions and may also be relevant to the missions of other federal agencies that sponsor work at the Laboratory. The program plays a key role in attracting the best and brightest scientific staff, which is needed to serve the highest priority DOE mission objectives. Individual project reports comprise the bulk of this LDRD report. The Laboratory focuses its LDRD research on scientific assets that often address more than one scientific discipline.

  19. Smart grid security

    Energy Technology Data Exchange (ETDEWEB)

    Cuellar, Jorge (ed.) [Siemens AG, Muenchen (Germany). Corporate Technology

    2013-11-01

    The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus of many stakeholders with different views on the security and privacy requirements, not to mention methods and solutions. The fragmentation of research agendas and proposed approaches or solutions for securing the future smart grid becomes apparent observing the results from different projects, standards, committees, etc, in different countries. The different approaches and views of the papers in this collection also witness this fragmentation. This book contains the following papers: 1. IT Security Architecture Approaches for Smart Metering and Smart Grid. 2. Smart Grid Information Exchange - Securing the Smart Grid from the Ground. 3. A Tool Set for the Evaluation of Security and Reliability in Smart Grids. 4. A Holistic View of Security and Privacy Issues in Smart Grids. 5. Hardware Security for Device Authentication in the Smart Grid. 6. Maintaining Privacy in Data Rich Demand Response Applications. 7. Data Protection in a Cloud-Enabled Smart Grid. 8. Formal Analysis of a Privacy-Preserving Billing Protocol. 9. Privacy in Smart Metering Ecosystems. 10. Energy rate at home Leveraging ZigBee to Enable Smart Grid in Residential Environment.

  20. Laboratory Directed Research and Development Annual Report - Fiscal Year 2000

    Energy Technology Data Exchange (ETDEWEB)

    Fisher, Darrell R.; Hughes, Pamela J.; Pearson, Erik W.

    2001-04-01

    The projects described in this report represent the Laboratory's investment in its future and are vital to maintaining the ability to develop creative solutions for the scientific and technical challenges faced by DOE and the nation. In accordance with DOE guidelines, the report provides, a) a director's statement, b) an overview of the laboratory's LDRD program, including PNNL's management process and a self-assessment of the program, c) a five-year project funding table, and d) project summaries for each LDRD project.

  1. Bartus Iris biometrics

    Energy Technology Data Exchange (ETDEWEB)

    Johnston, R.; Grace, W.

    1996-07-01

    This is the final report of a one-year, Laboratory-Directed Research and Development (LDRD) project at the Los Alamos National Laboratory (LANL). We won a 1994 R&D 100 Award for inventing the Bartas Iris Verification System. The system has been delivered to a sponsor and is no longer available to us. This technology can verify the identity of a person for purposes of access control, national security, law enforcement, forensics, counter-terrorism, and medical, financial, or scholastic records. The technique is non-invasive, psychologically acceptable, works in real-time, and obtains more biometric data than any other biometric except DNA analysis. This project sought to develop a new, second-generation prototype instrument.

  2. Implementing an Information Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Glantz, Clifford S.; Lenaeus, Joseph D.; Landine, Guy P.; O' Neil, Lori Ross; Leitch, Rosalyn; Johnson, Christopher; Lewis, John G.; Rodger, Robert M.

    2017-11-01

    The threats to information security have dramatically increased with the proliferation of information systems and the internet. Chemical, biological, radiological, nuclear, and explosives (CBRNe) facilities need to address these threats in order to protect themselves from the loss of intellectual property, theft of valuable or hazardous materials, and sabotage. Project 19 of the European Union CBRN Risk Mitigation Centres of Excellence Initiative is designed to help CBRN security managers, information technology/cybersecurity managers, and other decision-makers deal with these threats through the application of cost-effective information security programs. Project 19 has developed three guidance documents that are publically available to cover information security best practices, planning for an information security management system, and implementing security controls for information security.

  3. EMI Security Architecture

    CERN Document Server

    White, J.; Schuller, B.; Qiang, W.; Groep, D.; Koeroo, O.; Salle, M.; Sustr, Z.; Kouril, D.; Millar, P.; Benedyczak, K.; Ceccanti, A.; Leinen, S.; Tschopp, V.; Fuhrmann, P.; Heyman, E.; Konstantinov, A.

    2013-01-01

    This document describes the various architectures of the three middlewares that comprise the EMI software stack. It also outlines the common efforts in the security area that allow interoperability between these middlewares. The assessment of the EMI Security presented in this document was performed internally by members of the Security Area of the EMI project.

  4. Security Sector Reform in Albania

    OpenAIRE

    Abazi, Enika; Bumci, Aldo; Hide, Enri; Rakipi, Albert

    2009-01-01

    International audience; This paper analyses security sector reform (SSR) in Albania. In all its enterprises in reforming the security sector,Albania is assisted by different initiatives and projects that provide expertise and financial support. To assesswhether reforms improved the overall security environment (national and human) of the country, it is necessaryto measure the effectiveness of the various initiatives and projects. This is gauged by how well the initiatives andprojects achieved...

  5. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  6. Using Trust for Secure Collaboration in Uncertain Environments

    DEFF Research Database (Denmark)

    Cahill, Vinny; Gray, Elizabeth; Seigneur, Jean-Marc

    2003-01-01

    The SECURE project investigates the design of security mechanisms for pervasive computing based on trust. It addresses how entities in unfamiliar pervasive computing environments can overcome initial suspicion to provide secure collaboration.......The SECURE project investigates the design of security mechanisms for pervasive computing based on trust. It addresses how entities in unfamiliar pervasive computing environments can overcome initial suspicion to provide secure collaboration....

  7. On projective synchronization of hyperchaotic complex nonlinear systems based on passive theory for secure communications

    International Nuclear Information System (INIS)

    Mahmoud, Gamal M; Mahmoud, Emad E; Arafa, Ayman A

    2013-01-01

    In this paper we deal with the projective synchronization (PS) of hyperchaotic complex nonlinear systems and its application in secure communications based on passive theory. The unpredictability of the scaling factor in PS can additionally enhance the security of communications. In this paper, a scheme for secure message transmission is proposed, and we try to transmit more than one large or bounded message from the transmitter to the receiver. The new hyperchaotic complex Lorenz system is employed to encrypt these messages. In the transmitter, the original messages are modulated into its parameter. In the receiver, we assume that the parameter of the receiver system is uncertain. The controllers and corresponding parameter update law are constructed to achieve PS between the transmitter and receiver system with an uncertain parameter, and identify the unknown parameter via passive theory. The original messages can be recovered successfully through some simple operations by the estimated parameter. Numerical results have verified the effectiveness and feasibility of the presented method. (paper)

  8. LDRD HPC4Energy Wrapup Report - LDRD 12-ERD-074

    Energy Technology Data Exchange (ETDEWEB)

    Dube, E. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Grosh, J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2014-01-23

    High-performance computing and simulation has the potential to optimize production, distribution, and conversion of energy. Although a number of concepts have been discussed, a comprehensive research project to establish and quantify the effectiveness of computing and simulation at scale to core energy problems has not been conducted. We propose to perform the basic research to adapt existing high-performance computing tools and simulation approaches to two selected classes of problems common across the energy sector. The first, applying uncertainty quantification and contingency analysis techniques to energy optimization, allows us to assess the effectiveness of LLNL core competencies to problems such as grid optimization and building-system efficiency. The second, applying adaptive meshing and numerical analysis techniques to physical problems at fine scale, could allow immediate impacts in key areas such as efficient combustion and fracture and spallation. By creating an integrated project team with the necessary expertise, we can efficiently address these issues, delivering both near-term results as well as quantifying developments needed to address future energy challenges.

  9. Laboratory Directed Research and Development 1998 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Pam Hughes; Sheila Bennett eds.

    1999-07-14

    The Laboratory's Directed Research and Development (LDRD) program encourages the advancement of science and the development of major new technical capabilities from which future research and development will grow. Through LDRD funding, Pacific Northwest continually replenishes its inventory of ideas that have the potential to address major national needs. The LDRD program has enabled the Laboratory to bring to bear its scientific and technical capabilities on all of DOE's missions, particularly in the arena of environmental problems. Many of the concepts related to environmental cleanup originally developed with LDRD funds are now receiving programmatic support from DOE, LDRD-funded work in atmospheric sciences is now being applied to DOE's Atmospheric Radiation Measurement Program. We also have used concepts initially explored through LDRD to develop several winning proposals in the Environmental Management Science Program. The success of our LDRD program is founded on good management practices that ensure funding is allocated and projects are conducted in compliance with DOE requirements. We thoroughly evaluate the LDRD proposals based on their scientific and technical merit, as well as their relevance to DOE's programmatic needs. After a proposal is funded, we assess progress annually using external peer reviews. This year, as in years past, the LDRD program has once again proven to be the major enabling vehicle for our staff to formulate new ideas, advance scientific capability, and develop potential applications for DOE's most significant challenges.

  10. Evaluating and projecting the European security system

    International Nuclear Information System (INIS)

    Dean, J.

    1991-01-01

    Components of the new European security system are described taking into account the new policy making and possibilities to resolve conflicts. Programmes for political and economic integration and co-operation managed by the European Community will provide main positive content of the new European security system. An insight of the future of nuclear armaments in Europe is included together with confidence building measure and the role of NATO

  11. LABORATORY DIRECTED RESEARCH AND DEVELOPMENT ANNUAL REPORT TO THE DOE - DECEMBER 2001

    International Nuclear Information System (INIS)

    FOX, K.J.

    2001-01-01

    Brookhaven National (BNL) Laboratory is a multidisciplinary laboratory that carries out basic and applied research in the physical, biomedical, and environmental sciences, and in selected energy technologies. It is managed by Brookhaven Science Associates, LLC, under contract with the U. S. Department of Energy. BNL's total annual budget has averaged about$450 million. There are about 3,000 employees, and another 4,500 guest scientists and students who come each year to use the Laboratory's facilities and work with the staff. The BNL Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) annually in March, as required by DOE Order 4 13.2, ''Laboratory Directed Research and Development,'' March 5, 1997, and the LDRD Annual Report guidance, updated February 12, 1999. The LDRD Program obtains its funds through the Laboratory overhead pool and operates under the authority of DOE Order 4 13.2. The goals and objectives of BNL's LDRD Program can be inferred from the Program's stated purposes. These are to (1) encourage and support the development of new ideas and technology, (2) promote the early exploration and exploitation of creative and innovative concepts, and (3) develop new ''fundable'' R and D projects and programs. The emphasis is clearly articulated by BNL to be on supporting exploratory research ''which could lead to new programs, projects, and directions'' for the Laboratory. As one of the premier scientific laboratories of the DOE, BNL must continuously foster groundbreaking scientific research. At Brookhaven National Laboratory one such method is through its LDRD Program. This discretionary research and development tool is critical in maintaining the scientific excellence and long-term vitality of the Laboratory. Additionally, it is a means to stimulate the scientific community and foster new science and technology ideas, which becomes a major factor in achieving and maintaining staff excellence

  12. A flexible privacy enhanced and secured ICT architecture for a smart grid project with active cosumers in the city of Zwolle-NL

    NARCIS (Netherlands)

    Montes Portela, C.; Rooden, H.; Kohlmann, J.; Leersum, van D.; Geldtmeijer, D.A.M.; Slootweg, J.G.; van Eekelen, Marko

    2013-01-01

    This paper presents the ICT architecture for a Smart Grid project with consumer interaction in the city of Zwolle, the Netherlands. It describes the privacy and security enhancing measures applied to ensure a positive sum of necessary functionality and respect for consumer’s privacy and secure

  13. The Personal Information Security Assistant

    NARCIS (Netherlands)

    Kegel, Roeland Hendrik,Pieter

    The human element is often found to be the weakest link in the information security chain. The Personal Information Security Assistant project aims to address this by improving the privacy and security awareness of end-users and by aligning the user's personal IT environment to the user's security

  14. Laboratory Directed Research and Development Program FY 2006 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Sjoreen, Terrence P [ORNL

    2007-04-01

    The Oak Ridge National Laboratory (ORNL) Laboratory Directed Research and Development (LDRD) Program reports its status to the US Departmental of Energy (DOE) in March of each year. The program operates under the authority of DOE Order 413.2B, 'Laboratory Directed Research and Development' (April 19, 2006), which establishes DOE's requirements for the program while providing the Laboratory Director broad flexibility for program implementation. LDRD funds are obtained through a charge to all Laboratory programs. This report includes summaries all ORNL LDRD research activities supported during FY 2006. The associated FY 2006 ORNL LDRD Self-Assessment (ORNL/PPA-2007/2) provides financial data about the FY 2006 projects and an internal evaluation of the program's management process.

  15. Information security of remote-reading energy meters

    International Nuclear Information System (INIS)

    Jacobson, J.

    1994-01-01

    This report presents basic concepts within the field of IT security. The ITSEC security and the ITSEM methods given by the European Community are used as a base. The EC INFOSEC research programme has included the project 'PER DOMUM' which focuses on remote reading of energy meters. The project is a co-operation between TACS (U.K.), GPP (Germany), CESI (Italy) and ENEL (Italy). SP has during the spring and summer of 1994 participated in the concluding of the project. Threats, security functions and security mechanisms are given for remote reading of energy meters. All of the listed functions and mechanisms do not origin from the 'PER DOMUM' project, but are the experiences of SP. The security evaluation is explained in two ways. One description of the required by ITSEM is given. Another description is given of which deliverables are required to perform the evaluation

  16. Argonne National Laboratory annual report of Laboratory Directed Research and Development Program Activities FY 2009.

    Energy Technology Data Exchange (ETDEWEB)

    Office of the Director

    2010-04-09

    addition to meeting all reporting requirements during fiscal year 2009, our LDRD Office continues to enhance its electronic systems to streamline the LDRD management process. You will see from the following individual project reports that Argonne's researchers have once again done a superb job pursuing projects at the forefront of their respective fields and have contributed significantly to the advancement of Argonne's strategic thrusts. This work has not only attracted follow-on sponsorship in many cases, but is also proving to be a valuable basis upon which to continue realignment of our strategic portfolio to better match the Laboratory's Strategic Plan.

  17. Argonne National Laboratory annual report of Laboratory Directed Research and Development Program Activities FY 2009

    International Nuclear Information System (INIS)

    2010-01-01

    meeting all reporting requirements during fiscal year 2009, our LDRD Office continues to enhance its electronic systems to streamline the LDRD management process. You will see from the following individual project reports that Argonne's researchers have once again done a superb job pursuing projects at the forefront of their respective fields and have contributed significantly to the advancement of Argonne's strategic thrusts. This work has not only attracted follow-on sponsorship in many cases, but is also proving to be a valuable basis upon which to continue realignment of our strategic portfolio to better match the Laboratory's Strategic Plan.

  18. Secure Environments for Collaboration among Ubiquitous Roaming Entities

    DEFF Research Database (Denmark)

    Jensen, Christian D.

    2002-01-01

    SECURE is a newly started IST project, which addresses secure collaboration among computational entities in emerging global computing systems. The properties of these systems introduce new security challenges that are not adequately addressed by existing security models and mechanisms. The scale ...... and uncertainty of this global computing environment invalidates existing security models. Instead, new security models have to be developed along with new security mechanisms that control access to protected resources.......SECURE is a newly started IST project, which addresses secure collaboration among computational entities in emerging global computing systems. The properties of these systems introduce new security challenges that are not adequately addressed by existing security models and mechanisms. The scale...

  19. Physics of intense, high energy radiation effects.

    Energy Technology Data Exchange (ETDEWEB)

    Hjalmarson, Harold Paul; Hartman, E. Frederick; Magyar, Rudolph J.; Crozier, Paul Stewart

    2011-02-01

    This document summarizes the work done in our three-year LDRD project titled 'Physics of Intense, High Energy Radiation Effects.' This LDRD is focused on electrical effects of ionizing radiation at high dose-rates. One major thrust throughout the project has been the radiation-induced conductivity (RIC) produced by the ionizing radiation. Another important consideration has been the electrical effect of dose-enhanced radiation. This transient effect can produce an electromagnetic pulse (EMP). The unifying theme of the project has been the dielectric function. This quantity contains much of the physics covered in this project. For example, the work on transient electrical effects in radiation-induced conductivity (RIC) has been a key focus for the work on the EMP effects. This physics in contained in the dielectric function, which can also be expressed as a conductivity. The transient defects created during a radiation event are also contained, in principle. The energy loss lead the hot electrons and holes is given by the stopping power of ionizing radiation. This information is given by the inverse dielectric function. Finally, the short time atomistic phenomena caused by ionizing radiation can also be considered to be contained within the dielectric function. During the LDRD, meetings about the work were held every week. These discussions involved theorists, experimentalists and engineers. These discussions branched out into the work done in other projects. For example, the work on EMP effects had influence on another project focused on such phenomena in gases. Furthermore, the physics of radiation detectors and radiation dosimeters was often discussed, and these discussions had impact on related projects. Some LDRD-related documents are now stored on a sharepoint site (https://sharepoint.sandia.gov/sites/LDRD-REMS/default.aspx). In the remainder of this document the work is described in catergories but there is much overlap between the atomistic

  20. Involvement of the Private Security Sector in African Conflicts ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    In 2006, the Institute for Security Studies (ISS) undertook a project entitled Regulation of the Private Security Sector in Africa that was supported by IDRC under project 103396. The project focused on the private security sector in South Africa, the Democratic Republic of Congo and Uganda. The research reports were ...

  1. Noncontact surface thermometry for microsystems: LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Abel, Mark (Georgia Institute of Technology, Atlanta, GA); Beecham, Thomas (Georgia Institute of Technology, Atlanta, GA); Graham, Samuel (Georgia Institute of Technology, Atlanta, GA); Kearney, Sean Patrick; Serrano, Justin Raymond; Phinney, Leslie Mary

    2006-10-01

    We describe a Laboratory Directed Research and Development (LDRD) effort to develop and apply laser-based thermometry diagnostics for obtaining spatially resolved temperature maps on working microelectromechanical systems (MEMS). The goal of the effort was to cultivate diagnostic approaches that could adequately resolve the extremely fine MEMS device features, required no modifications to MEMS device design, and which did not perturb the delicate operation of these extremely small devices. Two optical diagnostics were used in this study: microscale Raman spectroscopy and microscale thermoreflectance. Both methods use a low-energy, nonperturbing probe laser beam, whose arbitrary wavelength can be selected for a diffraction-limited focus that meets the need for micron-scale spatial resolution. Raman is exploited most frequently, as this technique provides a simple and unambiguous measure of the absolute device temperature for most any MEMS semiconductor or insulator material under steady state operation. Temperatures are obtained from the spectral position and width of readily isolated peaks in the measured Raman spectra with a maximum uncertainty near {+-}10 K and a spatial resolution of about 1 micron. Application of the Raman technique is demonstrated for V-shaped and flexure-style polycrystalline silicon electrothermal actuators, and for a GaN high-electron-mobility transistor. The potential of the Raman technique for simultaneous measurement of temperature and in-plane stress in silicon MEMS is also demonstrated and future Raman-variant diagnostics for ultra spatio-temporal resolution probing are discussed. Microscale thermoreflectance has been developed as a complement for the primary Raman diagnostic. Thermoreflectance exploits the small-but-measurable temperature dependence of surface optical reflectivity for diagnostic purposes. The temperature-dependent reflectance behavior of bulk silicon, SUMMiT-V polycrystalline silicon films and metal surfaces is

  2. Nevada Test Site-Directed Research and Development, FY 2007 Report

    International Nuclear Information System (INIS)

    Wil Lewis, editor

    2008-01-01

    The Nevada Test Site-Directed Research and Development (SDRD) program completed a very successful year of research and development activities in FY 2007. Twenty-nine new projects were selected for funding this year, and eight projects started in FY 2006 were brought to conclusion. The total funds expended by the SDRD program were $5.67 million, for an average per-project cost of $153 thousand. An external audit conducted in September 2007 verified that appropriate accounting practices were applied to the SDRD program. Highlights for the year included: programmatic adoption of 8 SDRD-developed technologies; the filing of 9 invention disclosures for innovation evolving from SDRD projects; participation in the tri-Lab Laboratory Directed Research and Development (LDRD) and SDRD Symposium that was broadly attended by Nevada Test Site (NTS), National Nuclear Security Administration (NNSA), LDRD, U.S. Department of Homeland Security (DHS), and U.S. Department of Defense (DoD) representatives; peer reviews of all FY 2007 projects; and the successful completion of 37 R and D projects, as presented in this report. In response to a company-wide call, authors throughout the NTS complex submitted 182 proposals for FY 2007 SDRD projects. The SDRD program has seen a dramatic increase in the yearly total of submitted proposals--from 69 in FY 2002 to 182 this year--while the number of projects funded has actually decreased from a program high of 57 in FY 2004. The overall effect of this trend has helped ensure an increasingly competitive program that benefited from a broader set of innovative ideas, making project selection both challenging and rewarding. Proposals were evaluated for technical merit, including such factors as innovation, probability of success, potential benefit, and mission applicability. Authors and reviewers benefited from the use of a shortfalls list entitled the 'NTS Technology Needs Assessment' that was compiled from NTS, National Weapons Laboratory (NWL

  3. Nevada Test Site-Directed Research and Development, FY 2007 Report

    Energy Technology Data Exchange (ETDEWEB)

    Wil Lewis, editor

    2008-02-20

    The Nevada Test Site-Directed Research and Development (SDRD) program completed a very successful year of research and development activities in FY 2007. Twenty-nine new projects were selected for funding this year, and eight projects started in FY 2006 were brought to conclusion. The total funds expended by the SDRD program were $5.67 million, for an average per-project cost of $153 thousand. An external audit conducted in September 2007 verified that appropriate accounting practices were applied to the SDRD program. Highlights for the year included: programmatic adoption of 8 SDRD-developed technologies; the filing of 9 invention disclosures for innovation evolving from SDRD projects; participation in the tri-Lab Laboratory Directed Research and Development (LDRD) and SDRD Symposium that was broadly attended by Nevada Test Site (NTS), National Nuclear Security Administration (NNSA), LDRD, U.S. Department of Homeland Security (DHS), and U.S. Department of Defense (DoD) representatives; peer reviews of all FY 2007 projects; and the successful completion of 37 R&D projects, as presented in this report. In response to a company-wide call, authors throughout the NTS complex submitted 182 proposals for FY 2007 SDRD projects. The SDRD program has seen a dramatic increase in the yearly total of submitted proposals--from 69 in FY 2002 to 182 this year--while the number of projects funded has actually decreased from a program high of 57 in FY 2004. The overall effect of this trend has helped ensure an increasingly competitive program that benefited from a broader set of innovative ideas, making project selection both challenging and rewarding. Proposals were evaluated for technical merit, including such factors as innovation, probability of success, potential benefit, and mission applicability. Authors and reviewers benefited from the use of a shortfalls list entitled the 'NTS Technology Needs Assessment' that was compiled from NTS, National Weapons Laboratory

  4. Using Project Complexity Determinations to Establish Required Levels of Project Rigor

    Energy Technology Data Exchange (ETDEWEB)

    Andrews, Thomas D.

    2015-10-01

    This presentation discusses the project complexity determination process that was developed by National Security Technologies, LLC, for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office for implementation at the Nevada National Security Site (NNSS). The complexity determination process was developed to address the diversity of NNSS project types, size, and complexity; to fill the need for one procedure but with provision for tailoring the level of rigor to the project type, size, and complexity; and to provide consistent, repeatable, effective application of project management processes across the enterprise; and to achieve higher levels of efficiency in project delivery. These needs are illustrated by the wide diversity of NNSS projects: Defense Experimentation, Global Security, weapons tests, military training areas, sensor development and testing, training in realistic environments, intelligence community support, sensor development, environmental restoration/waste management, and disposal of radioactive waste, among others.

  5. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  6. Metrics, models and foresight for European sustainable food and nutrition security: the vision of the SUSFANS project

    NARCIS (Netherlands)

    Rutten, M.M.; Achterbosch, T.J.; Boer, de I.J.M.; Cuaresma, Jesus Crespo; Geleijnse, J.M.; Havlik, P.; Heckelei, T.; Ingram, John; Leip, Adrian; Marette, Stephan; Meijl, van J.C.M.; Soler, L.G.; Swinnen, J.; Veer, van 't P.; Vervoort, J.M.; Zimmermann, A.; Zimmermann, K.L.; Zurek, M.

    2018-01-01

    This paper defines the research agenda of the SUSFANS project, describes its history and its potential societal impacts. It contributes to balanced and encompassing views on how to strengthen food and nutrition security outcomes in the EU and how to improve the performance of the food system in the

  7. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  8. Laboratory Directed Research and Development Program FY 2007 Annual Report

    International Nuclear Information System (INIS)

    Sjoreen, Terrence P.

    2008-01-01

    The Oak Ridge National LaboratoryLaboratory Directed Research and Development (LDRD) program reports its status to the U.S. Department of Energy (DOE) in March of each year. The program operates under the authority of DOE Order 413.2B, 'Laboratory Directed Research and Development' (April 19, 2006), which establishes DOE's requirements for the program while providing the Laboratory Director broad flexibility for program implementation. LDRD funds are obtained through a charge to all Laboratory programs. This report includes summaries for all ORNL LDRD research activities supported during FY 2007. The associated FY 2007 ORNL LDRD Self-Assessment (ORNL/PPA-2008/2) provides financial data and an internal evaluation of the program's management process. ORNL is a DOE multiprogram science, technology, and energy laboratory with distinctive capabilities in materials science and engineering, neutron science and technology, energy production and end-use technologies, biological and environmental science, and scientific computing. With these capabilities ORNL conducts basic and applied research and development (R and D) to support DOE's overarching mission to advance the national, economic, and energy security of the United States and promote scientific and technological innovation in support of that mission. As a national resource, the Laboratory also applies its capabilities and skills to specific needs of other federal agencies and customers through the DOE Work for Others (WFO) program. Information about the Laboratory and its programs is available on the Internet at http://www.ornl.gov/. LDRD is a relatively small but vital DOE program that allows ORNL, as well as other DOE laboratories, to select a limited number of R and D projects for the purpose of: (1) maintaining the scientific and technical vitality of the Laboratory; (2) enhancing the Laboratory's ability to address future DOE missions; (3) fostering creativity and stimulating exploration of forefront science

  9. Laboratory Directed Research and Development Program FY 2007 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Sjoreen, Terrence P [ORNL

    2008-04-01

    The Oak Ridge National Laboratory (ORNL) Laboratory Directed Research and Development (LDRD) program reports its status to the U.S. Department of Energy (DOE) in March of each year. The program operates under the authority of DOE Order 413.2B, 'Laboratory Directed Research and Development' (April 19, 2006), which establishes DOE's requirements for the program while providing the Laboratory Director broad flexibility for program implementation. LDRD funds are obtained through a charge to all Laboratory programs. This report includes summaries for all ORNL LDRD research activities supported during FY 2007. The associated FY 2007 ORNL LDRD Self-Assessment (ORNL/PPA-2008/2) provides financial data and an internal evaluation of the program's management process. ORNL is a DOE multiprogram science, technology, and energy laboratory with distinctive capabilities in materials science and engineering, neutron science and technology, energy production and end-use technologies, biological and environmental science, and scientific computing. With these capabilities ORNL conducts basic and applied research and development (R&D) to support DOE's overarching mission to advance the national, economic, and energy security of the United States and promote scientific and technological innovation in support of that mission. As a national resource, the Laboratory also applies its capabilities and skills to specific needs of other federal agencies and customers through the DOE Work for Others (WFO) program. Information about the Laboratory and its programs is available on the Internet at http://www.ornl.gov/. LDRD is a relatively small but vital DOE program that allows ORNL, as well as other DOE laboratories, to select a limited number of R&D projects for the purpose of: (1) maintaining the scientific and technical vitality of the Laboratory; (2) enhancing the Laboratory's ability to address future DOE missions; (3) fostering creativity and stimulating

  10. Secure Communications in High Speed Fiber Optical Networks Using Code Division Multiple Access (CDMA) Transmission

    Energy Technology Data Exchange (ETDEWEB)

    Han, I; Bond, S; Welty, R; Du, Y; Yoo, S; Reinhardt, C; Behymer, E; Sperry, V; Kobayashi, N

    2004-02-12

    This project is focused on the development of advanced components and system technologies for secure data transmission on high-speed fiber optic data systems. This work capitalizes on (1) a strong relationship with outstanding faculty at the University of California-Davis who are experts in high speed fiber-optic networks, (2) the realization that code division multiple access (CDMA) is emerging as a bandwidth enhancing technique for fiber optic networks, (3) the realization that CDMA of sufficient complexity forms the basis for almost unbreakable one-time key transmissions, (4) our concepts for superior components for implementing CDMA, (5) our expertise in semiconductor device processing and (6) our Center for Nano and Microtechnology, which is where the majority of the experimental work was done. Here we present a novel device concept, which will push the limits of current technology, and will simultaneously solve system implementation issues by investigating new state-of-the-art fiber technologies. This will enable the development of secure communication systems for the transmission and reception of messages on deployed commercial fiber optic networks, through the CDMA phase encoding of broad bandwidth pulses. CDMA technology has been developed as a multiplexing technology, much like wavelength division multiplexing (WDM) or time division multiplexing (TDM), to increase the potential number of users on a given communication link. A novel application of the techniques created for CDMA is to generate secure communication through physical layer encoding. Physical layer encoding devices are developed which utilize semiconductor waveguides with fast carrier response times to phase encode spectral components of a secure signal. Current commercial technology, most commonly a spatial light modulator, allows phase codes to be changed at rates of only 10's of Hertz ({approx}25ms response). The use of fast (picosecond to nanosecond) carrier dynamics of semiconductors

  11. Computer Security: Competing Concepts

    OpenAIRE

    Nissenbaum, Helen; Friedman, Batya; Felten, Edward

    2001-01-01

    This paper focuses on a tension we discovered in the philosophical part of our multidisciplinary project on values in web-browser security. Our project draws on the methods and perspectives of empirical social science, computer science, and philosophy to identify values embodied in existing web-browser security and also to prescribe changes to existing systems (in particular, Mozilla) so that values relevant to web-browser systems are better served than presently they are. The tension, which ...

  12. LABORATORY DIRECTED RESEARCH AND DEVELOPMENT ANNUAL REPORT TO THE DEPARTMENT OF ENERGY - DECEMBER 2004

    Energy Technology Data Exchange (ETDEWEB)

    FOX,K.J.

    2004-12-31

    Brookhaven National (BNL) Laboratory is a multidisciplinary laboratory that carries out basic and applied research in the physical, biomedical, and environmental sciences, and in selected energy technologies. It is managed by Brookhaven Science Associates, LLC, under contract with the U. S. Department of Energy. BNL's total annual budget has averaged about $460 million. There are about 2,800 employees, and another 4,500 guest scientists and students who come each year to use the Laboratory's facilities and work with the staff. The BNL Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) annually in March, as required by DOE Order 4 13.2A, ''Laboratory Directed Research and Development,'' January 8, 2001, and the LDRD Annual Report guidance, updated February 12, 1999. The LDRD Program obtains its funds through the Laboratory overhead pool and operates under the authority of DOE Order 413.2A. The goals and objectives of BNL's LDRD Program can be inferred from the Program's stated purposes. These are to (1) encourage and support the development of new ideas and technology, (2) promote the early exploration and exploitation of creative and innovative concepts, and (3) develop new ''fundable'' R&D projects and programs. The emphasis is clearly articulated by BNL to be on supporting exploratory research ''which could lead to new programs, projects, and directions'' for the Laboratory. As one of the premier scientific laboratories of the DOE, BNL must continuously foster groundbreaking scientific research. At Brookhaven National Laboratory one such method is through its LDRD Program. This discretionary research and development tool is critical in maintaining the scientific excellence and long-term vitality of the Laboratory. Additionally, it is a means to stimulate the scientific community and foster new science and technology

  13. LABORATORY DIRECTED RESEARCH AND DEVELOPMENT PROGRAM ACTIVITIES FOR FY2002.

    Energy Technology Data Exchange (ETDEWEB)

    FOX,K.J.

    2002-12-31

    Brookhaven National (BNL) Laboratory is a multidisciplinary laboratory that carries out basic and applied research in the physical, biomedical, and environmental sciences, and in selected energy technologies. It is managed by Brookhaven Science Associates, LLC, under contract with the U. S. Department of Energy. BNL's total annual budget has averaged about $450 million. There are about 3,000 employees, and another 4,500 guest scientists and students who come each year to use the Laboratory's facilities and work with the staff. The BNL Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) annually in March, as required by DOE Order 4 1 3.2A, ''Laboratory Directed Research and Development,'' January 8, 2001, and the LDRD Annual Report guidance, updated February 12, 1999. The LDRD Program obtains its funds through the Laboratory overhead pool and operates under the authority of DOE Order 413.2A. The goals and objectives of BNL's LDRD Program can be inferred from the Program's stated purposes. These are to (1) encourage and support the development of new ideas and technology, (2) promote the early exploration and exploitation of creative and innovative concepts, and (3) develop new ''fundable'' R&D projects and programs. The emphasis is clearly articulated by BNL to be on supporting exploratory research ''which could lead to new programs, projects, and directions'' for the Laboratory. As one of the premier scientific laboratories of the DOE, BNL must continuously foster groundbreaking scientific research. At Brookhaven National Laboratory one such method is through its LDRD Program. This discretionary research and development tool is critical in maintaining the scientific excellence and long-term vitality of the Laboratory. Additionally, it is a means to stimulate the scientific community and foster new science and technology

  14. LABORATORY DIRECTED RESEARCH AND DEVELOPMENT ANNUAL REPORT TO THE DEPARTMENT OF ENERGY - DECEMBER 2003

    Energy Technology Data Exchange (ETDEWEB)

    FOX,K.J.

    2003-12-31

    Brookhaven National (BNL) Laboratory is a multidisciplinary laboratory that carries out basic and applied research in the physical, biomedical, and environmental sciences, and in selected energy technologies. It is managed by Brookhaven Science Associates, LLC, under contract with the U. S. Department of Energy. BNL's total annual budget has averaged about $450 million. There are about 3,000 employees, and another 4,500 guest scientists and students who come each year to use the Laboratory's facilities and work with the staff. The BNL Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) annually in March, as required by DOE Order 41 3.2A, ''Laboratory Directed Research and Development,'' January 8, 2001, and the LDRD Annual Report guidance, updated February 12, 1999. The LDRD Program obtains its funds through the Laboratory overhead pool and operates under the authority of DOE Order 413.2A. The goals and objectives of BNL's LDRD Program can be inferred from the Program's stated purposes. These are to (1) encourage and support the development of new ideas and technology, (2) promote the early exploration and exploitation of creative and innovative concepts, and (3) develop new ''fundable'' R&D projects and programs. The emphasis is clearly articulated by BNL to be on supporting exploratory research ''which could lead to new programs, projects, and directions'' for the Laboratory. As one of the premier scientific laboratories of the DOE, BNL must continuously foster groundbreaking scientific research. At Brookhaven National Laboratory one such method is through its LDRD Program. This discretionary research and development tool is critical in maintaining the scientific excellence and long-term vitality of the Laboratory. Additionally, it is a means to stimulate the scientific community and foster new science and technology

  15. LABORATORY DIRECTED RESEARCH AND DEVELOPMENT ANNUAL REPORT TO THE DOE - DECEMBER 2001.

    Energy Technology Data Exchange (ETDEWEB)

    FOX,K.J.

    2001-12-01

    Brookhaven National (BNL) Laboratory is a multidisciplinary laboratory that carries out basic and applied research in the physical, biomedical, and environmental sciences, and in selected energy technologies. It is managed by Brookhaven Science Associates, LLC, under contract with the U. S. Department of Energy. BNL's total annual budget has averaged about $450 million. There are about 3,000 employees, and another 4,500 guest scientists and students who come each year to use the Laboratory's facilities and work with the staff. The BNL Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) annually in March, as required by DOE Order 4 13.2, ''Laboratory Directed Research and Development,'' March 5, 1997, and the LDRD Annual Report guidance, updated February 12, 1999. The LDRD Program obtains its funds through the Laboratory overhead pool and operates under the authority of DOE Order 4 13.2. The goals and objectives of BNL's LDRD Program can be inferred from the Program's stated purposes. These are to (1) encourage and support the development of new ideas and technology, (2) promote the early exploration and exploitation of creative and innovative concepts, and (3) develop new ''fundable'' R&D projects and programs. The emphasis is clearly articulated by BNL to be on supporting exploratory research ''which could lead to new programs, projects, and directions'' for the Laboratory. As one of the premier scientific laboratories of the DOE, BNL must continuously foster groundbreaking scientific research. At Brookhaven National Laboratory one such method is through its LDRD Program. This discretionary research and development tool is critical in maintaining the scientific excellence and long-term vitality of the Laboratory. Additionally, it is a means to stimulate the scientific community and foster new science and technology ideas

  16. Poverty Mapping Project: Poverty and Food Security Case Studies

    Data.gov (United States)

    National Aeronautics and Space Administration — The Poverty and Food Security Case Studies dataset consists of small area estimates of poverty, inequality, food security and related measures for subnational...

  17. LABORATORY DIRECTED RESEARCH AND DEVELOPMENT PROGRAM ASSESSMENT FOR FY 2006.

    Energy Technology Data Exchange (ETDEWEB)

    FOX,K.J.

    2006-01-01

    Brookhaven National Laboratory (BNL) is a multidisciplinary laboratory that carries out basic and applied research in the physical, biomedical, and environmental sciences, and in selected energy technologies. It is managed by Brookhaven Science Associates, LLC, (BSA) under contract with the U. S. Department of Energy (DOE). BNL's total annual budget has averaged about $460 million. There are about 2,500 employees, and another 4,500 guest scientists and students who come each year to use the Laboratory's facilities and work with the staff. The BNL Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) annually in March, as required by DOE Order 413.2B, ''Laboratory Directed Research and Development,'' April 19,2006, and the Roles, Responsibilities, and Guidelines for Laboratory Directed Research and Development at the Department of Energy National Nuclear Security Administration Laboratories dated June 13,2006. The goals and' objectives of BNL's LDRD Program can be inferred from the Program's stated purposes. These are to (1) encourage and support the development of new ideas and technology, (2) promote the early exploration and exploitation of creative and innovative concepts, and (3) develop new ''fundable'' R&D projects and programs. The emphasis is clearly articulated by BNL to be on supporting exploratory research ''which could lead to new programs, projects, and directions'' for the Laboratory. As one of the premier scientific laboratories of the DOE, BNL must continuously foster groundbreaking scientific research. At Brookhaven National Laboratory one such method is through its LDRD Program. This discretionary research and development tool is critical in maintaining the scientific excellence and long-term vitality of the Laboratory. Additionally, it is a means to stimulate the scientific community and foster new

  18. Laboratory Directed Research and Development Program Assessment for FY 2007

    Energy Technology Data Exchange (ETDEWEB)

    Newman,L.; Fox, K.J.

    2007-12-31

    Brookhaven National Laboratory (BNL) is a multidisciplinary laboratory that carries out basic and applied research in the physical, biomedical, and environmental sciences, and in selected energy technologies. It is managed by Brookhaven Science Associates, LLC, (BSA) under contract with the U. S. Department of Energy (DOE). BNL's Fiscal Year 2007 spending was $515 million. There are approximately 2,600 employees, and another 4,500 guest scientists and students who come each year to use the Laboratory's facilities and work with the staff. The BNL Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) annually in March, as required by DOE Order 413.2B, 'Laboratory Directed Research and Development', April 19, 2006, and the Roles, Responsibilities, and Guidelines for Laboratory Directed Research and Development at the Department of Energy/National Nuclear Security Administration Laboratories dated June 13, 2006. The goals and objectives of BNL's LDRD Program can be inferred from the Program's stated purposes. These are to (1) encourage and support the development of new ideas and technology, (2) promote the early exploration and exploitation of creative and innovative concepts, and (3) develop new 'fundable' R&D projects and programs. The emphasis is clearly articulated by BNL to be on supporting exploratory research 'which could lead to new programs, projects, and directions' for the Laboratory. As one of the premier scientific laboratories of the DOE, BNL must continuously foster groundbreaking scientific research. At Brookhaven National Laboratory one such method is through its LDRD Program. This discretionary research and development tool is critical in maintaining the scientific excellence and long-term vitality of the Laboratory. Additionally, it is a means to stimulate the scientific community and foster new science and technology ideas, which

  19. National Strategy to Secure Cyberspace

    National Research Council Canada - National Science Library

    Schwalm, Keith T

    2006-01-01

    ... of a national strategy for securing cyberspace. The approach explored the development of cyber technology strategies and programs related to the mission and roles of Homeland Security Advanced Research Projects Agency...

  20. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  1. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  2. Analysis of electromagnetic scattering by nearly periodic structures: an LDRD report.

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, William Arthur; Warne, Larry Kevin; Jorgenson, Roy Eberhardt; Wilton, Donald R. (University of Houston, Houston, TX); Basilio, Lorena I.; Peters, David William; Capolino, F. (University of Houston, Houston, TX)

    2006-10-01

    In this LDRD we examine techniques to analyze the electromagnetic scattering from structures that are nearly periodic. Nearly periodic could mean that one of the structure's unit cells is different from all the others--a defect. It could also mean that the structure is truncated, or butted up against another periodic structure to form a seam. Straightforward electromagnetic analysis of these nearly periodic structures requires us to grid the entire structure, which would overwhelm today's computers and the computers in the foreseeable future. In this report we will examine various approximations that allow us to continue to exploit some aspects of the structure's periodicity and thereby reduce the number of unknowns required for analysis. We will use the Green's Function Interpolation with a Fast Fourier Transform (GIFFT) to examine isolated defects both in the form of a source dipole over a meta-material slab and as a rotated dipole in a finite array of dipoles. We will look at the numerically exact solution of a one-dimensional seam. In order to solve a two-dimensional seam, we formulate an efficient way to calculate the Green's function of a 1d array of point sources. We next formulate ways of calculating the far-field due to a seam and due to array truncation based on both array theory and high-frequency asymptotic methods. We compare the high-frequency and GIFFT results. Finally, we use GIFFT to solve a simple, two-dimensional seam problem.

  3. LDRD Final report

    International Nuclear Information System (INIS)

    Stewart, R.E.; Price, D.; Shepherd, R.; White, W.; Walling, R.; More, R.

    1995-01-01

    The goal of this project is to develop a 100-fs pulse length laser capable of heating solid density plasmas to near-kilovolt temperatures before hydrodynamic decompression of the target can take place, and to experimentally determine the properties of these plasmas with it. The authors have successfully developed the laser for this work and measured plasma production and laser absorption with it. This work has demonstrated the capacity to produce solid-density plasmas. Future experiments are described

  4. LABORATORY DIRECTED RESEARCH AND DEVELOPMENT ANNUAL REPORT TO THE DEPARTMENT OF ENERGY - DECEMBER 2006

    Energy Technology Data Exchange (ETDEWEB)

    FOX, K.J.

    2006-12-31

    Brookhaven National Laboratory (BNL) is a multidisciplinary laboratory that carries out basic and applied research in the physical, biomedical, and environmental sciences, and in selected energy technologies. It is managed by Brookhaven Science Associates, LLC, (BSA) under contract with the U. S. Department of Energy (DOE). BNL's total annual budget has averaged about $460 million. There are about 2,500 employees, and another 4,500 guest scientists and students who come each year to use the Laboratory's facilities and work with the staff. The BNL Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) annually in March, as required by DOE Order 413.2B, ''Laboratory Directed Research and Development,'' April 19, 2006, and the Roles, Responsibilities, and Guidelines for Laboratory Directed Research and Development at the Department of Energy National Nuclear Security Administration Laboratories dated June 13, 2006. In accordance this is our Annual Report in which we describe the Purpose, Approach, Technical Progress and Results, and Specific Accomplishments of all LDRD projects that received funding during Fiscal Year 2006.

  5. An Empirical Study of Security Issues Posted in Open Source Projects

    DEFF Research Database (Denmark)

    Zahedi, Mansooreh; Ali Babar, Muhammad; Treude, Christoph

    2018-01-01

    When developers gain thorough understanding and knowledge of software security, they can produce more secure software. This study aims at empirically identifying and understanding the security issues posted on a random sample of GitHub repositories. We tried to understand the presence of security...

  6. Security issues at the Department of Energy and records management

    International Nuclear Information System (INIS)

    NUSBAUM, ANNA W.

    2000-01-01

    In order to discuss the connection between security issues within the Department of Energy and records management, the author covers a bit of security history and talks about what she calls ''the Amazing Project''. Initiated in late May 1999, it was to be a tri-laboratory (Lawrence Livermore National Laboratory of Livermore, California, Los Alamos National Laboratory of Los Alamos, New Mexico, and Sandia National Laboratories of Albuquerque, New Mexico, and Livermore, California) project. The team that formed was tasked to develop the best set of security solutions that still enabled weapon mission work to get done and the security solutions were to be the same set for everyone. The amazing project was called ''The Integrated Security Management Project'', or ''ISecM' for short. She'll describe why she thinks this project was so amazing and what it accomplished. There's a bit of sad news about the project, but then she'll move onto discuss what was learned at Sandia as a result of the project and what they're currently doing in records management

  7. Simulations of the interaction of intense petawatt laser pulses with dense Z-pinch plasmas : final report LDRD 39670

    International Nuclear Information System (INIS)

    Welch, Dale Robert; MacFarlane, Joseph John; Mehlhorn, Thomas Alan; Campbell, Robert B.

    2004-01-01

    We have studied the feasibility of using the 3D fully electromagnetic implicit hybrid particle code LSP (Large Scale Plasma) to study laser plasma interactions with dense, compressed plasmas like those created with Z, and which might be created with the planned ZR. We have determined that with the proper additional physics and numerical algorithms developed during the LDRD period, LSP was transformed into a unique platform for studying such interactions. Its uniqueness stems from its ability to consider realistic compressed densities and low initial target temperatures (if required), an ability that conventional PIC codes do not possess. Through several test cases, validations, and applications to next generation machines described in this report, we have established the suitability of the code to look at fast ignition issues for ZR, as well as other high-density laser plasma interaction problems relevant to the HEDP program at Sandia (e.g. backlighting)

  8. Cloud Computing Security

    OpenAIRE

    Ngongang, Guy

    2011-01-01

    This project aimed to show how possible it is to use a network intrusion detection system in the cloud. The security in the cloud is a concern nowadays and security professionals are still finding means to make cloud computing more secure. First of all the installation of the ESX4.0, vCenter Server and vCenter lab manager in server hardware was successful in building the platform. This allowed the creation and deployment of many virtual servers. Those servers have operating systems and a...

  9. Secure it now or secure it later: the benefits of addressing cyber-security from the outset

    Science.gov (United States)

    Olama, Mohammed M.; Nutaro, James

    2013-05-01

    The majority of funding for research and development (R&D) in cyber-security is focused on the end of the software lifecycle where systems have been deployed or are nearing deployment. Recruiting of cyber-security personnel is similarly focused on end-of-life expertise. By emphasizing cyber-security at these late stages, security problems are found and corrected when it is most expensive to do so, thus increasing the cost of owning and operating complex software systems. Worse, expenditures on expensive security measures often mean less money for innovative developments. These unwanted increases in cost and potential slowing of innovation are unavoidable consequences of an approach to security that finds and remediate faults after software has been implemented. We argue that software security can be improved and the total cost of a software system can be substantially reduced by an appropriate allocation of resources to the early stages of a software project. By adopting a similar allocation of R&D funds to the early stages of the software lifecycle, we propose that the costs of cyber-security can be better controlled and, consequently, the positive effects of this R&D on industry will be much more pronounced.

  10. Indicators for energy security

    International Nuclear Information System (INIS)

    Kruyt, Bert; Van Vuuren, D.P.; De Vries, H.J.M.; Groenenberg, H.

    2009-01-01

    The concept of energy security is widely used, yet there is no consensus on its precise interpretation. In this research, we have provided an overview of available indicators for long-term security of supply (SOS). We distinguished four dimensions of energy security that relate to the availability, accessibility, affordability and acceptability of energy and classified indicators for energy security according to this taxonomy. There is no one ideal indicator, as the notion of energy security is highly context dependent. Rather, applying multiple indicators leads to a broader understanding. Incorporating these indicators in model-based scenario analysis showed accelerated depletion of currently known fossil resources due to increasing global demand. Coupled with increasing spatial discrepancy between consumption and production, international trade in energy carriers is projected to have increased by 142% in 2050 compared to 2008. Oil production is projected to become increasingly concentrated in a few countries up to 2030, after which production from other regions diversifies the market. Under stringent climate policies, this diversification may not occur due to reduced demand for oil. Possible benefits of climate policy include increased fuel diversity and slower depletion of fossil resources. (author)

  11. Security improvements for rail movements of SNM

    International Nuclear Information System (INIS)

    Garcia, M.R.; Gronager, J.E.; Shemigon, N.N.

    1998-01-01

    The US Department of Energy (DOE) and the Russian Special Scientific and Production State Enterprise Eleron have teamed to lead a project to enhance the overall security of Russian Ministry of Atomic Energy (MINATOM) transportation of Special Nuclear Material (SNM) shipments. The effort is called the Railcar Transportation Security Project and is part of the overall DOE Material Protection, Control, and Accounting (MPC and A) program addressing the enhancement of nuclear material control, accounting, and physical protection for Russian SNM. The goal of this MPC and A project is to significantly increase the security of Russian MINATOM highly enriched SNM rail shipments. To accomplish this, the MPC and A Railcar Transportation Security program will provide an enhanced, yet cost effective, railcar transportation security system. The system incorporates a balance between the traditional detection, communications, delay, and response security elements to significantly improve the security of MINATOM SNM shipments. The strategy of this program is to use rapid upgrades to implement mature security technologies as quickly as possible. The rapid upgrades emphasize rapidly deployable delay elements, enhanced radio communications, and intrusion detection and surveillance. Upgraded railcars have begun operation during FY98. Subsequent upgrades will build upon the rapid upgrades and eventually be integrated into a final deployed system configuration. This paper provides an overview of the program, with a summary of performance of the deployed railcars

  12. Development and Evaluation of an On-Line Educational Module for Volunteer Leaders on Bio-Security in Washington State 4-H Livestock Projects

    Science.gov (United States)

    Stevenson, Jill L.; Moore, Dale A.; Newman, Jerry; Schmidt, Janet L.; Smith, Sarah M.; Smith, Jean; Kerr, Susan; Wallace, Michael; BoyEs, Pat

    2011-01-01

    An on-line module on disease prevention was created for 4-H volunteer leaders who work with livestock projects in Washington to better prepare them to teach youth about bio-security and its importance in 4-H livestock projects. Evaluation of the module and usage statistics since the module's debut were collected and evaluated. The module increases…

  13. One health security: an important component of the global health security agenda.

    Science.gov (United States)

    Gronvall, Gigi; Boddie, Crystal; Knutsson, Rickard; Colby, Michelle

    2014-01-01

    The objectives of the Global Health Security Agenda (GHSA) will require not only a "One Health" approach to counter natural disease threats against humans, animals, and the environment, but also a security focus to counter deliberate threats to human, animal, and agricultural health and to nations' economies. We have termed this merged approach "One Health Security." It will require the integration of professionals with expertise in security, law enforcement, and intelligence to join the veterinary, agricultural, environmental, and human health experts essential to One Health and the GHSA. Working across such different professions, which occasionally have conflicting aims and different professional cultures, poses multiple challenges, but a multidisciplinary and multisectoral approach is necessary to prevent disease threats; detect them as early as possible (when responses are likely to be most effective); and, in the case of deliberate threats, find who may be responsible. This article describes 2 project areas that exemplify One Health Security that were presented at a workshop in January 2014: the US government and private industry efforts to reduce vulnerabilities to foreign animal diseases, especially foot-and-mouth disease; and AniBioThreat, an EU project to counter deliberate threats to agriculture by raising awareness and implementing prevention and response policies and practices.

  14. 78 FR 5116 - NASA Information Security Protection

    Science.gov (United States)

    2013-01-24

    ... 2700-AD61 NASA Information Security Protection AGENCY: National Aeronautics and Space Administration..., projects, plans, or protection services relating to the national security; or (h) The development... implement the provisions of Executive Order (E.O.) 13526, Classified National Security Information, and...

  15. Army Secure Operating System: Information Security for Real Time Systems

    National Research Council Canada - National Science Library

    Anderson, Eric

    1984-01-01

    The Army Secure Operating System (ASOS) project, under the management of the U.S. Army CECOM organization, will provide real time systems software necessary for fielding modern Battlefield Automation Systems...

  16. Beyond grid security

    International Nuclear Information System (INIS)

    Hoeft, B; Epting, U; Koenig, T

    2008-01-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls

  17. Advanced proton-exchange materials for energy efficient fuel cells.

    Energy Technology Data Exchange (ETDEWEB)

    Fujimoto, Cy H.; Grest, Gary Stephen; Hickner, Michael A.; Cornelius, Christopher James; Staiger, Chad Lynn; Hibbs, Michael R.

    2005-12-01

    The ''Advanced Proton-Exchange Materials for Energy Efficient Fuel Cells'' Laboratory Directed Research and Development (LDRD) project began in October 2002 and ended in September 2005. This LDRD was funded by the Energy Efficiency and Renewable Energy strategic business unit. The purpose of this LDRD was to initiate the fundamental research necessary for the development of a novel proton-exchange membranes (PEM) to overcome the material and performance limitations of the ''state of the art'' Nafion that is used in both hydrogen and methanol fuel cells. An atomistic modeling effort was added to this LDRD in order to establish a frame work between predicted morphology and observed PEM morphology in order to relate it to fuel cell performance. Significant progress was made in the area of PEM material design, development, and demonstration during this LDRD. A fundamental understanding involving the role of the structure of the PEM material as a function of sulfonic acid content, polymer topology, chemical composition, molecular weight, and electrode electrolyte ink development was demonstrated during this LDRD. PEM materials based upon random and block polyimides, polybenzimidazoles, and polyphenylenes were created and evaluated for improvements in proton conductivity, reduced swelling, reduced O{sub 2} and H{sub 2} permeability, and increased thermal stability. Results from this work reveal that the family of polyphenylenes potentially solves several technical challenges associated with obtaining a high temperature PEM membrane. Fuel cell relevant properties such as high proton conductivity (>120 mS/cm), good thermal stability, and mechanical robustness were demonstrated during this LDRD. This report summarizes the technical accomplishments and results of this LDRD.

  18. Security-by-design handbook.

    Energy Technology Data Exchange (ETDEWEB)

    Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

    2013-01-01

    This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

  19. Final LDRD report :

    Energy Technology Data Exchange (ETDEWEB)

    Ambrosini, Andrea; Miller, James Edward; Allendorf, Mark D.; Coker, Eric Nicholas; Ermanoski, Ivan; Hogan, Roy E.,; McDaniel, Anthony H.

    2014-01-01

    Despite rapid progress, solar thermochemistry remains high risk; improvements in both active materials and reactor systems are needed. This claim is supported by studies conducted both prior to and as part of this project. Materials offer a particular large opportunity space as, until recently, very little effort apart from basic thermodynamic analysis was extended towards understanding this most fundamental component of a metal oxide thermochemical cycle. Without this knowledge, system design was hampered, but more importantly, advances in these crucial materials were rare and resulted more from intuition rather than detailed insight. As a result, only two basic families of potentially viable solid materials have been widely considered, each of which has significant challenges. Recent efforts towards applying an increased level of scientific rigor to the study of thermochemical materials have provided a much needed framework and insights toward developing the next generation of highly improved thermochemically active materials. The primary goal of this project was to apply this hard-won knowledge to rapidly advance the field of thermochemistry to produce a material within 2 years that is capable of yielding CO from CO2 at a 12.5 % reactor efficiency. Three principal approaches spanning a range of risk and potential rewards were pursued: modification of known materials, structuring known materials, and identifying/developing new materials for the application. A newly developed best-of-class material produces more fuel (9x more H2, 6x more CO) under milder conditions than the previous state of the art. Analyses of thermochemical reactor and system efficiencies and economics were performed and a new hybrid concept was reported. The larger case for solar fuels was also further refined and documented.

  20. Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources

    Directory of Open Access Journals (Sweden)

    Christian Schmitt

    2015-07-01

    Full Text Available This paper presents a model for structuring and reusing security requirements sources. The model serves as blueprint for the development of an organization-specific repository, which provides relevant security requirements sources, such as security information and knowledge sources and relevant compliance obligations, in a structured and reusable form. The resulting repository is intended to be used by development teams during the elicitation and analysis of security requirements with the goal to understand the security problem space, incorporate all relevant requirements sources, and to avoid unnecessary effort for identifying, understanding, and correlating applicable security requirements sources on a project-wise basis. We start with an overview and categorization of important security requirements sources, followed by the description of the generic model. To demonstrate the applicability and benefits of the model, the instantiation approach and details of the resulting repository of security requirements sources are presented.

  1. Security in the Baltic region as a Projection of Global Confrontation between Russia and the USA

    Directory of Open Access Journals (Sweden)

    Vadim Volovoj

    2017-03-01

    Full Text Available This article considers the problem of security in the Baltic region, namely, that of Poland and the Baltics. The authors rely on the works of Karl Deutsch, Emanuel Adler, on Michael Barnett’s theory of security communities and Barry Buzan’s re­gional security complex theory, address Steven Mann’s controlled chaos theory and the concept of Intermarium. Their starting assumption is that the situation in the Baltic depends largely on the politics of external powers — Russia and the United States, — being a projection of their global geopolitical confrontation. The US strategy thus becomes a major part of the equation. The authors believe that since the end of the second Iraq war the American elite has been divided along ideological lines into adherents of the chaos theory and traditionalists thinking in terms of sharing control with the other centres of global power. The US strategy in the Baltic region does not seek an open military conflict with Russia. On the contrary, the US strives to preserve the current level of confrontation between Russia and the EU, convincing the latter of the reality of the Russian threat. Countries that traditionally support confrontation with Russia, Poland and the Bal­tics, serve as a conduit for Washington strategy in Europe and a cordon sanitaire. This function is implemented through the Intermarium project meant to separate Russia from the EU. The four countries are rather active in this area, striving to attain the status of the US principal partners in the region and Europe in general. To retaliate, Moscow does everything within its power to ‘separate’ Brussels from Washington, yet the US influence is still very strong in Europe.

  2. Results of a project on development of agro-forestry systems for food security in Carrefour region, Republic of Haiti

    Directory of Open Access Journals (Sweden)

    Furio Massolino

    2011-11-01

    Full Text Available Haity has a notable problem of food security, 48% of people have not sufficient food availability, food prices has doubled from 1980 and 1990 and further increased 5 times between 1991 and 2000. Water availability and quality is another problems to be added to food insufficiency. Food deficiency is mitigated by natural food resources in rural areas where many different species are cultivated together but it can be extreme in the towns. Agricultural systems are not efficient and, at the same time, enhance soil and genetic erosion. A development project has been implemented to increase food security over the long term in the geographical area of Carrefour rural area, this comprises a research aimed to increase national food production introducing complex agro-forestry systems. The project has investigated problems and solutions, actions have been started to increase food production, including agronomic training of local farmers, organization of small farmers including legal protection on land tenure, introduction of low input modern agroforestry systems that can diversify food production through the year and reduce soil and genetic erosion. After these results, an intervention project has been approved and funded by EU, then delayed due to the recent civil war, finally it is giving positive results now. The same approach used for this project can be spread in the rest of the Republic of Haiti and, hopefully, to other world regions that have similar problems.

  3. Laboratory directed research and development annual report: 2005

    International Nuclear Information System (INIS)

    2006-01-01

    This report summarizes progress from the Laboratory Directed Research and Development (LDRD) program during fiscal year 2005 for Sandia National Laboratories. In addition to a programmatic and financial overview, the report includes progress reports from 410 individual R and D projects in 19 categories. The categories and subheadings are: Science, Technology and Engineering (Advanced Components and Certification Engineering; Advanced Manufacturing; Biotechnology; Chemical and Earth Sciences; Computational and Information Sciences; Electronics and Photonics; Engineering Sciences; Materials Science and Technology; Pulsed Power Sciences and High Energy Density Sciences; Science and Technology Strategic Objectives); Mission Technologies (Energy and Infrastructure Assurance; Homeland Security; Military Technologies and Applications; Nonproliferation and Assessments; Grand Challanges); and Corporate Objectives (Advanced Concepts; Seniors' Council; University Collaborations)

  4. Generation and compression of a target plasma for magnetized target fusion

    International Nuclear Information System (INIS)

    Kirkpatrick, R.C.; Lindemuth, I.R.; Sheehey, P.T.

    1998-01-01

    This is the final report of a three-year, Laboratory Directed Research and Development (LDRD) project at the Los Alamos National Laboratory (LANL). Magnetized target fusion (MTF) is intermediate between the two very different approaches to fusion: inertial and magnetic confinement fusion (ICF and MCF). Results from collaboration with a Russian MTF team on their MAGO experiments suggest they have a target plasma suitable for compression to provide an MTF proof of principle. This LDRD project had tow main objectives: first, to provide a computational basis for experimental investigation of an alternative MTF plasma, and second to explore the physics and computational needs for a continuing program. Secondary objectives included analytic and computational support for MTF experiments. The first objective was fulfilled. The second main objective has several facets to be described in the body of this report. Finally, the authors have developed tools for analyzing data collected on the MAGO and LDRD experiments, and have tested them on limited MAGO data

  5. Enhancing Food Security through Information and Communication ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... national food security, and prior approval of the government's National Food Security and Nutrition Policy 2006-2015. In alignment with these governmental commitments, this project will enable researchers to provide policymakers with practical and sustainable solutions that directly respond to national food security goals ...

  6. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  7. Strengthening global health security capacity--Vietnam demonstration project, 2013.

    Science.gov (United States)

    Tran, Phu Dac; Vu, Long Ngoc; Nguyen, Hien Tran; Phan, Lan Trong; Lowe, Wayne; McConnell, Michelle S; Iademarco, Michael F; Partridge, Jeffrey M; Kile, James C; Do, Trang; Nadol, Patrick J; Bui, Hien; Vu, Diep; Bond, Kyle; Nelson, David B; Anderson, Lauren; Hunt, Kenneth V; Smith, Nicole; Giannone, Paul; Klena, John; Beauvais, Denise; Becknell, Kristi; Tappero, Jordan W; Dowell, Scott F; Rzeszotarski, Peter; Chu, May; Kinkade, Carl

    2014-01-31

    Over the past decade, Vietnam has successfully responded to global health security (GHS) challenges, including domestic elimination of severe acute respiratory syndrome (SARS) and rapid public health responses to human infections with influenza A(H5N1) virus. However, new threats such as Middle East respiratory syndrome coronavirus (MERS-CoV) and influenza A(H7N9) present continued challenges, reinforcing the need to improve the global capacity to prevent, detect, and respond to public health threats. In June 2012, Vietnam, along with many other nations, obtained a 2-year extension for meeting core surveillance and response requirements of the 2005 International Health Regulations (IHR). During March-September 2013, CDC and the Vietnamese Ministry of Health (MoH) collaborated on a GHS demonstration project to improve public health emergency detection and response capacity. The project aimed to demonstrate, in a short period, that enhancements to Vietnam's health system in surveillance and early detection of and response to diseases and outbreaks could contribute to meeting the IHR core capacities, consistent with the Asia Pacific Strategy for Emerging Diseases. Work focused on enhancements to three interrelated priority areas and included achievements in 1) establishing an emergency operations center (EOC) at the General Department of Preventive Medicine with training of personnel for public health emergency management; 2) improving the nationwide laboratory system, including enhanced testing capability for several priority pathogens (i.e., those in Vietnam most likely to contribute to public health emergencies of international concern); and 3) creating an emergency response information systems platform, including a demonstration of real-time reporting capability. Lessons learned included awareness that integrated functions within the health system for GHS require careful planning, stakeholder buy-in, and intradepartmental and interdepartmental coordination and

  8. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  9. US Food Security and Climate Change: Mid-Century Projections of Commodity Crop Production by the IMPACT Model

    Science.gov (United States)

    Takle, E. S.; Gustafson, D. I.; Beachy, R.; Nelson, G. C.; Mason-D'Croz, D.; Palazzo, A.

    2013-12-01

    Agreement is developing among agricultural scientists on the emerging inability of agriculture to meet growing global food demands. The lack of additional arable land and availability of freshwater have long been constraints on agriculture. Changes in trends of weather conditions that challenge physiological limits of crops, as projected by global climate models, are expected to exacerbate the global food challenge toward the middle of the 21st century. These climate- and constraint-driven crop production challenges are interconnected within a complex global economy, where diverse factors add to price volatility and food scarcity. We use the DSSAT crop modeling suite, together with mid-century projections of four AR4 global models, as input to the International Food Policy Research Institute IMPACT model to project the impact of climate change on food security through the year 2050 for internationally traded crops. IMPACT is an iterative model that responds to endogenous and exogenous drivers to dynamically solve for the world prices that ensure global supply equals global demand. The modeling methodology reconciles the limited spatial resolution of macro-level economic models that operate through equilibrium-driven relationships at a national level with detailed models of biophysical processes at high spatial resolution. The analysis presented here suggests that climate change in the first half of the 21st century does not represent a near-term threat to food security in the US due to the availability of adaptation strategies (e.g., loss of current growing regions is balanced by gain of new growing regions). However, as climate continues to trend away from 20th century norms current adaptation measures will not be sufficient to enable agriculture to meet growing food demand. Climate scenarios from higher-level carbon emissions exacerbate the food shortfall, although uncertainty in climate model projections (particularly precipitation) is a limitation to impact

  10. Integrating a flexible modeling framework (FMF) with the network security assessment instrument to reduce software security risk

    Science.gov (United States)

    Gilliam, D. P.; Powell, J. D.

    2002-01-01

    This paper presents a portion of an overall research project on the generation of the network security assessment instrument to aid developers in assessing and assuring the security of software in the development and maintenance lifecycles.

  11. Managing a major security system installation: Practical lessons learned

    International Nuclear Information System (INIS)

    Roehrig, S.C.

    1986-01-01

    Sandia National Laboratories has been heavily involved for over a decade in aiding a number of DOE facilities in defining and implementing upgraded security safeguards systems. Because security system definition, design, and installation is still a relatively new field to the commercial world, effective project management must pay special attention to first understanding and then interpreting the unique aspects of a security system for all concerned parties. Experiences from an actual security system installation are used to illustrate some project management approaches which have been found to be effective

  12. An adaptive algorithm for performance assessment of construction project management with respect to resilience engineering and job security

    Directory of Open Access Journals (Sweden)

    P. Hashemi

    2018-01-01

    Full Text Available Construction sites are accident-prone locations and therefore safety management plays an im-portant role in these workplaces. This study presents an adaptive algorithm for performance as-sessment of project management with respect to resilience engineering and job security in a large construction site. The required data are collected using questionnaires in a large construction site. The presented algorithm is composed of radial basis function (RBF, artificial neural networks multi-layer perceptron (ANN-MLP, and statistical tests. The results indicate that preparedness, fault-tolerance, and flexibility are the most effective factors on overall efficiency. Moreover, job security and resilience engineering have similar statistical impacts on overall system efficiency. The results are verified and validated by the proposed algorithm.

  13. Teaching Web Security Using Portable Virtual Labs

    Science.gov (United States)

    Chen, Li-Chiou; Tao, Lixin

    2012-01-01

    We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…

  14. Evaluation on Electronic Securities Settlements Systems by AHP Methods

    Science.gov (United States)

    Fukaya, Kiyoyuki; Komoda, Norihisa

    Accompanying the spread of Internet and the change of business models, electronic commerce expands buisness areas. Electronic finance commerce becomes popular and especially online security tradings becoome very popular in this area. This online securitiy tradings have some good points such as less mistakes than telephone calls. In order to expand this online security tradings, the transfer of the security paper is one the largest problems to be solved. Because it takes a few days to transfer the security paper from a seller to a buyer. So the dematerialization of security papers is one of the solutions. The demterilization needs the information systems for setteling security. Some countries such as France, German, United Kingdom and U.S.A. have been strating the dematerialization projects. The legacy assesments on these projects focus from the viewpoint of the legal schemes only and there is no assessment from system architectures. This paper focuses on the information system scheme and valuates these dematerlization projects by AHP methods from the viewpoints of “dematerializaion of security papers", “speed of transfer", “usefulness on the system" and “accumulation of risks". This is the first case of valuations on security settlements systems by AHP methods, especially four counties’ systems.

  15. IT Security Support for Spaceport Command and Control System

    Science.gov (United States)

    McLain, Jeffrey

    2013-01-01

    During the fall 2013 semester, I worked at the Kennedy Space Center as an IT Security Intern in support of the Spaceport Command and Control System under the guidance of the IT Security Lead Engineer. Some of my responsibilities included assisting with security plan documentation collection, system hardware and software inventory, and malicious code and malware scanning. Throughout the semester, I had the opportunity to work on a wide range of security related projects. However, there are three projects in particular that stand out. The first project I completed was updating a large interactive spreadsheet that details the SANS Institutes Top 20 Critical Security Controls. My task was to add in all of the new commercial of the shelf (COTS) software listed on the SANS website that can be used to meet their Top 20 controls. In total, there are 153 unique security tools listed by SANS that meet one or more of their 20 controls. My second project was the creation of a database that will allow my mentor to keep track of the work done by the contractors that report to him in a more efficient manner by recording events as they occur throughout the quarter. Lastly, I expanded upon a security assessment of the Linux machines being used on center that I began last semester. To do this, I used a vulnerability and configuration tool that scans hosts remotely through the network and presents the user with an abundance of information detailing each machines configuration. The experience I gained from working on each of these projects has been invaluable, and I look forward to returning in the spring semester to continue working with the IT Security team.

  16. Security engineering: systems engineering of security through the adaptation and application of risk management

    Science.gov (United States)

    Gilliam, David P.; Feather, Martin S.

    2004-01-01

    Information Technology (IT) Security Risk Management is a critical task in the organization, which must protect its resources and data against the loss of confidentiality, integrity, and availability. As systems become more complex and diverse, and more vulnerabilities are discovered while attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security. This paper describes an approach to address IT security risk through risk management and mitigation in both the institution and in the project life cycle.

  17. Considerations on the selection and prioritization of information security solutions

    Directory of Open Access Journals (Sweden)

    Maria Cristina RĂDULESCU

    2016-05-01

    Full Text Available This paper provides a set of guidelines that can be used for prescribing a methodology or a detailed process for selecting and prioritizing security projects or solutions. It is based on the idea that costs of security solutions should be justified by their contribution to ensuring adequate protection of information resources in the organization which implements them. The article reviews general issues of security risks and costs, arguing the need for explicit consideration of information resources security requirements in order to validate decisions concerning security projects implementation. In such an approach, security requirements of information resources are used as a reference system to quantify the benefits and limitations of security solutions defined as alternative or complementary responses to certain security risks as their implementation faces budget constraints.

  18. Security Technologies for Open Networking Environments (STONE)

    Energy Technology Data Exchange (ETDEWEB)

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi

  19. While working around security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg; Bødker, Susanne; Petersen, Marianne Graves

    This paper describes our work at two levels. First of all the paper discusses how users of IT deal with issues of IT security in their everyday life. Secondly, we discuss how the kind of understanding of IT security that comes out of careful analyses of use confronts the ways in which usable...... IT security is established in the literature. Recent literature has called for better conceptual models as a starting point for improving IT security. In contrast to such models we propose to dress up designers by helping them better understand the work that goes into everyday security. The result...... is a methodological toolbox that helps address and design for usable and useful IT security. We deploy examples of analyses and design, carried out by ourselves and by others to fine-tune our design perspective; in particular we use examples from three current research projects....

  20. Improving industrial process control systems security

    CERN Document Server

    Epting, U; CERN. Geneva. TS Department

    2004-01-01

    System providers are today creating process control systems based on remote connectivity using internet technology, effectively exposing these systems to the same threats as corporate computers. It is becoming increasingly difficult and costly to patch/maintain the technical infrastructure monitoring and control systems to remove these vulnerabilities. A strategy including risk assessment, security policy issues, service level agreements between the IT department and the controls engineering groups must be defined. In addition an increased awareness of IT security in the controls system engineering domain is needed. As consequence of these new factors the control system architectures have to take into account security requirements, that often have an impact on both operational aspects as well as on the project and maintenance cost. Manufacturers of industrial control system equipment do however also propose progressively security related solutions that can be used for our active projects. The paper discusses ...

  1. Open Source Vulnerability Database Project

    Directory of Open Access Journals (Sweden)

    Jake Kouns

    2008-06-01

    Full Text Available This article introduces the Open Source Vulnerability Database (OSVDB project which manages a global collection of computer security vulnerabilities, available for free use by the information security community. This collection contains information on known security weaknesses in operating systems, software products, protocols, hardware devices, and other infrastructure elements of information technology. The OSVDB project is intended to be the centralized global open source vulnerability collection on the Internet.

  2. Computer Security: Introduction to information and computer security (1/4)

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    Sebastian Lopienski is CERN's Deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support services hosted in the CERN Computer Centre; providing Central CVS Service for software projects at CERN; and development of applications for accelerator controls in Java. He graduated from the University of Warsaw (MSc in Computer Science) in 2002, and earned an MBA degree at the Enterprise Administration Institute in Aix-en-Provence and Haute Ecole de Gestion in Geneva in 2010. His professional interests include software and network security, distributed systems, and Web and mobile technologies. With the prevalence of modern information te...

  3. Lawrence Livermore National Laboratory FY 2016 Laboratory Directed Research and Development Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Al-Ayat, R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Gard, E. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Sketchley, J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Watkins, L. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-10-16

    The LDRD annual report for FY2016 consists of two parts: The Overview. This section contains a broad description of the LDRD Program, highlights of recent accomplishments and awards, Program statistics, and the LDRD portfolio-management processes. Project Reports. Project reports are submitted by all principal investigators at the end of the fiscal year. The length and depth of the report depends on the project’s lifecycle. For projects that will be continuing the following year, the principal investigator submits a continuing project report, which is a brief update containing descriptions of the goals, scope, motivation, relevance (to DOE/NNSA and Livermore mission areas), and technical progress achieved in FY16, as well as a list of selected publications and presentations that resulted from the research. For projects that concluded in FY16, a more detailed final report is provided that is technical in nature and includes the background, objectives, scientific approach, accomplishments, and impacts on the Laboratory missions, as well as a list of publications and presentations that resulted from the research. Project reports are listed under their research topics and organized by year and type, such as exploratory research (ER), feasibility study (FS), laboratory-wide competition (LW), and strategic initiative (SI). Each project is assigned a unique tracking code, an identifier that consists of three elements. The first is the fiscal year in which the project began, the second represents the project type, and the third identifies the serial number of the project for that fiscal year. For example, 16-ERD-100 means the project is an exploratory research project that began in FY16. The three-digit number (100) represents the serial number for the project.

  4. Model-Based Security Testing

    Directory of Open Access Journals (Sweden)

    Ina Schieferdecker

    2012-02-01

    Full Text Available Security testing aims at validating software system requirements related to security properties like confidentiality, integrity, authentication, authorization, availability, and non-repudiation. Although security testing techniques are available for many years, there has been little approaches that allow for specification of test cases at a higher level of abstraction, for enabling guidance on test identification and specification as well as for automated test generation. Model-based security testing (MBST is a relatively new field and especially dedicated to the systematic and efficient specification and documentation of security test objectives, security test cases and test suites, as well as to their automated or semi-automated generation. In particular, the combination of security modelling and test generation approaches is still a challenge in research and of high interest for industrial applications. MBST includes e.g. security functional testing, model-based fuzzing, risk- and threat-oriented testing, and the usage of security test patterns. This paper provides a survey on MBST techniques and the related models as well as samples of new methods and tools that are under development in the European ITEA2-project DIAMONDS.

  5. Managing information technology security risk

    Science.gov (United States)

    Gilliam, David

    2003-01-01

    Information Technology (IT) Security Risk Management is a critical task for the organization to protect against the loss of confidentiality, integrity and availability of IT resources. As systems bgecome more complex and diverse and and attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security risk. This paper describes a two-pronged approach in addressing IT security risk and risk management in the organization: 1) an institutional enterprise appraoch, and 2) a project life cycle approach.

  6. The COMURHEX 2 project. Investing in UF6 long-term security of supply

    International Nuclear Information System (INIS)

    Bouzon, Pierre; Lacombe, Philippe; Durante, Pierre; Teyssier, Patrick

    2008-01-01

    The front-end nuclear fuel supply chain for LWRs encompasses four major industrial stages that are mining and concentration, conversion, enrichment, and eventually fuel fabrication. The different stages involve uranium in different chemical and physical forms. Enrichment of the 235-U fissile isotope requires gaseous UF6. As the standard output of mine is U3O8, referred to as ''yellow cake'', a purely chemical stage is therefore needed to fluorinate U3O8 and turn it into UFe: this is the conversion stage. U3O8 inventories management is thus performed at the conversion sites.Purification of the mining concentrates is also needed prior to actual conversion into UFe. This step is important because the front-end supply chain facilities have strict specifications concerning impurities. The conversion stage may involve intermediary products, namely UO3 and/or UF4, depending on the industrial scheme implemented. With the Comurhex 2 project, AREVA is not only shaping the future of conversion market and contributing to the security of supply of its customers, but it is also developing innovative techniques and reorganizing the conversion process steps. Providing such guaranteed and valuable conversion supply with a brand new plant is our strong commitment to a sustainable nuclear fuel cycle. And AREVA is the first that has launched such a project, looking further ahead. The three main axes of sustainable development, economical, social, and environmental, are truly taken into account in the development of the new project.

  7. Security option file - After closure (DOS-AF)

    International Nuclear Information System (INIS)

    2016-01-01

    A first volume presents the context and scope of the Cigeo project, and the scope of this document. It proposes a general presentation of Cigeo, the regulatory framework and standards. It describes the different aspects and components of the security strategy: principles, security functions after closure, objectives of protection, global approach. It proposes a security assessment: objectives, consistency with international practices, assessment steps, scenarios, scenario quantitative assessment. The next part addresses security management. The second volume contains a description of the storage system: site characteristics, types of stored parcels, the future of the installation after its closure. The third volume proposes a security assessment. It addresses the management of risks and uncertainties, describes a scenario of normal evolution and also scenarios of altered evolutions, scenarios of unintentional human intrusion, and what-if type scenarios. The fourth volume reports lessons at the current stage of the project, and gives an overview of important activities from storage design to storage closure

  8. Computer Security: Cryptography and authentication (2/4)

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    Remi Mollon studied computer security at University and he first worked on Grids, with the EGEE project, for a French Bioinformatics institute. Information security being crucial in that field, he developed an encrypted file management system on top of Grid middleware, and he contributed in integrating legacy applications with Grids. Then, he was hired by CERN as a Grid Data Management developer, and he joined the Grid Operational Security Coordination Team. Remi has now moved to CERN Computer Security Team. Remi is involved in the daily security operations, in addition to be responsible to design Team's computer infrastructure, and to participate to several projects, like multi-factor authentication at CERN. With the prevalence of modern information technologies and its increasing integration into our daily live, digital systems become more and more playground for evil people. While in the past, attacks were driven by fame& kudos, nowadays money is the motivating factor. Just the recent months have s...

  9. Securing classification and regulatory approval for deepwater projects: management challenges in a global environment

    Energy Technology Data Exchange (ETDEWEB)

    Feijo, Luiz P.; Burton, Gareth C. [American Bureau of Shipping (ABS), Rio de Janeiro, RJ (Brazil)

    2008-07-01

    As the offshore industry continues to develop and move into increasingly deeper waters, technological boundaries are being pushed to new limits. Along with these advances, the design, fabrication and installation of deepwater oil and gas projects has become an increasingly global endeavor. After providing an overview of the history and role of Classification Societies, this paper reviews the challenges of securing classification and regulatory approval in a global environment. Operational, procedural and technological changes which one Classification Society; the American Bureau of Shipping, known as ABS, has implemented to address these challenges are presented. The result of the changes has been a more customized service aiming at faster and more streamlined classification approval process. (author)

  10. Elements of social security

    DEFF Research Database (Denmark)

    Hansen, Hans

    Elements of Social Security is a comparative study of important elements of the social security systems in Denmark (DK), Sweden (S), Finland (FIN), Austria (A), Germany (D), the Netherlands (NL), Great Britain (GB) and Canada (CAN). It should be emphasized that Germany is the former West Germany...... (Alte Länder). This is the 9th and last edition of the publication,covering income levels and rules for social security and personal taxation for 1999. Basis for the projections to 1999 income levels is the 1998 data (in some cases 1999 data)for OECD's Taxing Wages as reported by national experts....

  11. IT Security Specialist | IDRC - International Development Research ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The IT Security Specialist takes a strategic role in the delivery of Infrastructure ... on IT Security to project managers, business clients and senior management. ... as a team member or a team leader by undertaking research, investigations, ...

  12. Security Aspects of an Enterprise-Wide Network Architecture.

    Science.gov (United States)

    Loew, Robert; Stengel, Ingo; Bleimann, Udo; McDonald, Aidan

    1999-01-01

    Presents an overview of two projects that concern local area networks and the common point between networks as they relate to network security. Discusses security architectures based on firewall components, packet filters, application gateways, security-management components, an intranet solution, user registration by Web form, and requests for…

  13. Towards Interoperable IoT Deployments inSmart Cities - How project VITAL enables smart, secure and cost- effective cities

    OpenAIRE

    Schiele , Gregor; Soldatos , John; Mitton , Nathalie

    2014-01-01

    International audience; IoT-based deployments in smart cities raise several challenges, especially in terms of interoperability. In this paper, we illustrate semantic interoperability solutions for IoT systems. Based on these solutions, we describe how the FP7 VITAL project aims to bridge numerous silo IoT deployments in smart cities through repurposing and reusing sensors and data streams across multiple applications without carelessly compromising citizens’ security and privacy. This approa...

  14. The role of Nigerian youths in effective implementation of security ...

    African Journals Online (AJOL)

    ... effective implementation of security and social development intervention in Nigeria cannot be over-emphasized. This is because youths have been deeply involved in various self-help projects in various Local and State Governments in Nigeria. Their areas of interventions cover projects involving trade, commerce, security ...

  15. Smart Grid Demonstration Project

    Energy Technology Data Exchange (ETDEWEB)

    Miller, Craig [National Rural Electric Cooperative Association, Arlington, VA (United States); Carroll, Paul [National Rural Electric Cooperative Association, Arlington, VA (United States); Bell, Abigail [National Rural Electric Cooperative Association, Arlington, VA (United States)

    2015-03-11

    The National Rural Electric Cooperative Association (NRECA) organized the NRECA-U.S. Department of Energy (DOE) Smart Grid Demonstration Project (DE-OE0000222) to install and study a broad range of advanced smart grid technologies in a demonstration that spanned 23 electric cooperatives in 12 states. More than 205,444 pieces of electronic equipment and more than 100,000 minor items (bracket, labels, mounting hardware, fiber optic cable, etc.) were installed to upgrade and enhance the efficiency, reliability, and resiliency of the power networks at the participating co-ops. The objective of this project was to build a path for other electric utilities, and particularly electrical cooperatives, to adopt emerging smart grid technology when it can improve utility operations, thus advancing the co-ops’ familiarity and comfort with such technology. Specifically, the project executed multiple subprojects employing a range of emerging smart grid technologies to test their cost-effectiveness and, where the technology demonstrated value, provided case studies that will enable other electric utilities—particularly electric cooperatives— to use these technologies. NRECA structured the project according to the following three areas: Demonstration of smart grid technology; Advancement of standards to enable the interoperability of components; and Improvement of grid cyber security. We termed these three areas Technology Deployment Study, Interoperability, and Cyber Security. Although the deployment of technology and studying the demonstration projects at coops accounted for the largest portion of the project budget by far, we see our accomplishments in each of the areas as critical to advancing the smart grid. All project deliverables have been published. Technology Deployment Study: The deliverable was a set of 11 single-topic technical reports in areas related to the listed technologies. Each of these reports has already been submitted to DOE, distributed to co-ops, and

  16. Evaluation of Corba for use in distributed control systems

    International Nuclear Information System (INIS)

    Holloway, F.W.; Arsdall, P. van

    1999-01-01

    The Common Object Request Broker Architecture (CORBA)-based Simulator was a Laboratory Directed Research and Development (LDRD) project that applied simulation techniques to explore critical questions about advanced distributed control system architectures. A three-prong approach comprised of a study of object-oriented distribution tools, computer network modeling, and simulation of key control system scenarios was used in the LDRD project. This input report describes the first of the three approaches the study of object-oriented distribution tools together with measurements, and predictions of use within the National Ignition Facility (NIF) and some aspects of CORBA which remain to be resolved. For the ICCS, the completeness of suitable functionality, the speed of performance and utilization of machine and network resources, and the developing nature of the commercial CORBA products themselves, presented a certain risk. This LDRD thus evaluated CORBA in general, and a particular implementation, to determine its features, performance, and scaling properties, and to optimize its use within the ICCS. Both UNIX and real-time operating systems were studied

  17. Security in cloud computing

    OpenAIRE

    Moreno Martín, Oriol

    2016-01-01

    Security in Cloud Computing is becoming a challenge for next generation Data Centers. This project will focus on investigating new security strategies for Cloud Computing systems. Cloud Computingisarecent paradigmto deliver services over Internet. Businesses grow drastically because of it. Researchers focus their work on it. The rapid access to exible and low cost IT resources on an on-demand fashion, allows the users to avoid planning ahead for provisioning, and enterprises to save money ...

  18. Marketability and sustainability of food security programmes ...

    African Journals Online (AJOL)

    Marketability and sustainability of food security programmes: products and productivity of agricultural projects. ... Project products are sold to community members who accounted to 79%, and few (1%) to individuals owning business, clinics and outside the community. Project members advertised their produce mainly ...

  19. Nuclear power: energy security and supply assurances

    International Nuclear Information System (INIS)

    Rogner, H.H.; McDonald, A.

    2008-01-01

    Expectations are high for nuclear power. This paper first summarizes recent global and regional projections for the medium-term, including the 2007 updates of IAEA projections plus International Energy Agency and World Energy Technology Outlook projections to 2030 and 2050. One driving force for nuclear power is concern about energy supply security. Two potential obstacles are concerns about increased nuclear weapon proliferation risks, and concerns by some countries about potential politically motivated nuclear fuel supply interruptions. Concerning supply security, the paper reviews different definitions, strategies and costs. Supply security is not free; nor does nuclear power categorically increase energy supply security in all situations. Concerning proliferation and nuclear fuel cut-off risks, the IAEA and others are exploring possible 'assurance of supply' mechanisms with 2 motivations. First, the possibility of a political fuel supply interruption is a non-market disincentive discouraging investment in nuclear power. Fuel supply assurance mechanisms could reduce this disincentive. Second, the risk of interruption creates an incentive for a country to insure against that risk by developing a national enrichment capability. Assurance mechanisms could reduce this incentive, thereby reducing the possible spread of new national enrichment capabilities and any associated weapon proliferation risks. (orig.)

  20. A secure communication scheme based generalized function projective synchronization of a new 5D hyperchaotic system

    International Nuclear Information System (INIS)

    Wu, Xiangjun; Fu, Zhengye; Kurths, Jürgen

    2015-01-01

    In this paper, a new five-dimensional hyperchaotic system is proposed based on the Lü hyperchaotic system. Some of its basic dynamical properties, such as equilibria, Lyapunov exponents, bifurcations and various attractors are investigated. Furthermore, a new secure communication scheme based on generalized function projective synchronization (GFPS) of this hyperchaotic system with an uncertain parameter is presented. The communication scheme is composed of the modulation, the chaotic receiver, the chaotic transmitter and the demodulation. The modulation mechanism is to modulate the message signal into the system parameter. Then the chaotic signals are sent to the receiver via a public channel. In the receiver end, by designing the controllers and the parameter update rule, GFPS between the transmitter and receiver systems is achieved and the unknown parameter is estimated simultaneously. The message signal can be finally recovered by the identified parameter and the corresponding demodulation method. There is no any limitation on the message size. Numerical simulations are performed to show the validity and feasibility of the presented secure communication scheme. (paper)

  1. Long term Gas Supply Security in an Enlarged Europe. Final Report ENGAGED Project

    International Nuclear Information System (INIS)

    Van Oostvoorn, F.; Likachev, V.; Morgan, T.

    2004-12-01

    The title project concerned a study on the long-term gas supply security in Europe with a focus on the developments, risks and policies in the candidate countries in Eastern Europe. For that reason the report not only includes a European and EU-30 wide scenario analysis but also chapters on specific topics. One study (a chapter in this report) concerns the gas market and regulation developments in a number of relevant candidate countries. Another chapter presents a Russian vision on gas demand, production and supplies from Russia and also includes a paragraph on the supplies from other neighbours and the transit issues in the Ukraine. Finally, the report contains a chapter discussing the required network infrastructure for bringing the gas from external gas suppliers to the EU-30 markets. Hereby it analysis and tests the network flexibility to cope with some unlikely and unexpected supply interruptions in main pipelines to EU markets. The background information of the studies underlying the chapters can be partly found in the annexes and in the individual task reports. During the project the results of the study were discussed at several seminars in candidate countries and particularly on the final seminar in Prague, in June 2003, with different and important stakeholders and market actors

  2. Functional Security Model: Managers Engineers Working Together

    Science.gov (United States)

    Guillen, Edward Paul; Quintero, Rulfo

    2008-05-01

    Information security has a wide variety of solutions including security policies, network architectures and technological applications, they are usually designed and implemented by security architects, but in its own complexity this solutions are difficult to understand by company managers and they are who finally fund the security project. The main goal of the functional security model is to achieve a solid security platform reliable and understandable in the whole company without leaving of side the rigor of the recommendations and the laws compliance in a single frame. This paper shows a general scheme of the model with the use of important standards and tries to give an integrated solution.

  3. Secure Border Gateway Protocol and the External Routing Intrusion Detection System

    National Research Council Canada - National Science Library

    Kent, Stephen

    2000-01-01

    .... The Secure BGP projects designed a secure, scalable, deployable architecture (S-BGP) for an authorization and authentication system that addresses most of the security problems associated with BGP...

  4. Project financing renewable energy schemes

    International Nuclear Information System (INIS)

    Brandler, A.

    1993-01-01

    The viability of many Renewable Energy projects is critically dependent upon the ability of these projects to secure the necessary financing on acceptable terms. The principal objective of the study was to provide an overview to project developers of project financing techniques and the conditions under which project finance for Renewable Energy schemes could be raised, focussing on the potential sources of finance, the typical project financing structures that could be utilised for Renewable Energy schemes and the risk/return and security requirements of lenders, investors and other potential sources of financing. A second objective is to describe the appropriate strategy and tactics for developers to adopt in approaching the financing markets for such projects. (author)

  5. Fortress America: The Aesthetics of Homeland Security in the Public Realm

    Science.gov (United States)

    2017-09-01

    matured and evolved as a profession and is now an integral part of all urban design. UK citizens benefit from aesthetical public spaces where security...only can homeland security architecture restrict access to public spaces, it might not actually make the public safer. The indirect costs of poorly...change. Until public agencies hold homeland security architecture projects to the same public benefit requirements as other projects, the hostile

  6. Precision formed micro magnets: LDRD project summary report

    Energy Technology Data Exchange (ETDEWEB)

    CHRISTENSON,TODD R.; GARINO,TERRY J.; VENTURINI,EUGENE L.

    2000-02-01

    A microfabrication process is described that provides for the batch realization of miniature rare earth based permanent magnets. Prismatic geometry with features as small as 5 microns, thicknesses up through several hundred microns and with submicron tolerances may be accommodated. The processing is based on a molding technique using deep x-ray lithography as a means to generate high aspect-ratio precision molds from PMMA (poly methyl methacrylate) used as an x-ray photoresist. Subsequent molding of rare-earth permanent magnet (REPM) powder combined with a thermosetting plastic binder may take place directly in the PMMA mold. Further approaches generate an alumina form replicated from the PMMA mold that becomes an intermediate mold for pressing higher density REPM material and allows for higher process temperatures. Maximum energy products of 3--8 MGOe (Mega Gauss Oersted, 1 MGOe = 100/4{pi} kJ/m{sup 3}) are obtained for bonded isotropic forms of REPM with dimensions on the scale of 100 microns and up to 23 MGOe for more dense anisotropic REPM material using higher temperature processing. The utility of miniature precision REPMs is revealed by the demonstration of a miniature multipole brushless DC motor that possesses a pole-anisotropic rotor with dimensions that would otherwise prohibit multipole magnetization using a multipole magnetizing fixture at this scale. Subsequent multipole assembly also leads to miniaturized Halbach arrays, efficient magnetic microactuators, and mechanical spring-like elements which can offset miniaturized mechanical scaling behavior.

  7. U.S.-China Radiological Source Security Project: Continuing And Expanding Bilateral Cooperation

    International Nuclear Information System (INIS)

    Zhu, Zhixuan; Zhou, Qifu; Yang, Yaoyun; Huang, Chaoyun; Lloyd, James; Williams, Adam; Feldman, Alexander; Streeper, Charles; Pope, Noah G.; Hawk, Mark; Rawl, Rick; Howell, Randy A.; Kennedy, Catherine

    2009-01-01

    The successful radiological security cooperation between the U.S. and China to secure at-risk sites near venues of the 2008 Beijing Summer Olympics has led to an expanded bilateral nonproliferation cooperation scope. The U.S. Department of Energy's National Nuclear Security Administration, the Chinese Atomic Energy Authority and the China Ministry of Environmental Protection are continuing joint efforts to secure radiological sources throughout China under the U.S.-China Peaceful Uses of Nuclear Technology (PUNT) Agreement. Joint cooperation activities include physical security upgrades of sites with International Atomic Energy Agency (IAEA) Category 1 radiological sources, packaging, recovery, and storage of high activity transuranic and beta gamma sources, and secure transportation practices for the movement of recovered sources. Expansion of cooperation into numerous provinces within China includes the use of integrated training workshops that will demonstrate methodologies and best practices between U.S. and Chinese radiological source security and recovery experts. The fiscal year 2009 expanded scope of cooperation will be conducted similar to the 2008 Olympic cooperation with the Global Threat Reduction Initiative taking the lead for the U.S., PUNT being the umbrella agreement, and Los Alamos, Sandia, and Oak Ridge National Laboratories operating as technical working groups. This paper outlines the accomplishments of the joint implementation and training efforts to date and discusses the possible impact on future U.S./China cooperation.

  8. U.S.-CHINA RADIOLOGICAL SOURCE SECURITY PROJECT: CONTINUING AND EXPANDING BILATERAL COOPERATION

    Energy Technology Data Exchange (ETDEWEB)

    Zhu, Zhixuan; Zhou, Qifu; Yang, Yaoyun; Huang, Chaoyun; Lloyd, James; Williams, Adam; Feldman, Alexander; Streeper, Charles; Pope, Noah G.; Hawk, Mark; Rawl, Rick; Howell, Randy A.; Kennedy, Catherine

    2009-10-07

    The successful radiological security cooperation between the U.S. and China to secure at-risk sites near venues of the 2008 Beijing Summer Olympics has led to an expanded bilateral nonproliferation cooperation scope. The U.S. Department of Energy’s National Nuclear Security Administration, the Chinese Atomic Energy Authority and the China Ministry of Environmental Protection are continuing joint efforts to secure radiological sources throughout China under the U.S.-China Peaceful Uses of Nuclear Technology (PUNT) Agreement. Joint cooperation activities include physical security upgrades of sites with International Atomic Energy Agency (IAEA) Category 1 radiological sources, packaging, recovery, and storage of high activity transuranic and beta gamma sources, and secure transportation practices for the movement of recovered sources. Expansion of cooperation into numerous provinces within China includes the use of integrated training workshops that will demonstrate methodologies and best practices between U.S. and Chinese radiological source security and recovery experts. The fiscal year 2009 expanded scope of cooperation will be conducted similar to the 2008 Olympic cooperation with the Global Threat Reduction Initiative taking the lead for the U.S., PUNT being the umbrella agreement, and Los Alamos, Sandia, and Oak Ridge National Laboratories operating as technical working groups. This paper outlines the accomplishments of the joint implementation and training efforts to date and discusses the possible impact on future U.S./China cooperation.

  9. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  10. Modeling, simulation and analysis of a securities settlement system:The case of Central Securities Depository of Mexico

    OpenAIRE

    Muñoz, David F; Palacios, Arturo; Lascurain, Miguel

    2012-01-01

    The Instituto para el Depósito de Valores (INDEVAL) is the Central Securities Depository of Mexico. It is the only Mexican institution authorized to perform, in an integrated manner, the activities of safe-keeping, custody, management, clearing, settlement and transfer of securities. In this article, we report the modeling, simulation and analysis of a new Securities Settlement System (SSS) implemented by INDEVAL, as part of a project for the implementation of a safer and more efficient opera...

  11. Modeling, simulation and analysis of a securities settlement system: the case of Central Securities Depository of Mexico

    OpenAIRE

    Muñoz, David F.; Palacios, Arturo; de Lascurain, Miguel

    2012-01-01

    The Instituto para el Depósito de Valores (INDEVAL) is the Central Securities Depository of Mexico. It is the only Mexican institution authorized to perform, in an integrated manner, the activities of safe-keeping, custody, management, clearing, settlement and transfer of securities. In this article, we report the modeling, simulation and analysis of a new Securities Settlement System (SSS) implemented by INDEVAL, as part of a project for the implementation of a safer and more efficient opera...

  12. Public assessment of new surveillance-oriented security technologies: Beyond the trade-off between privacy and security.

    Science.gov (United States)

    Pavone, Vincenzo; Esposti, Sara Degli

    2012-07-01

    As surveillance-oriented security technologies (SOSTs) are considered security enhancing but also privacy infringing, citizens are expected to trade part of their privacy for higher security. Drawing from the PRISE project, this study casts some light on how citizens actually assess SOSTs through a combined analysis of focus groups and survey data. First, the outcomes suggest that people did not assess SOSTs in abstract terms but in relation to the specific institutional and social context of implementation. Second, from this embedded viewpoint, citizens either expressed concern about government's surveillance intentions and considered SOSTs mainly as privacy infringing, or trusted political institutions and believed that SOSTs effectively enhanced their security. None of them, however, seemed to trade privacy for security because concerned citizens saw their privacy being infringed without having their security enhanced, whilst trusting citizens saw their security being increased without their privacy being affected.

  13. Simulating security of supply effects of the Nabucco and South Stream projects for the European natural gas market

    Energy Technology Data Exchange (ETDEWEB)

    Dieckhoener, Caroline

    2010-12-15

    Due to the increasing European import dependency, significant additional natural gas volumes will be required. In addition to the Nord Stream pipeline, the Nabucco and South Stream pipeline are projects planned for the next decade to provide further gas supplies to the European market. As one of the European Union's energy policies' foci is security of supply, the question can be raised if and how these projects contribute to this objective not only in terms of diversification but also in case of supply disruptions such as occurred in 2009 during the Russia-Ukraine gas crisis. This paper discusses the impact of these two major gas import pipeline projects on the South-Eastern Europe gas supply and analyzes their effects on gas flows and marginal cost prices in general and in case of gas supply disruptions via Ukraine in a model-based analysis with the European natural gas infrastructure and dispatch model TIGER. (orig.)

  14. Transmission Line Security Monitor: Final Report

    Energy Technology Data Exchange (ETDEWEB)

    John Svoboda

    2011-04-01

    The Electric Power Transmission Line Security Monitor System Operational Test is a project funded by the Technical Support Working Group (TSWG). TSWG operates under the Combating Terrorism Technical Support Office that functions under the Department of Defense. The Transmission Line Security Monitor System is based on technology developed by Idaho National Laboratory. The technology provides a means for real-time monitoring of physical threats and/or damage to electrical transmission line towers and conductors as well as providing operational parameters to transmission line operators to optimize transmission line operation. The end use is for monitoring long stretches of transmission lines that deliver electrical power from remote generating stations to cities and industry. These transmission lines are generally located in remote transmission line corridors where security infrastructure may not exist. Security and operational sensors in the sensor platform on the conductors take power from the transmission line and relay security and operational information to operations personnel hundreds of miles away without relying on existing infrastructure. Initiated on May 25, 2007, this project resulted in pre-production units tested in realistic operational environments during 2010. A technology licensee, Lindsey Manufacturing of Azusa California, is assisting in design, testing, and ultimately production. The platform was originally designed for a security monitoring mission, but it has been enhanced to include important operational features desired by electrical utilities.

  15. TOWARD HIGHLY SECURE AND AUTONOMIC COMPUTING SYSTEMS: A HIERARCHICAL APPROACH

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Hsien-Hsin S

    2010-05-11

    The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniques and system software for achieving a robust, secure, and reliable computing system toward our goal.

  16. Laboratory Directed Research and Development Program FY98

    Energy Technology Data Exchange (ETDEWEB)

    Hansen, T. [ed.; Chartock, M.

    1999-02-05

    The Ernest Orlando Lawrence Berkeley National Laboratory (LBNL or Berkeley Lab) Laboratory Directed Research and Development Program FY 1998 report is compiled from annual reports submitted by principal investigators following the close of the fiscal year. This report describes the supported projects and summarizes their accomplishments. It constitutes a part of the Laboratory Directed Research and Development (LDRD) program planning and documentation process that includes an annual planning cycle, projection selection, implementation, and review. The LBNL LDRD program is a critical tool for directing the Laboratory's forefront scientific research capabilities toward vital, excellent, and emerging scientific challenges. The program provides the resources for LBNL scientists to make rapid and significant contributions to critical national science and technology problems. The LDRD program also advances LBNL's core competencies, foundations, and scientific capability, and permits exploration of exciting new opportunities. All projects are work in forefront areas of science and technology. Areas eligible for support include the following: Advanced study of hypotheses, concepts, or innovative approaches to scientific or technical problems; Experiments and analyses directed toward ''proof of principle'' or early determination of the utility of new scientific ideas, technical concepts, or devices; and Conception and preliminary technical analyses of experimental facilities or devices.

  17. Rapid Response: D-Wave Effort Debrief Welcome, Logistics

    Energy Technology Data Exchange (ETDEWEB)

    Eidenbenz, Stephan Johannes [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-10-11

    The main objects of this project is to develop a diverse and sizable workforce, community, interest within LANL for D-Wave and Quantum Computing; identify promising application areas/problems for future projects; and complement other D-Wave work at LANL (LDRD DR, ASC).

  18. Collaboration with East African security organisations

    DEFF Research Database (Denmark)

    Nordby, Johannes Riber; Jacobsen, Katja L.

    2012-01-01

    of the concept. At the same time the three organisations represent different constellations of member nations and thus different national interests, and locally they have different legitimacy and political strength. Thus, when choosing collaboration partners for a security project it is not simply a question......When it comes to understanding the concept of security and the way fragile security situations should be solved, the difference is big. While EASF – the East African Standby Force – is a regular military force with a rather traditional, military perception of the concept of security, EAC (East...... African Community) and IGAD (Intergovernmental Authority on Development) have broader perceptions of the concept. According to EAC, security also concerns matters such as policy reform, legislation, education and infrastructure. IGAD considers food security and environmental and economic issues as part...

  19. CRISP. Information Security Models and Their Economics

    International Nuclear Information System (INIS)

    Gustavsson, R.; Mellstrand, P.; Tornqvist, B.

    2005-03-01

    The deliverable D1.6 includes background material and specifications of a CRISP Framework on protection of information assets related to power net management and management of business operations related to energy services. During the project it was discovered by the CRISP consortium that the original description of WP 1.6 was not adequate for the project as such. The main insight was that the original emphasis on cost-benefit analysis of security protection measures was to early to address in the project. This issue is of course crucial in itself but requires new models of consequence analysis that still remains to be developed, especially for the new business models we are investigated in the CRISP project. The updated and approved version of the WP1.6 description, together with the also updated WP2.4 focus on Dependable ICT support of Power Grid Operations constitutes an integrated approach towards dependable and secure future utilities and their business processes. This document (D1.6) is a background to deliverable D2.4. Together they provide a dependability and security framework to the three CRISP experiments in WP3

  20. CC-based Design of Secure Application Systems

    DEFF Research Database (Denmark)

    Sharp, Robin

    2009-01-01

    This paper describes some experiences with using the Common Criteria for Information Security Evaluation as the basis for a design methodology for secure application systems. The examples considered include a Point-of-Sale (POS) system, a wind turbine park monitoring and control system and a secu...... an effective and secure design, starting with the formulation of a Protection Profile and ending with a concrete design, within the project timeframe.......This paper describes some experiences with using the Common Criteria for Information Security Evaluation as the basis for a design methodology for secure application systems. The examples considered include a Point-of-Sale (POS) system, a wind turbine park monitoring and control system and a secure...

  1. Transportation Energy Pathways LDRD.

    Energy Technology Data Exchange (ETDEWEB)

    Barter, Garrett. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Reichmuth, David. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Westbrook, Jessica [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Malczynski, Leonard A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Yoshimura, Ann S. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Peterson, Meghan B. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); West, Todd H. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Manley, Dawn Kataoka [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Guzman, Katherine Dunphy [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Edwards, Donna M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hines, Valerie Ann-Peters [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2012-09-01

    This report presents a system dynamics based model of the supply-demand interactions between the US light-duty vehicle (LDV) fleet, its fuels, and the corresponding primary energy sources through the year 2050. An important capability of our model is the ability to conduct parametric analyses. Others have relied upon scenario-based analysis, where one discrete set of values is assigned to the input variables and used to generate one possible realization of the future. While these scenarios can be illustrative of dominant trends and tradeoffs under certain circumstances, changes in input values or assumptions can have a significant impact on results, especially when output metrics are associated with projections far into the future. This type of uncertainty can be addressed by using a parametric study to examine a range of values for the input variables, offering a richer source of data to an analyst.The parametric analysis featured here focuses on a trade space exploration, with emphasis on factors that influence the adoption rates of electric vehicles (EVs), the reduction of GHG emissions, and the reduction of petroleum consumption within the US LDV fleet. The underlying model emphasizes competition between 13 different types of powertrains, including conventional internal combustion engine (ICE) vehicles, flex-fuel vehicles (FFVs), conventional hybrids(HEVs), plug-in hybrids (PHEVs), and battery electric vehicles(BEVs).We find that many factors contribute to the adoption rates of EVs. These include the pace of technological development for the electric powertrain, battery performance, as well as the efficiency improvements in conventional vehicles. Policy initiatives can also have a dramatic impact on the degree of EV adoption. The consumer effective payback period, in particular, can significantly increase the market penetration rates if extended towards the vehicle lifetime.Widespread EV adoption can have noticeable impact on petroleum consumption and

  2. How to implement security controls for an information security program at CBRN facilities

    International Nuclear Information System (INIS)

    Lenaeus, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.; Glantz, Clifford S.; Landine, Guy P.; Bryant, Janet L.; Lewis, John; Mathers, Gemma; Rodger, Robert; Johnson, Christopher

    2015-01-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  3. How to implement security controls for an information security program at CBRN facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lenaeus, Joseph D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); O' Neil, Lori Ross [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Leitch, Rosalyn M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Glantz, Clifford S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Landine, Guy P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Bryant, Janet L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lewis, John [National Nuclear Lab., Workington (United Kingdom); Mathers, Gemma [National Nuclear Lab., Workington (United Kingdom); Rodger, Robert [National Nuclear Lab., Workington (United Kingdom); Johnson, Christopher [National Nuclear Lab., Workington (United Kingdom)

    2015-12-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  4. Application of the Quality Functional Deployment Method in Mobility Aid Securement System Design

    Science.gov (United States)

    1992-12-01

    The Independent Locking Securement System Project (ILS System Project) is a : successful attempt to respond to the transportation community's need for a : "universal" securement/restraint system that will accommodate most wheeled : mobility aids, inc...

  5. SecureCore Software Architecture: Trusted Path Application (TPA) Requirements

    National Research Council Canada - National Science Library

    Clark, Paul C; Irvine, Cynthia E; Levin, Timothy E; Nguyen, Thuy D; Vidas, Timothy M

    2007-01-01

    .... The purpose of the SecureCore research project is to investigate fundamental architectural features required for the trusted operation of mobile computing devices so the security is built-in, transparent and flexible...

  6. Open Source Software Projects Needing Security Investments

    Science.gov (United States)

    2015-06-19

    modtls, BouncyCastle, gpg, otr, axolotl. 7. Static analyzers: Clang, Frama-C. 8. Nginx. 9. OpenVPN . It was noted that the funding model may be similar...to OpenSSL, where consulting funds the company. It was also noted that OpenVPN needs to correctly use OpenSSL in order to be secure, so focusing on...Dovecot 4. Other high-impact network services: OpenSSH, OpenVPN , BIND, ISC DHCP, University of Delaware NTPD 5. Core infrastructure data parsers

  7. Communication security in open health care networks.

    Science.gov (United States)

    Blobel, B; Pharow, P; Engel, K; Spiegel, V; Krohn, R

    1999-01-01

    Fulfilling the shared care paradigm, health care networks providing open systems' interoperability in health care are needed. Such communicating and co-operating health information systems, dealing with sensitive personal medical information across organisational, regional, national or even international boundaries, require appropriate security solutions. Based on the generic security model, within the European MEDSEC project an open approach for secure EDI like HL7, EDIFACT, XDT or XML has been developed. The consideration includes both securing the message in an unsecure network and the transport of the unprotected information via secure channels (SSL, TLS etc.). Regarding EDI, an open and widely usable security solution has been specified and practically implemented for the examples of secure mailing and secure file transfer (FTP) via wrapping the sensitive information expressed by the corresponding protocols. The results are currently prepared for standardisation.

  8. Recycled Uranium Mass Balance Project Y-12 National Security Complex Site Report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-12-01

    This report has been prepared to summarize the findings of the Y-12 National Security Complex (Y-12 Complex) Mass Balance Project and to support preparation of associated U. S. Department of Energy (DOE) site reports. The project was conducted in support of DOE efforts to assess the potential for health and environmental issues resulting from the presence of transuranic (TRU) elements and fission products in recycled uranium (RU) processed by DOE and its predecessor agencies. The United States government used uranium in fission reactors to produce plutonium and tritium for nuclear weapons production. Because uranium was considered scarce relative to demand when these operations began almost 50 years ago, the spent fuel from U.S. fission reactors was processed to recover uranium for recycling. The estimated mass balance for highly enriched RU, which is of most concern for worker exposure and is the primary focus of this project, is summarized in a table. A discrepancy in the mass balance between receipts and shipments (plus inventory and waste) reflects an inability to precisely distinguish between RU and non-RU shipments and receipts involving the Y-12 Complex and Savannah River. Shipments of fresh fuel (non-RU) and sweetener (also non-RU) were made from the Y-12 Complex to Savannah River along with RU shipments. The only way to distinguish between these RU and non-RU streams using available records is by enrichment level. Shipments of {le}90% enrichment were assumed to be RU. Shipments of >90% enrichment were assumed to be non-RU fresh fuel or sweetener. This methodology using enrichment level to distinguish between RU and non-RU results in good estimates of RU flows that are reasonably consistent with Savannah River estimates. Although this is the best available means of distinguishing RU streams, this method does leave a difference of approximately 17.3 MTU between receipts and shipments. Slightly depleted RU streams received by the Y-12 Complex from ORGDP and

  9. Perspectives on Energy Security

    International Nuclear Information System (INIS)

    Carlsson-Kanyama, Annika; Holmgren, Aake J.; Joensson, Thomas; Larsson, Robert L.

    2007-05-01

    A common notion of 'Energy Security' is that it includes access to energy resources without risking the the survival of the state. 'Security of supply' is most often the concept emphasized in the political discourse on energy security and it includes both production as well as secure and safe delivery of energy to the end consumers. Another aspect of energy security is the need for reducing energy consumption by improving energy efficiency. In this report, eight chapters covering these and other perspectives on energy security are presented. Six of the chapters deal with the supply perspective. Included topics cover power politics and geopolitical perspectives regarding large infrastructure projects and the ambitions of the EU in this regard. Further, methods and approaches for conducting risk analyses of electricity supply systems as well as for improving the security of digital control systems are discussed. As climate change will affect the supply and distribution of energy, one chapter presents an overview of this topic. The consumption perspective is discussed against the backdrop of research about household consumption practices and the role of climate change for future consumption levels. Finally, the role of armed forces as a large energy users is touched upon, as well as how so-called 'future studies' have dealt with energy as a topic

  10. Cloud Computing Security in Openstack Architecture: General Overview

    Directory of Open Access Journals (Sweden)

    Gleb Igorevich Shakulo

    2015-10-01

    Full Text Available The subject of article is cloud computing security. Article begins with author analyzing cloud computing advantages and disadvantages, factors of growth, both positive and negative. Among latter, security is deemed one of the most prominent. Furthermore, author takes architecture of OpenStack project as an example for study: describes its essential components and their interconnection. As conclusion, author raises series of questions as possible areas of further research to resolve security concerns, thus making cloud computing more secure technology.

  11. Science, technology and engineering at LANL

    Energy Technology Data Exchange (ETDEWEB)

    Mercer-smith, Janet A [Los Alamos National Laboratory; Wallace, Terry C [Los Alamos National Laboratory

    2011-01-06

    The Laboratory provides science solution to the mission areas of nuclear deterrence, global security, and energy security. The capabilities support the Laboratory's vision as the premier national security science laboratory. The strength of LANL's science is at the core of the Laboratory. The Laboratory addresses important science questions for stockpile stewardship, emerging threats, and energy. The underpinning science vitality to support mission areas is supported through the Post Doc program, the fundamental science program in LDRD, collaborations fostered through the Institutes, and the LANL user facilities. LANL fosters the strategy of Science that Matters through investments, people, and facilities.

  12. The CAMI Project - Weather and Climate Services for Caribbean Food Security

    Science.gov (United States)

    Trotman, Adrian; Van Meerbeeck, Cedric

    2013-04-01

    Food security is major focus of Caribbean governments, with production being of particular concern. For the past three decades, Caribbean agriculture has been declining in relative importance, both in terms of its contribution to GDP and its share of the labour force. One of the problems Caribbean agriculture faces is the destructive impacts from weather and climate extremes. These include flood, drought, extreme temperatures, and strong winds from tropical cyclones. Other potential disasters, such as from pests and diseases attacks, are also weather and climate driven. These make weather and climate information critically important to decision-making in agriculture in the Caribbean region. In an effort to help reduce weather and climate related risks to the food security sector, The Caribbean Institute for Meteorology and Hydrology, along with its partners the Caribbean Agricultural Research and Development Institute, the World Meteorological Organization (WMO) and ten National Meteorological Services from within the Caribbean Community launched and implemented the Caribbean Agrometeorological Initiative (CAMI). From 2010 to 2013, CAMI set out to provide relevant information to farmers, and the industry in general, for decision and policy making. The project is funded by the European Union through the Science and Technology Programme of the African, Caribbean and Pacific Group of Countries' (ACP). The overarching objective of CAMI was to increase and sustain agricultural productivity at the farm level in the Caribbean region through improved applications of weather and climate information, using an integrated and coordinated approach. Currently, this is done through (i) provision of relevant climate information appropriately disseminated, (ii) predictions on seasonal rainfall and temperature, (iii) support for improved irrigation management, (iv) the development of strategically selected weather-driven pest and disease models, (v) use of crop simulation models

  13. Optimal recovery sequencing for critical infrastructure resilience assessment.

    Energy Technology Data Exchange (ETDEWEB)

    Vugrin, Eric D.; Brown, Nathanael J. K.; Turnquist, Mark Alan (Cornell University, Ithaca, NY)

    2010-09-01

    Critical infrastructure resilience has become a national priority for the U. S. Department of Homeland Security. System resilience has been studied for several decades in many different disciplines, but no standards or unifying methods exist for critical infrastructure resilience analysis. This report documents the results of a late-start Laboratory Directed Research and Development (LDRD) project that investigated the identification of optimal recovery strategies that maximize resilience. To this goal, we formulate a bi-level optimization problem for infrastructure network models. In the 'inner' problem, we solve for network flows, and we use the 'outer' problem to identify the optimal recovery modes and sequences. We draw from the literature of multi-mode project scheduling problems to create an effective solution strategy for the resilience optimization model. We demonstrate the application of this approach to a set of network models, including a national railroad model and a supply chain for Army munitions production.

  14. Genetic engineering of cyanobacteria as biodiesel feedstock.

    Energy Technology Data Exchange (ETDEWEB)

    Ruffing, Anne.; Trahan, Christine Alexandra; Jones, Howland D. T.

    2013-01-01

    Algal biofuels are a renewable energy source with the potential to replace conventional petroleum-based fuels, while simultaneously reducing greenhouse gas emissions. The economic feasibility of commercial algal fuel production, however, is limited by low productivity of the natural algal strains. The project described in this SAND report addresses this low algal productivity by genetically engineering cyanobacteria (i.e. blue-green algae) to produce free fatty acids as fuel precursors. The engineered strains were characterized using Sandias unique imaging capabilities along with cutting-edge RNA-seq technology. These tools are applied to identify additional genetic targets for improving fuel production in cyanobacteria. This proof-of-concept study demonstrates successful fuel production from engineered cyanobacteria, identifies potential limitations, and investigates several strategies to overcome these limitations. This project was funded from FY10-FY13 through the President Harry S. Truman Fellowship in National Security Science and Engineering, a program sponsored by the LDRD office at Sandia National Laboratories.

  15. Academic Training Lecture Regular Programme: Computer Security - Introduction to information and computer security (1/4)

    CERN Multimedia

    2012-01-01

    Computer Security: Introduction to information and computer security (1/4), by Sebastian Lopienski (CERN).   Monday, 21 May, 2012 from 11:00 to 12:00 (Europe/Zurich) at CERN ( 31-3-004 - IT Auditorium ) Sebastian Lopienski is CERN's Deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support services hosted in the CERN Computer Centre; providing Central CVS Service for software projects at CERN; and development of applications for accelerator controls in Java. He graduated from the University of Warsaw (MSc in Computer Science) in 2002, and earned an MBA degree at the Enterprise Administration Institute in Ai...

  16. Information security and business continuity in Tecnatom

    International Nuclear Information System (INIS)

    Fernandez de Miguel, C.

    2013-01-01

    Information security is a key issue for companies that manage and process nuclear business related data. Availability of information systems as well as new data exchange facilities through simple and broad communication networks are the pillars of cooperation between different organizations, generating significant savings in costs and expanding the capacity to minimeze them. In this regard, information security is one of the major challenges for IT departments. This articles presents Tecnatoms experience in the Information Security Management Implementation project. Over several years, since 2004, the information security management has been developed and consolidated as an ongoing and horizontal process. (Author)

  17. Ultra-secure RF Tags for Safeguards and Security - SBIR Phase II Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Twogood, Richard E [Dirac Solutions Inc., Pleasanton, CA (United States)

    2015-01-27

    This is the Final Report for the DOE Phase II SBIR project “Ultra-secure RF Tags for Safeguards and Security.” The topics covered herein include technical progress made, progress against the planned milestones and deliverables, project outcomes (results, collaborations, intellectual property, etc.), and a discussion on future expectations of deployment and impacts of the results of this work. In brief, all planned work for the project was successfully completed, on or ahead of schedule and on budget. The major accomplishment was the successful development of a very advanced passive ultra-secure RFID tag system with combined security features unmatched by any commercially available ones. These tags have high-level dynamic encrypted authentication, a novel tamper-proofing mechanism, system software including graphical user interfaces and networking, and integration with a fiber-optic seal mechanism. This is all accomplished passively (with no battery) by incorporating sophisticated hardware in the tag which harvests the energy from the RFID readers that are interrogating the tag. Based on initial feedback (and deployments) at DOE’s Lawrence Livermore National Laboratory (LLNL), it is anticipated these tags and their offspring will meet DOE and international community needs for highly secure RFID systems. Beyond the accomplishment of those original objectives for the ultra-secure RF tags, major new spin-off thrusts from the original work were identified and successfully pursued with the cognizance of the DOE sponsor office. In particular, new classes of less sophisticated RFID tags were developed whose lineage derives from the core R&D thrusts of this SBIR. These RF “tag variants” have some, but not necessarily all, of the advanced characteristics described above and can therefore be less expensive and meet far wider markets. With customer pull from the DOE and its national laboratories, new RFID tags and systems (including custom readers and software) for

  18. Exe-Guard Project

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Rhett [Schweitzer Engineering Lab., Inc., Pullman, WA (United States); Marshall, Tim [Dominion Virginia Power, Richmond, VA (United States); Chavez, Adrian [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Bratus, Sergey [Dartmouth College, Hanover, NH (United States)

    2016-01-30

    The exe-Guard Project is an alliance between Dominion Virginia Power (DVP), Sandia National Laboratories (SNL), Dartmouth University, and Schweitzer Engineering Laboratories (SEL). SEL is primary recipient on this project. The exe-Guard project was selected for award under DE-FOA-0000359 with CFDA number 81.122 to address Topic Area of Interest 4: Hardened platforms and Systems. The exe-Guard project developed an antivirus solution for control system embedded devices to prevent the execution of unauthorized code and maintain settings and configuration integrity. This project created a white list antivirus solution for control systems capable of running on embedded Linux® operating systems. White list antivirus methods allow only credible programs to run through the use of digital signatures and hash functions. Once a system’s secure state is baselined, white list antivirus software denies deviations from that state because of the installation of malicious code as this changes hash results. Black list antivirus software has been effective in traditional IT environments but has negative implications for control systems. Black list antivirus uses pattern matching and behavioral analysis to identify system threats while relying on regular updates to the signature file and recurrent system scanning. Black list antivirus is vulnerable to zero day exploits which have not yet been incorporated into a signature file update. System scans hamper the performance of high availability applications, as revealed in NIST special publication 1058 which summarizes the impact of blacklist antivirus on control systems: Manual or “on-demand” scanning has a major effect on control processes in that they take CPU time needed by the control process (Sometimes close to 100% of CPU time). Minimizing the antivirus software throttle setting will reduce but not eliminate this effect. Signature updates can also take up to 100% of CPU time, but for a much shorter period than a typical

  19. Rapidly Deployable Security System Final Report CRADA No. TC-2030-01

    Energy Technology Data Exchange (ETDEWEB)

    Kohlhepp, V. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Whiteman, B. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); McKibben, M. T. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-09-28

    The ultimate objective of the LEADER and LLNL strategic partnership was to develop and commercialize_a security-based system product and platform for the use in protecting the substantial physical and economic assets of the government and commerce of the United States. The primary goal of this project was to integrate video surveillance hardware developed by LLNL with a security software backbone developed by LEADER. Upon completion of the project, a prototype hardware/software security system that is highly scalable was to be demonstrated.

  20. Argonne National Laboratory: Laboratory Directed Research and Development FY 1993 program activities. Annual report

    Energy Technology Data Exchange (ETDEWEB)

    None

    1993-12-23

    The purposes of Argonne`s Laboratory Directed Research and Development (LDRD) Program are to encourage the development of novel concepts, enhance the Laboratory`s R&D capabilities, and further the development of its strategic initiatives. Projects are selected from proposals for creative and innovative R&D studies which are not yet eligible for timely support through normal programmatic channels. Among the aims of the projects supported by the Program are establishment of engineering ``proof-of-principle`` assessment of design feasibility for prospective facilities; development of an instrumental prototype, method, or system; or discovery in fundamental science. Several of these projects are closely associated with major strategic thrusts of the Laboratory as described in Argonne`s Five Year Institutional Plan, although the scientific implications of the achieved results extend well beyond Laboratory plans and objectives. The projects supported by the Program are distributed across the major programmatic areas at Argonne as indicated in the Laboratory LDRD Plan for FY 1993.

  1. SECOND1. Security concept for DER (Distributed Energy Resources). Final report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    Secure communication is becoming increasingly more relevant in a power system where there is a high impact of distributed energy resources (DER). The purpose of this project has been to analyse and develop a proof of concept implementation for a security concept that can be used in a power system with a high degree of decentralized production and with many actors (BRP, DSO, TSO, utilities, retailers) in an unbundled market. One way to maintain flexibility in the communication system for the power grid is to assign access roles to specific operations and not just to a network or server. Security then becomes a matter of verification, namely that an applicant holds a role with privileges to perform the action applied for. The SECOND1 project has investigated various forms of role based access control (RBAC) as well as the underlying security mechanism identification and verification of the actor identity. The project analysed the needs for communication between energy operators and match these needs with a design for secure role based access control. (LN)

  2. Danish Interests in Regional Security Institutions in East Africa

    DEFF Research Database (Denmark)

    Nordby, Johannes Riber; Jacobsen, Katja

    2013-01-01

    For the past decade, peace and security in East Africa have gained increasing focus internationally. The region has experienced armed conflicts, civil wars, rebellion, drought and famine. Yet, at the same time, there is an emerging ambition among a number of African states to handle security issues...... on the continent independently. Such ambitions have fostered a variety of military capacity building programmes supported by external donors. The present report explores how up until now Denmark has sought to contribute to strengthening political and military security in East Africa. This has mainly been done...... through capacity building projects anchored in different regional security institutions. The report illuminates some of the risks that such capacity building projects might confront. Furthermore the report points out some of the challenges that exist in the cooperation between the Ministry of Foreign...

  3. The Relationship between Media Consumption and Feeling of Social Security

    OpenAIRE

    Bijan khajeNoori; Mehdi Kaveh

    2013-01-01

    IntroductionThe concept of social security and a Feeling of security and the citizens, as a key element in achieving the projected, is important Sociologists and criminologist shave always paid special attention has been sought. Study of the factors influencing the feeling of security, can increase the feeling of security is work. Also enhance citizens' feeling of security and welfare of the citizens and to accept responsibility and commitment will do. The widespread use of social media in re...

  4. Energy security and sustainability in Northeast Asia

    International Nuclear Information System (INIS)

    Hippel, David von; Suzuki, Tatsujiro; Williams, James H.; Savage, Timothy; Hayes, Peter

    2011-01-01

    'Energy Security' has typically, to those involved in making energy policy, meant mostly securing access to oil and other fossil fuels. With increasingly global, diverse energy markets, however, and increasingly transnational problems resulting from energy transformation and use, old energy security rationales are less salient, and other issues, including climate change and other environmental, economic, and international considerations are becoming increasingly important. As a consequence, a more comprehensive operating definition of 'Energy Security' is needed, along with a workable framework for analysis of which future energy paths or scenarios are likely to yield greater Energy Security in a broader, more comprehensive sense. Work done as a part of the Nautilus Institute's 'Pacific Asia Regional Energy Security' (PARES) project developed a broader definition of Energy Security, and described an analytical framework designed to help to compare the energy security characteristics - both positive and negative - of different quantitative energy paths as developed using software tools such as the LEAP (Long-range Energy Alternatives Planning) system.

  5. Integrating Programming Language and Operating System Information Security Mechanisms

    Science.gov (United States)

    2016-08-31

    suggestions for reducing the burden, to the Department of Defense, Executive Service Directorate (0704-0188). Respondents should be aware that...improve the precision of security enforcement, and to provide greater assurance of information security. This grant focuses on two key projects: language...based control of authority; and formal guarantees for the correctness of audit information. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17

  6. Development of a security-by-design handbook

    International Nuclear Information System (INIS)

    Olson, David L.; Snell, Mark Kamerer; Iida, Toru; Ochiai, Kazuya; Tanuma, Koji

    2010-01-01

    There is an increasing awareness that efficient and effective nuclear facility design is best achieved when requirements from the 3S disciplines Safety, Safeguards, and Security - are balanced and intrinsic to the facility design. This can be achieved when policy, processes, methods, and technologies are understood and applied in these areas during all phases of the design process. For the purposes of this paper, Security-by-design will be defined as the system level incorporation of the physical protection system (PPS) into a new or retrofitted nuclear power plant (NPP) or nuclear facility (NF) resulting in intrinsic security. Security-by-design can also be viewed as a framework to achieve robust and durable security systems. This paper reports on work performed to date to create a Security-by-Design Handbook, under a bilateral agreement between the United States and Japan, specifically, a review of physical protection principles and best practices, and a decommissioning to better understand where these principles and practices can be applied. This paper describes physical protection principles and best practices to achieve security-by- design that were gathered from International, Japanese, and U.S. sources. Principles are included for achieving security early in the design process where security requirements are typically less costly and easier to incorporate. The paper then describes a generic design process that covers the entire facility lifecycle from scoping and planning of the project to decommissioning and decontamination. Early design process phases, such as conceptual design, offer opportunities to add security features intrinsic to the facility design itself. Later phases, including design engineering and construction, are important for properly integrating security features into a coherent design and for planning for and assuring the proper performance of the security system during the operation and decommissioning of the facility. The paper also

  7. Secured web-based video repository for multicenter studies.

    Science.gov (United States)

    Yan, Ling; Hicks, Matt; Winslow, Korey; Comella, Cynthia; Ludlow, Christy; Jinnah, H A; Rosen, Ami R; Wright, Laura; Galpern, Wendy R; Perlmutter, Joel S

    2015-04-01

    We developed a novel secured web-based dystonia video repository for the Dystonia Coalition, part of the Rare Disease Clinical Research network funded by the Office of Rare Diseases Research and the National Institute of Neurological Disorders and Stroke. A critical component of phenotypic data collection for all projects of the Dystonia Coalition includes a standardized video of each participant. We now describe our method for collecting, serving and securing these videos that is widely applicable to other studies. Each recruiting site uploads standardized videos to a centralized secured server for processing to permit website posting. The streaming technology used to view the videos from the website does not allow downloading of video files. With appropriate institutional review board approval and agreement with the hosting institution, users can search and view selected videos on the website using customizable, permissions-based access that maintains security yet facilitates research and quality control. This approach provides a convenient platform for researchers across institutions to evaluate and analyze shared video data. We have applied this methodology for quality control, confirmation of diagnoses, validation of rating scales, and implementation of new research projects. We believe our system can be a model for similar projects that require access to common video resources. Copyright © 2015 Elsevier Ltd. All rights reserved.

  8. Coast Guard Enterprise Project Management (CG-EPM)

    Data.gov (United States)

    Department of Homeland Security — CG-EPM provides the following capabilities: A Project Center, Portfolio Analysis Tools, Project Planning Tool, Web-based Project Plan Updater, Project Collaboration...

  9. Significance of Hemispheric Security for Mexico

    Science.gov (United States)

    2003-04-07

    La Seguridad Internacional, la Nueva Geopolitica Continental y Mexico ,” Seminario Internacional sobre Misiones de Paz, Seguridad y Defensa, Rio de...USAWC STRATEGY RESEARCH PROJECT SIGNIFICANCE OF HEMISPHERIC SECURITY FOR MEXICO by LTC Enrique Garcia Jaramillo Cavalry, Mexican Army COL Joseph R...xx-xx-2002 to xx-xx-2003 4. TITLE AND SUBTITLE Significance of Hemispheric Security for Mexico Unclassified 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c

  10. Cloud Computing Security in Openstack Architecture: General Overview

    OpenAIRE

    Gleb Igorevich Shakulo

    2015-01-01

    The subject of article is cloud computing security. Article begins with author analyzing cloud computing advantages and disadvantages, factors of growth, both positive and negative. Among latter, security is deemed one of the most prominent. Furthermore, author takes architecture of OpenStack project as an example for study: describes its essential components and their interconnection. As conclusion, author raises series of questions as possible areas of further research to resolve security c...

  11. Advanced Interface for Tactical Security (AITS) Problem Analysis and Concept Definition

    National Research Council Canada - National Science Library

    Murray, S

    1999-01-01

    The Advanced Interface for Tactical Security (AITS) project was initiated to improve the task performance of security forces through technology and design improvements to information display systems...

  12. EEG analyses with SOBI.

    Energy Technology Data Exchange (ETDEWEB)

    Glickman, Matthew R.; Tang, Akaysha (University of New Mexico, Albuquerque, NM)

    2009-02-01

    The motivating vision behind Sandia's MENTOR/PAL LDRD project has been that of systems which use real-time psychophysiological data to support and enhance human performance, both individually and of groups. Relevant and significant psychophysiological data being a necessary prerequisite to such systems, this LDRD has focused on identifying and refining such signals. The project has focused in particular on EEG (electroencephalogram) data as a promising candidate signal because it (potentially) provides a broad window on brain activity with relatively low cost and logistical constraints. We report here on two analyses performed on EEG data collected in this project using the SOBI (Second Order Blind Identification) algorithm to identify two independent sources of brain activity: one in the frontal lobe and one in the occipital. The first study looks at directional influences between the two components, while the second study looks at inferring gender based upon the frontal component.

  13. Energy Security and Sub-Saharan Africa

    Directory of Open Access Journals (Sweden)

    Emily Meierding

    2013-02-01

    Full Text Available Published by Palgrave MacmillanOver the last decade the topic of energy security has reappeared on global policy agendas. Most analyses of international energy geopolitics examine the interests and behaviour of powerful energy-importing countries like the US and China. This chapter begins by examining foreign powers’ expanded exploitation of oil and uranium resources in Sub-Saharan Africa. It goes on to examine how energy importers’ efforts to enhance their energy security through Africa are impacting energy security within Africa. It assesses Sub-Saharan states’ attempts to increase consumption of local oil and uranium reserves. Observing the constraints on these efforts, it then outlines some alternative strategies that have been employed to enhance African energy security. It concludes that, while local community-based development projects have improved the well-being of many households, they are not a sufficient guarantor of energy security. Inadequate petroleum access, in particular, remains a development challenge. Foreign powers’ efforts to increase their oil security are undermining the energy security of Sub-Saharan African citizens.

  14. SLIGHTLY IRRADIATED FUEL (SIF) INTERIM DISPOSITION PROJECT

    International Nuclear Information System (INIS)

    Norton, S.H.

    2010-01-01

    CH2M HILL Plateau Remediation Company (CH2M HILL PRC) is proud to submit the Slightly Irradiated Fuel (SIF) Interim Disposition Project for consideration by the Project Management Institute as Project of the Year for 2010. The SIF Project was a set of six interrelated sub-projects that delivered unique stand-alone outcomes, which, when integrated, provided a comprehensive and compliant system for storing high risk special nuclear materials. The scope of the six sub-projects included the design, construction, testing, and turnover of the facilities and equipment, which would provide safe, secure, and compliant Special Nuclear Material (SNM) storage capabilities for the SIF material. The project encompassed a broad range of activities, including the following: Five buildings/structures removed, relocated, or built; Two buildings renovated; Structural barriers, fencing, and heavy gates installed; New roadways and parking lots built; Multiple detection and assessment systems installed; New and expanded communication systems developed; Multimedia recording devices added; and A new control room to monitor all materials and systems built. Project challenges were numerous and included the following: An aggressive 17-month schedule to support the high-profile Plutonium Finishing Plant (PFP) decommissioning; Company/contractor changeovers that affected each and every project team member; Project requirements that continually evolved during design and construction due to the performance- and outcome-based nature ofthe security objectives; and Restrictions imposed on all communications due to the sensitive nature of the projects In spite of the significant challenges, the project was delivered on schedule and $2 million under budget, which became a special source of pride that bonded the team. For years, the SIF had been stored at the central Hanford PFP. Because of the weapons-grade piutonium produced and stored there, the PFP had some of the tightest security on the Hanford

  15. SLIGHTLY IRRADIATED FUEL (SIF) INTERIM DISPOSITION PROJECT

    Energy Technology Data Exchange (ETDEWEB)

    NORTON SH

    2010-02-23

    CH2M HILL Plateau Remediation Company (CH2M HILL PRC) is proud to submit the Slightly Irradiated Fuel (SIF) Interim Disposition Project for consideration by the Project Management Institute as Project of the Year for 2010. The SIF Project was a set of six interrelated sub-projects that delivered unique stand-alone outcomes, which, when integrated, provided a comprehensive and compliant system for storing high risk special nuclear materials. The scope of the six sub-projects included the design, construction, testing, and turnover of the facilities and equipment, which would provide safe, secure, and compliant Special Nuclear Material (SNM) storage capabilities for the SIF material. The project encompassed a broad range of activities, including the following: Five buildings/structures removed, relocated, or built; Two buildings renovated; Structural barriers, fencing, and heavy gates installed; New roadways and parking lots built; Multiple detection and assessment systems installed; New and expanded communication systems developed; Multimedia recording devices added; and A new control room to monitor all materials and systems built. Project challenges were numerous and included the following: An aggressive 17-month schedule to support the high-profile Plutonium Finishing Plant (PFP) decommissioning; Company/contractor changeovers that affected each and every project team member; Project requirements that continually evolved during design and construction due to the performance- and outcome-based nature ofthe security objectives; and Restrictions imposed on all communications due to the sensitive nature of the projects In spite of the significant challenges, the project was delivered on schedule and $2 million under budget, which became a special source of pride that bonded the team. For years, the SIF had been stored at the central Hanford PFP. Because of the weapons-grade piutonium produced and stored there, the PFP had some of the tightest security on the Hanford

  16. SECURITY STRATEGIES OF MEMBER STATES OF THE EUROPEAN UNION FROM THE LISBON TREATY AND THE EUROPEAN SECURITY STRATEGY

    Directory of Open Access Journals (Sweden)

    PABLO RIVAS PARDO

    2017-09-01

    in mind, it is possible to study the variability of the Security Strategy in relation to four strategic guidelines: strategic self-perception, the necessity to tune these postulates with the common objectives of the European Union, the statement of threats and finally the actions projected by these strategies to face the changing environment of international security. This variability will seek the fact of the existence or nonexistence of tuning and consistency between the Security Strategies and the community positions in the matter of security and defense. The selected countries are those who have published their documents after the signing of the Treaty of Lisbon and the publication of the European Security Strategy, in other words, after2009: Austria, Bulgaria, Slovenia, Spain, Estonia, Holland, Hungary, Lithuania, UK and the Czech Republic.

  17. Watchdog Project

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Rhett [Schweitzer Engineering Laboratories, Inc., Pullman, WA (United States); Campbell, Jack [CenterPoint Energy Houston Electric, TX (United States); Hadley, Mark [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-12-30

    The Watchdog Project completed 100% of the project Statement of Project Objective (SOPO). The Watchdog project was a very aggressive project looking to accomplish commercialization of technology that had never been commercialized, as a result it took six years to complete not the original three that were planned. No additional federal funds were requested from the original proposal and SEL contributed the additional cost share required to complete the project. The result of the Watchdog Project is the world’s first industrial rated Software Defined Network (SDN) switch commercially available. This technology achieved the SOPOO and DOE Roadmap goals to have strong network access control, improve reliability and network performance, and give the asset owner the ability to minimize attack surface before and during an attack. The Watchdog project is an alliance between CenterPoint Energy Houston Electric, Pacific Northwest National Laboratories (PNNL), and Schweitzer Engineering Laboratories, Inc. (SEL). SEL is the world’s leader in microprocessor-based electronic equipment for protecting electric power systems. PNNL performs basic and applied research to deliver energy, environmental, and national security for our nation. CenterPoint Energy is the third largest publicly traded natural gas delivery company in the U.S and third largest combined electricity and natural gas delivery company. The Watchdog Project efforts were combined with the SDN Project efforts to produce the entire SDN system solution for the critical infrastructure. The Watchdog project addresses Topic Area of Interest 5: Secure Communications, for the DEFOA- 0000359 by protecting the control system local area network itself and the communications coming from and going to the electronic devices on the local network. Local area networks usually are not routed and have little or no filtering capabilities. Combine this with the fact control system protocols are designed with inherent trust the control

  18. Student Experiential Opportunities in National Security Careers

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private and public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.

  19. Integrated project support environments the ASPECT project

    CERN Document Server

    Brown, Alan W

    1991-01-01

    A major part of software engineering developments involve the use of computing tools which facilitate the management, maintenance, security, and building of long-scale software engineer projects. Consequently, there have been a proliferation of CASE tools and IPSES. This book looks at IPSES in general and the ASPECT project in particular, providing design and implementation details, as well as locating ASPECT in IPSE developments.Survey of integrated project support environments for more efficient software engineering**Description of a large scale IPSE--ASPECT**Evaluation of formal methods in

  20. Teaching Network Security with IP Darkspace Data

    Science.gov (United States)

    Zseby, Tanja; Iglesias Vázquez, Félix; King, Alistair; Claffy, K. C.

    2016-01-01

    This paper presents a network security laboratory project for teaching network traffic anomaly detection methods to electrical engineering students. The project design follows a research-oriented teaching principle, enabling students to make their own discoveries in real network traffic, using data captured from a large IP darkspace monitor…

  1. Laboratory Directed Research and Development Annual Report for 2009

    International Nuclear Information System (INIS)

    Hughes, Pamela J.

    2010-01-01

    This report documents progress made on all LDRD-funded projects during fiscal year 2009. As a US Department of Energy (DOE) Office of Science (SC) national laboratory, Pacific Northwest National Laboratory (PNNL) has an enduring mission to bring molecular and environmental sciences and engineering strengths to bear on DOE missions and national needs. Their vision is to be recognized worldwide and valued nationally for leadership in accelerating the discovery and deployment of solutions to challenges in energy, national security, and the environment. To achieve this mission and vision, they provide distinctive, world-leading science and technology in: (1) the design and scalable synthesis of materials and chemicals; (2) climate change science and emissions management; (3) efficient and secure electricity management from generation to end use; and (4) signature discovery and exploitation for threat detection and reduction. PNNL leadership also extends to operating EMSL: the Environmental Molecular Sciences Laboratory, a national scientific user facility dedicated to providing itnegrated experimental and computational resources for discovery and technological innovation in the environmental molecular sciences.

  2. Laboratory Directed Research and Development Annual Report for 2009

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Pamela J.

    2010-03-31

    This report documents progress made on all LDRD-funded projects during fiscal year 2009. As a US Department of Energy (DOE) Office of Science (SC) national laboratory, Pacific Northwest National Laboratory (PNNL) has an enduring mission to bring molecular and environmental sciences and engineering strengths to bear on DOE missions and national needs. Their vision is to be recognized worldwide and valued nationally for leadership in accelerating the discovery and deployment of solutions to challenges in energy, national security, and the environment. To achieve this mission and vision, they provide distinctive, world-leading science and technology in: (1) the design and scalable synthesis of materials and chemicals; (2) climate change science and emissions management; (3) efficient and secure electricity management from generation to end use; and (4) signature discovery and exploitation for threat detection and reduction. PNNL leadership also extends to operating EMSL: the Environmental Molecular Sciences Laboratory, a national scientific user facility dedicated to providing itnegrated experimental and computational resources for discovery and technological innovation in the environmental molecular sciences.

  3. Global Food Security in a Changing Climate: Considerations and Projections

    Science.gov (United States)

    Walsh, M. K.; Brown, M. E.; Backlund, P. W.; Antle, J. M.; Carr, E. R.; Easterling, W. E.; Funk, C. C.; Murray, A.; Ngugi, M.; Barrett, C. B.; Ingram, J. S. I.; Dancheck, V.; O'Neill, B. C.; Tebaldi, C.; Mata, T.; Ojima, D. S.; Grace, K.; Jiang, H.; Bellemare, M.; Attavanich, W.; Ammann, C. M.; Maletta, H.

    2015-12-01

    Global food security is an elusive challenge and important policy focus from the community to the globe. Food is provisioned through food systems that may be simple or labyrinthine, yet each has vulnerabilities to climate change through its effects on food production, transportation, storage, and other integral food system activities. At the same time, the future of food systems is sensitive to socioeconomic trajectories determined by choices made outside of the food system, itself. Constrictions for any reason can lead to decreased food availability, access, utilization, or stability - that is, to diminished food security. Possible changes in trade and other U.S. relationships to the rest of the world under changing conditions to the end of the century are considered through integrated assessment modelling under a range of emissions scenarios. Climate change is likely to diminish continued progress on global food security through production disruptions leading to local availability limitations and price increases, interrupted transport conduits, and diminished food safety, among other causes. In the near term, some high-latitude production export regions may benefit from changes in climate. The types and price of food imports is likely to change, as are export demands, affecting U.S. consumers and producers. Demands placed on foreign assistance programs may increase, as may demand for advanced technologies. Adaptation across the food system has great potential to manage climate change effects on food security, and the complexity of the food system offers multiple potential points of intervention for decision makers at every level. However, effective adaptation is subject to highly localized conditions and socioeconomic factors, and the technical feasibility of an adaptive intervention is not necessarily a guarantee of its application if it is unaffordable or does not provide benefits within a relatively short time frame.

  4. Martin Continues His Homeland Security Profession with New UASI Position

    OpenAIRE

    Issvoran, Heather

    2014-01-01

    Bruce Martin has found a second act in homeland security. The fire services veteran and college educator is now Project Manager of the Bay Area Urban Areas Security Initiative (UASI), overseeing its Chemical, Biological, Radiological, Nuclear Explosives (CBRNE) program. Martin is a 2010 master’s degree graduate of the Naval Postgraduate School Center for Homeland Defense and Security.

  5. Global Security Program Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    Bretzke, John C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-03-25

    The Global Security Directorate mission is to protect against proliferant and unconventional nuclear threats –regardless of origin - and emerging new threats. This mission is accomplished as the Los Alamos National Laboratory staff completes projects for our numerous sponsors. The purpose of this Program Management Plan is to establish and clearly describe the GS program management requirements including instructions that are essential for the successful management of projects in accordance with our sponsor requirements. The detailed information provided in this document applies to all LANL staff and their subcontractors that are performing GS portfolio work. GS management is committed to a culture that ensures effective planning, execution, and achievement of measurable results in accordance with the GS mission. Outcomes of such a culture result in better communication, delegated authority, accountability, and increased emphasis on safely and securely achieving GS objectives.

  6. Comparative Discourse Analysis of the Security-Privacy Dilemma: Salience of Security Issues in Printed Media

    Czech Academy of Sciences Publication Activity Database

    Guasti, Petra; Mansfeldová, Zdenka

    2015-01-01

    Roč. 30, č. 10 (2015), s. 127-156 ISSN 0254-0223 EU Projects: European Commission(XE) 285223 - SECONOMICS Institutional support: RVO:68378025 Keywords : security * media * stuxnet Subject RIV: AO - Sociology, Demography Impact factor: 0.444, year: 2015

  7. Guifi.net: Security analysis of a heterogeneous community network

    OpenAIRE

    Ramos García, Patricia

    2018-01-01

    Guifi.net is a heterogeneous community network that brings Internet to rural areas or vulnerable groups. This opens the door to many advances, but encompasses some risks as well. The aim of this project is to assess the general security of Guifi.net from tests performed on a key network element: the router. In particular, MikroTik and Ubiquiti are the most used makes in Guifi.net and hence, the target of this project. Basic, yet important, security settings are tested. On the plus side, the ...

  8. TA 55 Reinvestment Project II Phase C Update Project Status May 23, 2017

    Energy Technology Data Exchange (ETDEWEB)

    Giordano, Anthony P. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-05-25

    The TA-55 Reinvestment Project (TRP) II Phase C is a critical infrastructure project focused on improving safety and reliability of the Los Alamos National Laboratory (LANL) TA-55 Complex. The Project recapitalizes and revitalizes aging and obsolete facility and safety systems providing a sustainable nuclear facility for National Security Missions.

  9. Integrating Safeguards and Security with Safety into Design

    International Nuclear Information System (INIS)

    Bean, Robert S.; Hockert, John W.; Hebditch, David J.

    2009-01-01

    There is a need to minimize security risks, proliferation hazards, and safety risks in the design of new nuclear facilities in a global environment of nuclear power expansion, while improving the synergy of major design features and raising operational efficiency. In 2008, the U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA) launched the Next Generation Safeguards Initiative (NGSI) covering many safeguards areas. One of these, launched by NNSA with support of the DOE Office of Nuclear Energy, was a multi-laboratory project, led by the Idaho National Laboratory (INL), to develop safeguards by design. The proposed Safeguards-by-Design (SBD) process has been developed as a structured approach to ensure the timely, efficient, and cost effective integration of international safeguards and other nonproliferation barriers with national material control and accountability, physical security, and safety objectives into the overall design process for the nuclear facility lifecycle. A graded, iterative process was developed to integrate these areas throughout the project phases. It identified activities, deliverables, interfaces, and hold points covering both domestic regulatory requirements and international safeguards using the DOE regulatory environment as exemplar to provide a framework and guidance for project management and integration of safety with security during design. Further work, reported in this paper, created a generalized SBD process which could also be employed within the licensed nuclear industry and internationally for design of new facilities. Several tools for integrating safeguards, safety, and security into design are discussed here. SBD appears complementary to the EFCOG TROSSI process for security and safety integration created in 2006, which focuses on standardized upgrades to enable existing DOE facilities to meet a more severe design basis threat. A collaborative approach is suggested.

  10. Supervision functions - Secure operation of sustainable power systems

    DEFF Research Database (Denmark)

    Morais, Hugo; Zhang, Xinxin; Lind, Morten

    2013-01-01

    of power systems operation control. The use of PMUs allows more penetration of DG mainly, with technologies based on renewable resources with intermittent and unpredictable operation such a wind power. This paper introduces the Secure Operation of Sustainable Power Systems (SOSPO) project. The SOSPO...... project tries to respond to the question "How to ensure a secure operation of the future power system where the operating point is heavily is fluctuating?" focusing in the Supervision module architecture and in the power system operation states. The main goal of Supervision module is to determine...... the power system operation state based on new stability and security parameters derived from PMUs measurement and coordinate the use of automatic and manual control actions. The coordination of the control action is based not only in the static indicators but also in the performance evaluation of control...

  11. Homeland Security. Management Challenges Facing Federal Leadership

    Science.gov (United States)

    2002-12-01

    Security Management Challenges Facing Federal Leadership 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT...including attention to management practices and key success factors. HOMELAND SECURITY Management Challenges Facing Federal Leadership www.gao.gov/cgi...significant management and coordination challenges if it is to provide this leadership and be successful in preventing and responding to any future

  12. Implementation of computer security at nuclear facilities in Germany

    Energy Technology Data Exchange (ETDEWEB)

    Lochthofen, Andre; Sommer, Dagmar [Gesellschaft fuer Anlagen- und Reaktorsicherheit mbH (GRS), Koeln (Germany)

    2013-07-01

    In recent years, electrical and I and C components in nuclear power plants (NPPs) were replaced by software-based components. Due to the increased number of software-based systems also the threat of malevolent interferences and cyber-attacks on NPPs has increased. In order to maintain nuclear security, conventional physical protection measures and protection measures in the field of computer security have to be implemented. Therefore, the existing security management process of the NPPs has to be expanded to computer security aspects. In this paper, we give an overview of computer security requirements for German NPPs. Furthermore, some examples for the implementation of computer security projects based on a GRS-best-practice-approach are shown. (orig.)

  13. Implementation of computer security at nuclear facilities in Germany

    International Nuclear Information System (INIS)

    Lochthofen, Andre; Sommer, Dagmar

    2013-01-01

    In recent years, electrical and I and C components in nuclear power plants (NPPs) were replaced by software-based components. Due to the increased number of software-based systems also the threat of malevolent interferences and cyber-attacks on NPPs has increased. In order to maintain nuclear security, conventional physical protection measures and protection measures in the field of computer security have to be implemented. Therefore, the existing security management process of the NPPs has to be expanded to computer security aspects. In this paper, we give an overview of computer security requirements for German NPPs. Furthermore, some examples for the implementation of computer security projects based on a GRS-best-practice-approach are shown. (orig.)

  14. Final report on LDRD project : single-photon-sensitive imaging detector arrays at 1600 nm

    International Nuclear Information System (INIS)

    Childs, Kenton David; Serkland, Darwin Keith; Geib, Kent Martin; Hawkins, Samuel D.; Carroll, Malcolm S.; Klem, John Frederick; Sheng, Josephine Juin-Jye; Patel, Rupal K.; Bolles, Desta; Bauer, Tom M.; Koudelka, Robert

    2006-01-01

    The key need that this project has addressed is a short-wave infrared light detector for ranging (LIDAR) imaging at temperatures greater than 100K, as desired by nonproliferation and work for other customers. Several novel device structures to improve avalanche photodiodes (APDs) were fabricated to achieve the desired APD performance. A primary challenge to achieving high sensitivity APDs at 1550 nm is that the small band-gap materials (e.g., InGaAs or Ge) necessary to detect low-energy photons exhibit higher dark counts and higher multiplication noise compared to materials like silicon. To overcome these historical problems APDs were designed and fabricated using separate absorption and multiplication (SAM) regions. The absorption regions used (InGaAs or Ge) to leverage these materials 1550 nm sensitivity. Geiger mode detection was chosen to circumvent gain noise issues in the III-V and Ge multiplication regions, while a novel Ge/Si device was built to examine the utility of transferring photoelectrons in a silicon multiplication region. Silicon is known to have very good analog and GM multiplication properties. The proposed devices represented a high-risk for high-reward approach. Therefore one primary goal of this work was to experimentally resolve uncertainty about the novel APD structures. This work specifically examined three different designs. An InGaAs/InAlAs Geiger mode (GM) structure was proposed for the superior multiplication properties of the InAlAs. The hypothesis to be tested in this structure was whether InAlAs really presented an advantage in GM. A Ge/Si SAM was proposed representing the best possible multiplication material (i.e., silicon), however, significant uncertainty existed about both the Ge material quality and the ability to transfer photoelectrons across the Ge/Si interface. Finally a third pure germanium GM structure was proposed because bulk germanium has been reported to have better dark count properties. However, significant

  15. Final report on LDRD project : single-photon-sensitive imaging detector arrays at 1600 nm.

    Energy Technology Data Exchange (ETDEWEB)

    Childs, Kenton David; Serkland, Darwin Keith; Geib, Kent Martin; Hawkins, Samuel D.; Carroll, Malcolm S.; Klem, John Frederick; Sheng, Josephine Juin-Jye; Patel, Rupal K.; Bolles, Desta; Bauer, Tom M.; Koudelka, Robert

    2006-11-01

    The key need that this project has addressed is a short-wave infrared light detector for ranging (LIDAR) imaging at temperatures greater than 100K, as desired by nonproliferation and work for other customers. Several novel device structures to improve avalanche photodiodes (APDs) were fabricated to achieve the desired APD performance. A primary challenge to achieving high sensitivity APDs at 1550 nm is that the small band-gap materials (e.g., InGaAs or Ge) necessary to detect low-energy photons exhibit higher dark counts and higher multiplication noise compared to materials like silicon. To overcome these historical problems APDs were designed and fabricated using separate absorption and multiplication (SAM) regions. The absorption regions used (InGaAs or Ge) to leverage these materials 1550 nm sensitivity. Geiger mode detection was chosen to circumvent gain noise issues in the III-V and Ge multiplication regions, while a novel Ge/Si device was built to examine the utility of transferring photoelectrons in a silicon multiplication region. Silicon is known to have very good analog and GM multiplication properties. The proposed devices represented a high-risk for high-reward approach. Therefore one primary goal of this work was to experimentally resolve uncertainty about the novel APD structures. This work specifically examined three different designs. An InGaAs/InAlAs Geiger mode (GM) structure was proposed for the superior multiplication properties of the InAlAs. The hypothesis to be tested in this structure was whether InAlAs really presented an advantage in GM. A Ge/Si SAM was proposed representing the best possible multiplication material (i.e., silicon), however, significant uncertainty existed about both the Ge material quality and the ability to transfer photoelectrons across the Ge/Si interface. Finally a third pure germanium GM structure was proposed because bulk germanium has been reported to have better dark count properties. However, significant

  16. A New EU Gas Security of Supply Architecture?

    Energy Technology Data Exchange (ETDEWEB)

    De Jong, J. [Clingendael International Energy Programme CIEP, The Hague (Netherlands); Glachant, J.M.; Ahner, N. [European University Institute EUI, San Domenico di Fiesole (Italy); Hafner, M.; Tagliapietra, S. [Fondazione Eni Enrico Mattei FEEM, Milan (Italy)

    2012-07-15

    A series of workshops has been organized in order to take stock and discuss a possible new architecture for EU gas security. Discussions and reflections reported from the workshops held under this project have developed into the concluding ideas and recommendations for a new EU gas security of supply architecture, which are reflected in this article.

  17. Evaluation of the nuclear security culture

    International Nuclear Information System (INIS)

    Spitalnik, Jorge

    2003-01-01

    The security culture of an organization resides in its workers and it is expressed by the way the personnel that works in a particular organization practice daily its activities. The security culture can be practice in a high or in a low level, but it always exists and it can always be improved. It is based on the security condition and procedures that have been established in the planning phase and in the implementation of a project. After its implantation, in order to avoid deterioration, basically it is necessary to maintain and to bring updated those conditions and procedures through strategies of follow up and control. This process establishes the basis of a program of maintenance and improvement of the Security Culture. Many self-evaluations that have been accomplished at nuclear organizations based on workers perception concerning working conditions and management environment, have permitted objectively determine if the security doctrine, which the organization assure to follow rigorously into its dally activities, is really so (LS)

  18. Projections of 21st Century African Climate: Implications for African Savanna Fire Dynamics, Human Health and Food Security

    Science.gov (United States)

    Adegoke, J. O.

    2015-12-01

    Fire is a key agent of change in the African savannas, which are shaped through the complex interactions between trees, C4 grasses, rainfall, temperature, CO2 and fire. These fires and their emitted smoke can have numerous direct and indirect effects on the environment, water resources, air quality, and climate. For instance, veld fires in southern Africa cause large financial losses to agriculture, livestock production and forestry on an annual basis. This study contributes to our understanding of the implications of projected surface temperature evolution in Africa for fire risk, human health and agriculture over the coming decades. We use an ensemble of high-resolution regional climate model simulations of African climate for the 21st century. Regional dowscalings and recent global circulation model projections obtained for Africa indicate that African temperatures are likely to rise at 1.5 times the global rate of temperature increase in the tropics, and at almost twice the global rate of increase in the subtropics. Warming is projected to occur during the 21st century, with increases of 4-6 °C over the subtropics and 3-5 °C over the tropics plausible by the end of the century relative to present-day climate under the A2 (low mitigation) scenario. We explore the significance of the projected warming by documenting increases in projected high fire danger days and heat-wave days. General drying is projected across the continent, even for areas (e.g. tropical Africa) where an increase in rainfall is plausible. This is due to the drastic increases in temperature that are projected, which leads to drier soils (through enhanced evaporation) despite the rainfall increases. This will likely impact negatively on crop yield, particularly on the maize crop that is of crucial importance in terms of African food security.

  19. Towards Shibboleth-based security in the e-infrastructure for social sciences

    OpenAIRE

    Jie, Wei; Daw, Michael; Procter, Rob; Voss, Alex

    2007-01-01

    The e-Infrastructure for e-Social Sciences project leverages Grid computing technology to provide an integrated platform which enables social science researchers to securely access a variety of e-Science resources. Security underpins the e-Infrastructure and a security framework with authentication and authorization functionality is a core component of the e-Infrastructure for social sciences. To build the security framework, we adopt Shibboleth as the basic authentication and authorization i...

  20. Safeguards and security by design support for the next generation nuclear plant project - Progress in safeguards by design (SBD) by the United States National Nuclear Security Administration (NNSA)

    International Nuclear Information System (INIS)

    Bjornard, T.; Casey Durst, P.

    2013-01-01

    The Next Generation Nuclear Plant (NGNP) project was authorized by the United States Energy Policy Act of 2005 with the principal objective of designing, licensing, and building a Generation IV nuclear plant capable of producing both high-temperature process heat and electricity. The two candidate NGNP reactor concepts are pebble- and prismatic-fueled high-temperature gas reactors that will be licensed by the U.S. Nuclear Regulatory Commission (NRC). The conceptual design phase of the project was completed in December 2010. This paper summarizes support provided to the NGNP project to facilitate consideration of international safeguards during the design phase, or safeguards by design (SBD). Additional support was provided for domestic safeguards (material control and accounting) and physical protection, or safeguards and security by design (2SBD). The main focus of this paper is on SBD and international safeguards. Included is an overview of the international safeguards guidance contained in guidance reports for SBD. These reports contain guidance and suggestions intended to be useful to the industry design teams, but they do not contain ready-made solutions. Early and frequent interaction of design stakeholders with the International Atomic Energy Agency and the NRC are essential to a successful endeavor. The paper is followed by the slides of the presentation. (author)

  1. Nuclear security education and training at Naif Arab University for Security Sciences

    International Nuclear Information System (INIS)

    Amjad Fataftah

    2009-01-01

    Naif Arab University for Security Sciences (NAUSS) was established in 1978 as an Arab institution specialized in security sciences to fulfill the needs of the Arab law enforcement agencies for an academic institution that promotes research in security sciences, offers graduate education programs and conduct short-term training courses, which should contribute to the prevention and control of crimes in the Arab world. NAUSS and the IAEA organized the first workshop on nuclear security on November, 2006, which aimed to explore and improve the nuclear security culture awareness through the definitions of the nuclear security main pillars, Prevention, Detection and Response. In addition, NAUSS and IAEA organized a very important training course on April, 2008 on combating nuclear terrorism titled P rotection against nuclear terrorism: Protection of radioactive sources . In the past two years, IAEA has put tremendous efforts to develop an education program in nuclear security, which may lead into Master's degree in nuclear security, where NAUSS helped in this project through the participation in the IAEA organized consultancy and technical meetings for the development of this program along with many other academic, security and law enfacement experts and lawyers from many different institution in the world. NAUSS and IAEA drafted a work plan for the next coming two years which should lead into the gradual implementation of these educational programs at NAUSS. NAUSS also continues to participate in several local conferences and symposiums related to the peaceful application of nuclear power in the gulf region, and the need for a human resources development programs to fulfill the scientific and security needs which will arise from building nuclear power plants. NAUSS participated in the International Symposium on the Peaceful Application of Nuclear Technology in the GCC countries, organized by King Abdulaziz University in the city of Jeddah, Saudi Arabia. Also NAUSS

  2. New secure communication-layer standard for medical image management (ISCL)

    Science.gov (United States)

    Kita, Kouichi; Nohara, Takashi; Hosoba, Minoru; Yachida, Masuyoshi; Yamaguchi, Masahiro; Ohyama, Nagaaki

    1999-07-01

    This paper introduces a summary of the standard draft of ISCL 1.00 which will be published by MEDIS-DC officially. ISCL is abbreviation of Integrated Secure Communication Layer Protocols for Secure Medical Image Management Systems. ISCL is a security layer which manages security function between presentation layer and TCP/IP layer. ISCL mechanism depends on basic function of a smart IC card and symmetric secret key mechanism. A symmetry key for each session is made by internal authentication function of a smart IC card with a random number. ISCL has three functions which assure authentication, confidently and integrity. Entity authentication process is done through 3 path 4 way method using functions of internal authentication and external authentication of a smart iC card. Confidentially algorithm and MAC algorithm for integrity are able to be selected. ISCL protocols are communicating through Message Block which consists of Message Header and Message Data. ISCL protocols are evaluating by applying to regional collaboration system for image diagnosis, and On-line Secure Electronic Storage system for medical images. These projects are supported by Medical Information System Development Center. These project shows ISCL is useful to keep security.

  3. Laboratory directed research and development program, FY 1996

    International Nuclear Information System (INIS)

    1997-02-01

    The Ernest Orlando Lawrence Berkeley National Laboratory (Berkeley Lab) Laboratory Directed Research and Development Program FY 1996 report is compiled from annual reports submitted by principal investigators following the close of the fiscal year. This report describes the projects supported and summarizes their accomplishments. It constitutes a part of the Laboratory Directed Research and Development (LDRD) program planning and documentation process that includes an annual planning cycle, projection selection, implementation, and review. The Berkeley Lab LDRD program is a critical tool for directing the Laboratory's forefront scientific research capabilities toward vital, excellent, and emerging scientific challenges. The program provides the resources for Berkeley Lab scientists to make rapid and significant contributions to critical national science and technology problems. The LDRD program also advances the Laboratory's core competencies, foundations, and scientific capability, and permits exploration of exciting new opportunities. Areas eligible for support include: (1) Work in forefront areas of science and technology that enrich Laboratory research and development capability; (2) Advanced study of new hypotheses, new experiments, and innovative approaches to develop new concepts or knowledge; (3) Experiments directed toward proof of principle for initial hypothesis testing or verification; and (4) Conception and preliminary technical analysis to explore possible instrumentation, experimental facilities, or new devices

  4. Laboratory directed research and development program, FY 1996

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-02-01

    The Ernest Orlando Lawrence Berkeley National Laboratory (Berkeley Lab) Laboratory Directed Research and Development Program FY 1996 report is compiled from annual reports submitted by principal investigators following the close of the fiscal year. This report describes the projects supported and summarizes their accomplishments. It constitutes a part of the Laboratory Directed Research and Development (LDRD) program planning and documentation process that includes an annual planning cycle, projection selection, implementation, and review. The Berkeley Lab LDRD program is a critical tool for directing the Laboratory`s forefront scientific research capabilities toward vital, excellent, and emerging scientific challenges. The program provides the resources for Berkeley Lab scientists to make rapid and significant contributions to critical national science and technology problems. The LDRD program also advances the Laboratory`s core competencies, foundations, and scientific capability, and permits exploration of exciting new opportunities. Areas eligible for support include: (1) Work in forefront areas of science and technology that enrich Laboratory research and development capability; (2) Advanced study of new hypotheses, new experiments, and innovative approaches to develop new concepts or knowledge; (3) Experiments directed toward proof of principle for initial hypothesis testing or verification; and (4) Conception and preliminary technical analysis to explore possible instrumentation, experimental facilities, or new devices.

  5. Masters in Nuclear Security

    International Nuclear Information System (INIS)

    Rickwood, Peter

    2013-01-01

    Continuing global efforts to improve the security of nuclear and other radioactive material against the threat of malicious acts are being assisted by a new initiative, the development of a corps of professional experts to strengthen nuclear security. The IAEA, the European Commission, universities, research institutions and other bodies working in collaboration have established an International Nuclear Security Education Network (INSEN). In 2011, six European academic institutions, the Vienna University of Technology, the Brandenburg University of Applied Sciences, the Demokritos National Centre for Scientific Research in Greece, the Reactor Institute Delft of the Delft University of Technology in the Netherlands, the University of Oslo, and the University of Manchester Dalton Nuclear Institute, started developing a European Master of Science Programme in Nuclear Security Management. In March 2013, the masters project was inaugurated when ten students commenced studies at the Brandenburg University of Applied Sciences in Germany for two weeks. In April, they moved to the Delft University of Technology in the Netherlands for a further two weeks of studies. The pilot programme consists of six teaching sessions in different academic institutions. At the inauguration in Delft, IAEA Director General Yukiya Amano commended this effort to train a new generation of experts who can help to improve global nuclear security. ''It is clear that we will need a new generation of policy-makers and nuclear professionals - people like you - who will have a proper understanding of the importance of nuclear security,'' Mr. Amano told students and faculty members. ''The IAEA's goal is to support the development of such programmes on a global basis,'' said David Lambert, Senior Training Officer in the IAEA's Office of Nuclear Security. ''An existing postgraduate degree programme focused on nuclear security at Naif Arab University for Security Sciences (NAUSS) is currently supported by

  6. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  7. Safeguards and security research and development: Progress report, October 1994--September 1995

    Energy Technology Data Exchange (ETDEWEB)

    Rutherford, D.R.; Henriksen, P.W. [comp.

    1997-03-01

    The primary goal of the Los Alamos Safeguards and Security Technology Development Program, International Safeguards, and other Safeguards and Security Programs is to continue to be the center of excellence in the field of Safeguards and Security. This annual report for 1995 describes those scientific and engineering projects that contribute to all of the aforementioned programs. The authors have presented the information in a different format from previous annual reports. Part I is devoted to Nuclear Material Measurement Systems. Part II contains projects that are specific to Integrated Safeguards Systems. Part III highlights Safeguards Systems Effectiveness Evaluations and Part IV is a compilation of highlights from Information Assurance projects. Finally Part V highlights work on the projects at Los Alamos for International Safeguards. The final part of this annual report lists titles and abstracts of Los Alamos Safeguards and Security Technology Development reports, technical journal articles, and conference papers that were presented and published in 1995. This is the last annual report in this format. The authors wish to thank all of the individuals who have contributed to this annual report and made it so successful over the years.

  8. Safeguards and security research and development: Progress report, October 1994--September 1995

    International Nuclear Information System (INIS)

    Rutherford, D.R.; Henriksen, P.W.

    1997-03-01

    The primary goal of the Los Alamos Safeguards and Security Technology Development Program, International Safeguards, and other Safeguards and Security Programs is to continue to be the center of excellence in the field of Safeguards and Security. This annual report for 1995 describes those scientific and engineering projects that contribute to all of the aforementioned programs. The authors have presented the information in a different format from previous annual reports. Part I is devoted to Nuclear Material Measurement Systems. Part II contains projects that are specific to Integrated Safeguards Systems. Part III highlights Safeguards Systems Effectiveness Evaluations and Part IV is a compilation of highlights from Information Assurance projects. Finally Part V highlights work on the projects at Los Alamos for International Safeguards. The final part of this annual report lists titles and abstracts of Los Alamos Safeguards and Security Technology Development reports, technical journal articles, and conference papers that were presented and published in 1995. This is the last annual report in this format. The authors wish to thank all of the individuals who have contributed to this annual report and made it so successful over the years

  9. Advanced ion trap structures with integrated tools for qubit manipulation

    Science.gov (United States)

    Sterk, J. D.; Benito, F.; Clark, C. R.; Haltli, R.; Highstrete, C.; Nordquist, C. D.; Scott, S.; Stevens, J. E.; Tabakov, B. P.; Tigges, C. P.; Moehring, D. L.; Stick, D.; Blain, M. G.

    2012-06-01

    We survey the ion trap fabrication technologies available at Sandia National Laboratories. These include four metal layers, precision backside etching, and low profile wirebonds. We demonstrate loading of ions in a variety of ion traps that utilize these technologies. Additionally, we present progress towards integration of on-board filtering with trench capacitors, photon collection via an optical cavity, and integrated microwave electrodes for localized hyperfine qubit control and magnetic field gradient quantum gates. [4pt] This work was supported by Sandia's Laboratory Directed Research and Development (LDRD) Program and the Intelligence Advanced Research Projects Activity (IARPA). Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the US Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000.

  10. Quality of Security Service Costing Demonstration for the MSHN Project

    National Research Council Canada - National Science Library

    Spyropoulou, Evdoxia

    2000-01-01

    .... Each service has two costs: an initialization cost and a run-time cost. The demonstration illustrates the costs incurred as network modes and security levels are changed. High level and detailed specifications are provided.

  11. Status of Educational Efforts in National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This report documents the status of educational efforts for the preparation of a national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This report includes an assessment of the current educational situation for the national security workforce.

  12. Laboratory-Directed Research and Development 2016 Summary Annual Report

    International Nuclear Information System (INIS)

    Pillai, Rekha Sukamar; Jacobson, Julie Ann

    2017-01-01

    The Laboratory-Directed Research and Development (LDRD) Program at Idaho National Laboratory (INL) reports its status to the U.S. Department of Energy (DOE) by March of each year. The program operates under the authority of DOE Order 413.2C, 'Laboratory Directed Research and Development' (April 19, 2006), which establishes DOE's requirements for the program while providing the laboratory director broad flexibility for program implementation. LDRD funds are obtained through a charge to all INL programs. This report includes summaries of all INL LDRD research activities supported during Fiscal Year (FY) 2016. INL is the lead laboratory for the DOE Office of Nuclear Energy (DOE-NE). The INL mission is to discover, demonstrate, and secure innovative nuclear energy solutions, other clean energy options, and critical infrastructure with a vision to change the world's energy future and secure our critical infrastructure. Operating since 1949, INL is the nation's leading research, development, and demonstration center for nuclear energy, including nuclear nonproliferation and physical and cyber-based protection of energy systems and critical infrastructure, as well as integrated energy systems research, development, demonstration, and deployment. INL has been managed and operated by Battelle Energy Alliance, LLC (a wholly owned company of Battelle) for DOE since 2005. Battelle Energy Alliance, LLC, is a partnership between Battelle, BWX Technologies, Inc., AECOM, the Electric Power Research Institute, the National University Consortium (Massachusetts Institute of Technology, Ohio State University, North Carolina State University, University of New Mexico, and Oregon State University), and the Idaho university collaborators (i.e., University of Idaho, Idaho State University, and Boise State University). Since its creation, INL's research and development (R&D) portfolio has broadened with targeted programs supporting national missions to advance nuclear energy, enable clean

  13. LABORATORY DIRECTED RESEARCH AND DEVELOPMENT PROGRAM ANNUAL REPORT TO THE DEPARTMENT OF ENERGY FOR FISCAL YEAR 1999. THE DEPARTMENT OF ENERGY, DECEMBER 1999.

    Energy Technology Data Exchange (ETDEWEB)

    PAUL,P.; FOX,K.J.

    2000-07-01

    In FY 1999, the BNL LDRD Program funded 33 projects, 25 of which were new starts, at a total cost of $4,525,584. A table is presented which lists all of the FY 1999 funded projects and gives a history of funding for each by year. Several of these projects have already experienced varying degrees of success as indicated in the individual Project Program Summaries which are given. A total of 29 informal publications (abstracts, presentations, reports and workshop papers) were reported and an additional 23 formal (full length) papers were either published, are in press or being prepared for publication. The investigators on five projects have filed for patents. Seven of the projects reported that proposals/grants had either been funded or were submitted for funding. The complete summary of follow-on activities is as follows: Information Publications--29, Formal Papers--23, Grants/Proposals/Follow-on Funding--7. In conclusion, a significant measure of success is already attributable to the FY 1999 LDRD Program in the short period of time involved. The Laboratory has experienced a significant scientific gain by these achievements.

  14. Audited credential delegation: a usable security solution for the virtual physiological human toolkit

    Science.gov (United States)

    Haidar, Ali N.; Zasada, Stefan J.; Coveney, Peter V.; Abdallah, Ali E.; Beckles, Bruce; Jones, Mike A. S.

    2011-01-01

    We present applications of audited credential delegation (ACD), a usable security solution for authentication, authorization and auditing in distributed virtual physiological human (VPH) project environments that removes the use of digital certificates from end-users' experience. Current security solutions are based on public key infrastructure (PKI). While PKI offers strong security for VPH projects, it suffers from serious usability shortcomings in terms of end-user acquisition and management of credentials which deter scientists from exploiting distributed VPH environments. By contrast, ACD supports the use of local credentials. Currently, a local ACD username–password combination can be used to access grid-based resources while Shibboleth support is underway. Moreover, ACD provides seamless and secure access to shared patient data, tools and infrastructure, thus supporting the provision of personalized medicine for patients, scientists and clinicians participating in e-health projects from a local to the widest international scale. PMID:22670214

  15. Audited credential delegation: a usable security solution for the virtual physiological human toolkit.

    Science.gov (United States)

    Haidar, Ali N; Zasada, Stefan J; Coveney, Peter V; Abdallah, Ali E; Beckles, Bruce; Jones, Mike A S

    2011-06-06

    We present applications of audited credential delegation (ACD), a usable security solution for authentication, authorization and auditing in distributed virtual physiological human (VPH) project environments that removes the use of digital certificates from end-users' experience. Current security solutions are based on public key infrastructure (PKI). While PKI offers strong security for VPH projects, it suffers from serious usability shortcomings in terms of end-user acquisition and management of credentials which deter scientists from exploiting distributed VPH environments. By contrast, ACD supports the use of local credentials. Currently, a local ACD username-password combination can be used to access grid-based resources while Shibboleth support is underway. Moreover, ACD provides seamless and secure access to shared patient data, tools and infrastructure, thus supporting the provision of personalized medicine for patients, scientists and clinicians participating in e-health projects from a local to the widest international scale.

  16. All projects related to | Page 430 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2008-11-03

    In 2006, the Institute for Security Studies (ISS) undertook a project entitled Regulation of the Private Security Sector in Africa that was supported by IDRC under project 103396. Start Date: November 3, 2008. End Date: June 25, 2012. Topic: ARMED FORCES, MILITARY PERSONNEL, LEGAL STATUS, REGULATIONS, ...

  17. Why Do Large Infrastructure Projects Often Fail?

    DEFF Research Database (Denmark)

    Lando, Henrik

    The paper reports, in a systematic manner, the views of a group of experienced practitioners on why large infrastructure projects often fail. The views, centering on the role played by the Owner (the Client or Buyer), can be summarized as follows:The owner should be aware of the need of clarity...... when it comes to own priorities, requirements, decision making authority, and risk allocation, and such clarity together with measures intended to secure a cooperative spirit, including a balanced sharing of risk and conflict resolution schemes that secure a quick resolution of conflicts, are central...... elements in securing successful projects....

  18. Enhanced Micellar Catalysis LDRD.

    Energy Technology Data Exchange (ETDEWEB)

    Betty, Rita G.; Tucker, Mark D; Taggart, Gretchen; Kinnan, Mark K.; Glen, Crystal Chanea; Rivera, Danielle; Sanchez, Andres; Alam, Todd Michael

    2012-12-01

    The primary goals of the Enhanced Micellar Catalysis project were to gain an understanding of the micellar environment of DF-200, or similar liquid CBW surfactant-based decontaminants, as well as characterize the aerosolized DF-200 droplet distribution and droplet chemistry under baseline ITW rotary atomization conditions. Micellar characterization of limited surfactant solutions was performed externally through the collection and measurement of Small Angle X-Ray Scattering (SAXS) images and Cryo-Transmission Electron Microscopy (cryo-TEM) images. Micellar characterization was performed externally at the University of Minnesotas Characterization Facility Center, and at the Argonne National Laboratory Advanced Photon Source facility. A micellar diffusion study was conducted internally at Sandia to measure diffusion constants of surfactants over a concentration range, to estimate the effective micelle diameter, to determine the impact of individual components to the micellar environment in solution, and the impact of combined components to surfactant phase behavior. Aerosolized DF-200 sprays were characterized for particle size and distribution and limited chemical composition. Evaporation rates of aerosolized DF-200 sprays were estimated under a set of baseline ITW nozzle test system parameters.

  19. Iowa LiDAR Mapping Project

    Data.gov (United States)

    Federal Emergency Management Agency, Department of Homeland Security — This is collection level metadata for LAS and ASCII data files from the statewide Iowa Lidar Project. The Iowa Light Detection and Ranging (LiDAR) Project collects...

  20. Laboratory Directed Research and Development LDRD-FY-2011

    Energy Technology Data Exchange (ETDEWEB)

    Dena Tomchak

    2012-03-01

    This report provides a summary of the research conducted at the Idaho National Laboratory (INL) during Fiscal Year (FY) 2011. This report demonstrates the types of cutting edge research the INL is performing to help ensure the nation's energy security. The research conducted under this program is aligned with our strategic direction, benefits the Department of Energy (DOE) and is in compliance with DOE order 413.2B. This report summarizes the diverse research and development portfolio with emphasis on the DOE Office of Nuclear Energy (DOE-NE) mission, encompassing both advanced nuclear science and technology and underlying technologies.

  1. Laboratory directed research and development 2006 annual report.

    Energy Technology Data Exchange (ETDEWEB)

    Westrich, Henry Roger

    2007-03-01

    This report summarizes progress from the Laboratory Directed Research and Development (LDRD) program during fiscal year 2006. In addition to a programmatic and financial overview, the report includes progress reports from 430 individual R&D projects in 17 categories.

  2. Lemnos Interoperable Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Stewart, John [Tennessee Valley Authority, Knoxville, TN (United States); Halbgewachs, Ron [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Chavez, Adrian [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Smith, Rhett [Schweitzer Engineering Laboratories, Chattanooga, TN (United States); Teumim, David [Teumim Technical, Allentown, PA (United States)

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  3. Real time security assessment in national load dispatch centre, Tenaga Nasional Berhad, Malaysia

    Energy Technology Data Exchange (ETDEWEB)

    Sreedharan, G. [Tenaga Nasional Berhad, Kuala Lumpur (Malaysia); Moghavvemi, M. [Univ. of Malaya, Kuala Lumpur (Malaysia)

    2007-07-01

    Electric energy is one of the most important resources of modern industrial society. Electric power is available to the user instantly at the correct voltage, frequency and exactly at the amount that is needed. However, the power system is subjected to constant disturbances created by random load changes, faults created by natural causes and by equipment failures. One of the major impacts of the disturbances to the system is the impact imposed on transmission networks or corridors, which have increased the demand for more accurate and up to date information on the power system. It has become impossible to operate the system with an acceptable degree of security by using traditional operational planning studies that are conducted off-line and use forecast conditions to predict system security limits. Therefore the use of on-line security assessment is quickly becoming a necessity. This paper simplified the general off-line security assessment methodology by attempting to use the real time system snap shot data as an input to the dynamic security assessment tool namely VSAT. The study used raw data produced at every 10 minute cycle in order to conduct a security assessment of the power system, including current power system load; network topology; unit commitment; and generator and transmission line outages. The purpose of the project was to implement a real time security assessment to benefit the system operators to assist them in their daily work in monitoring and operating the power system in Tenaga Nasional Berhad. The paper discussed project implementation including a description of the project and project background. It discussed the operation of VSAT, result display, and future enhancement. 18 refs., 5 figs.

  4. Climate-derived tensions in Arctic security.

    Energy Technology Data Exchange (ETDEWEB)

    Backus, George A.; Strickland, James Hassler

    2008-09-01

    Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

  5. Collaboration using roles. [in computer network security

    Science.gov (United States)

    Bishop, Matt

    1990-01-01

    Segregation of roles into alternative accounts is a model which provides not only the ability to collaborate but also enables accurate accounting of resources consumed by collaborative projects, protects the resources and objects of such a project, and does not introduce new security vulnerabilities. The implementation presented here does not require users to remember additional passwords and provides a very simple consistent interface.

  6. How to Compare the Security Quality Requirements Engineering (SQUARE) Method with Other Methods

    National Research Council Canada - National Science Library

    Mead, Nancy R

    2007-01-01

    The Security Quality Requirements Engineering (SQUARE) method, developed at the Carnegie Mellon Software Engineering Institute, provides a systematic way to identify security requirements in a software development project...

  7. Impact of water scarcity on food security at micro level in Pakistan

    OpenAIRE

    Fahim, Muhammad Amir

    2011-01-01

    Pakistan is confronting the problem of water scarcity which is rendering an adverse impact on food security. The study examines the impact of water scarcity on food security in an era of climate change. It further focuses on projecting the future trends of water and food stock. The research effort probes the links among water scarcity, climate change, food security, water security, food inflation, poverty and management of water resources. Data on food security was collected from the FSA (Foo...

  8. Impact of water scarcity on food security at macro level in Pakistan

    OpenAIRE

    Fahim, Muhammad Amir

    2011-01-01

    Pakistan is confronting the problem of water scarcity which is rendering an adverse impact on food security. The study examines the impact of water scarcity on food security in an era of climate change. It further focuses on projecting the future trends of water and food stock. The research effort probes the links among water scarcity, climate change, food security, water security, food inflation, poverty and management of water resources. Data on food security was collected from the FSA (Foo...

  9. Impact of water scarcity on food security at meso level in Pakistan

    OpenAIRE

    Fahim, Muhammad Amir

    2011-01-01

    Pakistan is confronting the problem of water scarcity which is rendering an adverse impact on food security. The study examines the impact of water scarcity on food security in an era of climate change. It further focuses on projecting the future trends of water and food stock. The research effort probes the links among water scarcity, climate change, food security, water security, food inflation, poverty and management of water resources. Data on food security was collected from the FSA (Foo...

  10. Network and Ensemble Enabled Entity Extraction in Informal Text (NEEEEIT) final report

    Energy Technology Data Exchange (ETDEWEB)

    Kegelmeyer, Philip W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Shead, Timothy M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Dunlavy, Daniel M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2013-09-01

    This SAND report summarizes the activities and outcomes of the Network and Ensemble Enabled Entity Extraction in Information Text (NEEEEIT) LDRD project, which addressed improving the accuracy of conditional random fields for named entity recognition through the use of ensemble methods.

  11. Project financing

    International Nuclear Information System (INIS)

    Cowan, A.

    1998-01-01

    Project financing was defined ('where a lender to a specific project has recourse only to the cash flow and assets of that project for repayment and security respectively') and its attributes were described. Project financing was said to be particularly well suited to power, pipeline, mining, telecommunications, petro-chemicals, road construction, and oil and gas projects, i.e. large infrastructure projects that are difficult to fund on-balance sheet, where the risk profile of a project does not fit the corporation's risk appetite, or where higher leverage is required. Sources of project financing were identified. The need to analyze and mitigate risks, and being aware that lenders always take a conservative view and gravitate towards the lowest common denominator, were considered the key to success in obtaining project financing funds. TransAlta Corporation's project financing experiences were used to illustrate the potential of this source of financing

  12. SUMS Counts-Related Projects

    Data.gov (United States)

    Social Security Administration — Staging Instance for all SUMs Counts related projects including: Redeterminations/Limited Issue, Continuing Disability Resolution, CDR Performance Measures, Initial...

  13. Understanding Southern Influence in Cyberspace Security and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... it a matter of national security - is perhaps the most important force shaping global communications today. ... The project will provide evidence of the benefits of openness in cyberspace that can inform international ... Training materials.

  14. Vulnerabilities as monsters: the cultural foundations of computer security (extended abstract)

    NARCIS (Netherlands)

    Pieters, Wolter; Consoli, L.

    2006-01-01

    This paper is part of a project to investigate the philosophical aspects of the scientific discipline of information security. This eld of research investigates the means to protect information systems against attacks, typically by modelling the system according to a certain security model, and

  15. A roadmap for security challenges in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Arbia Riahi Sfar

    2018-04-01

    Full Text Available Unquestionably, communicating entities (object, or things in the Internet of Things (IoT context are playing an active role in human activities, systems and processes. The high connectivity of intelligent objects and their severe constraints lead to many security challenges, which are not included in the classical formulation of security problems and solutions. The Security Shield for IoT has been identified by DARPA (Defense Advanced Research Projects Agency as one of the four projects with a potential impact broader than the Internet itself. To help interested researchers contribute to this research area, an overview of the IoT security roadmap overview is presented in this paper based on a novel cognitive and systemic approach. The role of each component of the approach is explained, we also study its interactions with the other main components, and their impact on the overall. A case study is presented to highlight the components and interactions of the systemic and cognitive approach. Then, security questions about privacy, trust, identification, and access control are discussed. According to the novel taxonomy of the IoT framework, different research challenges are highlighted, important solutions and research activities are revealed, and interesting research directions are proposed. In addition, current standardization activities are surveyed and discussed to the ensure the security of IoT components and applications. Keywords: Internet of Things, Systemic and cognitive approach, Security, Privacy, Trust, Identification, Access control

  16. Effect of bond administration on construction project delivery

    Directory of Open Access Journals (Sweden)

    Oke Ayodeji Emmanuel

    2016-12-01

    Full Text Available Construction bond administration involves management of bond issues from inception of obtaining bond from guarantor to the point of release of contractor by the client. This process has posted a lot of challenges to construction stakeholders; it is therefore, necessary to examine the relationship between bond administration and project success. Archival data of completed bonded building projects were gathered through a pro forma developed for this purpose. Using Pearson product moment of correlation, it was revealed that the cost of securing a construction bond has a positive and significant effect on the initial and final costs of the project, while the number of days needed to secure a construction bond has no significant effect on the initial and final durations of the construction project. In order to establish the relationship between project delivery indices of cost and time and the construction bond administration variables, iteration of linear regression was adopted to arrive at the best-fit equation. Factors affecting the cost of securing construction bonds from guarantors should be identified and given adequate attention by construction stakeholders in order to minimize the effect of construction bond administration on project delivery.

  17. National Security Technology Incubator Business Plan

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  18. Integrated fingerprinting in secure digital cinema projection

    Science.gov (United States)

    Delannay, Damien; Delaigle, Jean-Francois; Macq, Benoit M. M.; Quisquater, Jean-Jacques; Mas Ribes, Joan M.; Boucqueau, Jean M.; Nivart, Jean-Francois

    2001-12-01

    This paper describes the functional model of a combined conditional access and fingerprinting copyright (-or projectionright) protection system in a digital cinema framework. In the cinema industry, a large part of early movie piracy comes from copies made in the theater itself with a camera. The evolution towards digital cinema broadcast enables watermark based fingerprinting protection systems. Besides an appropriate fingerprinting technology, a number of well defined security/cryptographic tools are integrated in order to guaranty the integrity of the whole system. The requirements are two-fold: On one side, we must ensure that the media content is only accessible at exhibition time (under specific authorization obtained after an ad-hoc film rental agreement) and contains the related exhibition fingerprint. At the other end, we must prove our ability to retrieve the fingerprint information from an illegal copy of the media.

  19. Strategies for Overcoming Key Barriers to Development of a National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-06-30

    This report documents the strategies for overcoming identified key barriers to development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) National Nuclear Security Administration (NNSA) grant. Many barriers currently exist that prevent the development of an adequate number of properly trained national security personnel. The identified strategies to address the barriers will focus on both short-term and long-term efforts, as well as strategies to capture legacy knowledge of retiring national security workforce personnel.

  20. Security Vulnerability Profiles of NASA Mission Software: Empirical Analysis of Security Related Bug Reports

    Science.gov (United States)

    Goseva-Popstojanova, Katerina; Tyo, Jacob P.; Sizemore, Brian

    2017-01-01

    principle. Specifically, for all three datasets, from 86 to 88 the security related issues were located in two to four subsystems.- The severity levels of most security issues were moderate, in all three datasets.- Out of 21 primary security classes, five dominated: Exception Management, Memory Access, Other, Risky Values, and Unused Entities. Together, these classes contributed from around 80 to 90 of all security issues in each dataset. This again proves the Pareto principle of uneven distribution of security issues, in this case across CWE classes, and supports the fact that addressing these dominant security classes provides the most cost efficient way to improve missions' security. The findings presented in this report uncovered the security vulnerability profiles and identified the common trends and dominant classes of security issues, which in turn can be used to select the most efficient secure design and coding best practices compiled by the part of the SARP project team associated with the NASA's Johnson Space Center. In addition, these findings provide valuable input to the NASA IVV initiative aimed at identification of the two 25 CWEs of ground and flight missions.

  1. Supporting multi-state collaboration on privacy and security to foster health IT and health information exchange.

    Science.gov (United States)

    Banger, Alison K; Alakoye, Amoke O; Rizk, Stephanie C

    2008-11-06

    As part of the HHS funded contract, Health Information Security and Privacy Collaboration, 41 states and territories have proposed collaborative projects to address cross-state privacy and security challenges related to health IT and health information exchange. Multi-state collaboration on privacy and security issues remains complicated, and resources to support collaboration around these topics are essential to the success of such collaboration. The resources outlined here offer an example of how to support multi-stakeholder, multi-state projects.

  2. LBNL Laboratory Directed Research and Development Program FY2016

    Energy Technology Data Exchange (ETDEWEB)

    Ho, D.

    2017-03-01

    The Berkeley Lab Laboratory Directed Research and Development Program FY2016 report is compiled from annual reports submitted by principal investigators following the close of the fiscal year. This report describes the supported projects and summarizes their accomplishments. It constitutes a part of the LDRD program planning and documentation process that includes an annual planning cycle, project selection, implementation and review.

  3. Development and characterization of 3D, nano-confined multicellular constructs for advanced biohybrid devices.

    Energy Technology Data Exchange (ETDEWEB)

    Kaehr, Bryan James

    2011-09-01

    This is the final report for the President Harry S. Truman Fellowship in National Security Science and Engineering (LDRD project 130813) awarded to Dr. Bryan Kaehr from 2008-2011. Biological chemistries, cells, and integrated systems (e.g., organisms, ecologies, etc.) offer important lessons for the design of synthetic strategies and materials. The desire to both understand and ultimately improve upon biological processes has been a driving force for considerable scientific efforts worldwide. However, to impart the useful properties of biological systems into modern devices and materials requires new ideas and technologies. The research herein addresses aspects of these issues through the development of (1) a rapid-prototyping methodology to build 3D bio-interfaces and catalytic architectures, (2) a quantitative method to measure cell/material mechanical interactions in situ and at the microscale, and (3) a breakthrough approach to generate functional biocomposites from bacteria and cultured cells.

  4. Prosperity, Security and Politics

    DEFF Research Database (Denmark)

    Lauridsen, Laurids Sandager

    Governing elites in Southeast Asia are preoccupied with high-speed railways, which are also a cornerstone in China’s new Silk Road initiative - the “One Belt, One Road.” Chinese political leaders have in recent years travelled around Southeast- and Central Asia to promote Chinese high-speed railway...... as rationales behind the Sino-Thai high-speed rail project. It is argued that there are multiple motives behind the “One-Road-One-Belt” initiative and that the Sino-Thai project is driven by a mixture economic and security concerns on the Chinese side, while it on the Thai side combines the need for economic...

  5. Final Report: 06-LW-013, Nuclear Physics the Monte Carlo Way

    International Nuclear Information System (INIS)

    Ormand, W.E.

    2009-01-01

    This is document reports the progress and accomplishments achieved in 2006-2007 with LDRD funding under the proposal 06-LW-013, 'Nuclear Physics the Monte Carlo Way'. The project was a theoretical study to explore a novel approach to dealing with a persistent problem in Monte Carlo approaches to quantum many-body systems. The goal was to implement a solution to the notorious 'sign-problem', which if successful, would permit, for the first time, exact solutions to quantum many-body systems that cannot be addressed with other methods. In this document, we outline the progress and accomplishments achieved during FY2006-2007 with LDRD funding in the proposal 06-LW-013, 'Nuclear Physics the Monte Carlo Way'. This project was funded under the Lab Wide LDRD competition at Lawrence Livermore National Laboratory. The primary objective of this project was to test the feasibility of implementing a novel approach to solving the generic quantum many-body problem, which is one of the most important problems being addressed in theoretical physics today. Instead of traditional methods based matrix diagonalization, this proposal focused a Monte Carlo method. The principal difficulty with Monte Carlo methods, is the so-called 'sign problem'. The sign problem, which will discussed in some detail later, is endemic to Monte Carlo approaches to the quantum many-body problem, and is the principal reason that they have not been completely successful in the past. Here, we outline our research in the 'shifted-contour method' applied the Auxiliary Field Monte Carlo (AFMC) method

  6. Threat Prioritization Process for the Czech Security Strategy Making

    Directory of Open Access Journals (Sweden)

    Milos Balaban

    2012-06-01

    Full Text Available This article offers systematic view of a process of identification of security threats and, subsequently, their use in the making of strategic documents, notably the Security Strategy of the Czech Republic. It is not the aim of the authors to name or define such threats, but to present the process itself. It is paramount to any credible security strategy that it deals with the threat identification in the most precise fashion. The authors take reservations against the “catalogue” approach and claim the processes of prioritization and categorization to be essential for any policies derived from the security strategy, especially in times of economic need. It is also the 2011 final paper of the project “Trends, Risks, and Scenarios of the Security Developments in the World, Europe, and the Czech Republic – Impacts on the Policy and Security System of the Czech Republic” (TRS / VG20102013009.

  7. Cyber Security Analysis by Attack Trees for a Reactor Protection System

    International Nuclear Information System (INIS)

    Park, Gee-Yong; Lee, Cheol Kwon; Choi, Jong Gyun; Kim, Dong Hoon; Lee, Young Jun; Kwon, Kee-Choon

    2008-01-01

    As nuclear facilities are introducing digital systems, the cyber security becomes an emerging topic to be analyzed and resolved. The domestic and other nation's regulatory bodies notice this topic and are preparing an appropriate guidance. The nuclear industry where new construction or upgrade of I and C systems is planned is analyzing and establishing a cyber security. A risk-based analysis for the cyber security has been performed in the KNICS (Korea Nuclear I and C Systems) project where the cyber security analysis has been applied to a reactor protection system (RPS). In this paper, the cyber security analysis based on the attack trees is proposed for the KNICS RPS

  8. Development of a portable X-ray and gamma-ray detector instrument and imaging camera for use in radioactive and hazardous materials management

    International Nuclear Information System (INIS)

    Scyoc, J.M. van; James, R.B.; Anderson, R.J.

    1997-08-01

    The overall goal of this LDRD project was to develop instruments for use in the management of radioactive and hazardous wastes. Devices for identifying and imaging such wastes are critical to developing environmental remediation strategies. Field portable units are required to enable the on-site analysis of solids, liquids, and gas effluents. Red mercuric iodide (α-HgI 2 ) is a semiconductor material that can be operated as a high-energy-resolution radiation detector at ambient temperatures. This property provides the needed performance of conventional germanium- and silicon-based devices, while eliminating the need for the cryogenic cooling of such instruments. The first year of this project focused on improving the materials properties of the mercuric iodide to enable the new sensor technology; in particular the charge carrier traps limiting device performance were determined and eliminated. The second year involved the development of a field portable x-ray fluorescence analyzer for compositional analyses. The third and final year of the project focused on the development of imaging sensors to provide the capability for mapping the composition of waste masses. This project resulted in instruments useful not only for managing hazardous and radioactive wastes, but also in a variety of industrial and national security applications

  9. Systems Security Engineering Capability Maturity Model (SSECMM), Model Description, Version 1.1

    National Research Council Canada - National Science Library

    1997-01-01

    This document is designed to acquaint the reader with the SSE-CMM Project as a whole and present the project's major work product - the Systems Security Engineering Capability Maturity Model (SSE- CMM...

  10. Threats to economic security of the region

    Directory of Open Access Journals (Sweden)

    Y. A. Salikov

    2017-01-01

    Full Text Available Various aspects of economic security are in sight of the researchers for more than two decades. Today in the economic literature widely presents the conceptual aspects of economic safety of the state. Theoretical and methodological foundations of the study of this multifaceted problem lies in the researches of many domestic and foreign scientists, which are the basic levels of economic security. Among the priority levels include, in our view, the regional level (meso-level and actual problems of economic security studied to date lack detail. Economic development regions of the country has its own specifics, which is projected to the achieving of regional and national economic security. The article summarizes the approaches to definition of essence of the category “economic security of the region” and was given its author’s interpretation, considers the reasons of appearance and development of crisis situations causing threats to the economic security of the region. Given that the prevention of threats and reduction of their consequences is the basis of regional economic security, the article identifies the main threats to economic security, as well as the peculiarities of their manifestations (for example, the most significant threats to economic security of the Voronezh region, as well as the proposed activities in support of regional economic security and stated objectives of regional economic policy, the solution of which is aimed at ensuring the economic security of the region. In addition, it is proved that the actual problems of economic security must be constantly in sight of the regional leadership and find its solution in government documents and policy programmes promising socio-economic development of the region.

  11. Need an Information Security in Access Control System?

    Directory of Open Access Journals (Sweden)

    V. R. Petrov

    2011-12-01

    Full Text Available The purpose of this paper is the general problems of information security in access control system. The field of using is the in project of reconstruction Physical protection system.

  12. State of security in Elasticsearch

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    Security is an often understated problem in high growth emerging branches of IT like big data and IoT. Elasticsearch is a great example because support for security not only came late, but it's a quite convoluted, non-open, and very expensive solution. Learn how Simone Scarduzio lead his Open Source project ReadonlyREST to become the solution of choice for many. From hackathon hustlers to Fortune500 corporates. ReadonlyREST is simple yet powerful because it leverages the concept of access control list (yes, like firewalls). We'll go through some creative use cases and business concepts made possible by the creative use of ReadonlyREST and its configuration model. About the speaker Simone Scarduzio has a 8 years background in software engineering, spanning from mobile messaging clusters to Cloud-first startups. He wrote the first book about Vert.x, a JVM micro services framework. Recently, he helped Thomson Reuters re-architect legacy back ends into secure, polyglot, resilient distributed systems. Today, ...

  13. Security Functions for a File Repository

    NARCIS (Netherlands)

    Helme, A.; Helme, Arne; Stabell-Kulo, Tage

    1997-01-01

    When personal machines are incorporated into distributed systems a new mixture of threats is exposed. The security effort in the MobyDick project is aimed at understanding how privacy can be protected in this new environment. Our claim is that a two-step process for authentication and authorisation

  14. National Security Technology Incubator Evaluation Process

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.

  15. Capacity Credit and Security of Supply

    DEFF Research Database (Denmark)

    Chozas, Julia Fernandez; Mathiesen, Brian Vad

    2015-01-01

    electricity systems are planned, and how renewable energies fit in these systems. The second part of the article assesses the actual contribution that variable renewable energies can make to security of supply, firstly from a qualitative point of view and secondly in measurable terms. The study is based......This paper addresses the question of how renewable energies can contribute to security of supply. In order to analyse this subject, the paper has two differentiated parts. In the first part, the concept of security of supply is reviewed. This provides the baseline to understand how current...... demand for electricity is highest, the study focuses on the capacity credit of future Danish scenarios including high penetrations of offshore wind, onshore wind, wave and solar PV. The results of this project can ultimately lead towards the improvement of existing rules and methods in system planning...

  16. HARD - The High Assurance Remote Authentication Device Project

    OpenAIRE

    2006-01-01

    The HARD project will build and evaluate a high assurance network access device. The purpose of this device is to provide an unforgeable trusted path with which network clients can securely interact with security-enabled remote servers.

  17. A REGIONAL PARTNERSHIP ON RADIOLOGICAL SECURITY

    International Nuclear Information System (INIS)

    Morris, Fred A.; Murray, A.; Dickerson, S.; Tynan, Douglas M.; Rawl, Richard R.; Hoo, Mark S.

    2007-01-01

    In 2004, Australia, through the Australian Nuclear Science and Technology Organisation (ANSTO) created the Regional Security of Radioactive Sources (RSRS) project and partnered with the U.S. Department of Energy's National Nuclear Security Administration (NNSA) and the International Atomic Energy Agency (IAEA) to form the Southeast Asian Regional Radiological Security Partnership (RRSP). The intent of the RRSP/RSRS partnership is to cooperate with regional neighbors in Southeast Asia to improve the security of their radioactive sources. This Southeast Asian Partnership supports NNSA and IAEA objectives to improve the security of high risk radioactive sources by raising awareness of the need, and developing national programs, to: protect and control such materials; improve the security of such materials and recover and condition the materials no longer in use. To date, agreed upon joint activities have included assistance with the improvement of regulatory infrastructure for the control of radioactive sources, training on the physical protection of radioactive sources, training and assistance with the search, location, identification and securing of orphan radioactive sources and overall assistance with implementing the IAEA Code of Conduct on the Safety and Security of Radioactive Sources. Since the inception of the partnership, ten Southeast Asian nations have participated in a range of activities from receiving general training on the security of radioactive sources to receiving specialized equipment and training to locate orphan or abandoned radioactive sources. By having a shared vision and objectives for radioactive source security in the Southeast Asian region, ANSTO and NNSA have been able to develop a successful partnership which has effectively utilized the technical, financial and political resources of each contributing partner. An example of how this partnership works is the cooperation with the Nuclear Energy Regulatory Agency, Indonesia (BAPETEN) to

  18. Elements of ESA's policy on space and security

    Science.gov (United States)

    Giannopapa, Christina; Adriaensen, Maarten; Antoni, Ntorina; Schrogl, Kai-Uwe

    2018-06-01

    In the past decade Europe has been facing rising security threats, ranging from climate change, migrations, nearby conflicts and crises, to terrorism. The demand to tackle these critical challenges is increasing in Member States. Space is already contributing, and could further contribute with already existing systems and future ones. The increasing need for security in Europe and for safety and security of Europe's space activities has led to a growing number of activities in ESA in various domains. It has also driven new and strengthened partnerships with security stakeholders in Europe. At the European level, ESA is collaborating closely with the main European institutions dealing with space security. In addition, as an organisation ESA has evolved to conduct security-related projects and programmes and to address the threats to its own activities, thereby securing the investments of the Member States. Over the past years the Agency has set up a comprehensive regulatory framework in order to be able to cope with security related requirements. Over the past years, ESA has increased its exchanges with its Member States. The paper presents main elements of the ESA's policy on space and security. It introduces the current European context for space and security, the European goals in this domain and the specific objectives to which the Agency intends to contribute. Space and security in the ESA context is set out under two components: a) security from space and b) security in space, including the security of ESA's own activities (corporate security and the security of ESA's space missions). Subsequently, ESA's activities are elaborated around these two pillars, composed of different activities conducted in the most appropriate frameworks and in coordination with the relevant stakeholders and shareholders.

  19. Cyber Security Analysis by Attack Trees for a Reactor Protection System

    Energy Technology Data Exchange (ETDEWEB)

    Park, Gee-Yong; Lee, Cheol Kwon; Choi, Jong Gyun; Kim, Dong Hoon; Lee, Young Jun; Kwon, Kee-Choon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2008-10-15

    As nuclear facilities are introducing digital systems, the cyber security becomes an emerging topic to be analyzed and resolved. The domestic and other nation's regulatory bodies notice this topic and are preparing an appropriate guidance. The nuclear industry where new construction or upgrade of I and C systems is planned is analyzing and establishing a cyber security. A risk-based analysis for the cyber security has been performed in the KNICS (Korea Nuclear I and C Systems) project where the cyber security analysis has been applied to a reactor protection system (RPS). In this paper, the cyber security analysis based on the attack trees is proposed for the KNICS RPS.

  20. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  1. Analyst-to-Analyst Variability in Simulation-Based Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Glickman, Matthew R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Romero, Vicente J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-02-01

    This report describes findings from the culminating experiment of the LDRD project entitled, "Analyst-to-Analyst Variability in Simulation-Based Prediction". For this experiment, volunteer participants solving a given test problem in engineering and statistics were interviewed at different points in their solution process. These interviews are used to trace differing solutions to differing solution processes, and differing processes to differences in reasoning, assumptions, and judgments. The issue that the experiment was designed to illuminate -- our paucity of understanding of the ways in which humans themselves have an impact on predictions derived from complex computational simulations -- is a challenging and open one. Although solution of the test problem by analyst participants in this experiment has taken much more time than originally anticipated, and is continuing past the end of this LDRD, this project has provided a rare opportunity to explore analyst-to-analyst variability in significant depth, from which we derive evidence-based insights to guide further explorations in this important area.

  2. Evaluating pay-as-you-go social security systems

    OpenAIRE

    Bachmann, Andreas; Wüthrich, Kaspar

    2013-01-01

    This paper proposes a new method for welfare analysis of unfunded social security systems. Based on an overlapping generations model with endogenous labor supply, we derive a formula for the evaluation of existing pay-as-you-go social security systems that depends on impulse response functions and projected growth rates only. We propose an implementation strategy based on reduced form estimates of a VAR model that is valid under weak assumptions about the deep structure of the model. Our meth...

  3. Information Governance: A Model for Security in Medical Practice

    Directory of Open Access Journals (Sweden)

    Patricia A.H. Williams

    2007-03-01

    Full Text Available Information governance is becoming an important aspect of organisational accountability. In consideration that information is an integral asset of most organisations, the protection of this asset will increasingly rely on organisational capabilities in security.  In the medical arena this information is primarily sensitive patient-based information. Previous research has shown that application of security measures is a low priority for primary care medical practice and that awareness of the risks are seriously underestimated. Consequently, information security governance will be a key issue for medical practice in the future. Information security governance is a relatively new term and there is little existing research into how to meet governance requirements. The limited research that exists describes information security governance frameworks at a strategic level. However, since medical practice is already lagging in the implementation of appropriate security, such definition may not be practical although it is obviously desirable. This paper describes an on-going action research project undertaken in the area of medical information security, and presents a tactical approach model aimed at addressing information security governance and the protection of medical data. 

  4. Laboratory-Directed Research and Development 2016 Summary Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Pillai, Rekha Sukamar [Idaho National Lab. (INL), Idaho Falls, ID (United States); Jacobson, Julie Ann [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2017-01-01

    The Laboratory-Directed Research and Development (LDRD) Program at Idaho National Laboratory (INL) reports its status to the U.S. Department of Energy (DOE) by March of each year. The program operates under the authority of DOE Order 413.2C, “Laboratory Directed Research and Development” (April 19, 2006), which establishes DOE’s requirements for the program while providing the laboratory director broad flexibility for program implementation. LDRD funds are obtained through a charge to all INL programs. This report includes summaries of all INL LDRD research activities supported during Fiscal Year (FY) 2016. INL is the lead laboratory for the DOE Office of Nuclear Energy (DOE-NE). The INL mission is to discover, demonstrate, and secure innovative nuclear energy solutions, other clean energy options, and critical infrastructure with a vision to change the world’s energy future and secure our critical infrastructure. Operating since 1949, INL is the nation’s leading research, development, and demonstration center for nuclear energy, including nuclear nonproliferation and physical and cyber-based protection of energy systems and critical infrastructure, as well as integrated energy systems research, development, demonstration, and deployment. INL has been managed and operated by Battelle Energy Alliance, LLC (a wholly owned company of Battelle) for DOE since 2005. Battelle Energy Alliance, LLC, is a partnership between Battelle, BWX Technologies, Inc., AECOM, the Electric Power Research Institute, the National University Consortium (Massachusetts Institute of Technology, Ohio State University, North Carolina State University, University of New Mexico, and Oregon State University), and the Idaho university collaborators (i.e., University of Idaho, Idaho State University, and Boise State University). Since its creation, INL’s research and development (R&D) portfolio has broadened with targeted programs supporting national missions to advance nuclear energy

  5. LABORATORY DIRECTED RESEARCH AND DEVELOPMENT ANNUAL REPORT TO THE DEPARTMENT OF ENERGY - DECEMBER 2000.

    Energy Technology Data Exchange (ETDEWEB)

    FOX,K.J.

    2000-12-31

    The goals and objectives of BNL's LDRD Program can be inferred from the Program's stated purposes. These are to (1) encourage and support the development of new ideas and technology, (2) promote the early exploration and I exploitation of creative and innovative concepts, and (3) develop new ''fundable'' R&D projects and programs. The emphasis is clearly articulated by BNL to be on supporting exploratory research ''which could lead to new programs, ,projects, and directions'' for the Laboratory. As one of the premier scientific laboratories of the DOE, BNL must continuously foster groundbreaking scientific research. At Brookhaven National Laboratory one such method is through its Laboratory Directed Research and Development Program. This discretionary research and development tool is critical in maintaining the scientific excellence and long-term vitality of the Laboratory. Additionally, it is a means to stimulate the scientific community, fostering new science and technology ideas, which is a major factor in achieving and maintaining staff excellence and a means to address national needs within the overall mission of the DOE and BNL. The LDRD Annual Report contains summaries of all research activities funded during Fiscal Year 2000. The Project Summaries with their accomplishments described in this report reflect the above. Aside from leading to new fundable or promising programs and producing especially noteworthy research, they have resulted in numerous publications in various professional and scientific journals and presentations at meetings and forums. All FY 2000 projects are listed and tabulated in the Project Funding Table. Also included in this Annual Report in Appendix A is a summary of the proposed projects for FY 2001. The BNL LDRD budget authority by DOE in FY 2000 was $6 million. The.actual allocation totaled $5.5 million. The following sections in this report contain the management processes, peer

  6. Effects of Security actions

    Science.gov (United States)

    Bergman, Ramona; Andersson-Sköld, Yvonne; Nyberg, Lars; Johansson, Magnus

    2010-05-01

    In a project funded by the Swedish Civil Contingencies Agency, the effort and work to reduce different kinds of accidents are being evaluated. The project wants to illuminate the links between actions and outcome, so we can learn from today's performance and in the future select more effective measures and overall deal with accidents more efficiently. The project ESS covers the field of frequent accidents such as sliding accidents at home, in house fires and less common accidents such as chemical and land fill accidents up to even more rare accidents such as natural accidents and hazards. In the ESS project SGI (Swedish geotechnical institute) will evaluate the work and effort concerning various natural hazards limited to landslides, erosion and flooding. The aim is to investigate how municipalities handle, especially prevention, of such natural disasters today. The project includes several aspects such as: • which are the driving forces for risk analysis in a municipality • do one use risk mapping (and what type) in municipal risk analysis • which aspects are most important when selecting preventive measures • in which way do one learn from past accidents • and from previous accidents elsewhere, by for example use existing databases • etc There are many aspects that play a role in a well-functioning safety promotion work. The overall goal is to examine present work and activities, highlight what is well functioning and identify weak points. The aim is to find out where more resources are needed and give suggestions for a more efficient security work. This includes identification of the most efficient "tools" in use or needed. Such tools can be education, directives, funding, more easily available maps and information regarding previous accidents and preventive measures etc. The project will result in recommendations for more effective ways to deal with landslides, erosion and flooding. Since different kinds of problems can occur depending on level of

  7. Speeding decisions. Social security's information exchange program.

    Science.gov (United States)

    Winter, Kitt; Hastings, Bob

    2011-05-01

    The Social Security Administration has plenty of reasons to streamline its records request process-more than 15 million reasons each year, in fact. That's why it has been pioneering information exchange projects with the private sector, including use of the Nationwide Health Information Network.

  8. Integration of EGA secure data access into Galaxy.

    Science.gov (United States)

    Hoogstrate, Youri; Zhang, Chao; Senf, Alexander; Bijlard, Jochem; Hiltemann, Saskia; van Enckevort, David; Repo, Susanna; Heringa, Jaap; Jenster, Guido; J A Fijneman, Remond; Boiten, Jan-Willem; A Meijer, Gerrit; Stubbs, Andrew; Rambla, Jordi; Spalding, Dylan; Abeln, Sanne

    2016-01-01

    High-throughput molecular profiling techniques are routinely generating vast amounts of data for translational medicine studies. Secure access controlled systems are needed to manage, store, transfer and distribute these data due to its personally identifiable nature. The European Genome-phenome Archive (EGA) was created to facilitate access and management to long-term archival of bio-molecular data. Each data provider is responsible for ensuring a Data Access Committee is in place to grant access to data stored in the EGA. Moreover, the transfer of data during upload and download is encrypted. ELIXIR, a European research infrastructure for life-science data, initiated a project (2016 Human Data Implementation Study) to understand and document the ELIXIR requirements for secure management of controlled-access data. As part of this project, a full ecosystem was designed to connect archived raw experimental molecular profiling data with interpreted data and the computational workflows, using the CTMM Translational Research IT (CTMM-TraIT) infrastructure http://www.ctmm-trait.nl as an example. Here we present the first outcomes of this project, a framework to enable the download of EGA data to a Galaxy server in a secure way. Galaxy provides an intuitive user interface for molecular biologists and bioinformaticians to run and design data analysis workflows. More specifically, we developed a tool -- ega_download_streamer - that can download data securely from EGA into a Galaxy server, which can subsequently be further processed. This tool will allow a user within the browser to run an entire analysis containing sensitive data from EGA, and to make this analysis available for other researchers in a reproducible manner, as shown with a proof of concept study.  The tool ega_download_streamer is available in the Galaxy tool shed: https://toolshed.g2.bx.psu.edu/view/yhoogstrate/ega_download_streamer.

  9. External Service Providers to the National Security Technology Incubator: Formalization of Relationships

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-04-30

    This report documents the formalization of relationships with external service providers in the development of the National Security Technology Incubator (NSTI). The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report summarizes the process in developing and formalizing relationships with those service providers and includes a sample letter of cooperation executed with each provider.

  10. Digital watermarking for secure and adaptive teleconferencing

    Science.gov (United States)

    Vorbrueggen, Jan C.; Thorwirth, Niels

    2002-04-01

    The EC-sponsored project ANDROID aims to develop a management system for secure active networks. Active network means allowing the network's customers to execute code (Java-based so-called proxylets) on parts of the network infrastructure. Secure means that the network operator nonetheless retains full control over the network and its resources, and that proxylets use ANDROID-developed facilities to provide secure applications. Management is based on policies and allows autonomous, distributed decisions and actions to be taken. Proxylets interface with the system via policies; among actions they can take is controlling execution of other proxylets or redirection of network traffic. Secure teleconferencing is used as the application to demonstrate the approach's advantages. A way to control a teleconference's data streams is to use digital watermarking of the video, audio and/or shared-whiteboard streams, providing an imperceptible and inseparable side channel that delivers information from originating or intermediate stations to downstream stations. Depending on the information carried by the watermark, these stations can take many different actions. Examples are forwarding decisions based on security classifications (possibly time-varying) at security boundaries, set-up and tear-down of virtual private networks, intelligent and adaptive transcoding, recorder or playback control (e.g., speaking off the record), copyright protection, and sender authentication.

  11. Nevada National Security Site Waste Acceptance Criteria

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Management

    2010-09-03

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  12. Nevada National Security Site Waste Acceptance Criteria

    International Nuclear Information System (INIS)

    2010-01-01

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  13. Nevada National Security Site Waste Acceptance Criteria

    International Nuclear Information System (INIS)

    2011-01-01

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  14. SecurePhone: a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly

    Science.gov (United States)

    Ricci, R.; Chollet, G.; Crispino, M. V.; Jassim, S.; Koreman, J.; Olivar-Dimas, M.; Garcia-Salicetti, S.; Soria-Rodriguez, P.

    2006-05-01

    This article presents an overview of the SecurePhone project, with an account of the first results obtained. SecurePhone's primary aim is to realise a mobile phone prototype - the 'SecurePhone' - in which biometrical authentication enables users to deal secure, dependable transactions over a mobile network. The SecurePhone is based on a commercial PDA-phone, supplemented with specific software modules and a customised SIM card. It integrates in a single environment a number of advanced features: access to cryptographic keys through strong multimodal biometric authentication; appending and verification of digital signatures; real-time exchange and interactive modification of (esigned) documents and voice recordings. SecurePhone's 'biometric recogniser' is based on original research. A fused combination of three different biometric methods - speaker, face and handwritten signature verification - is exploited, with no need for dedicated hardware components. The adoption of non-intrusive, psychologically neutral biometric techniques is expected to mitigate rejection problems that often inhibit the social use of biometrics, and speed up the spread of e-signature technology. Successful biometric authentication grants access to SecurePhone's built-in esignature services through a user-friendly interface. Special emphasis is accorded to the definition of a trustworthy security chain model covering all aspects of system operation. The SecurePhone is expected to boost m-commerce and open new scenarios for m-business and m-work, by changing the way people interact and by improving trust and confidence in information technologies, often considered intimidating and difficult to use. Exploitation plans will also explore other application domains (physical and logical access control, securised mobile communications).

  15. Data security in Intelligent Transport Systems

    Directory of Open Access Journals (Sweden)

    Tomas Zelinka

    2012-10-01

    Full Text Available Intelligent Transport Services expect availability of the secure seamless communications solutions typically covering widely spread areas. Different ITS solutions require different portfolio of telecommunications service quality. These parameters have to correspond with ITS service performance parameters required by specific service. Even though quite extensive range of public wireless data services with reasonable coverage are provided, most of them are provided with no guaranteed quality and security. ITS requirements can be in most parameters easier reached if multi-path communications systems are applied core solution is combined with both public as well as private ones where and when it is needed. Such solution requires implementation of relevant flexible system architecture supported by the efficient decision processes. This paper is concentrated the telecommunications security issues relevant to the ITS wide area networking. Expected level of security varies in dependence on relevant ITS service requirements. Data volumes transferred both in private data vehicle on board networks as well as between vehicles and infrastructure (C2I or other vehicles (C2C progressively grow. Such trend upsurges the fatal problems appearance probability in case security of the wide area networks is not relevantly treated. That is reason why relevant communications security treatment becomes crucial part of the ITS solution. Besides of available "off shelf" security tools we present solution based on non-public universal identifier with dynamical extension (time and position dependency as an autonomous variables and data selection according to actor role or category. Presented results were obtained within projects e-Ident1, DOTEK2 and SRATVU3.

  16. Secure Information Exchange Gateway for Electric Grid Operations

    Energy Technology Data Exchange (ETDEWEB)

    Robertson, F. Russell [Grid Protection Alliance, Chattanooga, TN (United States); Carroll, J. Ritchie [Grid Protection Alliance, Chattanooga, TN (United States); Sanders, William [Univ. of Illinois, Urbana-Champaign, IL (United States); Yardley, Timothy [Univ. of Illinois, Urbana-Champaign, IL (United States); Heine, Erich [Univ. of Illinois, Urbana-Champaign, IL (United States); Hadley, Mark [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); McKinnon, David [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Motteler, Barbara [Alstom Grid Inc., Levallois-Perret Cedex (France); Giri, Jay [Grid Protection Alliance, Chattanooga, TN (United States); Walker, William [PJM Interconnection (PJM), Norristown, PA (United States); McCartha, Esrick [PJM Interconnection (PJM), Norristown, PA (United States)

    2014-09-30

    The major objectives of the SIEGate project were to improve the security posture and minimize the cyber-attack surface of electric utility control centers and to reduce the cost of maintaining control-room-to-control-room information exchange. Major project goals included the design, development, testing, and commercialization of a single security-hardened appliance that could meet industry needs for resisting cyber-attacks while protecting the confidentiality and integrity of a growing volume of real-time information needed to ensure the reliability of the bulk electric system and interoperating with existing data formats and networking technologies. The SIEGate project has achieved its goals and objectives. The SIEGate Design Document, issued in March 2012, presented SIEGate use cases, provided SIEGate requirements, established SIEGate design principles, and prescribed design functionality of SIEGate as well as the components that make up SIEGate. SIEGate Release Version 1.0 was posted in January 2014. Release Version 1.0.83, which was posted on March 28, 2014, fixed many issues discovered by early adopters and added several new features. Release Candidate 1.1, which added additional improvements and bug fixes, was posted in June 2014. SIEGate executables have been downloaded more than 300 times. SIEGate has been tested at PJM, Entergy, TVA, and Southern. Security testing and analysis of SIEGate has been conducted at PNNL and PJM. Alstom has provided a summary of recommended steps for commercialization of the SIEGate Appliance and identified two deployment models with immediate commercial application.

  17. 44 CFR 78.12 - Eligible types of projects.

    Science.gov (United States)

    2010-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program FLOOD MITIGATION ASSISTANCE § 78.12 Eligible types of projects. The following types of projects are eligible for.... (g) Minor physical flood mitigation projects that reduce localized flooding problems and do not...

  18. Security Reasoning, Spatial Politics, Patriarchy and the Economic ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Security Reasoning, Spatial Politics, Patriarchy and the Economic Rights of ... find a job, start a business, and participate in the formal or informal economy. ... and engage in public policy dialogue will be an important aspect of this project.

  19. Clean air and project financing

    International Nuclear Information System (INIS)

    Zimmer, M.J.

    1992-01-01

    This article examines how environmental requirements are challenging the developers ability to secure financing for independent energy projects. The topics addressed in the article include a review of the US Environmental Protection Agency auction rules for acid rain emission allowances, short term and long term market demand, project financing issues, credit value and matching interests

  20. Spins, Stalls, and Shutdowns: Pitfalls of Qualitative Policing and Security Research

    Directory of Open Access Journals (Sweden)

    Randy K. Lippert

    2015-11-01

    Full Text Available This article explores key elements of qualitative research on policing and security agencies, including barriers encountered and strategies to prevent them. While it is oft-assumed that policing/security agencies are difficult to access due to their clandestine or bureaucratic nature, this article demonstrates this is not necessarily the case, as access was gained for three distinct qualitative research projects. Yet, access and subsequent research were not without pitfalls, which we term security spins, security stalls, and security shutdowns. We illustrate how each was encountered and argue these pitfalls are akin to researchers falling into risk categories, not unlike those used by policing/security agents in their work. Before concluding we discuss methodological strategies for scholars to avoid these pitfalls and to advance research that critically interrogates the immense policing/security realm. URN: http://nbn-resolving.de/urn:nbn:de:0114-fqs1601108

  1. Barakah Project in UAE

    Energy Technology Data Exchange (ETDEWEB)

    Petrunik, K. [Emirates Nuclear Energy Corp., Abu Dhabi (United Arab Emirates)

    2014-07-01

    This paper reviews the Barakah Project in United Arab Emirates (UAE). Development of UAE nuclear power plant programme is proceeding and construction is well under way. Nuclear energy is a compelling solution to energy demand in the UAE. Economics, environment, energy security, diversification and industrial development are the key drivers of this program. The project continues ro meet construction milestones, capacity building and training on UAE Nationals.

  2. The changing face of Hanford security 1990--1994

    International Nuclear Information System (INIS)

    Thielman, J.

    1995-01-01

    The meltdown of the Cold War was a shock to the systems built to cope with it. At the DOE's Hanford Site in Washington State, a world-class safeguards and security system was suddenly out of step with the times. The level of protection for nuclear and classified materials was exceptional. But the cost was high and the defense facilities that funded security were closing down. The defense mission had created an umbrella of security over the sprawling Hanford Site. Helicopters designed to ferry special response teams to any trouble spot on the 1,456 square-kilometer site made the umbrella analogy almost literally true. Facilities were grouped into areas, fenced off like a military base, and entrance required a badge check for everyone. Within the fence, additional rings of protection were set up around security interests or targets. The security was effective, but costly to operate and inconvenient for employees and visitors alike. Moreover, the umbrella meant that virtually all employees needed a security clearance just to get to work, whether they worked on classified or unclassified projects. Clearly, some fundamental rethinking of safeguards and security was needed. The effort to meet that challenge is the story of transition at Hanford and documented here

  3. Auditing cloud computing a security and privacy guide

    CERN Document Server

    Halpert, Ben

    2011-01-01

    The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment Many organizations are reporting or projecting a significant cost savings through the use of cloud computing-utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just as many organizations, however, are expressing concern with security and privacy issues for their organization's data in the "cloud." Auditing Cloud Computing provides necessary guidance to build a proper audit to ensure operational integrity and customer data protection, among othe

  4. IT Security Vulnerability and Incident Response Management

    NARCIS (Netherlands)

    Hafkamp, W.H.M.; Paulus, S.; Pohlman, N.; Reimer, H.

    2006-01-01

    This paper summarises the results of a Dutch PhD research project on IT security vulnerability and incident response management, which is supervised by the University of Twente in the Netherlands and which is currently in its final stage. Vulnerabilities are ‘failures or weaknesses in computer

  5. 49 CFR 15.5 - Sensitive security information.

    Science.gov (United States)

    2010-10-01

    ... held by the Federal government concerning threats against transportation or transportation systems and..., including threat images and descriptions of threat images for threat image projection systems. (10) Security... systems operated by the Federal government that have been identified by the DOT or DHS as critical to...

  6. Security model for picture archiving and communication systems.

    Science.gov (United States)

    Harding, D B; Gac, R J; Reynolds, C T; Romlein, J; Chacko, A K

    2000-05-01

    The modern information revolution has facilitated a metamorphosis of health care delivery wrought with the challenges of securing patient sensitive data. To accommodate this reality, Congress passed the Health Insurance Portability and Accountability Act (HIPAA). While final guidance has not fully been resolved at this time, it is up to the health care community to develop and implement comprehensive security strategies founded on procedural, hardware and software solutions in preparation for future controls. The Virtual Radiology Environment (VRE) Project, a landmark US Army picture archiving and communications system (PACS) implemented across 10 geographically dispersed medical facilities, has addressed that challenge by planning for the secure transmission of medical images and reports over their local (LAN) and wide area network (WAN) infrastructure. Their model, which is transferable to general PACS implementations, encompasses a strategy of application risk and dataflow identification, data auditing, security policy definition, and procedural controls. When combined with hardware and software solutions that are both non-performance limiting and scalable, the comprehensive approach will not only sufficiently address the current security requirements, but also accommodate the natural evolution of the enterprise security model.

  7. Unobtrusive Multimodal Biometric Authentication: The HUMABIO Project Concept

    Directory of Open Access Journals (Sweden)

    Evangelos Bekiaris

    2008-03-01

    Full Text Available Human Monitoring and Authentication using Biodynamic Indicators and Behavioural Analysis (HUMABIO (2007 is an EU Specific Targeted Research Project (STREP where new types of biometrics are combined with state of the art sensorial technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system which utilizes a biodynamic physiological profile, unique for each individual, and advancements of the state-of-the art in behavioural and other biometrics, such as face, speech, gait recognition, and seat-based anthropometrics. Several shortcomings in biometric authentication will be addressed in the course of HUMABIO which will provide the basis for improving existing sensors, develop new algorithms, and design applications, towards creating new, unobtrusive biometric authentication procedures in security sensitive, controlled environments. This paper presents the concept of this project, describes its unobtrusive authentication demonstrator, and reports some preliminary results.

  8. Integrated secure solution for electronic healthcare records sharing

    Science.gov (United States)

    Yao, Yehong; Zhang, Chenghao; Sun, Jianyong; Jin, Jin; Zhang, Jianguo

    2007-03-01

    The EHR is a secure, real-time, point-of-care, patient-centric information resource for healthcare providers. Many countries and regional districts have set long-term goals to build EHRs, and most of EHRs are usually built based on the integration of different information systems with different information models and platforms. A number of hospitals in Shanghai are also piloting the development of an EHR solution based on IHE XDS/XDS-I profiles with a service-oriented architecture (SOA). The first phase of the project targets the Diagnostic Imaging domain and allows seamless sharing of images and reports across the multiple hospitals. To develop EHRs for regional coordinated healthcare, some factors should be considered in designing architecture, one of which is security issue. In this paper, we present some approaches and policies to improve and strengthen the security among the different hospitals' nodes, which are compliant with the security requirements defined by IHE IT Infrastructure (ITI) Technical Framework. Our security solution includes four components: Time Sync System (TSS), Digital Signature Manage System (DSMS), Data Exchange Control Component (DECC) and Single Sign-On (SSO) System. We give a design method and implementation strategy of these security components, and then evaluate the performance and overheads of the security services or features by integrating the security components into an image-based EHR system.

  9. Foundational development of an advanced nuclear reactor integrated safety code

    International Nuclear Information System (INIS)

    Clarno, Kevin; Lorber, Alfred Abraham; Pryor, Richard J.; Spotz, William F.; Schmidt, Rodney Cannon; Belcourt, Kenneth; Hooper, Russell Warren; Humphries, Larry LaRon

    2010-01-01

    This report describes the activities and results of a Sandia LDRD project whose objective was to develop and demonstrate foundational aspects of a next-generation nuclear reactor safety code that leverages advanced computational technology. The project scope was directed towards the systems-level modeling and simulation of an advanced, sodium cooled fast reactor, but the approach developed has a more general applicability. The major accomplishments of the LDRD are centered around the following two activities. (1) The development and testing of LIME, a Lightweight Integrating Multi-physics Environment for coupling codes that is designed to enable both 'legacy' and 'new' physics codes to be combined and strongly coupled using advanced nonlinear solution methods. (2) The development and initial demonstration of BRISC, a prototype next-generation nuclear reactor integrated safety code. BRISC leverages LIME to tightly couple the physics models in several different codes (written in a variety of languages) into one integrated package for simulating accident scenarios in a liquid sodium cooled 'burner' nuclear reactor. Other activities and accomplishments of the LDRD include (a) further development, application and demonstration of the 'non-linear elimination' strategy to enable physics codes that do not provide residuals to be incorporated into LIME, (b) significant extensions of the RIO CFD code capabilities, (c) complex 3D solid modeling and meshing of major fast reactor components and regions, and (d) an approach for multi-physics coupling across non-conformal mesh interfaces.

  10. Foundational development of an advanced nuclear reactor integrated safety code.

    Energy Technology Data Exchange (ETDEWEB)

    Clarno, Kevin (Oak Ridge National Laboratory, Oak Ridge, TN); Lorber, Alfred Abraham; Pryor, Richard J.; Spotz, William F.; Schmidt, Rodney Cannon; Belcourt, Kenneth (Ktech Corporation, Albuquerque, NM); Hooper, Russell Warren; Humphries, Larry LaRon

    2010-02-01

    This report describes the activities and results of a Sandia LDRD project whose objective was to develop and demonstrate foundational aspects of a next-generation nuclear reactor safety code that leverages advanced computational technology. The project scope was directed towards the systems-level modeling and simulation of an advanced, sodium cooled fast reactor, but the approach developed has a more general applicability. The major accomplishments of the LDRD are centered around the following two activities. (1) The development and testing of LIME, a Lightweight Integrating Multi-physics Environment for coupling codes that is designed to enable both 'legacy' and 'new' physics codes to be combined and strongly coupled using advanced nonlinear solution methods. (2) The development and initial demonstration of BRISC, a prototype next-generation nuclear reactor integrated safety code. BRISC leverages LIME to tightly couple the physics models in several different codes (written in a variety of languages) into one integrated package for simulating accident scenarios in a liquid sodium cooled 'burner' nuclear reactor. Other activities and accomplishments of the LDRD include (a) further development, application and demonstration of the 'non-linear elimination' strategy to enable physics codes that do not provide residuals to be incorporated into LIME, (b) significant extensions of the RIO CFD code capabilities, (c) complex 3D solid modeling and meshing of major fast reactor components and regions, and (d) an approach for multi-physics coupling across non-conformal mesh interfaces.

  11. Room-Temperature Single-Photon Source for Secure Quantum Communication

    Data.gov (United States)

    National Aeronautics and Space Administration — We are asking for four years of support for PhD student Justin Winkler's work on a research project entitled "Room temperature single photon source for secure...

  12. Global agenda, local health: including concepts of health security in preparedness programs at the jurisdictional level.

    Science.gov (United States)

    Eby, Chas

    2014-01-01

    The Global Health Security Agenda's objectives contain components that could help health departments address emerging public health challenges that threaten the population. As part of the agenda, partner countries with advanced public health systems will support the development of infrastructure in stakeholder health departments. To facilitate this process and augment local programs, state and local health departments may want to include concepts of health security in their public health preparedness offices in order to simultaneously build capacity. Health security programs developed by public health departments should complete projects that are closely aligned with the objectives outlined in the global agenda and that facilitate the completion of current preparedness grant requirements. This article identifies objectives and proposes tactical local projects that run parallel to the 9 primary objectives of the Global Health Security Agenda. Executing concurrent projects at the international and local levels in preparedness offices will accelerate the completion of these objectives and help prevent disease epidemics, detect health threats, and respond to public health emergencies. Additionally, future funding tied or related to health security may become more accessible to state and local health departments that have achieved these objectives.

  13. Marketing Plan for the National Security Technology Incubator

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubator program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.

  14. A nuclear facility Security Analyzer written in Prolog

    International Nuclear Information System (INIS)

    Zimmerman, B.D.

    1987-01-01

    The Security Analyzer project was undertaken to use the Prolog artificial intelligence programming language and Entity-Relationship database construction techniques to produce an intelligent database computer program capable of analyzing the effectiveness of a nuclear facility's security systems. The Security Analyzer program can search through a facility to find all possible surreptitious entry paths that meet various user-selected time and detection probability criteria. The program can also respond to user-formulated queries concerning the database information. The intelligent database approach allows the program to perform a more comprehensive path search than other programs that only find a single optimal path. The program also is more flexible in that the database, once constructed, can be interrogated and used for purposes independent of the searching function

  15. A nuclear facility Security Analyzer written in PROLOG

    International Nuclear Information System (INIS)

    Zimmerman, B.D.

    1987-08-01

    The Security Analyzer project was undertaken to use the Prolog ''artificial intelligence'' programming language and Entity-Relationship database construction techniques to produce an intelligent database computer program capable of analyzing the effectiveness of a nuclear facility's security systems. The Security Analyzer program can search through a facility to find all possible surreptitious entry paths that meet various user-selected time and detection probability criteria. The program can also respond to user-formulated queries concerning the database information. The intelligent database approach allows the program to perform a more comprehensive path search than other programs that only find a single ''optimal'' path. The program also is more flexible in that the database, once constructed, can be interrogated and used for purposes independent of the searching function

  16. What is Security? A perspective on achieving security

    Energy Technology Data Exchange (ETDEWEB)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  17. ICT security- aspects important for nuclear facilities

    International Nuclear Information System (INIS)

    Thunem, Atoosa P-J.

    2005-09-01

    Rapid application growth of complex Information and Communication Technologies (ICT) in every society and state infrastructure as well as industry has revealed vulnerabilities that eventually have given rise to serious security breaches. These vulnerabilities together with the course of the breaches from cause to consequence are gradually about to convince the field experts that ensuring the security of ICT-driven systems is no longer possible by only relying on the fundaments of computer science, IT, or telecommunications. Appropriating knowledge from other disciplines is not only beneficial, but indeed very necessary. At the same time, it is a common observation today that ICT-driven systems are used everywhere, from the nuclear, aviation, commerce and healthcare domains to camera-equipped web-enabled cellular phones. The increasing interdisciplinary and inter-sectoral aspects of ICT security worldwide have been providing updated and useful information to the nuclear domain, as one of the emerging users of ICT-driven systems. Nevertheless, such aspects have also contributed to new and complicated challenges, as ICT security for the nuclear domain is in a much more delicate manner than for any other domains related to the concept of safety, at least from the public standpoint. This report addresses some important aspects of ICT security that need to be considered at nuclear facilities. It deals with ICT security and the relationship between security and safety from a rather different perspective than usually observed and applied. The report especially highlights the influence on the security of ICT-driven systems by all other dependability factors, and on that basis suggests a framework for ICT security profiling, where several security profiles are assumed to be valid and used in parallel for each ICT-driven system, sub-system or unit at nuclear facilities. The report also covers a related research topic of the Halden Project with focus on cyber threats and

  18. Potential applications of nanostructured materials in nuclear waste management.

    Energy Technology Data Exchange (ETDEWEB)

    Braterman, Paul S. (The University of North Texas, Denton, TX); Phol, Phillip Isabio; Xu, Zhi-Ping (The University of North Texas, Denton, TX); Brinker, C. Jeffrey; Yang, Yi (University of New Mexico, Albuquerque, NM); Bryan, Charles R.; Yu, Kui; Xu, Huifang (University of New Mexico, Albuquerque, NM); Wang, Yifeng; Gao, Huizhen

    2003-09-01

    This report summarizes the results obtained from a Laboratory Directed Research & Development (LDRD) project entitled 'Investigation of Potential Applications of Self-Assembled Nanostructured Materials in Nuclear Waste Management'. The objectives of this project are to (1) provide a mechanistic understanding of the control of nanometer-scale structures on the ion sorption capability of materials and (2) develop appropriate engineering approaches to improving material properties based on such an understanding.

  19. All projects related to | Page 137 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Project. Africa has the highest proportion of undernourished people in the world. Topic: AFRICA SOUTH OF SAHARA, SMALL FARMS, AGRICULTURE, WOMEN, Food security. Region: Burundi, Ethiopia, Kenya, Malawi, Mozambique, Rwanda, Zimbabwe, Uganda, Tanzania, Zambia. Program: Agriculture and Food Security.

  20. End-to-end integrated security and performance analysis on the DEGAS Choreographer platform

    DEFF Research Database (Denmark)

    Buchholtz, Mikael; Gilmore, Stephen; Haenel, Valentin

    2005-01-01

    We present a software tool platform which facilitates security and performance analysis of systems which starts and ends with UML model descriptions. A UML project is presented to the platform for analysis, formal content is extracted in the form of process calculi descriptions, analysed with the......We present a software tool platform which facilitates security and performance analysis of systems which starts and ends with UML model descriptions. A UML project is presented to the platform for analysis, formal content is extracted in the form of process calculi descriptions, analysed...

  1. National Security and the Accelerating Risks of Climate Change

    Science.gov (United States)

    2014-05-01

    there would be too much. Over the coming decades, projected climate change likely will cause Australia, portions of India , and much of inland China...significant potential water , food, and energy insecurity; political instability; extreme weather events; and other manifestations of climate change ...production, and human sustenance. In light of projected climate change , stresses on the water -food-energy nexus are a mounting security concern

  2. Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan.

    Science.gov (United States)

    Sahi, Aqeel; Lai, David; Li, Yan

    2016-11-01

    Cloud computing was introduced as an alternative storage and computing model in the health sector as well as other sectors to handle large amounts of data. Many healthcare companies have moved their electronic data to the cloud in order to reduce in-house storage, IT development and maintenance costs. However, storing the healthcare records in a third-party server may cause serious storage, security and privacy issues. Therefore, many approaches have been proposed to preserve security as well as privacy in cloud computing projects. Cryptographic-based approaches were presented as one of the best ways to ensure the security and privacy of healthcare data in the cloud. Nevertheless, the cryptographic-based approaches which are used to transfer health records safely remain vulnerable regarding security, privacy, or the lack of any disaster recovery strategy. In this paper, we review the related work on security and privacy preserving as well as disaster recovery in the eHealth cloud domain. Then we propose two approaches, the Security-Preserving approach and the Privacy-Preserving approach, and a disaster recovery plan. The Security-Preserving approach is a robust means of ensuring the security and integrity of Electronic Health Records, and the Privacy-Preserving approach is an efficient authentication approach which protects the privacy of Personal Health Records. Finally, we discuss how the integrated approaches and the disaster recovery plan can ensure the reliability and security of cloud projects. Copyright © 2016 Elsevier Ltd. All rights reserved.

  3. Risk assessment of climate systems for national security.

    Energy Technology Data Exchange (ETDEWEB)

    Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean; Cai, Ximing; Conrad, Stephen Hamilton; Constantine, Paul G; Dalbey, Keith R.; Debusschere, Bert J.; Fields, Richard; Hart, David Blaine; Kalinina, Elena Arkadievna; Kerstein, Alan R.; Levy, Michael; Lowry, Thomas Stephen; Malczynski, Leonard A.; Najm, Habib N.; Overfelt, James Robert; Parks, Mancel Jordan; Peplinski, William J.; Safta, Cosmin; Sargsyan, Khachik; Stubblefield, William Anthony; Taylor, Mark A.; Tidwell, Vincent Carroll; Trucano, Timothy Guy; Villa, Daniel L.

    2012-10-01

    Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.

  4. Climate Change, Agriculture and Food Security in Tanzania

    DEFF Research Database (Denmark)

    Arndt, Channing; Farmer, William; Strzepek, Kenneth

    2012-01-01

    Due to their reliance on rain-fed agriculture, both as a source of income and consumption, many low-income countries are considered to be the most vulnerable to climate change. Here, we estimate the impact of climate change on food security in Tanzania. Representative climate projections are used...... as the channel of impact, food security in Tanzania appears likely to deteriorate as a consequence of climate change. The analysis points to a high degree of diversity of outcomes (including some favorable outcomes) across climate scenarios, sectors, and regions. Noteworthy differences in impacts across...

  5. Urban security annual report for 1997

    International Nuclear Information System (INIS)

    1998-03-01

    The work during fiscal year 1997 focused in an effort titled ''Urban Security -- A High-Performance Computing Pilot Project.'' During this year a team was engaged representing five Laboratory divisions and a range of expertise including atmospheric and hydrologic modeling, software design, mathematics, geographic information systems (GIS), geology, and urban planning. One major part of the pilot project was to link regional atmospheric modeling with ground water models in order to assess vulnerability of urban water supplies to climate change. Another part of the pilot project was to model the transport of an airborne toxic gas, including effects of buildings on air flow, and to link this to traffic simulations for effective emergency response. Other activities were to establish connections with potential collaborators and funding agencies, as well as highlighting the project through presentations at professional meetings

  6. Improving Food and Nutrition Security in the Philippines through ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Improving food and nutrition security in the Philippines through school ... Implementation of the Community Health Assessment Program in the Philippines ... This project will address the effects of fast-paced economic growth in the Greater ...

  7. DESIGN MODELING OF A UNIVERSITY’S COMPREHENSIVE-INTEGRATED SECURITY SYSTEM

    Directory of Open Access Journals (Sweden)

    Marina V. Dulyasova

    2017-03-01

    Full Text Available Introduction: the safety of higher education institutions is considered to be of great importance nowadays. Security challenges need to be addressed through a comprehensive and integrative approach. This approach provides neutralisation of various threats systemically, risk prevention, minimisation of the tangible and moral harm. The project concept of “safe university” is proposed and substantiated for the above-mentioned purposes. Materials and Methods: the authors used a special literature survey on the issue, which is divided into three main groups of publications, where the complex security of educational institutions is considered in the context of the general theory of security, in the educational-methodical plan and within the framework of sociological, psychological and pedagogical approaches. The legislative and regulatory sources also indicated, legislative and regulatory legal acts reviews, “Safe City” concept, National standard “Information security technologies: complex and integrated ones. Standard requirements to architecture and technologies of intellectual systems of monitoring for safety of the companies and the territories” (State standard specification P 56875-2016, documents of higher education institutions, media reports. The analysis and generalisation of information was coupled with project modeling of the new comprehensive system of higher education institution security. Results: the authors introduce the concept, architecture and model of the comprehensive integrated higher education institution security, monitoring based on measures and indicators pertaining to implementation of standard requirements and level of satisfaction with safety, evaluation of the taken measures in terms of efficiency. Discussion and Conclusions: the main contours of the model for comprehensive integrated security system in a higher education institution and algorithm of interaction between the subjects are determined. These

  8. LDRD Final Report: Advanced Hohlraum Concepts

    Energy Technology Data Exchange (ETDEWEB)

    Jones, Ogden S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-11-08

    Indirect drive inertial confinement fusion (ICF) experiments to date have mostly used cylindrical, laser-heated, gas-filled hohlraums to produce the radiation drive needed to symmetrically implode DT-filled fusion capsules. These hohlraums have generally been unable to produce a symmetric radiation drive through the end of the desired drive pulse, and are plagued with complications due to laser-plasma interactions (LPI) that have made it difficult to predict their performance. In this project we developed several alternate hohlraum concepts. These new hohlraums utilize different hohlraum geometries, radiation shields, and foam materials in an attempt to improve performance relative to cylindrical hohlraums. Each alternate design was optimized using radiation hydrodynamic (RH) design codes to implode a reference DT capsule with a high-density carbon (HDC) ablator. The laser power and energy required to produce the desired time-dependent radiation drive, and the resulting time-dependent radiation symmetry for each new concept were compared to the results for a reference cylindrical hohlraum. Since several of the new designs needed extra laser entrance holes (LEHs), techniques to keep small LEHs open longer, including high-Z foam liners and low-Z wires at the LEH axis, were investigated numerically. Supporting experiments and target fabrication efforts were also done as part of this project. On the Janus laser facility plastic tubes open at one end (halfraums) and filled with SiO2 or Ta2O5 foam were heated with a single 2w laser. Laser propagation and backscatter were measured. Generally the measured propagation was slower than calculated, and the measured laser backscatter was less than calculated. A comparable, scaled up experiment was designed for the NIF facility and four targets were built. Since low density gold foam was identified as a desirable material for lining the LEH and the hohlraum wall, a technique was developed to

  9. CSIR ScienceScope: An Energy-secure South Africa

    CSIR Research Space (South Africa)

    CSIR

    2009-06-01

    Full Text Available issues, especially as buildings use more than 25% of national energy consumption. "An Energy-secure South Africa" the theme of this ScienceScope, features a multidisciplinary projects of the R&D work done on alternative energy solutions, clean and cleaner...

  10. Cyber/Physical Security Vulnerability Assessment Integration

    International Nuclear Information System (INIS)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-01-01

    This internally funded Laboratory-Directed R and D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  11. Supporting non proliferation and global security efforts

    International Nuclear Information System (INIS)

    Pochon, E.

    2013-01-01

    CEA contributes as a major actor of France's action against nuclear proliferation and to the strengthening of nuclear security at national level as European and International levels, in particular through the support of the IAEA activities in nuclear non proliferation with the French Support Programme for the IAEA safeguards system and security with the contribution to the IAEA Nuclear Security Plan and cooperation projects with the European Commission. The CEA is a French government funded technological research organization, organized around 5 branches: Nuclear Energy, Technological Researches, Defence (DAM), Material Sciences and Life Sciences. Within the scope of its activities, CEA covers most of the research areas and techniques in nuclear non-proliferation and security. The CEA is also the advisor of the French Government on nuclear policy. Treaty monitoring and the development and implementation of non proliferation and global security programs is an important mission of DAM which rely on nuclear weapons manufacture and past testing experience. The programmes on non proliferation and global security carried out to fulfil DAM's mission cover the following areas: development of monitoring and detection methods and equipments, country profiles and nuclear stockpiles assessment, arms control instruments, proliferation resistance of nuclear fuel cycle, monitoring of nuclear tests, operation and maintenance of national detection capabilities and contribution to CTBT verification systems. (A.C.)

  12. Securing your Site in Development and Beyond

    Energy Technology Data Exchange (ETDEWEB)

    Akopov, Mikhail S.

    2018-01-04

    Why wait until production deployment, or even staging and testing deployment to identify security vulnerabilities? Using tools like Burp Suite, you can find security vulnerabilities before they creep up on you. Prevent cross-site scripting attacks, and establish a firmer trust between your website and your client. Verify that Apache/Nginx have the correct SSL Ciphers set. We explore using these tools and more to validate proper Apache/Nginx configurations, and to be compliant with modern configuration standards as part of the development cycle. Your clients can use tools like https://securityheaders.io and https://ssllabs.com to get a graded report on your level of compliance with OWASP Secure Headers Project and SSLLabs recommendations. Likewise, you should always use the same sites to validate your configurations. Burp Suite will find common misconfigurations and will also perform more thorough security testing of your applications. In this session you will see examples of vulnerabilities that were detected early on, as well has how to integrate these practices into your daily workflow.

  13. Physical security technologies for weapons complex reconfiguration facilities

    International Nuclear Information System (INIS)

    Jaeger, C.D.

    1994-01-01

    Sandia National Laboratories was a member of the Weapons Complex Reconfiguration (WCR) Safeguards and Security (S ampersand S) team providing assistance to the Department of Energy's (DOE) Office of Weapons Complex Reconfiguration. The physical security systems in the new and upgraded facilities being considered for the WCR had to meet DOE orders and other requirements set forth in the WCR Programmatic Design Criteria (PDC), incorporate the latest physical security technologies using proven state-of-the-art systems and meet fundamental security principles. The outcome was to avoid costly retrofits and provide effective and comprehensive protection against current and projected threats with minimal impact on operations, costs and schedule. Physical security requirements for WCR facilities include: (1) reducing S ampersand S life-cycle costs, (2) where feasible automating S ampersand S functions to minimize operational costs, access to critical assets and exposure of people to hazardous environments, (3) increasing the amount of delay to outsider adversary attack, (4) compartmentalizing the facility to minimize the number of personnel requiring access to critical areas and (5) having reliable and maintainable systems. To be most effective against threats physical security must be integrated with facility operations, safety and other S ampersand S activities, such as material control and accountability, nuclear measurements and computer and information security. This paper will discuss the S ampersand S issues, requirements, technology opportunities and needs. Physical security technologies and systems considered in the design effort of the Weapons Complex Reconfiguration facilities will be reviewed

  14. All projects related to | Page 307 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2010-10-21

    Managing Wetlands for Improved Food Security in Uganda. Project. With increased food insecurity in Uganda, the pressure to use wetlands for agriculture is growing. Start Date: October 21, 2010. End Date: April 21, 2014. Topic: FOOD SECURITY, FOOD SOVEREIGNTY, WETLANDS, ENVIRONMENTAL HEALTH, ...

  15. All projects related to | Page 310 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Strengthening Evidence-based Policy Research and Advocacy for an African Green Revolution. Project. The Alliance for a Green Revolution in Africa (AGRA) has launched a vast program for increasing agricultural productivity and improving food security in Africa. Topic: AGRICULTURAL RESEARCH, Food security, ...

  16. Peace, Human Security and Sustainable Development in Africa ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Peace, Human Security and Sustainable Development in Africa ... into a sustainable livelihood for some of the poorest communities in Africa. ... Project status ... IDRC congratulates first cohort of Women in Climate Change Science Fellows ... titled “Climate change and adaptive water management: Innovative solutions from ...

  17. The DOE safeguards and security technology development program

    International Nuclear Information System (INIS)

    Cherry, R.C.; Wheelock, A.J.

    1991-01-01

    This paper reports that strategic planning for safeguards and security within the Department of Energy emphasizes the contributions of advanced technologies to the achievement of Departmental protection program goals. The Safeguards and Security Technology Development Program provides state-of-the-art technologies, systems and technical services in support of the policies and programmatic requirements for the protection of Departmental assets. The Program encompasses research and development in physical security, nuclear material control and accountability, information security and personnel security, and the integration of these disciplines in advanced applications. Technology development tasks serve goals that range from the maintenance of an effective technology base to the development, testing and evaluation of applications to meet field needs. A variety of factors, from the evolving threat to reconfiguration of the DOE complex and the technical requirements of new facilities, are expected to influence safeguards and security technology requirements and development efforts. Implementation of the Program is based on the systematic identification, prioritization and alignment of technology development tasks and needs. Initiatives currently underway are aimed at enhancing technology development project management. Increased management attention is also being placed on efforts to promote the benefits of the Program through technology transfer and interagency liaison

  18. Policy Paper 39: Power and Prosperity: Linkages Between Security and Economics in U.S-Japanese Relations Since 1960

    OpenAIRE

    Wampler, Robert A.

    1998-01-01

    How do Japan and the United States fit into each other’s grand strategies? A grand strategy is one that relates means and ends, resources and objectives, economics and national security. The National Security Archive’s Project on U.S.–Japanese Relations Since 1960 is probing these issues through a major program of research and study into policymaking by both governments across a wide spectrum of diplomatic, security, and economic issues. This project has brought together scholars and of...

  19. IT Security Support for the Spaceport Command Control Systems Development Ground Support Development Operations

    Science.gov (United States)

    Branch, Drew A.

    2014-01-01

    Security is one of the most if not the most important areas today. After the several attacks on the United States, security everywhere has heightened from airports to the communication among the military branches legionnaires. With advanced persistent threats (APT's) on the rise following Stuxnet, government branches and agencies are required, more than ever, to follow several standards, policies and procedures to reduce the likelihood of a breach. Attack vectors today are very advanced and are going to continue to get more and more advanced as security controls advance. This creates a need for networks and systems to be in an updated and secured state in a launch control system environment. FISMA is a law that is mandated by the government to follow when government agencies secure networks and devices. My role on this project is to ensure network devices and systems are in compliance with NIST, as outlined in FISMA. I will achieve this by providing assistance with security plan documentation and collection, system hardware and software inventory, malicious code and malware scanning, and configuration of network devices i.e. routers and IDS's/IPS's. In addition, I will be completing security assessments on software and hardware, vulnerability assessments and reporting, and conducting patch management and risk assessments. A guideline that will help with compliance with NIST is the SANS Top 20 Critical Controls. SANS Top 20 Critical Controls as well as numerous security tools, security software and the conduction of research will be used to successfully complete the tasks given to me. This will ensure compliance with FISMA and NIST, secure systems and a secured network. By the end of this project, I hope to have carried out the tasks stated above as well as gain an immense knowledge about compliance, security tools, networks and network devices, as well as policies and procedures.

  20. Twitter, Facebook, and Ten Red Balloons: Social Network Problem Solving and Homeland Security

    OpenAIRE

    Ford, Christopher M.

    2011-01-01

    This article appeared in Homeland Security Affairs (February 2011), v.7 no.1 This essay, the winner of the Center for Homeland Defense and Security (CHDS) Essay Contest in 2010, looks at how homeland security could benefit from crowd-sourced applications accessed through social networking tools such as Twitter and Facebook. Christopher M. Ford looks at the apparent efficacy of two such endeavors: the Defense Advanced Research Projects Agency'۪s (DARPA) competition to find ten 8-foot balloo...