WorldWideScience

Sample records for security master plans

  1. Master planning for successful safeguard/security systems engineering

    International Nuclear Information System (INIS)

    Bruckner, D.G.

    1987-01-01

    The development and phased implementation of an overall master plan for weapons systems and facilities engaged in the complexities of high technology provides a logical road map for system accomplishment. An essential factor in such a comprehensive plan is development of an integrated systems security engineering plan. Some DOD programs use new military regulations and policy directives to mandate consideration of the safeguard/security disciplines be considered for weapons systems and facilities during the entire life cycle of the program. The emphasis is to make certain the weapon system and applicable facilities have complementary security features. Together they must meet the needs of the operational mission and, at the same time, provide the security forces practical solutions to their requirements. This paper discusses the process of meshing the safe- guards/security requirements with an overall the master plan and the challenges attendant to this activity

  2. Strategic planning and security analysis

    International Nuclear Information System (INIS)

    DePasquale, S.

    1991-01-01

    Nuclear security master planning is a deliberative process, founded on the premise that the broad scope of security must be analyzed before any meaningful determinations may be reached on an individual security aspect. This paper examines the analytical process required in developing a Security Master Plan. It defines a four stage process concluding with the selection of security measures encompassing physical security, policy and procedure considerations and guard force deployment. The final product orchestrates each security measure in a complementary and supportive configuration

  3. Masters in Nuclear Security

    International Nuclear Information System (INIS)

    Rickwood, Peter

    2013-01-01

    Continuing global efforts to improve the security of nuclear and other radioactive material against the threat of malicious acts are being assisted by a new initiative, the development of a corps of professional experts to strengthen nuclear security. The IAEA, the European Commission, universities, research institutions and other bodies working in collaboration have established an International Nuclear Security Education Network (INSEN). In 2011, six European academic institutions, the Vienna University of Technology, the Brandenburg University of Applied Sciences, the Demokritos National Centre for Scientific Research in Greece, the Reactor Institute Delft of the Delft University of Technology in the Netherlands, the University of Oslo, and the University of Manchester Dalton Nuclear Institute, started developing a European Master of Science Programme in Nuclear Security Management. In March 2013, the masters project was inaugurated when ten students commenced studies at the Brandenburg University of Applied Sciences in Germany for two weeks. In April, they moved to the Delft University of Technology in the Netherlands for a further two weeks of studies. The pilot programme consists of six teaching sessions in different academic institutions. At the inauguration in Delft, IAEA Director General Yukiya Amano commended this effort to train a new generation of experts who can help to improve global nuclear security. ''It is clear that we will need a new generation of policy-makers and nuclear professionals - people like you - who will have a proper understanding of the importance of nuclear security,'' Mr. Amano told students and faculty members. ''The IAEA's goal is to support the development of such programmes on a global basis,'' said David Lambert, Senior Training Officer in the IAEA's Office of Nuclear Security. ''An existing postgraduate degree programme focused on nuclear security at Naif Arab University for Security Sciences (NAUSS) is currently supported by

  4. Interior design. Mastering the master plan.

    Science.gov (United States)

    Mesbah, C E

    1995-10-01

    Reflecting on the results of the survey, this proposed interior design master planning process addresses the concerns and issues of both CEOs and facility managers in ways that focus on problem-solving strategies and methods. Use of the interior design master plan process further promotes the goals and outcomes expressed in the survey by both groups. These include enhanced facility image, the efficient selection of finishes and furnishings, continuity despite staff changes, and overall savings in both costs and time. The interior design master plan allows administrators and facility managers to anticipate changes resulting from the restructuring of health care delivery. The administrators and facility managers are then able to respond in ways that manage those changes in the flexible and cost-effective manner they are striving for. This framework permits staff members to concentrate their time and energy on the care of their patients--which is, after all, what it's all about.

  5. Low Impact Development Master Plan

    Energy Technology Data Exchange (ETDEWEB)

    Loftin, Samuel R. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-10-02

    This project creates a Low Impact Development (LID) Master Plan to guide and prioritize future development of LID projects at Los Alamos National Laboratory (LANL or the Laboratory). The LID Master Plan applies to developed areas across the Laboratory and focuses on identifying opportunities for storm water quality and hydrological improvements in the heavily urbanized areas of Technical Areas 03, 35 and 53. The LID Master Plan is organized to allow the addition of LID projects for other technical areas as time and funds allow in the future.

  6. Evaluation of the Navy Master Planning Program

    Science.gov (United States)

    1976-05-01

    Navy planning directives, interviews with Navy planning personnel, researc " of applicable literature on planning and program evaluation, and the...master planning has absorbed the additional roles of program management and public relations marketing . The Navy planner is now deeply involved in...master planning 62conducted by NAVFAC headquarters in 1972, various Navy planning directives, a " Market Survey" of NAVFAC services and customer 63

  7. Housing, health and master planning: rules of engagement.

    Science.gov (United States)

    Harris, P; Haigh, F; Thornell, M; Molloy, L; Sainsbury, P

    2014-04-01

    Knowledge about health focussed policy collaboration to date has been either tactical or technical. This article focusses on both technical and tactical issues to describe the experience of cross-sectoral collaboration between health and housing stakeholders across the life of a housing master plan, including but not limited to a health impact assessment (HIA). A single explanatory case study of collaboration on a master plan to regenerate a deprived housing estate in Western Sydney was developed to explain why and how the collaboration worked or did not work. Data collection included stakeholder interviews, document review, and reflections by the health team. Following a realist approach, data was analysed against established public policy theory dimensions. Tactically we did not know what we were doing. Despite our technical knowledge and skills with health focussed processes, particularly HIA, we failed to appreciate complexities inherent in master planning. This limited our ability to provide information at the right points. Eventually however the HIA did provide substantive connections between the master plan and health. We use our analysis to develop technical and tactical rules of engagement for future cross-sectoral collaboration. This case study from the field provides insight for future health focussed policy collaboration. We demonstrate the technical and tactical requirements for future intersectoral policy and planning collaborations, including HIAs, with the housing sector on master planning. The experience also suggested how HIAs can be conducted flexibly alongside policy development rather than at a specific point after a policy is drafted. Copyright © 2014 The Royal Society for Public Health. All rights reserved.

  8. Measures for Management of Land Use Master Plan Released

    Institute of Scientific and Technical Information of China (English)

    Qian Fang; Li Caige

    2017-01-01

    On May 8,2017,the Measures for Management of Land Use Master Plan was released for enforcement by the Ministry of Land and Resources.The Measures clearly points out that a land use master plan is an essential part of the national spatial planning system and an important basis for implementing land use modes control and management,

  9. United States Shipbuilding Standards Master Plan

    National Research Council Canada - National Science Library

    Horsmon, Jr, Albert W

    1992-01-01

    This Shipbuilding Standards Master Plan was developed using extensive surveys, interviews, and an iterative editing process to include the views and opinions of key persons and organizations involved...

  10. SEA effectiveness for landscape and master planning: An investigation in Sardinia

    International Nuclear Information System (INIS)

    De Montis, Andrea; Ledda, Antonio; Caschili, Simone; Ganciu, Amedeo; Barra, Mario

    2014-01-01

    The Italian administrative bodies and planning agencies have embraced with mixed feedbacks the introduction of Strategic Environmental Assessment (SEA) through the European Directive 2001/42/EC. Concurrently, regional and local spatial planning practice have been characterized by a new approach inspired by landscape planning. The Italian region of Sardinia has been one of the pioneering administrative bodies in the Italian and European arena that has adopted landscape principles for the construction of its regional master plan (PPR, Piano Paesaggistico Regionale). Municipalities are now carrying out the review of their master plans to the PPR's prescriptions and indications. Against this background, the aim of this paper is to assess the level of SEA implementation in the municipal master plans of Sardinia, six years after the approval of the PPR. Rooted in the SEA international literature we construct a modular and adaptable on-line survey for officers involved in the review of municipal master plans. The results show that many Sardinian municipalities have not reviewed their master plans to the PPR's regulations yet and only a few municipalities have started this review process according to the SEA procedure. - Highlights: • We study strategic environmental assessment (SEA) effectiveness on land use plans • Four SEA implementation key issues are drawn from international literature • Data collection has included an on-line survey with close and open questions • Results indicate that SEA has been poorly implemented in landscape and master plans • Weak aspects include planning alternatives, financial resources, and monitoring

  11. SEA effectiveness for landscape and master planning: An investigation in Sardinia

    Energy Technology Data Exchange (ETDEWEB)

    De Montis, Andrea, E-mail: andreadm@uniss.it [Dipartimento di Agraria, Sezione Ingegneria del Territorio, Università degli Studi di Sassari, Viale Italia, 39, 07100 Sassari (Italy); Ledda, Antonio, E-mail: antonioledda@gmail.com [Dipartimento di Agraria, Sezione Ingegneria del Territorio, Università degli Studi di Sassari, Viale Italia, 39, 07100 Sassari (Italy); Caschili, Simone, E-mail: s.caschili@ucl.ac.uk [UCL QASER Lab and Centre for Advanced Spatial Analysis, University College London, Gower Street, London WC1E 7HB (United Kingdom); Ganciu, Amedeo, E-mail: dott.amedeoganciu@gmail.com [Dipartimento di Agraria, Sezione Ingegneria del Territorio, Università degli Studi di Sassari, Viale Italia, 39, 07100 Sassari (Italy); Barra, Mario, E-mail: barra@uniss.it [Dipartimento di Agraria, Sezione Ingegneria del Territorio, Università degli Studi di Sassari, Viale Italia, 39, 07100 Sassari (Italy)

    2014-07-01

    The Italian administrative bodies and planning agencies have embraced with mixed feedbacks the introduction of Strategic Environmental Assessment (SEA) through the European Directive 2001/42/EC. Concurrently, regional and local spatial planning practice have been characterized by a new approach inspired by landscape planning. The Italian region of Sardinia has been one of the pioneering administrative bodies in the Italian and European arena that has adopted landscape principles for the construction of its regional master plan (PPR, Piano Paesaggistico Regionale). Municipalities are now carrying out the review of their master plans to the PPR's prescriptions and indications. Against this background, the aim of this paper is to assess the level of SEA implementation in the municipal master plans of Sardinia, six years after the approval of the PPR. Rooted in the SEA international literature we construct a modular and adaptable on-line survey for officers involved in the review of municipal master plans. The results show that many Sardinian municipalities have not reviewed their master plans to the PPR's regulations yet and only a few municipalities have started this review process according to the SEA procedure. - Highlights: • We study strategic environmental assessment (SEA) effectiveness on land use plans • Four SEA implementation key issues are drawn from international literature • Data collection has included an on-line survey with close and open questions • Results indicate that SEA has been poorly implemented in landscape and master plans • Weak aspects include planning alternatives, financial resources, and monitoring.

  12. Review of Current Aircrew Coordination Training Program and Master Plan for Program Enhancement: Aircrew Coordination Training Master Plan

    National Research Council Canada - National Science Library

    Grubb, G

    2001-01-01

    ...) program to develop a master plan of continuous improvement. Research source materials included policies, training courseware, evaluation guides, research papers and reports, and assessment summaries of operational trend data...

  13. Master plans for pedestrian and bicycle transportation: community characteristics.

    Science.gov (United States)

    Steinman, Lesley; Doescher, Mark; Levinger, David; Perry, Cynthia; Carter, Louise; Eyler, Amy; Aytur, Semra; Cradock, Angie L I; Evenson, Kelly R; Heinrich, Katie; Kerr, Jacqueline; Litt, Jill; Severcan, Yucel; Voorhees, Carolyn

    2010-03-01

    Recent research demonstrates the importance of targeting the built environment to support individual physical activity, particularly for people experiencing health disparities. Master plans to promote biking and/or pedestrians (BPMPs) are a potential method for environmental change. This descriptive study aims to provide a snapshot of plan attributes and better understand demographic, social and transportation characteristics of communities with BPMPs. We collected a census sample of BPMPs from 4 states. Population and commuting data were obtained from national statistics. 294 master plans were included, with most plans representing municipalities. 62% of plans targeted biking only, one-fifth targeted biking and walking, and 15% targeted walking only. The sampled locations have a similar demographic profile as the overall U.S. for median age and household income, people of color, high school education, and income inequality. The degree of racial diversity of sampled communities is slightly less than the U.S. average and the percentage of people who walk to work were slightly higher. Given that communities with master plans have a similar profile as the overall U.S., BPMPs could feasibly be spread to communities throughout the country. Further research is planned to describe BPMPs in detail toward informing future plan development.

  14. Perancangan Master Plan Sistem Informasi Akademik STT Dharma Iswara Madiun

    Directory of Open Access Journals (Sweden)

    Hani Atun Mumtahana

    2016-12-01

    Full Text Available Teknologi Informasi dan Sistem Informasi sudah menjadi hal paling mendasar dalam suatu organisasi dalam menjalankan proses bisnis. Perkembangan Teknologi Informasi dan Sistem Informasi (TI/SI yang baik harus direncanakan dengan baik. Master Plan merupakan suatu pedoman jangka pendek, menengah dan jangka panjang dalam pengembangan TI/SI suatu organisasi/perusahaan. Dalam menjalankan proses bisnis yang disesuaikan dengan Visi, Misi dan Tujuannya, STT Dharma Iswara Madiun lebih menitik beratkan pada Pelayanan Bidang Akademik (disesuaikan dengan gambaran Portofolio Aplikasi. Untuk menghasilkan pelayanan yang prima dalam bidang Akademik, perancangan Master Plan Sistem Informasi Akademik merupakan salah satu cara untuk membuat perencanaan jangka panjang pemeliharaan Sistem Informasi Akademik. Pada penelitian ini perancangan Master Plan Sistem Informasi Akademik dilakukan dengan perumusan Rencana Strategis STT Dharma Iswara Madiun, membuat arsitektur Sistem Informasi dengan framework Zachman 4 kolom (data (what, function (how, network (where dan people (who dan 3 baris (planner, owner dan designer. Hasil penelitian ini berupa rencana pengembangan Sistem Infromasi Akademik dalam bentuk Master Plan pada jangka pendek, jangka menengah dan jangka panjang.

  15. Are master plans effective in limiting development in China's disaster-prone areas?

    OpenAIRE

    Kim, Saehoon; Rowe, Peter G.

    2013-01-01

    The effectiveness of urban master plans in limiting development in a disaster-prone area of China was empirically investigated by measuring cities’ land-cover changes against their master plans. If a master plan serves as guidance for urban polices that reduce property loss from earthquakes, floods, landslides,land subsidence, and rises in sea level, it will substantially limit urban development in areas at risk from environmental hazards. An environmental risk map weighted toward valuable...

  16. Louisiana's 2017 Master Plan for a Sustainable Coast

    Science.gov (United States)

    Haase, B.

    2017-12-01

    The Coastal Protection and Restoration Authority is charged with coordinating restoration and protection investments through the development and implementation of Louisiana's Comprehensive Master Plan for a Sustainable Coast. The first master plan was submitted to the Louisiana Legislature in 2007 and is mandated to be updated every five years. The plan's objectives are to reduce economic losses from flooding, promote sustainability by harnessing natural processes, provide habitats for commercial and recreational activities, sustain cultural heritage and promote a viable working coast. Two goals drive decision making about the appropriate suite of restoration and protection projects to include in the Plan: restore and maintain Louisiana's wetlands and provide flood protection for coastal Louisiana's citizens. As part of the decision making process, a wide range of additional metrics are used to evaluate the complex, competing needs of communities, industries, navigation and fisheries. The master plan decision making process includes the identification of individual protection and restoration projects that are evaluated with landscape, storm surge, and risk assessment models and then ranked by how well they perform over time across the set of decision drivers and metrics. High performing projects are assembled into alternatives constrained by available funding and river resources. The planning process is grounded not only on extensive scientific analysis but also on interdisciplinary collaboration between scientists, engineers, planners, community advocates, and coastal stakeholders which creates the long-term dialogue needed for complex environmental planning decisions. It is through this collaboration that recommended alternatives are reviewed and modified to develop the final Plan. Keywords:alternative formulation, comprehensive planning, ecosystem restoration, flood risk reduction and stakeholder engagement

  17. Colorado Academic Library Master Plan, Spring 1982.

    Science.gov (United States)

    Breivik, Patricia Senn; And Others

    Based on a need to assess current library strengths and weaknesses and to project potential library roles in supporting higher education, this master plan makes a series of recommendations to Colorado's academic libraries. It is noted that the plan was endorsed by both the Colorado Commission on Higher Education and the Colorado State Department…

  18. Development of Facilities Master Plan and Laboratory Renovation Project

    Energy Technology Data Exchange (ETDEWEB)

    Fox, Andrea D

    2011-10-03

    Funding from this grant has allowed Morehouse School of Medicine to complete its first professionally developed, comprehensive campus master plan that is in alignment with the recently completed strategic plan. In addition to master planning activities, funds were used for programming and designing research renovations, and also to supplement other research facility upgrades by providing lighting and equipment. The activities funded by this grant will provide the catalyst for substantial improvement in the School's overall facilities for biomedical education and research, and will also provide much of the information needed to conduct a successful campaign to raise funds for proposed buildings and renovations.

  19. AUA Program Master Plan. Volume 1: Overview

    Science.gov (United States)

    1997-03-01

    The Office of Air Traffic Systems Development (AUA) Program Master Plan : summarizes the management, development approach, and status of products and : services provided by the AUA organization to fulfill its role in supporting : National Airspace Sy...

  20. Security planning an applied approach

    CERN Document Server

    Lincke, Susan

    2015-01-01

    This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan their defense and secure proprietary/confidential information. The process is documented in the supplemental online security workbook. Security Planning is designed for the busy IT practitioner, who does not have time to become a security expert, but needs a security plan now. It also serves to educate the reader of a broader set of concepts related to the security environment through the Introductory Concepts and Advanced sections. The book serv

  1. Laredo District Coahuila/Nuevo Leon/Tamaulipas border master plan.

    Science.gov (United States)

    2012-06-01

    Border Master Plans document a regions needs and priorities, and recommend a mechanism to ensure coordination on current and planned future port of entry (POE) projects and supporting transportation infrastructure to serve the anticipated demand i...

  2. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  3. Homeroom Activities in a College of Technology Based on the Master Plan

    Science.gov (United States)

    Fuchida, Kunihiiko; Murata, Hideaki; Yuji, Junichiro

    Homeroom (HR) activities have an important role in engineering education at technical colleges. Yatsushiro National College of Technology has made a master plan for them and has been putting the plan into practical use since 2002. This plan is comprehensive and has two main categories, social education and career guidance, both being composed of three sub-categories (e.g., self-understanding and making future plans) . Based on the master plan, each HR teacher makes his own plan for HR activities for his classroom at the beginning of the academic year. We have reached a consensus to share our practice and to improve HR activities for years to come. We also recognize that to carry out HR activities based on a master plan that reflects the school's educational goals is essential in order to train students who are well-prepared, both as engineers and as humans.

  4. Straighttalk. The ideal master facility plan begins with business strategy and integrates operational improvement.

    Science.gov (United States)

    Powder, Scott; Brown, Richard E; Haupert, John M; Smith, Ryder

    2007-04-02

    Given the scarcity of capital to meet ever-growing demands for healthcare services, master facility planning has become more important than ever. Executives must align their master facility plans with their overall business strategy, incorporating the best in care- and service-delivery models. In this installment of Straight Talk, executives from two health systems--Advocate Health Care in Oak Brook, Ill. and Parkland Health & Hospital System in Dallas--discuss master facility planning. Modern Healthcare and PricewaterhouseCoopers present Straight Talk. The session on master facility planning was held on March 8, 2007 at Modern Healthcare's Chicago Headquarters. Charles Lauer, former vice president of publishing and editorial director at Modern Healthcare, was the moderator.

  5. Coho Salmon Master Plan, Clearwater River Basin.

    Energy Technology Data Exchange (ETDEWEB)

    Nez Perce Tribe; FishPro

    2004-10-01

    The Nez Perce Tribe has a desire and a goal to reintroduce and restore coho salmon to the Clearwater River Subbasin at levels of abundance and productivity sufficient to support sustainable runs and annual harvest. Consistent with the Clearwater Subbasin Plan (EcoVista 2003), the Nez Perce Tribe envisions developing an annual escapement of 14,000 coho salmon to the Clearwater River Subbasin. In 1994, the Nez Perce Tribe began coho reintroduction by securing eggs through U.S. v. Oregon; by 1998 this agreement provided an annual transfer of 550,000 coho salmon smolts from lower Columbia River hatchery facilities for release in the Clearwater River Subbasin. In 1998, the Northwest Power and Conservation Council authorized the Bonneville Power Administration to fund the development of a Master Plan to guide this reintroduction effort. This Master Plan describes the results of experimental releases of coho salmon in the Clearwater River Subbasin, which have been ongoing since 1995. These data are combined with results of recent coho reintroduction efforts by the Yakama Nation, general coho life history information, and historical information regarding the distribution and life history of Snake River coho salmon. This information is used to assess a number of alternative strategies aimed at restoring coho salmon to historical habitats in the Clearwater River subbasin. These data suggest that there is a high probability that coho salmon can be restored to the Clearwater River subbasin. In addition, the data also suggest that the re-establishment of coho salmon could be substantially aided by: (1) the construction of low-tech acclimation facilities; (2) the establishment of a 'localized' stock of coho salmon; and (3) the construction of hatchery facilities to provide a source of juvenile coho salmon for future supplementation activities. The Nez Perce Tribe recognizes that there are factors which may limit the success of coho reintroduction. As a result of these

  6. Master-planned in exurbia: examining the drivers and impacts of master-planned communities at the urban fringe

    Science.gov (United States)

    Jenna H. Tilt; Lee. Cerveny

    2013-01-01

    Smart growth strategies of infill and compact growth in existing suburban cities will most likely not be sufficient to absorb a new US household growth in the future. To meet housing demands and preferences, master-planned communities will continue to be built in outlying exurban areas. However, little is known about the impacts these communities may have on the...

  7. Minimizing Lid Overstows in Master Stowage Plans for Container Vessels is NP-Complete

    DEFF Research Database (Denmark)

    Ajspur, Mai Lise; Jensen, Rune Møller; Guilbert, Nicolas

    Container vessel stowage is a particularly hard combinatorial problem within the shipping industry. The currently most successful approaches decompose the problem hierarchically and first generate a master plan that handle highlevel constraints and objectives such as balance and stress moments...... that it is an NP -complete problem to generate master plans that minimize the number of these lid overstows. Since any efficient approach to container vessel stowage most likely must include a master plan, the implication of this result is that future research must focus and developing good heuristics...

  8. Developing Scientific Index System of Urban Master Planning

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    <正>Master plan is the fundamental basis for urban construction and administration, an important public policy of the govern-ments, as well as an overall, comprehen-sive, and strategic task related to politics, economy,

  9. Structural master plan of flood mitigation measures

    OpenAIRE

    A. Heidari

    2009-01-01

    Flood protection is one of the practical methods in damage reduction. Although it not possible to be completely protected from flood disaster but major part of damages can be reduced by mitigation plans. In this paper, the optimum flood mitigation master plan is determined by economic evaluation in trading off between the construction costs and expected value of damage reduction as the benefits. Size of the certain mitigation alternative is also be obtained by risk analysis by accepting possi...

  10. 6 CFR 37.41 - Security plan.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security plan. 37.41 Section 37.41 Domestic... Security plan. (a) In General. States must have a security plan that addresses the provisions in paragraph (b) of this section and must submit the security plan as part of its REAL ID certification under § 37...

  11. Northeast Oregon Hatchery Spring Chinook Master Plan, Technical Report 2000.

    Energy Technology Data Exchange (ETDEWEB)

    Ashe, Becky L.; Concannon, Kathleen; Johnson, David B.

    2000-04-01

    Spring chinook salmon populations in the Imnaha and Grande Ronde rivers are listed as threatened under the Endangered Species Act (ESA) and are at high risk of extirpation. The Nez Perce Tribe, the Confederated Tribes of the Umatilla Indian Reservation, and Oregon Department of Fish and Wildlife, are co-managers of conservation/restoration programs for Imnaha and Grande Ronde spring chinook salmon that use hatchery supplementation and conventional and captive broodstock techniques. The immediate goal of these programs is to prevent extirpation and provide the potential for restoration once factors limiting production are addressed. These programs redirect production occurring under the Lower Snake River Compensation Plan (LSRCP) from mitigation to conservation and restoration. Both the Imnaha and Grande Ronde conservation/restoration programs are described in ESA Section 10 permit applications and the co-managers refer to the fish production from these programs as the Currently Permitted Program (CPP). Recently, co-managers have determined that it is impossible to produce the CPP at Lookingglass Hatchery, the LSRCP facility intended for production, and that without additional facilities, production must be cut from these conservation programs. Development of new facilities for these programs through the Columbia Basin Fish and Wildlife Program is considered a new production initiative by the Northwest Power Planning Council (NPPC) and requires a master plan. The master plan provides the NPPC, program proponents and others with the information they need to make sound decisions about whether the proposed facilities to restore salmon populations should move forward to design. This master plan describes alternatives considered to meet the facility needs of the CPP so the conservation program can be fully implemented. Co-managers considered three alternatives: modify Lookingglass Hatchery; use existing facilities elsewhere in the Basin; and use new facilities in

  12. Mastering VMware vSphere 5

    CERN Document Server

    Lowe, Scott

    2011-01-01

    A new and updated edition of bestselling Mastering VMware vSphere 4 Written by leading VMware expert, this book covers all the features and capabilities of VMware vSphere. You'll learn how to install, configure, operate, manage, and secure the latest release.Covers all the new features and capabilities of the much-anticipated new release of VMware vSphereDiscusses the planning, installation, operation, and management for the latest releaseReviews migration to the latest vSphere softwareOffers hands-on instruction and clear explanations with real-world examples Mastering VMware vSphere is the

  13. Laredo District Coahuila/Nuevo Leon/Tamaulipas border master plan : executive summary.

    Science.gov (United States)

    2012-06-01

    Border Master Plans, as defined and supported by the U.S./Mexico Joint Working : Committee on Transportation Planning and Programming, the Federal Highway Administration, : and the U.S. Department of State, are comprehensive long range plans to inven...

  14. Integration of Environmental Planning Into the Army Master Planning Process

    Science.gov (United States)

    1992-10-01

    the issues specific to the later assessment (ETL 1110-3-407, pp 1-9 to 1-10). Under the : estructured master planning process discussed in this report...Lisa~m 0111utHars M143 AMW PRO*b LAMM~e 0)3. AMW uaides, Uso ~ow (M Port RJ." 21719 7%s pubhicaton was repfodaaced on moycled V&Mp. /| / 121 DATEI:

  15. Yakima Habitat Improvement Project Master Plan, Technical Report 2003.

    Energy Technology Data Exchange (ETDEWEB)

    Golder Associates, Inc.

    2003-04-22

    The Yakima Urban Growth Area (UGA) is a developing and growing urban area in south-central Washington. Despite increased development, the Yakima River and its tributaries within the UGA continue to support threatened populations of summer steelhead and bull trout as well as a variety of non-listed salmonid species. In order to provide for the maintenance and recovery of these species, while successfully planning for the continued growth and development within the UGA, the City of Yakima has undertaken the Yakima Habitat Improvement Project. The overall goal of the project is to maintain, preserve, and restore functioning fish and wildlife habitat within and immediately surrounding the Yakima UGA over the long term. Acquisition and protection of the fish and wildlife habitat associated with key properties in the UGA will prevent future subdivision along riparian corridors, reduce further degradation or removal of riparian habitat, and maintain or enhance the long term condition of aquatic habitat. By placing these properties in long-term protection, the threat of development from continued growth in the urban area will be removed. To most effectively implement the multi-year habitat acquisition and protection effort, the City has developed this Master Plan. The Master Plan provides the structure and guidance for future habitat acquisition and restoration activities to be performed within the Yakima Urban Area. The development of this Master Plan also supports several Reasonable and Prudent Alternatives (RPAs) of the NOAA Fisheries 2000 Biological Opinion (BiOp), as well as the Water Investment Action Agenda for the Yakima Basin, local planning efforts, and the Columbia Basin Fish and Wildlife Authority's 2000 Fish and Wildlife Program. This Master Plan also provides the framework for coordination of the Yakima Habitat Improvement Project with other fish and wildlife habitat acquisition and protection activities currently being implemented in the area. As a

  16. The Effect of Modeling Qualities, Tones and Gages in Ceramic Supply Chains' Master Planning

    Directory of Open Access Journals (Sweden)

    Isabel MUNDI

    2012-01-01

    Full Text Available Ceramic production processes are characterized by providing quantities of the same finished goods that differ in qualities, tones and gages. This aspect becomes a problem for ceramic supply chains (SCs that should promise and serve customer orders with homogeneous quantities of the same finished good. In this paper a mathematical programming model for the cen-tralized master planning of ceramic SC is proposed. Inputs to the master plan include demand forecasts in terms of customer order classes based on their order size and splitting percentages of a lot into homogeneous sub-lots. Then, the master plan defines the size and loading of lots to production lines and their distribution with the aim of maximizing the number of customer orders fulfilled with homogeneous quantities in the most efficient manner for the SC. Finally, the effect of modeling qualities, tones and gages in master planning is assessed.

  17. Experience of Sponge City Master Plan: A Case Study of Nanning City

    Institute of Scientific and Technical Information of China (English)

    Zhang Wei; Wang Jiazhuo; Che Han; Wang Chen; Zhang Chunyang; Shi Lian; Fan Jin; Li Caige

    2017-01-01

    As a new urban development pattern, the construction of sponge cities has been deeply integrated into the new urbanization and water safety strategy. Nanning City, as one of the first batch of experimental sponge cities in China, has undertaken exploration and practice on sponge city planning, construction, and management. The sponge city master plan of Nanning City establishes an urban ecological spatial pattern in order to protect the security of the sponge base. The sponge city construction strategy has also proposed an overall construction strategy of a sponge city in line with urban development features. Through the systematic analysis and planning, a “23+10+202” pattern of sponge city construction has been formed. “23” represents 23 drainage basins, in which major sponge facilities such as storage facilities, waterfront buffer zones, wetland parks, ecological rainwater corridor and sponge parks are allocated. “10” represents 10 sponge functional zones, which provide important reference for the establishment of sponge city construction index system. “202” represents 202 management units, which decomposes the general objective and provides technical support not only for sponge city construction and management, but also for the implementation of general objectives in the regulatory plan as well.

  18. Quality control of brachytherapy system module Oncentra MasterPlan V3.3 planning; Control de calidad del modulo de braquiterapia del sistema de planificacion Oncentra MasterPlan V3.3

    Energy Technology Data Exchange (ETDEWEB)

    Monja Ray, P. de la; Torres Pozas, S.; Sanchez Carrascal, M.; Macias Verde, D.; Martin Oliva, R.

    2011-07-01

    We present the results of quality control carried out the planning system (SP) MasterPlan Oncentra Brachy, version 3.3 (Nucletron), on the occasion of its launch, following the recommendations proposed in the Protocol for quality control in planning systems therapy with ionizing radiation [SEFM, published by the Spanish Society of Medical Physics (SEFM) in 2005].

  19. "Hospital Master Plan'ist" haiglavõrgu arengukavani / Tarmo Bakler

    Index Scriptorium Estoniae

    Bakler, Tarmo, 1970-

    2003-01-01

    Ülevaade, kuidas Hospital Master Planìs toodud põhimõtteid on kasutatud praeguseni elluviidud muutuste tegemisel ja kuidas on HMPd täiendatud Eesti Tervishoiuprojekt 2015 koostatud haiglavõrgu arengukavas 2002. Kaart. Tabelid

  20. Methodical approaches in the Norwegian Master Plan for Water Resources

    International Nuclear Information System (INIS)

    Bowitz, Einar

    1997-01-01

    The Norwegian Master Plan for Water Resources instructs the management not to consider applications for concession to develop hydroelectric projects in the so called category II of the plan. These are the environmentally most controversial projects or the most expensive projects. This report discusses the methods used in this Master Plan to classify the projects. The question whether the assessments of the environmental disadvantages of hydropower development are reasonable is approached in two ways: (1) Compare the environmental costs imbedded in the Plan with direct assessments, and (2) Discuss the appropriateness of the methodology used for environmental evaluations in the Plan. The report concludes that (1) the environmental costs that can be derived from the ranking in the Plan are significantly greater than those following from direct evaluations, (2) the differences are generally so great that one may ask whether the methods used in the Plan overestimate the real environmental costs, (3) it seems to have been difficult to make a unified assessment of the environmental disadvantages, (4) the Plan has considered the economic impact on agriculture and forestry very roughly and indirectly, which may have contributed to overestimated environmental costs of hydropower development. 20 refs., 6 figs., 7 tabs

  1. Cooperative Path Planning and Constraints Analysis for Master-Slave Industrial Robots

    Directory of Open Access Journals (Sweden)

    Yahui Gan

    2012-09-01

    Full Text Available A strategy of cooperative path planning for a master-slave multiple robot system is presented in this paper. The path planning method is based on motion constraints between the end-effectors of cooperative robots. Cooperation motions have been classified into three types by relative motions between end-effectors of master and slave robots, which is concurrent cooperation, coupled synchronous cooperation and combined synchronous cooperation. Based on this classification, position /orientation constraints and joint velocity constraints are explored in-depth here. In order to validate the path planning method and the theoretical developments in motion constraints analysis, representative experiments based on two industrial robots, Motoman VA1400 and HP20, are provided at the end of the paper. The experimental results have proved both the effectiveness of the path planning method and the correctness of the constraints analysis.

  2. Master plan for remediation of the Sillamaee tailings pond and technical design project

    International Nuclear Information System (INIS)

    Kaasik, T.

    2000-01-01

    Remediation of the Sillamaee radioactive tailings pond is a priority in the Estonian National Environmental Plan. The Sillamaee plant has processed metal ores by hydrometallurgical methods since 1946. Processing continued until 1990, but in the 1970s, production of rare earths and rare metals was introduced and continues today at a smaller scale. The tailings pond contains residues from these operations. The environmental problems associated with the tailings pond are the stability of the dam and the release of contaminants. In order to deal with these two issues effectively, a master plan was drawn up. The master plan covers the period from 1997 to 2008 and was compiled with the cooperation of the Silmet Group and the Sillamaee International Expert Reference Group (SIERG). The master plan sets up a systematic approach for the overall tailings pond remediation, including drying its interior, reshaping and covering the surface, minimizing water flow through the tailings, and ensuring long-term dam stability

  3. A master plan for the radwaste management

    International Nuclear Information System (INIS)

    Kim, Y.E.; Lee, S.H.; Lee, C.K.; Moon, S.H.; Sung, R.J.; Sung, K.W.

    1983-01-01

    The accumulated total amount of low-level radioactive wastes to be produced from operating power reactors and nuclear installations up until the year 2007 is estimated to 900,000 drum(approximately 200,000M 3 ). An effective master plan for the safe disposal of the wastes is necessary. Among many different disposal methods available for low-and medium-level radwastes, the engineered trench approach was chosen by an extensive feasibility study as the optimum method for Korea. Site selection, construction and commissioning of such a disposal facility are presumed to take two and a half years, beginning in July 1983. The total cost in opening the site and the unit disposal cost per drum were estimated to be 11 billion won and 40,000 won, respectively. An agency(KORDA) managing the operation of the disposal site is recommended to be established by 1987, assuming that the agency's economic feasibility can be justified by that time. When the disposal site is commissioned, a regulatory guide for ground disposal will be available, and supporting R and D work on the disposal site will be complete. Studies on the technology of radwaste treatment will continue through this period. For the longer term, staff training and future planning have been undertaken to ensure that a master plan, which can be expected to be used as a guideline for disposal of all radioactive waste arising, is fully adequate. (Author)

  4. Master plan nurse duty roster using the 0-1 goal programming technique

    Science.gov (United States)

    Ismail, Wan Rosmanira; Jenal, Ruzzakiah

    2013-04-01

    The scheduling of nurses is particularly challenging because of the nature of the work which is around the clock. In addition, inefficient duty roster can have an effect on the nurses well being as well as their job satisfaction. In nurse scheduling problem (NSP), nurses are generally allocated to periods of work over a specified time horizon. A typical length of the schedule varies from a few weeks to a month. The schedule will be consistently rebuilt after the specified time period and will result in a time-consuming task for the administrative staff involved. Moreover, the task becomes overwhelming when the staff needs to consider the previous duty rosters in order to maintain the quality of schedules. Therefore, this study suggests the development of a master plan for a nurse duty roster for approximately one year. The master plan starts with the development of a blue print for the nurse duty roster using a 0-1 goal programming technique. The appropriate working period for this blue print is formulated based on the number of night shifts and the number of required nurses for night shift per schedule. Subsequently, the blue print is repeated to complete the annual nurse duty roster. These newly developed procedures were then tested on several data sets. The test results found that the master plan has successfully distributed the annual workload evenly among nurses. In addition, the master plan allows nurses to arrange their career and social activities in advance.

  5. The relationship between the Municipal Master Plan and local Watershed Plans in water management

    Directory of Open Access Journals (Sweden)

    Denise Gallo Pizella

    2015-07-01

    Full Text Available The National Water Resources Policy has as one of its tools the drafting of local Water Resource Plans. In view of water resources planning and its relationship to land use planning, the aim of this work is to analyze the institutional and legal difficulties and the potential for an integrated system of water resources management. For this, we used the method of documentary and bibliographic research, beginning with the “Estatuto da Cidade”, a law for urban policy in Brazil, and literature on water management at the municipal and watershed levels. At the municipal level, the “Master Plan” (municipal plan of land use planning became the main instrument of territorial and municipal management, defining the parameters for the compliance of social, environmental and economic functions of real property. In this sense, the municipalities have a responsibility to protect water resources and, without local support, territorial and water management cannot be integrated in the context of the river basin. Despite the difficulties of including environmental variable in urban planning, the Master Plan has the potential to shape local water management systems that are environmentally sustainable and that progressively improve water quality and quantity within the watershed. Similarly, with more significant participation of the municipality in the Basin Committee, it is possible that the forms of municipal land use and occupation can be considered during the development and implementation of the Basin Plan. Thus, the management of water resources can occur integrally.

  6. Succession, Development and Innovation of the Master Plan of Beijing

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    <正> The Master Plan of Beijing (2004 - 2020),approved in January 2005 by the State Council, is an important strategic, holistic and comprehensive plan for Beijing to face the new century, to realize the stra-tegic proposition of"New Beijing, Great Olympics", and to fully push forward the harmonious and sustainable development of economy, society, population, resources and environment.

  7. 49 CFR 659.23 - System security plan: contents.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: contents. 659.23 Section 659... State Oversight Agency § 659.23 System security plan: contents. The system security plan must, at a... system security plan; and (e) Document the rail transit agency's process for making its system security...

  8. 6 CFR 27.225 - Site security plans.

    Science.gov (United States)

    2010-01-01

    ... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.225 Site security plans. (a) The Site Security Plan must... chemical facility security. (b) Except as provided in § 27.235, a covered facility must complete the Site...

  9. Nuclear safety research master plan

    Energy Technology Data Exchange (ETDEWEB)

    Ha, Jae Joo; Yang, J. U.; Jun, Y. S. and others

    2001-06-01

    The SRMP (Safety Research Master Plan) is established to cope with the changes of nuclear industry environments. The tech. tree is developed according to the accident progress of the nuclear reactor. The 11 research fields are derived to cover the necessary technologies to ensure the safety of nuclear reactors. Based on the developed tech. tree, the following four main research fields are derived as the main safety research areas: 1. Integrated nuclear safety enhancement, 2. Thermal hydraulic experiment and assessment, 3. Severe accident management and experiment, and 4. The integrity of equipment and structure. The research frame and strategies are also recommended to enhance the efficiency of research activity, and to extend the applicability of research output.

  10. Changing Perspectives on the Planning of Ankara (1924-2007 and Lessons for a New Master-Planning Approach to Developing Cities

    Directory of Open Access Journals (Sweden)

    Olgu Çalişkan

    2014-07-01

    Full Text Available As one of the newly planned capitals in the 20th century – like Islamabad, Canberra and Brazil –, Ankara represents an original case in planning history: from shaping a new town under the influence of early European urbanism to the control of a dynamic metropolitan form by structural planning approaches. Forming its urban core according to the initial planning perspectives between the beginning of 1930s and the mid-1970s, the city has entered a rapid phase of space production in its extensions for about the last thirty years.In the current period of development, highly fragmented urban peripheral formation has being occurred in Ankara. Since the existing trend on the dispersion of urban form lacking spatial coherence at different scale-levels causes the dominance of the private domain and a loss of urbanity, this trend might at first glance be considered as a break with the European tradition and the emergence of Anglo-Americanization in Turkish planning system in terms of looser development control approach on urban form.Before, coming to such a critical end-point, the paper prefers a closer look into the changing dynamics of master plans of the city. It is aimed to reveal the developmental logic of the city by means of master plan analysis. The comprehensive outlook – called plan matrix – is integrated into each master plan schema by correlating the basic components like main policy directions, depth of control, settlement typology, and city structure and form. Such a framework has a potential to be utilized for any kind of plan analysis at metropolitan scale for different cases. At the end of the analysis, the paper tends to address an alternative master planning approach for the similar types of developing cities striving for keeping its urban character within a fragmented urban body.

  11. THE NIGERIAN GAS MASTER-PLAN, INVESTMENT OPPORTUNITIES, CHALLENGES, ISSUES AFFECTING POWER SECTOR: AN ANALYSIS

    Directory of Open Access Journals (Sweden)

    R. INGWE

    2014-11-01

    Full Text Available The Nigerian Gas Master-Plan, Investment Opportunities, Challenges, Issues Affecting Power Sector: an Analysis. The objective of this article is to contribute towards understanding of the Nigerian Gas Master Plan (NGMP/Plan and its bifurcations with key socio-economic development factors. I applied the method of discourse to bring to being some points that have hitherto been unknown about the Master-plan and its inter-relationships and bifurcations. Elaborated here are the spectacular gains that have accrued to the Latin American country, Trinidad and Tobago, from its recent development of natural gas resources. This was considered suitable and significant here for highlighting that if such spectacular achievements could be realized from Trinidad and Tobago’s relatively smaller gas deposit (15.3 tcf, probable reserves (8.4 tcf, possible reserves (6.2 tcf would be by far greater considering Nigeria’s larger natural gas reserves (184 tcf wealth as earlier stated. I show that the Plan is well designed relevant to addressing Nigeria’s current development needs generally. It presents potentials for stimulating Nigeria’s economic growth by harnessing the country’s abundant natural gas reserves. The Plan enumerates/ elaborates huge investment opportunities. Some challenges likely to be faced in the implementation/management of the Plan are already being surmounted as recent reports show that some of its key investments have been realized and the required infrastructure are being provided. Regarding the issues in the Master-plan that are likely to affect and are affecting Nigeria’s power sector development, I reckon that they are mostly positive factors due to the way the plan promises to stimulate electricity generation in our country.

  12. Freezing the Master Production Schedule Under Rolling Planning Horizons

    OpenAIRE

    V. Sridharan; William L. Berry; V. Udayabhanu

    1987-01-01

    The stability of the Master Production Schedule (MPS) is a critical issue in managing production operations with a Material Requirements Planning System. One method of achieving stability is to freeze some portion or all of the MPS. While freezing the MPS can limit the number of schedule changes, it can also produce an increase in production and inventory costs. This paper examines three decision variables in freezing the MPS: the freezing method, the freeze interval length, and the planning ...

  13. Radiotherapy facilities: Master planning and concept design considerations

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2014-08-15

    This publication provides guidelines on how to plan a radiotherapy facility in terms of the strategic master planning process including the legal, technical and infrastructure requirements. It outlines a risk assessment methodology, a typical project work plan and describes the professional expertise required for the implementation of such a project. Generic templates for a block design are suggested, which include possibilities for future expansion. These templates can be overlaid onto the designated site such that the most efficient workflow between the main functional areas can be ensured. A sample checklist is attached to act as a guideline for project management and to indicate the critical stages in the process where technical expert assistance may be needed. The publication is aimed at professionals and administrators involved in infrastructure development, planning and facility management, as well as engineers, building contractors and radiotherapy professionals.

  14. Radiotherapy facilities: Master planning and concept design considerations

    International Nuclear Information System (INIS)

    2014-01-01

    This publication provides guidelines on how to plan a radiotherapy facility in terms of the strategic master planning process including the legal, technical and infrastructure requirements. It outlines a risk assessment methodology, a typical project work plan and describes the professional expertise required for the implementation of such a project. Generic templates for a block design are suggested, which include possibilities for future expansion. These templates can be overlaid onto the designated site such that the most efficient workflow between the main functional areas can be ensured. A sample checklist is attached to act as a guideline for project management and to indicate the critical stages in the process where technical expert assistance may be needed. The publication is aimed at professionals and administrators involved in infrastructure development, planning and facility management, as well as engineers, building contractors and radiotherapy professionals

  15. Use of the Social Security Administration Death Master File for ascertainment of mortality status

    Directory of Open Access Journals (Sweden)

    Whitcomb Brian W

    2004-03-01

    Full Text Available Abstract Objectives Internet sources that use the Social Security Administration's (SSA Death Master File have demonstrated high sensitivity among males for detection of mortality status in comparisons to the National Death Index, but the sensitivity has not been investigated for other demographic groups. Methods The authors used the SSA Death Master File to determine the mortality status of 374 decedents from the ongoing Patient Outcomes Study at Cedars-Sinai Medical Center whose deaths were confirmed by physicians using hospital records. Results Decedents identified by the SSA Death Master File were significantly older than those not identified. Foreign-born decedents were significantly less likely to be identified as dead than American-born decedents. Gender and marital status were not significant factors for identification by the SSA Death Master File. Conclusion The results of this study suggest that Internet sources may be used as an inexpensive and effective tool for determination of mortality status. However, among certain populations use of these databases alone may provide incomplete information.

  16. IAEA Nuclear Security Programme Combating Nuclear Terrorism

    International Nuclear Information System (INIS)

    2010-01-01

    IAEA Plans of activities include, General Conference in September 2001 which reviewed activities relevant to preventing nuclear terrorism and proposed master plan. The Board of Governors approved new Nuclear Security Plan for the next four years. Three activity areas are; - needs assessment, analysis and coordination, prevention and detection and response.

  17. California Master Plan for Migrant Education, 1976 Edition (Plan Maestro de California para Educacion Migrante, Edicion de 1976).

    Science.gov (United States)

    California State Dept. of Education, Sacramento. Div. of Compensatory Education.

    Based on the national migrant education plan, California's master plan aims to mobilize the necessary State and Federal resources, and to unify and assist the efforts of local educational agencies to end the migrant child's failure in school. The plan includes provisions for: instructional activities on a regular and extended year basis designed…

  18. Implementation plan for HANDI 2000 TWRS master equipment list

    International Nuclear Information System (INIS)

    BENNION, S.I.

    1999-01-01

    This document presents the implementation plan for an additional deliverable of the HANDI 2000 Project. The PassPort Equipment Data module processes include those portions of the COTS PassPort system required to support tracking and management of the Master Equipment List for Lockheed Martin Hanford Company (LMHC) and custom software created to work with the COTS products

  19. National Security Technology Incubation Project Continuation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-09-30

    This document contains a project continuation plan for the National Security Technology Incubator (NSTI). The plan was developed as part of the National Security Preparedness Project (NSPP) funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This continuation plan describes the current status of NSTI (staffing and clients), long-term goals, strategies, and long-term financial solvency goals.The Arrowhead Center of New Mexico State University (NMSU) is the operator and manager of the NSTI. To realize the NSTI, Arrowhead Center must meet several performance objectives related to planning, development, execution, evaluation, and sustainability. This continuation plan is critical to the success of NSTI in its mission of incubating businesses with security technology products and services.

  20. OPS Master

    Data.gov (United States)

    US Agency for International Development — OPS Master is a management tool and database for integrated financial planning and portfolio management in USAID Missions. Using OPS Master, the three principal...

  1. Underground storage tank - Integrated Demonstration Technical Task Plan master schedule

    International Nuclear Information System (INIS)

    Johnson, C.M.

    1994-08-01

    This document provides an integrated programmatic schedule (i.e., Master Schedule) for the U.S. Department of Energy (DOE) Underground Storage Tank-Integrated Demonstration (UST-ID) Program. It includes top-level schedule and related information for the DOE Office of Technology Development (EM-50) UST-ID activities. The information is based upon the fiscal year (FY) 1994 technical task plans (TTPS) and has been prepared as a baseline information resource for program participants. The Master Schedule contains Level 0 and Level 1 program schedules for the UST-ID Program. This document is one of a number of programmatic documents developed to support and manage the UST-ID activities. It is composed of the following sections: Program Overview - provides a summary background of the UST-ID Program. This summary addresses the mission, scope, and organizational structure of the program; Activity Description - provides a programmatic description of UST-ID technology development activities and lists the key milestones for the UST-ID systems. Master Schedules - contains the Level 0 and Level 1 programmatic schedules for the UST-ID systems. References - lists the UST-ID programmatic documents used as a basis for preparing the Master Schedule. The appendixes contain additional details related to site-specific technology applications

  2. ORCWM test and evaluaton master plan. Revision 00

    International Nuclear Information System (INIS)

    1995-08-01

    The Office of Civilian Radioactive Waste Management (OCRWM) Test and Evaluation Master Plan (TEMP) describes the program Test and Evaluation (T ampersand E) policy, objectives, requirements, general methodology (test flow and description of each T ampersand E phase), responsibilities, and scheduling of test phases for the Civilian Radioactive Waste Management System (CRWMS). This TEMP is a program-level management planning document for al CRWMS T ampersand E activities and will be used in conjunction with Section 11 of the Quality Assurance Requirements and Description (QARD), as appropriate, as a guide for the projects in developing their T ampersand E plans. In the OCRWM document hierarchy, that is described in the OCRWM Systems Engineering Management Plan (SEMP), the TEMP is subordinate to the program SEMP. To ensure CRWMS operates as an integrated system, the plans for verifying the performance and evaluating the operational suitability and effectiveness of the overall system are also described. Test and evaluation is an integral part of the systems engineering process. Key aspects of the systems engineering process, more fully described in the OCRWM SEMP, are discussed in this TEMP to illustrate how T ampersand E supports the overall systems engineering process

  3. The Challenges of Implementing Sustainable Development: The Case of Sofia’s Master Plan

    Directory of Open Access Journals (Sweden)

    Aleksandar D. Slaev

    2016-12-01

    Full Text Available In this paper, we explore how master planning promotes and implements particular urban development patterns and, more generally, contributes to sustainability. Our goal is to understand the link between urban growth intentions articulated through the master planning process and realisation of its specific forms, e.g., monocentric or polycentric, compact or dispersed. As a case study, we examine the current General Urban Development Plan (GUDP of the Bulgarian capital Sofia against the city’s actual development pattern. We observe that the primary goals of the GUDP are to promote a polycentric urban structure and low-density expansion, as well as preserve green edges. While the question of whether and how these goals reflect the sustainability ideal requires further consideration, there are some indications that Sofia’s GUDP may not be effective in encouraging sustainable forms of growth. Substantial inconsistencies exist between the plan’s overall goals and some of its measures and implementation tools. The results on the ground suggest that, despite the plan’s low-density aspirations, Sofia is becoming more compact and densified, while losing its green edges and failing to redirect growth to its northern territories where ample space and opportunities exist. We conclude that employing the achievements of research on sustainability and developing relevant implementation tools such as more effective zoning regulations and viable suburban transportation infrastructure are necessary for realising both the patterns proposed through master planning and achieving sustainable urban growth.

  4. Voluntary research results for five years along the master plan on nuclear safety research. FY 2001 - 2005

    International Nuclear Information System (INIS)

    Sato, Yoshinori

    2006-05-01

    Safety Research has been conducted from FY 2001 to FY 2005 according to the Master Plan on Nuclear Safety Research (FY 2001-2005) in Japan Atomic Energy Agency which took over former Japan Nuclear Cycle Development Institute. This report shows the voluntary research results for five years conducted from FY 2001 to FY 2005 according to the Master Plan on Nuclear Safety Research (FY 2001-2005). (author)

  5. Structural master plan of flood mitigation measures

    Directory of Open Access Journals (Sweden)

    A. Heidari

    2009-01-01

    Full Text Available Flood protection is one of the practical methods in damage reduction. Although it not possible to be completely protected from flood disaster but major part of damages can be reduced by mitigation plans. In this paper, the optimum flood mitigation master plan is determined by economic evaluation in trading off between the construction costs and expected value of damage reduction as the benefits. Size of the certain mitigation alternative is also be obtained by risk analysis by accepting possibility of flood overtopping. Different flood mitigation alternatives are investigated from various aspects in the Dez and Karun river floodplain areas as a case study in south west of IRAN. The results show that detention dam and flood diversion are the best alternatives of flood mitigation methods as well as enforcing the flood control purpose of upstream multipurpose reservoirs. Dyke and levees are not mostly justifiable because of negative impact on down stream by enhancing routed flood peak discharge magnitude and flood damages as well.

  6. Planning Security Services for IT Systems

    OpenAIRE

    Henderson, Marie; Page, Howard Philip

    2014-01-01

    Often the hardest job is to get business representatives to look at security as something that makes managing their risks and achieving their objectives easier, with security compliance as just part of that journey. This paper addresses that by making planning for security services a 'business tool'.

  7. 49 CFR 659.21 - System security plan: general requirements.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: general requirements. 659.21... State Oversight Agency § 659.21 System security plan: general requirements. (a) The oversight agency shall require the rail transit agency to implement a system security plan that, at a minimum, complies...

  8. 49 CFR 659.25 - Annual review of system safety program plan and system security plan.

    Science.gov (United States)

    2010-10-01

    ... system security plan. 659.25 Section 659.25 Transportation Other Regulations Relating to Transportation... and system security plan. (a) The oversight agency shall require the rail transit agency to conduct an annual review of its system safety program plan and system security plan. (b) In the event the rail...

  9. International Nuclear Security Education Network (INSEN): Promoting nuclear security education

    International Nuclear Information System (INIS)

    Muhamad Samudi Yasir

    2013-01-01

    Full-text: The need for human resource development programmes in nuclear security was underlined at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors Meetings. Successive IAEA Nuclear Security Plans, the most recent of which was agreed by the Board of Governors in September 2009, give high priority to assisting States in establishing educational programmes in nuclear security in order to ensure the sustainability of nuclear security improvements. The current Nuclear Security Plan 1 covering 2010-2013 emphasizes on the importance of considering existing capacities at international, regional and national levels while designing nuclear security academic programmes. In the course of implementing the Plan, the IAEA developed a guide entitled Educational Programme in Nuclear Security (IAEA Nuclear Security Series No. 12) that consists of a model of a MAster of Science (M.Sc.) and a Certificate Programme in Nuclear Security. This guide was aims at assisting universities or other educational institutes to developed academic programmes in nuclear security. Independently, some universities already offered academic programmes covering some areas of nuclear security, while other universities have asked the IAEA to support the implementation of these programmes. In order to better address current and future request for assistance in this area, the IAEA establish a collaboration network-International Nuclear Security Education Network (INSEN), among universities who are providing nuclear security education or who are interested in starting an academic programme/ course(s) in nuclear security. Universiti Kebangsaan Malaysia (UKM) is a first local university became a member of INSEN since the beginning of the establishment. (author)

  10. Information Security: USDA Needs to Implement Its Departmentwide Information Security Plan

    National Research Council Canada - National Science Library

    2000-01-01

    USDA has taken positive steps to begin improving its information security by developing its August 1999 Action Plan with recommendations to strengthen department-wide information security and hiring...

  11. Integrated Nuclear Security Support Plan (INSSP)

    International Nuclear Information System (INIS)

    Moore, G.M.

    2010-01-01

    Integrated Nuclear Security Support Plan (INSSP) purposes the framework for a comprehensive approach to addressing specific national security needs. It provides means for coordinating nuclear security assistance to member states. Identifies responsible parties for completion of nuclear security activities which are necessary to build sustainable nuclear security programs. International Atomic Energy Agency INSSP development process is based on findings and recommendations from a range of nuclear security missions and other information needs assessments. Takes into account of the ongoing work activities of other bilateral assistance.

  12. Master Plan for Tennessee Schools: Preparing for the 21st Century.

    Science.gov (United States)

    Tennessee State Board of Education, Nashville.

    The Education Improvement Act (EIA) was passed in Tennessee in 1992. It established the Basic Education Program (BEP) as the funding formula used to provide adequate, equitable, and sustainable school funding. The 1997 master plan is consistent with the national Goals 2000 legislation and addresses each of the eight national goals. The plan…

  13. Improving the effectiveness of planning EIA (PEIA) in China: Integrating planning and assessment during the preparation of Shenzhen's Master Urban Plan

    International Nuclear Information System (INIS)

    Che Xiuzhen; English, Alex; Lu Jia; Chen, Yongqin David

    2011-01-01

    The enactment and implementation of the 2003 EIA Law in China institutionalised the role of plan environmental impact assessment (PEIA). While the philosophy, methodology and mechanisms of PEIA have gradually permeated through the various levels of government with a positive effect on the process and outcome of urban planning, only a few cities in China have so far carried out PEIA as a Strategic Environmental Assessment (SEA)-type procedure. One such case is the southern city of Shenzhen. During the past three decades, Shenzhen has grown from a small town to a large and booming city as China has successfully and rapidly developed its economy by adopting the 'reform and open door' policy. In response to the challenges arising from the generally divergent processes of rapid urbanisation, economic transformation and environment protection, Shenzhen has incrementally adopted the SEA concept in developing the city's Master Urban Plan. As such, this paper reviews the effectiveness of PEIA in three ways: ·as a tool and process for achieving more sustainable and strategic planning; ·to determine the level of integration of SEA within the planning system; and, ·its effectiveness vis-a-vis implementation. The implementation of PEIA within Shenzhen's Master Urban Plan offers important insights into the emergence of innovative practices in undertaking PEIA as well as theoretical contributions to the field, especially in exploring the relationship between PEIA and SEA and highlighting the central role of local governing institutions in SEA development.

  14. Path planning of master-slave manipulator using graphic simulator

    International Nuclear Information System (INIS)

    Lee, J. Y.; Kim, S. H.; Song, T. K.; Park, B. S.; Yoon, J. S.

    2002-01-01

    To handle the high level radioactive materials such as spent fuels remotely, the master-slave manipulator is generally used as a remote handling equipment in the hot cell. To analyze the motion and to implement the training system by virtual reality technology, the simulator for M-S manipulator using the computer graphics is developed. The parts are modelled in 3-D graphics, assembled, and kinematics are assigned. The inverse kinematics of the manipulator is defined, and the slave of manipulator is coupled with master by the manipulator's specification. Also, the virtual work cell is implemented in the graphical environment which is the same as the real environment and the path planning method using the function of the collision detection for a manipulator are proposed. This graphic simulator of manipulator can be effectively used in designing of the maintenance processes for the hot cell equipment and enhance the reliability of the spent fuel management

  15. Developing a Robust Strategy for Implementing a Water Resources Master Plan in Lima, Peru

    Science.gov (United States)

    Kalra, N.; Groves, D.; Bonzanigo, L.; Molina-Perez, E.

    2015-12-01

    Lima, the capital of Peru, faces significant water stress. It is the fifth largest metropolitan area in Latin America, and the second largest desert city in the world. The city has developed a Master Plan of major investment projects to improve water reliability until 2040. Yet key questions remain. Is the Master Plan sufficient for ensuring reliability in the face of deeply uncertain future climate change and demand? How do uncertain budget and project feasibility conditions shape Lima's options? How should the investments in the plan be prioritized, and can some be delayed? Lima is not alone in facing these planning challenges. Governments invest billions of dollars annually in long-term projects. Yet deep uncertainties pose formidable challenges to making near-term decisions that make long-term sense. The World Bank has spearheaded a community of practice on methods for Decision Making Under Deep Uncertainty (DMU). This pilot project in Peru is the first in-depth application of DMU techniques to water supply planning in a developing country. It builds on prior analysis done in New York, California, and for the Colorado River, yet shows how these methods can be applied in regions which do not have as advanced data or tools available. The project combines three methods in particular -- Robust Decision Making, Decision Scaling, and Adaptive Pathways -- to help Lima implement its Master Plan in a way that is robust, no-regret, and adaptive. It was done in close partnership with SEDAPAL, the water utility company in Lima, and in coordination with other national WRM and meteorological agencies. This talk will: Present the planning challenges Lima and other cities face, including climate change Describe DMU methodologies and how they were applied in collaboration with SEDAPAL Summarize recommendations for achieving long-term water reliability in Lima Suggest how these methodologies can benefit other investment projects in developing countries.

  16. Radiotherapy Facilities: Master Planning and Concept Design Considerations (Russian Edition)

    International Nuclear Information System (INIS)

    2015-01-01

    This publication provides guidelines on how to plan a radiotherapy facility in terms of the strategic master planning process including the legal, technical and infrastructure requirements. It outlines a risk assessment methodology and a typical project work plan, and describes the professional expertise required for the implementation of such a project. Generic templates for a block design are suggested, which include possibilities for future expansion. These templates can be overlaid onto the designated site such that the most efficient workflow between the main functional areas can be ensured. A sample checklist is attached to act as a guideline for project management and to indicate the critical stages in the process where technical expert assistance may be needed. The publication is aimed at professionals and administrators involved in infrastructure development, planning and facility management, as well as engineers, building contractors and radiotherapy professionals

  17. Integral stormwater management master plan and design in an ecological community.

    Science.gov (United States)

    Che, Wu; Zhao, Yang; Yang, Zheng; Li, Junqi; Shi, Man

    2014-09-01

    Urban stormwater runoff nearly discharges directly into bodies of water through gray infrastructure in China, such as sewers, impermeable ditches, and pump stations. As urban flooding, water shortage, and other environment problems become serious, integrated water environment management is becoming increasingly complex and challenging. At more than 200ha, the Oriental Sun City community is a large retirement community located in the eastern side of Beijing. During the beginning of its construction, the project faced a series of serious water environment crises such as eutrophication, flood risk, water shortage, and high maintenance costs. To address these issues, an integral stormwater management master plan was developed based on the concept of low impact development (LID). A large number of LID and green stormwater infrastructure (GSI) approaches were designed and applied in the community to replace traditional stormwater drainage systems completely. These approaches mainly included bioretention (which captured nearly 85th percentile volume of the annual runoff in the site, nearly 5.4×10(5)m(3) annually), swales (which functioned as a substitute for traditional stormwater pipes), waterscapes, and stormwater wetlands. Finally, a stormwater system plan was proposed by integrating with the gray water system, landscape planning, an architectural master plan, and related consultations that supported the entire construction period. After more than 10 years of planning, designing, construction, and operation, Oriental Sun City has become one of the earliest modern large-scale LID communities in China. Moreover, the project not only addressed the crisis efficiently and effectively, but also yielded economic and ecological benefits. Copyright © 2014. Published by Elsevier B.V.

  18. Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication

    Science.gov (United States)

    Murdoch, Steven J.; Anderson, Ross

    Banks worldwide are starting to authenticate online card transactions using the '3-D Secure' protocol, which is branded as Verified by Visa and MasterCard SecureCode. This has been partly driven by the sharp increase in online fraud that followed the deployment of EMV smart cards for cardholder-present payments in Europe and elsewhere. 3-D Secure has so far escaped academic scrutiny; yet it might be a textbook example of how not to design an authentication protocol. It ignores good design principles and has significant vulnerabilities, some of which are already being exploited. Also, it provides a fascinating lesson in security economics. While other single sign-on schemes such as OpenID, InfoCard and Liberty came up with decent technology they got the economics wrong, and their schemes have not been adopted. 3-D Secure has lousy technology, but got the economics right (at least for banks and merchants); it now boasts hundreds of millions of accounts. We suggest a path towards more robust authentication that is technologically sound and where the economics would work for banks, merchants and customers - given a gentle regulatory nudge.

  19. Corporate strategic plan for safeguards and security

    International Nuclear Information System (INIS)

    1997-06-01

    Department of Energy (DOE) safeguards and security (S and S) is a team effort, consisting of Field, National Laboratories, Program Office, and Headquarters units cooperating to support the Department's diverse security needs. As an integral part of the nation's security structure, the DOE S and S Program regularly supports and works in cooperation with other US Government agencies and private industry to improve the national security posture. Thus, inter- and intra-agency partnerships play an invaluable role in the continuing efforts to integrate and implement improved ways of doing business. Their Corporate Strategic Plan provides a road map to guide, track, and provide feedback for the incorporation and implementation of S and S activities within DOE. Part 1 Planning Framework, describes those overarching factors which influence the planning endeavors. Part 2, Strategic Perspective, outlines where the S and S Program has been and how they will move to the future through core competencies, changing cultural thinking, and implementing their strategies. Part 3, Strategic and Operational Integration, details critical focus areas, strategies, and success indicators designed to enhance inter-agency S and S integration and promote cooperation with external agencies. This Plan will be reviewed annually to ensure it remains supportive and fully-engaged with the nation's and international security environments

  20. Connecting Systems Model Design to Decision-Maker and Stakeholder Needs: Lessons from Louisiana's Coastal Master Plan

    Science.gov (United States)

    Fischbach, J. R.; Johnson, D.

    2017-12-01

    Louisiana's Comprehensive Master Plan for a Sustainable Coast is a 50-year plan designed to reduce flood risk and minimize land loss while allowing for the continued provision of economic and ecosystem services from this critical coastal region. Conceived in 2007 in response to hurricanes Katrina and Rita in 2005, the master plan is updated on a five-year planning cycle by the state's Coastal Protection and Restoration Authority (CPRA). Under the plan's middle-of-the-road (Medium) environmental scenario, the master plan is projected to reduce expected annual damage from storm surge flooding by approximately 65% relative to a future without action: from 5.3 billion to 2.2 billion in 2040, and from 12.1 billion to 3.7 billion in 2065. The Coastal Louisiana Risk Assessment model (CLARA) is used to estimate the risk reduction impacts of projects that have been considered for implementation as part of the plan. Evaluation of projects involves estimation of cost effectiveness in multiple future time periods and under a range of environmental uncertainties (e.g., the rates of sea level rise and land subsidence, changes in future hurricane intensity and frequency), operational uncertainties (e.g., system fragility), and economic uncertainties (e.g., patterns of population change and asset exposure). Between the 2012 and 2017 planning cycles, many improvements were made to the CLARA model. These included changes to the model's spatial resolution and definition of policy-relevant spatial units, an improved treatment of parametric uncertainty and uncertainty propagation between model components, the addition of a module to consider critical infrastructure exposure, and a new population growth model. CPRA also developed new scenarios for analysis in 2017 that were responsive to new scientific literature and to accommodate a new approach to modeling coastal morphology. In this talk, we discuss how CLARA has evolved over the 2012 and 2017 planning cycles in response to the needs

  1. Master Plan for Tennessee Schools, 1995: Preparing for the 21st Century.

    Science.gov (United States)

    Tennessee State Board of Education, Nashville.

    The Tennessee State Legislature passed the Education Improvement Act (EIA) in 1992, which established the Basic Education Program (BEP) as the funding formula for providing adequate, equitable, and sustainable school funding. This document presents the 1995 Master Plan for Tennessee Schools, which focuses on the priority issues that must be…

  2. Master plan: Guntersville Reservoir Aquatic Plant Management. Executive summary

    Energy Technology Data Exchange (ETDEWEB)

    1992-12-31

    In 1989, Congress provided funding to start a five-year comprehensive project to manage aquatic plants in Guntersville Reservoir, to be jointly implemented by the US Army Corps of Engineers (Corps) and Tennessee Valley Authority (TVA). TVA serves as the overall project coordinator and is the lead agency for this project. Known as the Joint Agency Guntersville Project (JAGP), the project will test and demonstrate innovative management technologies, and incorporate the most effective technologies into a comprehensive aquatic plant management plan for Guntersville Reservoir. The JAGP is intended to serve as a National Demonstration Project for aquatic plant management. As part of this JAGP, the Master Plan for Aquatic Plant Management for the Guntersville Reservoir Project, Alabama-Tennessee is authorized by Corps Contract Number DACW62-90-C-0067.

  3. Ghana's Integrated Nuclear Security Support Plan

    International Nuclear Information System (INIS)

    Dahlstrom, Danielle

    2013-01-01

    At the Korle Bu Teaching Hospital outside Accra, Pearl Lovelyn Lawson checks the records of the next patient to undergo radiotherapy and adjusts the dose settings of the teletherapy machine. It is business as usual at the facility that treats over fifty patients each day. But Lawson's routine now includes additional procedures to ensure that the highly radioactive cobalt-60 source located inside the machine remains secure. Nuclear security devices and systems such as double locks, motion sensors, and cameras that transmit images to a central alarm system have been installed to ensure that the source cannot be stolen, the facility sabotaged, or unauthorized access gained. At Korle Bu physical protection measures were upgraded as part of Ghana's Integrated Nuclear Security Support Plan (INSSP). Preventing, detecting and responding to criminal acts like the theft or illegal transfer of a radioactive source, is an international priority that could be addressed through an INSSP. As one of its key nuclear security services, the IAEA assists Member States in drafting such plans. An INSSP is developed jointly with the Member State, using a holistic approach to nuclear security capacity building. It reinforces the primary objective of a State's nuclear security regime to protect people, society, and the environment from the harmful consequences of a nuclear security event. Addressing five components - the legal and regulatory framework, prevention, detection, and sustainability - the jointly developed plan identifies the needs, responsible entities and organizations within the State, as well as the timeframe for the implementation of agreed nuclear security related activities. Ghana's INSSP, tailored to its specific needs, is based on findings and recommendations from advisory service missions carried out in Ghana, including an International Nuclear Security Advisory Service mission and an International Physical Protection Advisory Service mission. Ghana's INSSP was

  4. The Dutch Bicycle Master Plan and road safety : measures to be taken.

    NARCIS (Netherlands)

    Noordzij, P.C. & Blokpoel, A.

    1998-01-01

    The Bicycle Master Plan was launched in 1990 and concluded in 1996. To mark its conclusion, a study was carried out to assess developments in road safety for cyclists. An overview of future measures was also compiled. Since 1950, there have been three broad periods: (1) 1950-1975: an increase in the

  5. National Security Technology Incubator Business Plan

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  6. A Practice of Secure Development and Operational Environment Plan

    International Nuclear Information System (INIS)

    Park, Jaekwan; Seo, Sangmun; Suh, Yongsukl; Park, Cheol

    2017-01-01

    This paper suggests a practice of plan for SDOE establishment in a nuclear I and C. First, it is necessary to perform a requirements analysis to define key regulatory issues and determine the target systems. The analysis includes a survey to find out the applicable measures credited internationally. Based on the analysis results, this paper proposes an implementation plan including a process harmonizing security activities with legacy software activities and applicable technical, operational, and management measures for target systems. Recently, nuclear I and C has been faced with two security issues, cyber security (CS) and secure development and operational environment (SDOE). Unlike cyber security, few studies on planning SDOE have been presented. This paper suggests a plan for establishing an SDOE in a nuclear I and C. This paper defines three key considerations to comply with the regulatory position of RG. 1.152(R3) and proposes a process harmonizing the security activities with legacy software activities. In addition, this paper proposes technical, operational, and management measures applicable for SDOE.

  7. Master environmental plan for Fort Devens, Massachusetts

    Energy Technology Data Exchange (ETDEWEB)

    Biang, C.A.; Peters, R.W.; Pearl, R.H.; Tsai, S.Y. (Argonne National Lab., IL (United States). Energy Systems Div.)

    1991-11-01

    Argonne National Laboratory has prepared a master environmental plan (MEP) for Fort Devens, Massachusetts, for the US Army Toxic and Hazardous Materials Agency. The MEP is an assessment based on environmental laws and regulations of both the federal government and the Commonwealth of Massachusetts. The MEP assess the physical and environmental status of 58 potential hazardous waste sites, including 54 study areas (SAs) that pose a potential for releasing contamination into the environment and 4 areas of concern (AOCs) that are known to have substantial contamination. For each SA or AOC, this MEP describes the known history and environment, identifies additional data needs, and proposes possible response actions. Most recommended response actions consist of environmental sampling and monitoring and other characterization studies. 74 refs., 63 figs., 50 tabs.

  8. Security-Constrained Resource Planning in Electricity Market

    International Nuclear Information System (INIS)

    Roh, Jae Hyung; Shahidehpour, Mohammad; Yong Fu

    2007-06-01

    We propose a market-based competitive generation resource planning model in electricity markets. The objective of the model is to introduce the impact of transmission security in a multi-GENCO generation resource planning. The proposed approach is based on effective decomposition and coordination strategies. Lagrangian relaxation and Benders decomposition like structure are applied to the model. Locational price signal and capacity signal are defined for the simulation of competition among GENCOs and the coordination of security between GENCOs and the regulatory body (ISO). The numerical examples exhibit the effectiveness of the proposed generation planning model in electricity markets.

  9. 78 FR 51754 - Request To Modify License by Replacing Security Plan With New Radiation Safety Plan; U.S...

    Science.gov (United States)

    2013-08-21

    ... Replacing Security Plan With New Radiation Safety Plan; U.S. Department of the Army, Jefferson Proving... security plan with a new radiation safety plan. DATES: Submit comments by September 20, 2013. Requests for.... The proposed change is to modify License Condition No. 12 D which refers to the security plan of...

  10. Information security management system planning for CBRN facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lenaeu, Joseph D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); O' Neil, Lori Ross [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Leitch, Rosalyn M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Glantz, Clifford S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Landine, Guy P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Bryant, Janet L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lewis, John [National Nuclear Lab., Workington (United Kingdom); Mathers, Gemma [National Nuclear Lab., Workington (United Kingdom); Rodger, Robert [National Nuclear Lab., Workington (United Kingdom); Johnson, Christopher [National Nuclear Lab., Workington (United Kingdom)

    2015-12-01

    The focus of this document is to provide guidance for the development of information security management system planning documents at chemical, biological, radiological, or nuclear (CBRN) facilities. It describes a risk-based approach for planning information security programs based on the sensitivity of the data developed, processed, communicated, and stored on facility information systems.

  11. Information security management system planning for CBRN facilities

    International Nuclear Information System (INIS)

    Lenaeu, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.; Glantz, Clifford S.; Landine, Guy P.; Bryant, Janet L.; Lewis, John; Mathers, Gemma; Rodger, Robert; Johnson, Christopher

    2015-01-01

    The focus of this document is to provide guidance for the development of information security management system planning documents at chemical, biological, radiological, or nuclear (CBRN) facilities. It describes a risk-based approach for planning information security programs based on the sensitivity of the data developed, processed, communicated, and stored on facility information systems.

  12. Stability measures for rolling schedules with applications to capacity expansion planning, master production scheduling, and lot sizing

    OpenAIRE

    Kimms, Alf

    1996-01-01

    This contribution discusses the measurement of (in-)stability of finite horizon production planning when done on a rolling horizon basis. As examples we review strategic capacity expansion planning, tactical master production schedulng, and operational capacitated lot sizing.

  13. Master plan study - District heating Sillamaee municipality. Estonia. Final report. Appendices for chapter 9

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    The appendices to the final report on the master plan study on district heating in the municipality in Estonia, chapter nine, gives data related to general economic assumptions for financial and economic calculations, fuel consumption, financing, prices, fuel consumption. (ARW)

  14. Mastering Mobile Security

    Science.gov (United States)

    Panettieri, Joseph C.

    2007-01-01

    Without proper security, mobile devices are easy targets for worms, viruses, and so-called robot ("bot") networks. Hackers increasingly use bot networks to launch massive attacks against eCommerce websites--potentially targeting one's online tuition payment or fundraising/financial development systems. How can one defend his mobile systems against…

  15. Development of a master plan for industrial solid waste management

    International Nuclear Information System (INIS)

    Karamouz, M.; Zahraie, B.; Kerachian, R.; Mahjouri, N.; Moridi, A.

    2006-01-01

    Rapid industrial growth in the province of Khuzestan in the south west of Iran has resulted in disposal of about 1750 tons of solid waste per day. Most of these industrial solid wastes including hazardous wastes are disposed without considering environmental issues. This has contributed considerably to the pollution of the environment. This paper introduces a framework in which to develop a master plan for industrial solid waste management. There are usually different criteria for evaluating the existing solid waste pollution loads and how effective the management schemes are. A multiple criteria decision making technique, namely Analytical Hierarchy Process, is used for ranking the industrial units based on their share in solid waste related environmental pollution and determining the share of each unit in total solid waste pollution load. In this framework, a comprehensive set of direct, indirect, and supporting projects are proposed for solid waste pollution control. The proposed framework is applied for industrial solid waste management in the province of Khuzestan in Iran and a databank including GIS based maps of the study area is also developed. The results have shown that the industries located near the capital city of the province, Ahwaz, produce more than 32 percent of the total solid waste pollution load of the province. Application of the methodology also has shown that it can be effectively used for development of the master plan and management of industrial solid wastes

  16. 49 CFR 172.802 - Components of a security plan.

    Science.gov (United States)

    2010-10-01

    ... from origin to destination, including shipments stored incidental to movement. (b) The security plan must also include the following: (1) Identification by job title of the senior management official... business and must make the security plan available upon request, at a reasonable time and location, to an...

  17. Global Security Program Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    Bretzke, John C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-03-25

    The Global Security Directorate mission is to protect against proliferant and unconventional nuclear threats –regardless of origin - and emerging new threats. This mission is accomplished as the Los Alamos National Laboratory staff completes projects for our numerous sponsors. The purpose of this Program Management Plan is to establish and clearly describe the GS program management requirements including instructions that are essential for the successful management of projects in accordance with our sponsor requirements. The detailed information provided in this document applies to all LANL staff and their subcontractors that are performing GS portfolio work. GS management is committed to a culture that ensures effective planning, execution, and achievement of measurable results in accordance with the GS mission. Outcomes of such a culture result in better communication, delegated authority, accountability, and increased emphasis on safely and securely achieving GS objectives.

  18. A Master Plan for the Development of Vocational-Technical Education In New Mexico.

    Science.gov (United States)

    Sterling Inst., Washington, DC.

    This master plan for vocational education in New Mexico is the result of a study conducted by professional education consultants. The following areas were examined during the study: (1) New Mexico's present manpower problems, (2) market trends of future industrial potential, (3) state resources capable of attracting new industry, (4) adequacy of…

  19. Implementation of the Master Plan Activities in Serayu River Voyage (SRV Within the Framework of Tourism Development in Banyumas Regency

    Directory of Open Access Journals (Sweden)

    Imam Pamungkas

    2015-02-01

    Full Text Available The Master Plan Activity of Serayu River Voyage (SRV for tourism development in Banyumas Regency were expected to be completed within five years from 2008 to 2012, but during the period until 2013, most programs and activities have not been implemented. The results showed that the Master Plan of SRV in the framework of tourism development in Banyumas Regency has not been implemented properly. The cause is the absence of good coordination between agencies, the lack programs and activities integration, supporting documents have not been revised, absence of good socialization, and the lack of private sector contribution. The factors that constrain and support implementation of the Master Plan is described as follows. Supporting factors: competent human resources (implementor already available at the managerial level and have intellectual tourism, it is only need to add personnel in the sector of culture; the availability of adequate budget; institutions that have been effective and efficient; High community response; High commitment of Banyumas Regent and cooperation related parties (stakeholders; and natural conditions of Serayu tend to calm and the river slope condition is small. The constrain factors: regulatory policies; integration of programs and activities; coordination and socialization implied sectoral ego that need to be addressed. Keywords : implementation, master plan, Serayu River Voyage, human resources, regulation

  20. Revised Master Plan for the Hood River Production Program, Technical Report 2008.

    Energy Technology Data Exchange (ETDEWEB)

    Oregon Department of Fish and Wildlife; Confederated Tribes of the Warm Springs Reservation

    2008-04-28

    The Hood River Production Program (HRPP) is a Bonneville Power Administration (BPA) funded program initiated as a mitigation measure for Columbia River hydrosystem effects on anadromous fish. The HRPP began in the early 1990s with the release of spring Chinook and winter steelhead smolts into the basin. Prior to implementation, co-managers, including the Confederated Tribes of the Warm Springs Reservation and the Oregon Department of Fish and Wildlife drafted the Hood River Production Master Plan (O'Toole and ODFW 1991a; O'Toole and ODFW 1991b) and the Pelton Ladder Master Plan (Smith and CTWSR 1991). Both documents were completed in 1991 and subsequently approved by the Council in 1992 and authorized through a BPA-led Environmental Impact Statement in 1996. In 2003, a 10-year programmatic review was conducted for BPA-funded programs in the Hood River (Underwood et al. 2003). The primary objective of the HRPP Review (Review) was to determine if program goals were being met, and if modifications to program activities would be necessary in order to meet or revise program goals. In 2003, an agreement was signed between PacifiCorp and resource managers to remove the Powerdale Dam (RM 10) and associated adult trapping facility by 2010. The HRPP program has been dependant on the adult trap to collect broodstock for the hatchery programs; therefore, upon the dam's removal, some sort of replacement for the trap would be needed to continue the HRPP. At the same time the Hood River Subbasin Plan (Coccoli 2004) was being written and prompted the co-managers to considered future direction of the program. This included revising the numerical adult fish objectives based on the assimilated data and output from several models run on the Hood River system. In response to the Review as well as the Subbasin Plan, and intensive monitoring and evaluation of the current program, the HRPP co-managers determined the spring Chinook program was not achieving the HRPP

  1. Computer Security Incident Response Planning at Nuclear Facilities

    International Nuclear Information System (INIS)

    2016-06-01

    The purpose of this publication is to assist Member States in developing comprehensive contingency plans for computer security incidents with the potential to impact nuclear security and/or nuclear safety. It provides an outline and recommendations for establishing a computer security incident response capability as part of a computer security programme, and considers the roles and responsibilities of the system owner, operator, competent authority, and national technical authority in responding to a computer security incident with possible nuclear security repercussions

  2. Research Projects at Chulalongkorn University for the Master Degree Programme in Nuclear Security and Safeguard

    International Nuclear Information System (INIS)

    Nilsuwankosit, S.

    2015-01-01

    The Department of Nuclear Engineering, Faculty of Engineering, Chulalongkorn University, Thailand, began its master degree programme in nuclear security and safeguard in November 2013 with the support from the CBRN-Center of Excellence, European Union. This programme was planned as a way to raise the awareness of various local agencies in ASEAN countries regarding the threat of CBRN events. In the long run, the programme will also serve as the platform to develop the human resource and to provide the professional assistance required to counter such threat in the region. The programme closely follows the guideline as given by the IAEA and employs its materials as the main source of references. The first batch of 20 students came from countries in the ASEAN community. Due to the nature of the program, each student is required to conduct the research and a thesis based on such research is to be submitted as part of the requirement for the graduation. Currently, the research subjects that are readily available to the students can be classified into 5 categories: 1. subjects with neutron generator, 2. subjects with nuclear electronics and instruments, 3. subjects with industrial applications, 4. subjects with computer simulations, and 5. subjects with policy research. (author)

  3. A Case Study in Master Planning the Learning Landscape Hub Concepts for the University at Buffalo

    Science.gov (United States)

    Dugdale, Shirley; Torino, Roger; Felix, Elliot

    2009-01-01

    This case study describes concepts for three types of learning spaces that grew out of a Learning Landscape planning process. The process was part of a master plan study for the three campuses of the University at Buffalo. It involved research into user needs and aspirations about future pedagogy, development of learning space strategy,…

  4. The Maritime Infrastructure Recovery Plan for the National Strategy for Maritime Security

    National Research Council Canada - National Science Library

    2006-01-01

    ... to the jurisdiction of the United States. The MIRP, the Maritime Commerce Security Plan, and the Maritime Transportation System Security Plan were developed in close coordination under the National Strategy for Maritime Security (NSMS...

  5. ADP Security Plan, Math Building, Room 1139

    Energy Technology Data Exchange (ETDEWEB)

    Melton, R.

    1985-08-27

    This document provides the draft copy of an updated (ADP) Security Plan for an IBM Personal Computer to be used in the Math Building at PNL for classified data base management. Using the equipment specified in this document and implementing the administrative and physical procedures as outlined will provide the secure environment necessary for this work to proceed.

  6. Master Environmental Plan: Fort Wingate Depot Activity, Gallup, New Mexico

    Energy Technology Data Exchange (ETDEWEB)

    Biang, C.A.; Yuen, C.R.; Biang, R.P.; Antonopoulos, A.A.; Ditmars, J.D.

    1990-12-01

    The master environmental plan is based on an environmental assessment of the areas requiring environmental evaluation (AREEs) at Fort Wingate Depot Activity near Gallup, New Mexico. The Fort Wingate Depot Activity is slated for closure under the Base Closure and Realignment Act, Public Law 100--526. The MEP assesses the current status, describes additional data requirements, recommends actions for the sites, and establishes a priority order for actions. The plan was developed so that actions comply with hazardous waste and water quality regulations of the State of New Mexico and applicable federal regulations. It contains a brief history of the site, relevant geological and hydrological information, and a description of the current status for each AREE along with a discussion of the available site-specific data that pertain to existing or potential contamination and the impact on the environment. 35 refs., 27 figs., 23 tabs.

  7. Istra district heating system. Specific technical report. Appendix 2 to the master plan

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-09-01

    The objective of the master plan project is to improve heat supply in Istra. The considerable system losses from the fuel supplied to the end-users are one subject for improvement. At the same time, the current system operation results in poor quality heat for the consumers. Due to the inflexibility of the system, the dwellings/premises of the consumers are either overheated or insufficiently heated. The financial situation in Istra, the legal ownership of the district heating system and consumers ability to pay limit the possibilities for system improvements. The Master Plan and Feasibility Study evaluates four different development scenarios. Each of the scenarios is compared to the current situation in Istra, where nothing is done to change the system, but only to operate the present system in a sustainable way. The sustainable operation of the district heating system includes all necessary renovations and component replacements necessary. The project does not take into account the present financial situation in Istra, which has resulted in less maintenance than necessary. This situation is not a comparable parameter, as it is not sustainable and will lead to a breakdown of the heat supply within a short time horizon. (EHS)

  8. Improving operational effectiveness of tactical master plans for emergency and elective patients under stochastic demand and capacitated resources

    NARCIS (Netherlands)

    Adan, I.J.B.F.; Bekkers, J.A.; Dellaert, N.P.; Jeunet, J.; Vissers, J.M.H.

    2009-01-01

    This paper develops a two-stage planning procedure for master planning of elective and emergency patients while allocating at best the available hospital resources. Four types of resources are considered: operating theatre, beds in the medium and in the intensive care units, and nursing hours in the

  9. Improving operational effectiveness of tactical master plans for emergency and elective patients under stochastic demand and capacitated resources

    NARCIS (Netherlands)

    Adan, I.J.B.F.; Bekkers, J.A.; Dellaert, N.P.; Jeunet, J.; Vissers, Jan

    2011-01-01

    This paper develops a two-stage planning procedure for master planning of elective and emergency patients while allocating at best the available hospital resources. Four types of resources are considered: operating theatre, beds in the medium and in the intensive care units, and nursing hours in the

  10. TWRS Privatization Phase 1 Master Site Plan

    International Nuclear Information System (INIS)

    PARAZIN, R.J.

    1999-01-01

    The U.S. Department of Energy (DOE) has chosen to accomplish the Tank Waste Remediation System disposal mission via privatization. The disposal mission has been divided into two privatization phases. Phase I, a 'proof of concept' phase, will establish and demonstrate the technical, commercial, and procurement capabilities necessary far privatization to proceed. Once established, privatization will be expanded in the form of a second phase (Phase II) to dispose of the remainder of the tank waste. In conjunction with preparation of the Tank Waste Remediation System (TWRS) Privatization Request for Proposals (RFP)(RL, 1996), a location was selected for the Phase I demonstration facilities (Shord, 1996). The location selected was the area previously developed and characterized for the Grout Disposal Site, adjoining the 200 East Area. The site is of sufficient size for a Private Contractor (PC) to carry out pretreatment, immobilization, and vitrification operations and possesses the required characteristics (e.g., close to feed tanks) to best facilitate the Phase I operations. This overall long-range Master Site Plan (MSP) has been developed to establish a ''baseline'' for the (TWRS) Privatization Phase I (TPPI) PC Site. The MSP depicts the planned layout for the PC Site along with various interfaces between the site and other Hanford utilities and functions. The complete integration of TPPl MSP with overall Hanford Site planning process will assist in establishing the PC site and the necessary priorities to meet the Hanford cleanup mission. The MSP has been developed systematically into a comprehensive, safe, flexible, logical and cost-effective plan. The general philosophy behind the preparation of a MSP for the TPPl program is that it will serve as a single source documentation of the planning for the development of the TPPl complex. The effort will plan temporary and permanent land use, utilities, and traffic flow for the overall program. It will identify needs

  11. FORMATION OF FINANCIAL SECURITY OF THE ENTERPRISE BASED ON STRATEGIC PLANNING

    Directory of Open Access Journals (Sweden)

    Nadiya Rushchyshyn

    2017-09-01

    Full Text Available The purpose of the study is to improve ways of forming financial security of the enterprise based onstrategic planning. The subject of the research: formation of financial security of the enterprise on the basis of strategicplanning. The methodological background of the research is a set of theoretical and general scientific methods:analysis and synthesis, theoretical and logical generalization, grouping, abstraction, and others. The paper providesa general description of the core approaches defining the concept of “financial security of the enterprise”. Functionalgoals of financial security of the enterprise are outlined, namely: ensuring financial stability and independence;achievement of high competitiveness in the market of goods, works, services; ensuring high efficiency of financialand economic activity; ensuring high liquidity of assets, and increasing the market value of the enterprise; supportfor the appropriate level of business activity and image; formation of information security and commercialsecrets; efficient organization of security of share capital and assets of the enterprise. The scheme of organizationof financial security organization is considered based on strategic planning. It is determined that the strategicplanning results in strategic plan (strategy for ensuring the financial security of the enterprise. Such a strategyshould be consistent with both financial and the company’s overall strategies, as well as main goals and objectives.For the most effective implementation of the chosen financial security strategy at the enterprise, it is expedientto develop and implement a system of plans covering all aspects of the strategic planning process, including thetarget program, strategic, tactical, calendar, and individual plans. The system of plans should specify: the purpose ofchanges in the functioning of internal systems of the enterprise; terms of making changes; the work that needs tobe done to make changes; their

  12. Marketing Plan for the National Security Technology Incubator

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubator program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.

  13. 46 CFR 169.817 - Master to instruct ship's company.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Master to instruct ship's company. 169.817 Section 169.817 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Operations § 169.817 Master to instruct ship's company. The master shall conduct drills and give instructions as necessary to insure that al...

  14. Developing a master plan for hospital solid waste management: A case study

    International Nuclear Information System (INIS)

    Karamouz, Mohammad; Zahraie, Banafsheh; Kerachian, Reza; Jaafarzadeh, Nemat; Mahjouri, Najmeh

    2007-01-01

    Disposal of about 1750 tons of solid wastes per day is the result of a rapid population growth in the province of Khuzestan in the south west of Iran. Most of these wastes, especially hospital solid wastes which have contributed to the pollution of the environment in the study area, are not properly managed considering environmental standards and regulations. In this paper, the framework of a master plan for managing hospital solid wastes is proposed considering different criteria which are usually used for evaluating the pollution of hospital solid waste loads. The effectiveness of the management schemes is also evaluated. In order to rank the hospitals and determine the share of each hospital in the total hospital solid waste pollution load, a multiple criteria decision making technique, namely analytical hierarchy process (AHP), is used. A set of projects are proposed for solid waste pollution control and reduction in the proposed framework. It is partially applied for hospital solid waste management in the province of Khuzestan, Iran. The results have shown that the hospitals located near the capital city of the province, Ahvaz, produce more than 43% of the total hospital solid waste pollution load of the province. The results have also shown the importance of improving management techniques rather than building new facilities. The proposed methodology is used to formulate a master plan for hospital solid waste management

  15. The Architect Carlos Contreras and the master plan of Aguascalientes, 1948. Modern city planning and influence on urban morphology

    Directory of Open Access Journals (Sweden)

    Alejandro Acosta Collazo

    2015-04-01

    Full Text Available This paper aims to analyze the ordering interest related to industry in the city, workers' housing needs, the impact on the phenomenon of the city shape of the moment and building complex urban morphology consistent, positive or negative, with a planning practice. The labor colonies and Industrial guild were the product of a social response to the demands of the manufacturing city in the first half of the twentieth century. Thanks to the Master Plan by architect Carlos Contreras Elizondo for the city of Aguascalientes in 1948. Also, this article seeks to address the impact of the Plan in the historic centreof Aguascalientes, which was modified over the years to meet the needs that arose.

  16. Master plan study - District heating Kohtla-Jaerve and Johvi municipalities. Estonia. Final report. Appendices for chapter 7

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    The appendices to chapter 7 of the master plan study on district heating in the municipalities of Kohtla-Jarve and Johvi (Estonia) present technical data on production units, also with regard to new facilities. (ARW)

  17. PLANNING INTELLIGENCE ACTIVITIES IN A DYNAMIC SECURITY ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    Anca Pavel

    2016-10-01

    Full Text Available The hypothesis introduced by this article is that, in order to perform intelligence missions and to obtain valuable intelligence for the consumers it is necessary to implement processes and tools to support planning activities. Today's challenges consist rather in the ability of intelligence organizations to identify and initiate new connections, processes and communication flows with other partners operating in the security environment than to plan in their own name secret operations. From this point of view, planning activities should focus on new procedures, at a much more extensive level in order to align institutional efforts beyond the boundaries of their own organization and the national community of information. Also, in order to coordinate intelligence activities, strategic planning must be anchored into a complex analysis of the potential impact of existing and possible future global phenomena that shape the security environment and thus identify better ways of improving results.

  18. 48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007) All...

  19. 48 CFR 1252.239-71 - Information technology security plan and accreditation.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan and...

  20. A review on salt lake city, Kolkata, India: Master planning and realization

    Directory of Open Access Journals (Sweden)

    Tošković Dobrivoje

    2008-01-01

    Full Text Available Motivation for construction of Salt Lake City comes from the circumstances characterizing life in Calcutta known by its social, political and cultural activities. Among many problems, the City was faced with poverty and overcrowding. West Bengal Government realized that serious steps have to be taken to resolve the situation. One of the biggest actions of the Government was creation of so called 'NEDECO' Plan for reclamation certain area of the Salted Lakes, followed by the tender for urban planning. The enterprise for water ways Ivan Milutinović was considered the most convenient for both: reclamation and planning. The Conceptualization covers the Main Aims and interests forming plan basis where three factors were selected: urban character, new vs old town, inhabitants and town growth. Follows Existing Land Use Pattern of the Municipal Area. The realization of the Salt Lake Master Plan, as a part of the Municipal Area, is shown through an Overview of Achieved Infrastructure covering Roads, Water Supply, Sewerage, Area Level Storm Water Drainage, Solid Waste Management and, finally, through the Other Municipal Services, such as: Administrative Infrastructure, Health Infrastructure, Greeneries, Water bodies, Socio-Cultural Infrastructure. .

  1. Security administration plan for HANDI 2000 business management system

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, D.

    1998-09-29

    This document encompasses and standardizes the integrated approach for security within the PP and Ps applications, It also identifies the security tools and methods to be used. The Security Administration Plan becomes effective as of this document`s acceptance and will provide guidance through implementation efforts and, as a ``living document`` will support the operations and maintenance of the system.

  2. 20 years of power station master training

    International Nuclear Information System (INIS)

    Schwarz, O.

    1977-01-01

    In the early fifties, the VGB working group 'Power station master training' elaborated plans for systematic and uniform training of power station operating personnel. In 1957, the first power station master course was held. In the meantime, 1.720 power station masters are in possession of a master's certificate of a chamber of commerce and trade. Furthermore, 53 power station masters have recently obtained in courses of the 'Kraftwerksschule e.V.' the know-how which enables them to also carry out their duty as a master in nuclear power stations. (orig.) [de

  3. 6 CFR 27.245 - Review and approval of site security plans.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...

  4. The establishment of master plan for developing advanced I and C technology -The development of advanced instrumentation and control technology-

    International Nuclear Information System (INIS)

    Ham, Chang Shik; Lee, Byung Sun; Kwon, Kee Choon; Lee, Dong Young; Hwang, In Koo; Lee, Jang Soo; Kim, Jung Soo; Kim, Chang Hwoi; Jung, Chul Hwan; Na, Nan Ju; Dong, In Sook; Kang, Soon Gu; Lyu, Chan Ho; Song, Soon Ja

    1994-07-01

    Although several organizations are performing their tasks making efforts to develop new digital technology for application to existing nuclear power plants as well as new plants of the future, their projects are similar to each other and have possibilities of redundant investment. Therefore, KAERI have established a Master Plan to define the suitable work-scope of each Instrumentation and Control (I and C) development project and proceed its development items continuously. Furthermore, in the project, several kinds of advanced technology for application of computer science and digital electronics were studied to obtain better reliability of the I and C systems and reduce opertor's burden. For establishing the Master Plan, functions of I and C system of NPPs were surveyed. Especially EPRI URD was deeply analyzed for setting up a basis of the foreign countries were referred for the Master Plan. For the new technology survey, fault-tolerant control technology and control system performance analysis methods were studied. Requirements of alarm and information system as well as technology of I and C network system of NPPs were also established to introduce the advantages of commercial distributed control system. (Author)

  5. The Composition of the Master Schedule

    Science.gov (United States)

    Thomas, Cynthia C.; Behrend, Dirk; MacMillan, Daniel S.

    2010-01-01

    Over a period of about four months, the IVS Coordinating Center (IVSCC) each year composes the Master Schedule for the IVS observing program of the next calendar year. The process begins in early July when the IVSCC contacts the IVS Network Stations to request information about available station time as well as holiday and maintenance schedules for the upcoming year. Going through various planning stages and a review process with the IVS Observing Program Committee (OPC), the final version of the Master Schedule is posted by early November. We describe the general steps of the composition and illustrate them with the example of the planning for the Master Schedule of the 2010 observing year.

  6. Impact of Urban Heat Island under the Hanoi Master Plan 2030 on Cooling Loads in Residential Buildings

    Directory of Open Access Journals (Sweden)

    Tran Hoang Hai Nam

    2015-01-01

    Full Text Available This study aims to evaluate the influence of urban heat island (UHI under the Hanoi Master Plan 2030 on the energy consumption for space cooling in residential buildings. The weather conditions under the current and future status (master plan condition simulated in the previous study (Trihamdani et al., 2014 were used and cooling loads in all the residential buildings in Hanoi over the hottest month were estimated under the simulated current and future conditions by using the building simulation program, TRNSYS (v17. Three most typical housing types in the city were selected for the simulation. The cooling loads of respective housing types were obtained in each of the districts in Hanoi. The results show that the total cooling loads over June 2010 is approximately 683 Terajoule (TJ under the current status, but it is predicted to increase to 903 TJ under the master plan condition. The increment is largely due to the increase in number of households (203 TJ or 92%, but partially due to the increase in urban temperature, i.e. UHI effect (17 TJ or 8%. The increments in new built-up areas were found to be larger than those in existing built-up areas. The cooling load in apartment is approximately half of that in detached house, which is approximately half of that in row house. Moreover, it was seen that although sensible cooling loads increased with the increase in outdoor temperature, the latent cooling loads decreased due to the decrease in absolute humidity and the increase in air temperature.

  7. Master plan envisions multi-billion-dollar expansion of Vietnam's electricity monopoly

    International Nuclear Information System (INIS)

    2001-12-01

    Massive investment in Vietnam's electricity monopoly by Western aid and export credit agencies form part of the ten-year master plan developed for Vietnam. Central planning and political patronage, instead of market assessments and customer choice form the basis for monopoly investments in a centralized grid linking big hydro, gas, coal, and nuclear power projects. Western aid agencies might effectively crowd out viable private-sector energy investments by financing power projects considered too large and risky by the private sector. These investments by Western aid agencies would assist in winning contracts for favoured exporters of engineering services and equipment. It would be a breeding ground for corruption in Vietnam if market discipline, public oversight, and enforceable property rights are not present in the face of power sector aid. There is a real possibility that damages to the environment could result from electricity investments, and some communities might be victimized, electricity costs might increase, the indebtedness level of the population might increase

  8. Master plan study - District heating Kohtla-Jaerve and Johvi municipalities. Estonia. Final report. Appendices for chapter 9

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    The appendices to chapter nine of the final report of the master plan study on district heating in the municipalities of Kohtla-Jarve and Johvi municipalities (Estonia) present extensive data relating to economic, financial and environmental calculations, fuel consumption, energy balance and prices. (ARW)

  9. TECHNIQUE OF OPTIMAL AUDIT PLANNING FOR INFORMATION SECURITY MANAGEMENT SYSTEM

    Directory of Open Access Journals (Sweden)

    F. N. Shago

    2014-03-01

    Full Text Available Complication of information security management systems leads to the necessity of improving the scientific and methodological apparatus for these systems auditing. Planning is an important and determining part of information security management systems auditing. Efficiency of audit will be defined by the relation of the reached quality indicators to the spent resources. Thus, there is an important and urgent task of developing methods and techniques for optimization of the audit planning, making it possible to increase its effectiveness. The proposed technique gives the possibility to implement optimal distribution for planning time and material resources on audit stages on the basis of dynamics model for the ISMS quality. Special feature of the proposed approach is the usage of a priori data as well as a posteriori data for the initial audit planning, and also the plan adjustment after each audit event. This gives the possibility to optimize the usage of audit resources in accordance with the selected criteria. Application examples of the technique are given while planning audit information security management system of the organization. The result of computational experiment based on the proposed technique showed that the time (cost audit costs can be reduced by 10-15% and, consequently, quality assessments obtained through audit resources allocation can be improved with respect to well-known methods of audit planning.

  10. And the Sky Is Grey: The Ambivalent Outcomes of the California Master Plan for Higher Education

    Science.gov (United States)

    Marginson, Simon

    2018-01-01

    In the 1960 Master Plan for Higher Education, California in the United States famously combined the principles of excellence and access within a steep three-tiered system of Higher Education. It fashioned the world's strongest system of public research universities, while creating an open access system that brought college to millions of American…

  11. Plan Colombia or development as security

    Directory of Open Access Journals (Sweden)

    Juan Pablo Guevara Latorre

    2015-01-01

    the most relevant policy for the construction of the State in 21st-century Colombia from a critical standpoint. The document makes it possible to show that Plan Colombia is a privatized form of development, interpreted in terms of security based on an incomplete understanding of the Colombian conflict that prevails into our present

  12. Istra district heating system. General technical report. Appendix 1 to the master plan

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-09-01

    The objective of the master plan project is to improve the heat supply in Istra. The considerable system losses from the fuel supplied to the end-users are one issue for improvement. At the same time, the current system operation results in poor quality heat for the consumers. Due to the inflexibility of the system the dwellings/premises of the consumers are either overheated or insufficiently heated. The financial situation in Istra, the legal ownership of the district heating system and consumers' lacking ability to pay limit the possibilities for system improvements. The Master Plan and Feasibility Study evaluates four different development scenarios. Each of the scenarios is compared to the current situation in Istra, where nothing is done to change the system, but only to operate the present system in a sustainable way. The sustainable operation of the district heating system includes all necessary renovations and component replacements necessary. The project does not take into account the present financial situation in Istra, which has resulted in less maintenance than necessary. This situation is not a comparable parameter, as it is not sustainable and will lead to a breakdown of the heat supply within a short time horizon. The General Technical Report evaluates the technical situation and describes system improvements at a general level. The intention with this report is to provide important information useful to other district heating companies in Russia. (au)

  13. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  14. Bechtel Hanford, Inc. Network Security Plan for the Environmental Restoration Contract

    International Nuclear Information System (INIS)

    Slade, B.E.

    2000-01-01

    This document was created to address ERC computer security needs that are outlined by DOE Order 1360.2B, Unclassified Computer Security Program. DOE Order 1360.2B has been canceled and replaced with DOE Notice 205.1, Unclassified Cyber Security Program. The ERC response to DOE Notice 205.1 is to generate BHI-01343, Cyber Security Program Plan, which is not available for public access or viewing

  15. Acceptance criteria for the evaluation of nuclear power reactor security plans

    International Nuclear Information System (INIS)

    1982-08-01

    This guidance document contains acceptance criteria to be used in the NRC license review process. It contains specific criteria for use in evaluating the acceptability of nuclear power reactor security programs as detailed in security plans

  16. A guide for developing an ADP security plan for Navy Finance Center, Cleveland, Ohio

    OpenAIRE

    Barber, Daniel E.; Hodnett, Elwood Thomas, Jr.

    1982-01-01

    Approved for public release; distribution is unlimited This paper is intended to be used as a guide by personnel at the Navy Finance Center (NFC) Cleveland, Ohio in developing an Automatic Data Processing (ADP) Security Plan. An effort has been made to combine the requirements for an ADP security plan established by OPNAVINST5239.1A with pertinent information from other selected readings. The importance of the devotion of personnel, time and funds to ADP security planning has been emphas...

  17. 33 CFR 103.505 - Elements of the Area Maritime Security (AMS) Plan.

    Science.gov (United States)

    2010-07-01

    ... port in case of security threats or breaches of security; (j) Procedures for periodic plan review... (CSO), Vessel Security Officers (VSO), public safety officers, emergency response personnel, and crisis management organization representatives within the port, including 24-hour contact details; (m) Measures to...

  18. Double Star project - master science operations plan

    Science.gov (United States)

    Shen, C.; Liu, Z.

    2005-11-01

    For Double Star Project (DSP) exploration, the scientific operations are very important and essential for achieving its scientific objectives. Two years before the launch of the DSP satellites (TC-1 and TC-2) and during the mission operating phase, the long-term and short-term master science operations plans (MSOP) were produced. MSOP is composed of the operation schedules of all the scientific instruments, the modes and timelines of the Payload Service System on TC-1 and TC-2, and the data receiving schedules of the three ground stations. The MSOP of TC-1 and TC-2 have been generated according to the scientific objectives of DSP, the orbits of DSP, the near-Earth space environments and the coordination with Cluster, etc., so as to make full use of the exploration resources provided by DSP and to acquire as much quality scientific data as possible for the scientific communities. This paper has summarized the observation resources of DSP, the states of DSP and its evolution since the launch, the strategies and rules followed for operating the payload and utilizing the ground stations, and the production of MSOP. Until now, the generation and execution of MSOP is smooth and successful, the operating of DSP is satisfactory, and most of the scientific objectives of DSP have been fulfilled.

  19. Double Star project - master science operations plan

    Directory of Open Access Journals (Sweden)

    C. Shen

    2005-11-01

    Full Text Available For Double Star Project (DSP exploration, the scientific operations are very important and essential for achieving its scientific objectives. Two years before the launch of the DSP satellites (TC-1 and TC-2 and during the mission operating phase, the long-term and short-term master science operations plans (MSOP were produced. MSOP is composed of the operation schedules of all the scientific instruments, the modes and timelines of the Payload Service System on TC-1 and TC-2, and the data receiving schedules of the three ground stations. The MSOP of TC-1 and TC-2 have been generated according to the scientific objectives of DSP, the orbits of DSP, the near-Earth space environments and the coordination with Cluster, etc., so as to make full use of the exploration resources provided by DSP and to acquire as much quality scientific data as possible for the scientific communities. This paper has summarized the observation resources of DSP, the states of DSP and its evolution since the launch, the strategies and rules followed for operating the payload and utilizing the ground stations, and the production of MSOP. Until now, the generation and execution of MSOP is smooth and successful, the operating of DSP is satisfactory, and most of the scientific objectives of DSP have been fulfilled.

  20. Tools for an effective annual review of the Security Management Plan.

    Science.gov (United States)

    Daniel, Matthew

    2014-01-01

    A hospital's Security Management Plan, required by the Joint Commission, can also be used by security management professionals, the author points out, to ensure that they are continually monitoring and improving the program in a changing healthcare environment.

  1. EXPLORATION ON TECHNICAL REFORM OF STRATEGIC PLANNING AND URBAN MASTER PLANNING THROUGH THE ANALYSIS ON THEIR RELATIONSHIP%从战略规划与总体规划关系探讨两者技术改革

    Institute of Scientific and Technical Information of China (English)

    赵艳莉; 郑声轩; 张卓如

    2012-01-01

    Through the comparative analysis on the concept features and technical contents of strategic planning and master planning, this paper analyzes the types of urban strategic planning and clarifies the status and role of strategic planning in the planning system of China. Through the case study on the interaction between strategic planning and master planning, the paper elaborates their mutual supporting and complementary relationship, and points out that emphasizing the differentiated development of these two kinds of planning is favorable for the technical progress of planning, and that strategic planning should focus on goal guidance and master planning should strengthen the comprehensive control.%比较分析了战略规划与总体规划的概念特征及技术内容,并梳理城市发展战略规划的几种类型,认识战略规划在我国规划体系中的地位、作用.通过战略规划与总体规划互动的规划案例阐明两者互为支撑、互为补充的关系,提出强调两者的差异化发展有利于规划技术进步,战略规划应突出目标引导性,总体规划应加强综合控制性.

  2. Nevada National Security Site Integrated Groundwater Sampling Plan, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Marutzky, Sam; Farnham, Irene

    2014-10-01

    The purpose of the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan) is to provide a comprehensive, integrated approach for collecting and analyzing groundwater samples to meet the needs and objectives of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) Activity. Implementation of this Plan will provide high-quality data required by the UGTA Activity for ensuring public protection in an efficient and cost-effective manner. The Plan is designed to ensure compliance with the UGTA Quality Assurance Plan (QAP). The Plan’s scope comprises sample collection and analysis requirements relevant to assessing the extent of groundwater contamination from underground nuclear testing. This Plan identifies locations to be sampled by corrective action unit (CAU) and location type, sampling frequencies, sample collection methodologies, and the constituents to be analyzed. In addition, the Plan defines data collection criteria such as well-purging requirements, detection levels, and accuracy requirements; identifies reporting and data management requirements; and provides a process to ensure coordination between NNSS groundwater sampling programs for sampling of interest to UGTA. This Plan does not address compliance with requirements for wells that supply the NNSS public water system or wells involved in a permitted activity.

  3. Master Robotic Net

    Directory of Open Access Journals (Sweden)

    Vladimir Lipunov

    2010-01-01

    Full Text Available The main goal of the MASTER-Net project is to produce a unique fast sky survey with all sky observed over a single night down to a limiting magnitude of 19-20. Such a survey will make it possible to address a number of fundamental problems: search for dark energy via the discovery and photometry of supernovae (including SNIa, search for exoplanets, microlensing effects, discovery of minor bodies in the Solar System, and space-junk monitoring. All MASTER telescopes can be guided by alerts, and we plan to observe prompt optical emission from gamma-ray bursts synchronously in several filters and in several polarization planes.

  4. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  5. Master Plan UMKM Berbasis Perikanan untuk Meningkatkan Pengolahan Produk Ikan yang Memiliki Nilai Tambah Tinggi

    OpenAIRE

    Meydianawathi, Luh Gede; Wiagustini, Ni Luh Putu; Riana, I Gede

    2014-01-01

    This research aims to generate a Master plan of fisheries-based SME development concept in Bali region, in order to build Bali as the centre for production and processing of fishery products in the Coridor of Bali-Nusa Tenggara. In Year-1 of the study period, the research activities carried out includes three processes, including analysis of the potensial of SMEs, analyzes the business cycle, and identification of barriers and chalenges. By using the method of linear regression analysis, Geog...

  6. Compliance with federal and state regulations regarding the emergency response plan and physical security plan at the Oregon State TRIGA reactor

    International Nuclear Information System (INIS)

    Johnson, A.G.; Ringle, J.C.; Anderson, T.V.

    1976-01-01

    Recent legislative actions within the State of Oregon have had a significant impact upon the OSU TRIGA Emergency Response Plan, and to a lesser extent upon the Physical Security Plan. These state imposed changes will be reviewed in light of existing federal requirements. With the upcoming acquisition of FLIP fuel in August 1976, NRC required several major changes to the existing Physical Security Plan. Within the limitations of public disclosure, these changes will be contrasted to the present plan. (author)

  7. Plan for radiological security at a university health center

    International Nuclear Information System (INIS)

    Huiaman Mendoza, G.M.; Sanchez Riojas, M.M.; Felix JImenez, D.

    1998-01-01

    This work shows a radiological security plan applied to a Basic Radiological Service at a university health center. Factors taken into account were installation designs, equipment operation parameters, work procedures, image system and responsibilities

  8. Master-slave control with trajectory planning and Bouc-Wen model for tracking control of piezo-driven stage

    Science.gov (United States)

    Lu, Xiaojun; Liu, Changli; Chen, Lei

    2018-04-01

    In this paper, a redundant Piezo-driven stage having 3RRR compliant mechanism is introduced, we propose the master-slave control with trajectory planning (MSCTP) strategy and Bouc-Wen model to improve its micro-motion tracking performance. The advantage of the proposed controller lies in that its implementation only requires a simple control strategy without the complexity of modeling to avoid the master PEA's tracking error. The dynamic model of slave PEA system with Bouc-Wen hysteresis is established and identified via particle swarm optimization (PSO) approach. The Piezo-driven stage with operating period T=1s and 2s is implemented to track a prescribed circle. The simulation results show that MSCTP with Bouc-Wen model reduces the trajectory tracking errors to the range of the accuracy of our available measurement.

  9. The Security Plan for the Joint Euratom/IAEA Remote Monitoring Network

    International Nuclear Information System (INIS)

    Stronkhorst, J.; Schoop, K.; Ruuska, K.; Kurek, S.; Levert, J.F.

    2015-01-01

    The European Commission and the IAEA have installed surveillance systems in all larger civil European nuclear facilities. The monitoring data is gathered by optical surveillance systems, electronic sealing systems and numerous measuring devices. The on-site joint Euratom/IAEA monitoring networks operate in general completely isolated from the operator's IT systems. To largely improve data security and reliability, remote data transmission (RDT) is installed on a growing number of sites, and the inspection data is daily transferred to the Data Collect Servers in Luxembourg and Vienna. A growing number of RDT connections and a growing number of security threats require an IT security policy that is pro-active as well as reactive in an efficient way. The risk based approach used in setting up the security plans assesses all elements of the monitoring network, from the implemented technical solution and the assessment of the security needs and threats, up to the incident handling and lessons learned. The results of the assessments are, for each individual RDT connection, described in the technical paragraphs and annexes, including system descriptions, network plans and contact information. The principles of secure data handling as implemented in the shared Euratom /IAEA monitoring network can apply to a broad range of industrial monitoring systems, where human interaction is in general the largest security risk. (author)

  10. 76 FR 45645 - 10-Day Notice of Proposed Information Collection: Technology Security/Clearance Plans, Screening...

    Science.gov (United States)

    2011-07-29

    ...: Technology Security/Clearance Plans, Screening Records, and Non-Disclosure Agreements ACTION: Notice of... Information Collection: Technology Security/ Clearance Plans, Screening Records, and Non-Disclosure Agreements...: None. Respondents: Business and Nonprofit Organizations, Foreign Governments. Estimated Number of...

  11. Protection planning and risk management at Lawrence Livermore National Laboratory

    International Nuclear Information System (INIS)

    Hunt, J.S.; Altman, W.D.; Hockert, J.W.

    1988-01-01

    Effective safeguards and security management begins with comprehensive strategic planning that synthesizes protection objectives, threat information, existing protection capabilities, consequences of protection failure, and the costs and impacts of safeguards changes into cost effective protection strategies that adequately address credible threats. Lawrence Livermore National Laboratory (LLNL) has developed a structured risk management approach to safeguards and security planning that is designed to lead to protection strategies that are cost effective, meet the intent of Department of Energy (DOE) orders, balance protection needs with programmatic priorities, and acknowledge a level of residual risks that is not cost effective to eliminate. This risk management approach to safeguards decision making was used to develop the first DOE-approved Master Safeguards and Security Agreement (MSSA) that addresses all security interests at a major facility including: special nuclear material, classified information and materials, computer and communication security, and other DOE property. This risk management approach also provides the strategic basis for day-to-day management of the LLNL security program as well as the integration of safeguards program upgrades

  12. Alum expands master's research, presents in UK

    OpenAIRE

    2015-01-01

    Center for Homeland Defense and Security News and Stories CATEGORY: STORIES Dr. William Pilkington was interested in developing a more analytical approach to allocating resources as he wrote his CHDS master's degree thesis, “Risk, Politics, and Money: Need for A Value-Based Model

  13. New fire and security rules change USA nuclear power plant emergency plans

    International Nuclear Information System (INIS)

    Garrou, A.L.

    1978-01-01

    New safety and security rules for nuclear power plants have resulted from the Energy Reorganisation Act and also from a review following the Browns Ferry fire. The content of the emergency plan which covers personnel, plant, site, as well as a general emergency, is outlined. New fire protection rules, the plan for security, local and state government assistance are also discussed, with a brief reference to the impact of the new rules on continuity of operations. (author)

  14. Optimal Pricing and Production Master Planning in a Multiperiod Horizon Considering Capacity and Inventory Constraints

    Directory of Open Access Journals (Sweden)

    Neale R. Smith

    2009-01-01

    Full Text Available We formulate and solve a single-item joint pricing and master planning optimization problem with capacity and inventory constrains. The objective is to maximize profits over a discrete-time multiperiod horizon. The solution process consists of two steps. First, we solve the single-period problem exactly. Second, using the exact solution of the single-period problem, we solve the multiperiod problem using a dynamic programming approach. The solution process and the importance of considering both capacity and inventory constraints are illustrated with numerical examples.

  15. Mastering wireless penetration testing for highly secured environments

    CERN Document Server

    Johns, Aaron

    2015-01-01

    This book is intended for security professionals who want to enhance their wireless penetration testing skills and knowledge. Since this book covers advanced techniques, you will need some previous experience in computer security and networking.

  16. Georgia Institute of Technology chilled water system evaluation and master plan

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-05-15

    As the host of the Olympic Village for the 1996 Atlanta Olympics, Georgia Tech has experienced a surge in construction activities over the last three years. Over 1.3 million square feet of new buildings have been constructed on the Georgia Tech campus. This growth has placed a strain on the Georgia Tech community and challenged the facilities support staff charged with planning and organizing utility services. In concert with Olympic construction, utility planners have worked to ensure long term benefits for Georgia Tech facilities while meeting the short term requirements of the Olympic Games. The concentration of building construction in the northwest quadrant of the campus allowed planners to construct a satellite chilled water plant to serve the needs of this area and provide the opportunity to integrate this section of the campus with the main campus chilled water system. This assessment and master plan, funded in part by the US Department of Energy, has evaluated the chilled water infrastructure at Georgia Tech, identified ongoing problems and made recommendations for long term chilled water infrastructure development and efficiency improvements. The Georgia Tech office of Facilities and RDA Engineering, Inc. have worked together to assemble relevant information and prepare the recommendations contained in this document.

  17. [Planning a Health Residence for Prison Security Measures, Tuscany (Italy)].

    Science.gov (United States)

    Porfido, Eugenio; Colombai, Renato; Scarpa, Franco; Totaro, Michele; Tani, Luca; Baldini, Claudio; Baggiani, Angelo

    2016-01-01

    Health Residences for Prison Security Measures are facilities hosting psychotic persons who have committed crimes and providing them with personalized rehabilitation and treatment plans to promote their reinstatement in society. The aim of this study was to describe the criteria for planning and designing a prison health residence in the Tuscany region (Italy), to be managed by the regional healthcare service, in line with current regulations, with dedicated staff for providing specific treatment plans and programmes.

  18. 29 CFR 2509.75-3 - Interpretive bulletin relating to investments by employee benefit plans in securities of...

    Science.gov (United States)

    2010-07-01

    ... Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR... Interpretive bulletin relating to investments by employee benefit plans in securities of registered investment.... That section provides that an investment by an employee benefit plan in securities issued by an...

  19. Operations Program Plan for the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    1990-09-01

    This document, Revision 4 of the Operations Program Plan, has been developed as the seven-year master plan for operating of the Waste Isolation Pilot Plant (WIPP). Subjects covered include public and technical communications; regulatory and environmental programs; startup engineering; radiation handling, surface operations, and underground operations; waste certification and waste handling; transportation development; geotechnical engineering; experimental operations; engineering program; general maintenance; security program; safety, radiation, and regulatory assurance; quality assurance program; training program; administration activities; management systems program; and decommissioning. 243 refs., 19 figs., 25 tabs. (SM)

  20. Evolution of strategic risks under future scenarios for improved utility master plans.

    Science.gov (United States)

    Luís, Ana; Lickorish, Fiona; Pollard, Simon

    2016-01-01

    Integrated, long-term risk management in the water sector is poorly developed. Whilst scenario planning has been applied to singular issues (e.g. climate change), it often misses a link to risk management because the likelihood of impacts in the long-term are frequently unaccounted for in these analyses. Here we apply the morphological approach to scenario development for a case study utility, Empresa Portuguesa das Águas Livres (EPAL). A baseline portfolio of strategic risks threatening the achievement of EPAL's corporate objectives was evolved through the lens of three future scenarios, 'water scarcity', 'financial resource scarcity' and 'strong economic growth', built on drivers such as climate, demographic, economic, regulatory and technological changes and validated through a set of expert workshops. The results represent how the baseline set of risks might develop over a 30 year period, allowing threats and opportunities to be identified and enabling strategies for master plans to be devised. We believe this to be the first combined use of risk and futures methods applied to a portfolio of strategic risks in the water utility sector. Copyright © 2015 Elsevier Ltd. All rights reserved.

  1. VoIP Security

    OpenAIRE

    Fontanini, Piero

    2008-01-01

    VOIP or Voice Over Internet Protocol is a common term for phone service over IP based networks. There are much information about VoIP and some of how VoIP can be secured. There is however no standard for VoIP and no general solution for VoIP Security. The security in VoIP systems today are often non existing or in best case weak and often based on proprietary solutions. This master thesis investigates threats to VoIP system and describes existing alternatives for securing Vo...

  2. Security's role in morgue operations: needed--a foolproof plan.

    Science.gov (United States)

    White, John M

    2012-01-01

    If handling the remains of dead patients is a responsibility of your security department, or you are being pressured to take on the role because of budget cuts, the need to anticipate and plan for complications which may arise is critical, the author points out.

  3. The public transportation system security and emergency preparedness planning guide

    Science.gov (United States)

    2003-01-01

    Recent events have focused renewed attention on the vulnerability of the nation's critical infrastructure to major events, including terrorism. The Public Transportation System Security and Emergency Preparedness Planning Guide has been prepared to s...

  4. Risk evaluation system for facility safeguards and security planning

    International Nuclear Information System (INIS)

    Udell, C.J.; Carlson, R.L.

    1987-01-01

    The Risk Evaluation System (RES) is an integrated approach to determining safeguards and security effectiveness and risk. RES combines the planning and technical analysis into a format that promotes an orderly development of protection strategies, planning assumptions, facility targets, vulnerability and risk determination, enhancement planning, and implementation. In addition, the RES computer database program enhances the capability of the analyst to perform a risk evaluation of the facility. The computer database is menu driven using data input screens and contains an algorithm for determining the probability of adversary defeat and risk. Also, base case and adjusted risk data records can be maintained and accessed easily

  5. Energy-Integrating Master Plan for the City of Atlantic City, New Jersey: energy conservation element. Volume 3

    Energy Technology Data Exchange (ETDEWEB)

    1978-11-01

    The Master Plan describes a coordinated energy-conservation effort for the City, the effective application and ultimate success of which depend primarily on the active involvement of the City government and its functional departments. Following an introductory section, Section XXI, Community Energy Determinants, describes the natural and man-made environment, growth and energy profiles, and the institutional environment. Additional sections are entitled: Energy-Conservation Options (passive energy options and active energy-conservation options); Energy Integration; Community Energy Management; Energy-Conservation Implementation Plan; and an appendix containing an energy-related glossary, a directory to various sources of information on energy conservation, various technical documents, a copy of the National Energy Act, and a bibliography. (MCW)

  6. Momentum: "Developing Masterful Marketing Plans."

    Science.gov (United States)

    Meservey, Lynne D.

    1988-01-01

    Describes how directors can plan and develop a written marketing plan which can increase enrollment at child care centers. Components of successful marketing plans include parent retention; program merchandising; staff and director training; sales promotions; networking; and enrichment programs/fundraising. (NH)

  7. Long-term optimal energy mix planning towards high energy security and low GHG emission

    International Nuclear Information System (INIS)

    Thangavelu, Sundar Raj; Khambadkone, Ashwin M.; Karimi, Iftekhar A.

    2015-01-01

    Highlights: • We develop long-term energy planning considering the future uncertain inputs. • We analyze the effect of uncertain inputs on the energy cost and energy security. • Conventional energy mix prone to cause high energy cost and energy security issues. • Stochastic and optimal energy mix show benefits over conventional energy planning. • Nuclear option consideration reduces the energy cost and carbon emissions. - Abstract: Conventional energy planning focused on energy cost, GHG emission and renewable contribution based on future energy demand, fuel price, etc. Uncertainty in the projected variables such as energy demand, volatile fuel price and evolution of renewable technologies will influence the cost of energy when projected over a period of 15–30 years. Inaccurate projected variables could affect energy security and lead to the risk of high energy cost, high emission and low energy security. The energy security is an ability of generation capacity to meet the future energy demand. In order to minimize the risks, a generic methodology is presented to determine an optimal energy mix for a period of around 15 years. The proposed optimal energy mix is a right combination of energy sources that minimize the risk caused due to future uncertainties related to the energy sources. The proposed methodology uses stochastic optimization to address future uncertainties over a planning horizon and minimize the variations in the desired performance criteria such as energy security and costs. The developed methodology is validated using a case study for a South East Asian region with diverse fuel sources consists of wind, solar, geothermal, coal, biomass and natural gas, etc. The derived optimal energy mix decision outperformed the conventional energy planning by remaining stable and feasible against 79% of future energy demand scenarios at the expense of 0–10% increase in the energy cost. Including the nuclear option in the energy mix resulted 26

  8. A novel sort of adaptive complex synchronizations of two indistinguishable chaotic complex nonlinear models with uncertain parameters and its applications in secure communications

    Science.gov (United States)

    Mahmoud, Emad E.; Abood, Fatimah S.

    In this paper, we will demonstrate the adaptive complex anti-lag synchronization (CALS) of two indistinguishable complex chaotic nonlinear systems with the parameters which are uncertain. The significance of CALS is not advised well in the literature yet. The CALS contains or consolidate two sorts of synchronizations (anti-lag synchronization ALS and lag synchronization LS). The state variable of the master system synchronizes with an alternate state variable of the slave system. Depending on the function of Lyapunov, a plan is orchestrated to achieve CALS of chaotic attractors of complex systems with unverifiable parameters. CALS of two indistinguishable complexes of Lü systems is viewed as, for example, an occasion for affirming the likelihood of the plan exhibited. In physics, we can see complex chaotic systems in numerous different applications, for example, applied sciences or engineering. With a specific end goal to affirm the proposed synchronization plan viability and demonstrate the hypothetical outcomes, we can compute the numerical simulation. The above outcomes will give the hypothetical establishment to the secure communication applications. CALS of complex chaotic systems in which a state variable of the master system synchronizes with an alternate state variable of the slave system is an encouraging sort of synchronization as it contributes excellent security in secure communication. Amid this secure communication, the synchronization between transmitter and collector is shut and message signals are recouped. The encryption and restoration of the signals are simulated numerically.

  9. Guidelines for developing NASA (National Aeronautics and Space Administration) ADP security risk management plans

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    This report presents guidance to NASA Computer security officials for developing ADP security risk management plans. The six components of the risk management process are identified and discussed. Guidance is presented on how to manage security risks that have been identified during a risk analysis performed at a data processing facility or during the security evaluation of an application system.

  10. Bechtel Hanford, Inc. network security plan for the environmental restoration contract

    International Nuclear Information System (INIS)

    McCaffrey, M.B.

    1997-01-01

    As part of the Computer Protection Program, this Network Security Plan identifies the specific security measures used to protect the Bechtel Hanford, Inc. (BHI) enterprise network. The network consists of the communication infrastructure and information systems used by BHI to perform work related to the Environmental Restoration Contract (ERC) at the Hanford Site. It provides electronic communication between the ERC-leased facilities in Richland, Washington and other facilities located on the Hanford Site. Network gateways to other site and offsite networks provide electronic communication with the rest of the Hanford community. The enterprise network is comprised of several individual networks that operate under different conditions and perform different functions. The principal network used by BHI is the Bechtel Local Area Network (BLAN). This document identifies specific security issues surrounding the BLAN and the measures BHI takes to protect it. The other BHI-operated networks are discussed from the perspective of the security impact they have on the BLAN. This plan addresses security for individual and shared computer systems connected to the BHI networks as well as the gateways between other site and external networks. It specifically does not address computer-based information systems that store or process particularly sensitive data, computer systems connected to other site networks (e.g., Hanford Local Area Network), or standalone computers located in ERC facilities

  11. Interim format and content for a physical security plan for nuclear power plants

    International Nuclear Information System (INIS)

    1977-02-01

    The document serves as interim guidance to assist the licensee or applicant in the preparation of a physical security plan. It is to be used in conjunction with interim acceptance criteria for physical security programs, which will be distributed at a later date

  12. Plan de implementación de un SGSI acorde a la norma ISO/IEC 27001:2005

    OpenAIRE

    Álvarez Verdugo, Joaquín

    2014-01-01

    Plan de implementación de un SGSI acorde a la norma ISO/IEC 27001:2005 en un organismo público municipal. Pla d'implementació d'un SGSI d'acord amb la norma ISO/IEC 27001:2005 en un organisme públic municipal. Master thesis for the ICT Security management program.

  13. Bigfoot or Big Mistake: Is CBP’s Expanding Footprint Helping or Hurting Homeland Security

    Science.gov (United States)

    2017-03-31

    Faculty of the Joint Advanced Warfighting School in partial satisfaction of the requirements of a Master of Science Degree in Joint Campaign Planning...ship. The Container Security Initiative is currently operational in 58 ports in 30 countries around the world. This accounts for 80% of incoming ...be viewed as a jobs program and method to inject money into the system. National borders are what create price differentiation and supply and demand

  14. On new methodological and other standards in planning: The case of the Master Plan of Belgrade 2021

    Directory of Open Access Journals (Sweden)

    Vujošević Miodrag L.

    2002-01-01

    changed structure of stakeholders and concomitant institutional arrangements. This also applies to 'educators' in general, because the prolonged international isolation of the FR Yugoslavia has caused the gross of their knowledge and capabilities irrelevant. In sum, it seems that many planners would not be able to assume new roles that they are expected to on the part of the society at large. (8The planning/policy information, research, institutional and other support provided by the state and other agents often does not satisfy even the most basic needs in this fields, partly for a general scarcity of resources concomitant to the overall and deep social, economic and political crisis the society found itself in the 1990s. (9 Most frightfully, manipulation, paternalism and clientelism still represent dominant forms of power, which is a problem by itself in Yugoslavia being one of the most corruptive countries in the world. What is now most missing is a non-manipulative persuasion, as well as the authority of professional values, as the communication and interaction forms that seem only promising for and supportive to developing of a democratic, emancipatory and transformative planning mode. A number of attempts during the last decade to embark upon the preparation of the new 'Master Plan of the City Belgrade' (in the sequel: MP came into realization not before the democratic political changes of October 2000 took place in Serbia. However, the so far undertaken steps do not seem promising, as they failed to satisfy a number of methodological and other standards, as well as to introduce necessary innovations. Unfortunately, the MP was commissioned to the Bureau of Urban Planning of the City of Belgrade (otherwise a 'faithful ally' of all non-democratic regimes in the City's urban planning and related matters over the last more than ten years now, during which there has been a so far unrecorded squandering and illegal privatization of public urban assets, mostly uncontrolled

  15. 10 CFR 72.186 - Change to physical security and safeguards contingency plans.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Change to physical security and safeguards contingency... contingency plans. (a) The licensee shall make no change that would decrease the safeguards effectiveness of... licensee safeguards contingency plan without prior approval of the Commission. A licensee desiring to make...

  16. Expanding Nuclear Power Programmes - Romanian experience: Master - Nuclear Materials and Technologies Educational Plan

    International Nuclear Information System (INIS)

    Valeca, S.; Valeca, M.

    2012-01-01

    The main objectives of the Master Nuclear Materials and Technologies Educational Plan are: 1. To deliver higher education and training in the following specific domains, such as: Powders Technology and Ceramic Materials, Techniques of Structural Analysis, Composite Materials, Semiconductor Materials and Components, Metals and Metallic Alloys, Optoelectronic Materials and Devices, Nuclear Materials, The Engineering of Special Nuclear Materials, 2. To train managers of the Nuclear Waste Products and Nuclear Safety, 3. To qualify in ICT Systems for Nuclear Process Guidance, 4. To qualify in Environmental Protection System at the Level of Nuclear Power Stations, 5. To train managers for Quality Assurance of Nuclear Energetic Processes, 6. To deliver higher education and training regarding the International Treatises, Conventions and Settlements in force in the field of nuclear related activities. (author)

  17. 75 FR 43528 - Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan

    Science.gov (United States)

    2010-07-26

    ... National Health Security Strategy Biennial Implementation Plan AGENCY: Department of Health and Human... National Health Security Strategy (NHSS) of the United States of America (2009) and build upon the NHSS Interim Implementation Guide for the National Health Security Strategy of the United States of America...

  18. Implementing the enterprise master patient index.

    Science.gov (United States)

    Adragna, L

    1998-10-01

    In implementing a cross-facility initiative, the importance of planning and understanding the implications for all facilities can't be overlooked. Here's how one integrated delivery network navigated the challenges of implementing a cross-facility enterprise master patient index.

  19. Evaluation of Plan Implementation: Peri-urban Development and the Shanghai Master Plan 1999-2020

    Directory of Open Access Journals (Sweden)

    Jinghuan He

    2015-01-01

    Full Text Available Since the 1980s China has experienced unprecedented urbanisation as a result of a series of reforms promoting rapid economic development. Shanghai, like the other big cities along China’s coastline, has witnessed extraordinary growth in its economy and population with industrial development and rural-to-urban migration generating extensive urban expansion. Shanghai’s GDP growth rate has been over 10 per cent for more than 15 years. Its population in 2013 was estimated at 23.47 million, which is double its size in 1979. The urban area enlarged by four times from 644 to 2,860 km2 between 1977 and 2010. Such demanding growth and dramatic changes present big challenges for urban planning practice in Shanghai. Plans have not kept up with development and the mismatch between the proposals in plans and the actual spatial development has gradually increased, reaching a critical level since 2000. The mismatch in the periurban areas is more notable than that in the existing urban area, but there has not been a systematic review of the relationship between plan and implementation. Indeed, there are few studies on the evaluation of plan implementation in China generally. Although many plans at numerous spatial levels are successively prepared and revised, only few of them have been evaluated in terms of their effectiveness and implementation.  This particularly demanding context for planning where spatial development becomes increasingly unpredictable and more difficult to influence presents an opportunity to investigate the role of plans under conditions of rapid urbanisation. The research project asks to what extent have spatial plans influenced the actual spatial development in the peri-urban areas of Shanghai? The research pays particular attention to the role of the Shanghai Master Plan 1999-2020 (Plan 1999. By answering the main research question this study seeks to contribute to a better understanding of present planning practice in Shanghai

  20. Contribution of a Master Program to Building Competencies in Nuclear Sciences in Morocco

    International Nuclear Information System (INIS)

    Hakam, Oum Keltoum

    2014-01-01

    Conclusion and perspectives: Given the high number of demands from African countries to join the master and as the master program has developed a wide and structured network of collaborations and partnerships with national and international institutions. We wish to have the support of IAEA and other international organizations to establish a regional master program in nuclear science and engineering focused on safety, security and nonproliferation aspects in order to meet the needs of the African region and to contribute to the proper management of radioactive and nuclear material

  1. A survey of pandemic influenza preparedness and response capabilities in Chicago area hospital security departments.

    Science.gov (United States)

    Kimmerly, David P

    2009-01-01

    This article is a summary based on a December 2007 paper prepared by the author in partial fulfillment of the requirements for a master's degree in business and organizational security management at Webster University. The project described was intended to assess Chicago-area healthcare organization security departments' preparedness and response capabilities for a potential influenza pandemic. While the author says healthcare organizations are learning from the pandemics of the past, little research has been conducted on the requirements necessary within hospital security departments. The article explores staffing, planning, preparation and response capabilities within a healthcare security context to determine existing resources available to the healthcare security community. Eleven completed surveys were received from hospital security managers throughout the geographical Chicago area. They reveal that hospital security managers are conscious of the risks of a pandemic influenza outbreak. Yet, it was found that several gaps existed within hospital security department staffing and response capabilities, as hospital security departments may not have the available resources necessary to adequately maintain their operations during a pandemic incident.

  2. Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan.

    Science.gov (United States)

    Sahi, Aqeel; Lai, David; Li, Yan

    2016-11-01

    Cloud computing was introduced as an alternative storage and computing model in the health sector as well as other sectors to handle large amounts of data. Many healthcare companies have moved their electronic data to the cloud in order to reduce in-house storage, IT development and maintenance costs. However, storing the healthcare records in a third-party server may cause serious storage, security and privacy issues. Therefore, many approaches have been proposed to preserve security as well as privacy in cloud computing projects. Cryptographic-based approaches were presented as one of the best ways to ensure the security and privacy of healthcare data in the cloud. Nevertheless, the cryptographic-based approaches which are used to transfer health records safely remain vulnerable regarding security, privacy, or the lack of any disaster recovery strategy. In this paper, we review the related work on security and privacy preserving as well as disaster recovery in the eHealth cloud domain. Then we propose two approaches, the Security-Preserving approach and the Privacy-Preserving approach, and a disaster recovery plan. The Security-Preserving approach is a robust means of ensuring the security and integrity of Electronic Health Records, and the Privacy-Preserving approach is an efficient authentication approach which protects the privacy of Personal Health Records. Finally, we discuss how the integrated approaches and the disaster recovery plan can ensure the reliability and security of cloud projects. Copyright © 2016 Elsevier Ltd. All rights reserved.

  3. Nuclear security education and training at Naif Arab University for Security Sciences

    International Nuclear Information System (INIS)

    Amjad Fataftah

    2009-01-01

    Naif Arab University for Security Sciences (NAUSS) was established in 1978 as an Arab institution specialized in security sciences to fulfill the needs of the Arab law enforcement agencies for an academic institution that promotes research in security sciences, offers graduate education programs and conduct short-term training courses, which should contribute to the prevention and control of crimes in the Arab world. NAUSS and the IAEA organized the first workshop on nuclear security on November, 2006, which aimed to explore and improve the nuclear security culture awareness through the definitions of the nuclear security main pillars, Prevention, Detection and Response. In addition, NAUSS and IAEA organized a very important training course on April, 2008 on combating nuclear terrorism titled P rotection against nuclear terrorism: Protection of radioactive sources . In the past two years, IAEA has put tremendous efforts to develop an education program in nuclear security, which may lead into Master's degree in nuclear security, where NAUSS helped in this project through the participation in the IAEA organized consultancy and technical meetings for the development of this program along with many other academic, security and law enfacement experts and lawyers from many different institution in the world. NAUSS and IAEA drafted a work plan for the next coming two years which should lead into the gradual implementation of these educational programs at NAUSS. NAUSS also continues to participate in several local conferences and symposiums related to the peaceful application of nuclear power in the gulf region, and the need for a human resources development programs to fulfill the scientific and security needs which will arise from building nuclear power plants. NAUSS participated in the International Symposium on the Peaceful Application of Nuclear Technology in the GCC countries, organized by King Abdulaziz University in the city of Jeddah, Saudi Arabia. Also NAUSS

  4. Risk evaluation system for facility safeguards and security planning

    International Nuclear Information System (INIS)

    Udell, C.J.; Carlson, R.L.

    1987-01-01

    The Risk Evaluation System (RES) is an integrated approach to determining safeguards and security effectiveness and risk. RES combines the planning and technical analysis into a format that promotes an orderly development of protection strategies, planing assumptions, facility targets, vulnerability and risk determination, enhancement planning, and implementation. In addition, the RES computer database program enhances the capability of the analyst to perform a risk evaluation of the facility. The computer database is menu driven using data input screens and contains an algorithm for determining the probability of adversary defeat and risk. Also, base case and adjusted risk data records can be maintained and accessed easily

  5. Energy planning and security of supply in Spain and their compliance with the European legal framework

    International Nuclear Information System (INIS)

    Dolader, J.

    2004-01-01

    The electricity and gas markets in Spain were liberalized by the 1997 Electricity Act and the 1998 Hydrocarbons Act, respectively. The final step of the liberalization process was completed in January 2003 with the full eligibility of Spanish electricity and gas consumers. The liberalization Acts include in addition a two-way long-term energy planning process within a ten-year time scope. On the one hand the planning process involves binding planning concerning the so called 'basic infrastructures' (which include the electricity and gas transmission networks plus the total re-gasification capacity), and on the other hand, an indicative energy planning aimed at facilitating the decision making of administrations and agents by forecasting energy demand, and analyzing its coverage under the premises of security of supply. The present paper describes the current energy planning system in Spain, the provisions to ensure the security of supply and their compliance with the new European legislation - both the proposed and the existent one - regarding the security of supply in the EU.(author)

  6. Plan Nacional de Desarrollo y Seguridad 1971-1975 (National Plan for Development and Security, 1971-1975).

    Science.gov (United States)

    Boletin del Centro Nacional de Documentacion e Informacion Educativa, 1971

    1971-01-01

    This article discusses the education provisions established in the Argentine Plan for Development and Security (1971-1975). The statements on educational development call for a diagnostic study of the current cultural and educational situation, the establishment of objectives and strategies, goals for each level of education, steps for the…

  7. Network master planning for a global manufacturing company

    OpenAIRE

    Heinz, Michael Pierre

    2006-01-01

    Production in global, intra-organisational networks is becoming more common. In this context, the allocation of production quantities to constrained manufacturing capacity is a challenging process. Due to a volatile environment it is argued to be impossible to achieve a ‘clean’ system design with dedicated resources which exactly meets future demand. Thus, recursive ‘Network Master Planning’ (NMP) becomes necessary. The aim of this research is to generate an understanding of th...

  8. Secure environment for real-time tele-collaboration on virtual simulation of radiation treatment planning.

    Science.gov (United States)

    Ntasis, Efthymios; Maniatis, Theofanis A; Nikita, Konstantina S

    2003-01-01

    A secure framework is described for real-time tele-collaboration on Virtual Simulation procedure of Radiation Treatment Planning. An integrated approach is followed clustering the security issues faced by the system into organizational issues, security issues over the LAN and security issues over the LAN-to-LAN connection. The design and the implementation of the security services are performed according to the identified security requirements, along with the need for real time communication between the collaborating health care professionals. A detailed description of the implementation is given, presenting a solution, which can directly be tailored to other tele-collaboration services in the field of health care. The pilot study of the proposed security components proves the feasibility of the secure environment, and the consistency with the high performance demands of the application.

  9. Bio-inspired motion planning algorithms for autonomous robots facilitating greater plasticity for security applications

    Science.gov (United States)

    Guo, Yi; Hohil, Myron; Desai, Sachi V.

    2007-10-01

    Proposed are techniques toward using collaborative robots for infrastructure security applications by utilizing them for mobile sensor suites. A vast number of critical facilities/technologies must be protected against unauthorized intruders. Employing a team of mobile robots working cooperatively can alleviate valuable human resources. Addressed are the technical challenges for multi-robot teams in security applications and the implementation of multi-robot motion planning algorithm based on the patrolling and threat response scenario. A neural network based methodology is exploited to plan a patrolling path with complete coverage. Also described is a proof-of-principle experimental setup with a group of Pioneer 3-AT and Centibot robots. A block diagram of the system integration of sensing and planning will illustrate the robot to robot interaction to operate as a collaborative unit. The proposed approach singular goal is to overcome the limits of previous approaches of robots in security applications and enabling systems to be deployed for autonomous operation in an unaltered environment providing access to an all encompassing sensor suite.

  10. Innovative Stormwater Quality Tools by SARA for Holistic Watershed Master Planning

    Science.gov (United States)

    Thomas, S. M.; Su, Y. C.; Hummel, P. R.

    2016-12-01

    Stormwater management strategies such as Best Management Practices (BMP) and Low-Impact Development (LID) have increasingly gained attention in urban runoff control, becoming vital to holistic watershed master plans. These strategies can help address existing water quality impairments and support regulatory compliance, as well as guide planning and management of future development when substantial population growth and urbanization is projected to occur. However, past efforts have been limited to qualitative planning due to the lack of suitable tools to conduct quantitative assessment. The San Antonio River Authority (SARA), with the assistance of Lockwood, Andrews & Newnam, Inc. (LAN) and AQUA TERRA Consultants (a division of RESPEC), developed comprehensive hydrodynamic and water quality models using the Hydrological Simulation Program-FORTRAN (HSPF) for several urban watersheds in the San Antonio River Basin. These models enabled watershed management to look at water quality issues on a more refined temporal and spatial scale than the limited monitoring data. They also provided a means to locate and quantify potential water quality impairments and evaluate the effects of mitigation measures. To support the models, a suite of software tools were developed. including: 1) SARA Timeseries Utility Tool for managing and processing of large model timeseries files, 2) SARA Load Reduction Tool to determine load reductions needed to achieve screening levels for each modeled constituent on a sub-basin basis, and 3) SARA Enhanced BMP Tool to determine the optimal combination of BMP types and units needed to achieve the required load reductions. Using these SARA models and tools, water quality agencies and stormwater professionals can determine the optimal combinations of BMP/LID to accomplish their goals and save substantial stormwater infrastructure and management costs. The tools can also help regulators and permittees evaluate the feasibility of achieving compliance

  11. PNNL Campus Master Plan

    Energy Technology Data Exchange (ETDEWEB)

    Mosey, Whitney LC

    2012-09-07

    The Plan is used as a guide for PNNL in making facility and infrastructure decisions essential to supporting the PNNL vision: to establish a modern, collaborative, flexible, and sustainable campus while optimizing the efficiency of operations in support of courageous discovery and innovation.

  12. Economic Security Environment and Implementation of Planning, Programming, Budgeting, Execution (PPBE) System in Georgia

    Science.gov (United States)

    2004-06-01

    Roy J. What Determines Economic Growth? Economic Review – Second Quarter 1993 [References: Barro (1991); Mankiw , Romer, and Well (1992); De Long...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release: distribution unlimited ECONOMIC SECURITY...DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE: Economic Security Environment and Implementation of Planning, Programming, Budgeting, Execution

  13. Background Information for the Nevada National Security Site Integrated Sampling Plan, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene; Marutzky, Sam

    2014-12-01

    This document describes the process followed to develop the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan). It provides the Plan’s purpose and objectives, and briefly describes the Underground Test Area (UGTA) Activity, including the conceptual model and regulatory requirements as they pertain to groundwater sampling. Background information on other NNSS groundwater monitoring programs—the Routine Radiological Environmental Monitoring Plan (RREMP) and Community Environmental Monitoring Program (CEMP)—and their integration with the Plan are presented. Descriptions of the evaluations, comments, and responses of two Sampling Plan topical committees are also included.

  14. State and Urban Area Homeland Security Strategy v3.0: Evolving Strategic Planning

    National Research Council Canada - National Science Library

    Chen, Darren

    2006-01-01

    This thesis proposes to overhaul the state and urban area homeland security strategy program by improving the strategic planning process guidance and assistance and strategy review in collaboration...

  15. Information security in academic libraries: the role of the librarian in planning and introducing institutional policies

    Directory of Open Access Journals (Sweden)

    Juliana Soares Lima

    2017-04-01

    Full Text Available This study presents a short discussion about the role of the librarian as a mediator at planning, developing and implementing an Information Security Policy in Academic Libraries, by working together with professionals in the field of Information Technology. It also discusses the main virtual threats and some risks that are prone to infect computers in libraries. Based on the current legislation and on some normative documents about information security, it is confirmed the importance of the librarian take part in the main decision-making related to information security, such as planning a consistent Information Security Policy which be able to see the specific needs of Academic Libraries as institutions prone to cyberattacks. The main topics and guidelines to carry out an Information Security Policy are presented based on the results that were obtained through an action research, by visiting libraries to fill in application forms and to compose reports whose content was analyzed. Finally, the study concludes that Information Security Policy must be validated by managers of sectors or departments which the Academic Library is hierarchically subordinate to.

  16. State and Urban Area Homeland Security Plans and Exercises: Issues for the 110th Congress

    National Research Council Canada - National Science Library

    Reese, Shawn

    2007-01-01

    ... for both terrorist attacks and natural disasters. Two potential activities that Congress might choose to focus on are the certification of state and urban area homeland security plans and the conduct of exercises to test the plans...

  17. State and Urban Area Homeland Security Plans and Exercises: Issues for the 109th Congress

    National Research Council Canada - National Science Library

    Reese, Shawn

    2006-01-01

    ... for both terrorist attacks and natural disasters. Two potential activities that Congress might choose to focus on are the certification of state and urban area homeland security plans, and the conduct of exercises to test the plans...

  18. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  19. State and Urban Area Homeland Security Strategy v3.0: Evolving Strategic Planning

    National Research Council Canada - National Science Library

    Chen, Darren

    2006-01-01

    ... with state and local stakeholders. Federal state and local reviewers regard the current state and urban homeland security strategies as generally inadequate and indicative of limited strategic planning processes...

  20. Teaching Information Security Students to "Think thief"

    NARCIS (Netherlands)

    Hartel, Pieter H.; Junger, Marianne

    2012-01-01

    We report on an educational experiment where information security master students were encouraged to think out of the box. Instead of taking the usual point of view of the security engineer we challenged the students to take the point of view of the motivated offender. We report on the exciting

  1. Mastering Windows Server 2008 Networking Foundations

    CERN Document Server

    Minasi, Mark; Mueller, John Paul

    2011-01-01

    Find in-depth coverage of general networking concepts and basic instruction on Windows Server 2008 installation and management including active directory, DNS, Windows storage, and TCP/IP and IPv4 networking basics in Mastering Windows Server 2008 Networking Foundations. One of three new books by best-selling author Mark Minasi, this guide explains what servers do, how basic networking works (IP basics and DNS/WINS basics), and the fundamentals of the under-the-hood technologies that support staff must understand. Learn how to install Windows Server 2008 and build a simple network, security co

  2. Comprehensive, Integrated Reconstruction Operations: We Need a Master Plan

    National Research Council Canada - National Science Library

    Dosa, Brian L

    2007-01-01

    The U.S. military has historically played a critical role during post-conflict stability operations, contributing to the overall goal of achieving long term security and securing our strategic interests...

  3. Exclusión y seguridad social en el plan de desarrollo Exclusion and social security in the Development Plan

    Directory of Open Access Journals (Sweden)

    Rodríguez Salazar Oscar

    1999-06-01

    Full Text Available Este articulo analiza la forma en que el Plan de Desarrollo "Cambio para contruir la Paz" trata el sistema de seguridad social y su interpretacion sobre las causas de la exclusion social. El plan carece de una vision de conjunto del sistema por cuanto no aborda los aspectos reisgos profesionles y pensiones; articula el concepto de solidaridad a las relaciones interpersonales y, asi, subestima el papel del Estado en el logro de esa meta. Por otra parte, las politicas laborales esbozadas en el Plan conducen en forma inexorable a una mayor exclusion social. En cuanto al sistema de seguridad social en salud, dado que la cobertura se ha extendido mediante el regimen subsidiado, la ausencia de una politica que promueva el control social puede acentuar la clientelizacion que Estado manifiesta querer combatir.This article analyzes the way that the Development Plan "Changeto Build Peace" treats the social security system and its interpretation of the causes of social exclusion. The Plan lacks a vision of the system as a whole as it does not address the aspects of professional risks and pensions; it articula tes the concept of solidarity to interpersonal relations and thus underestimates the role of the State in achieving that goal. Moreover, the labor policies outlined in the Plan lead inexorably to greater social exclusion. As far as the social security system for health, given that coverage has been extended by meansof the subsidized regime, the absence of a policy that promotes social control may accentuate the clientelization of the State which the Plan claims to want to combato.

  4. 14 CFR 152.109 - Project eligibility: Airport planning.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Project eligibility: Airport planning. 152....109 Project eligibility: Airport planning. (a) Airport master planning. A proposed project for airport master planning is not approved unless— (1) The location of the existing or proposed airport is included...

  5. Collaborative Adaptation Planning for Water Security: Preliminary Lessons, Challenges, and the Way Forward for Maipo Basin Adaptation Plan, Chile

    Science.gov (United States)

    Vicuna, S.; Scott, C. A.; Bonelli, S.; Bustos, E.; Meza, F. J.

    2014-12-01

    The Maipo basin holds 40% of Chile's total population and almost half of the country's Gross Domestic Product. The basin is located in the semiarid central region of the country and, aside from the typical pressures of growth in developing country basins, the Maipo river faces climate change impacts associated with a reduction in total runoff and changes in its seasonality. Surface water is the main water source for human settlements and economic activities including agriculture. In 2012 we started a research project to create a climate variability and climate change adaptation plan for the basin. The pillars of the plan are co-produced by researchers and a Scenario Building Team (SBT) with membership of relevant water and land use stakeholders (including from civil society, public and private sectors) in the basin. Following similar experiences in other regions in the world that have faced the challenges of dealing with long term planning under uncertainty, the project has divided the task of developing the plan into a series of interconnected elements. A critical first component is to work on the desired vision(s) of the basin for the future. In this regards, the "water security" concept has been chosen as a framework that accommodates all objectives of the SBT members. Understanding and quantifying the uncertainties that could affect the future water security of the basin is another critical aspect of the plan. Near and long term climate scenarios are one dimension of these uncertainties that are combined with base development uncertainties such as urban growth scenarios. A third component constructs the models/tools that allows the assessment of impacts on water security that could arise under these scenarios. The final critical component relates to the development of the adaptation measures that could avoid the negative impacts and/or capture the potential opportunities. After two years in the development of the adaptation plan a series of results has been

  6. Formulation for less master production schedule instability under rolling horizon

    OpenAIRE

    Herrera , Carlos; Thomas , André

    2009-01-01

    International audience; In Manufacturing Planning and Control Systems, the Master Production Schedule (MPS) makes a link between tactical and operational levels, taking into account information provided by end items, demand forecast as well as Sales and Operations Planning (S&OP) suggestions. Therefore, MPS plays an important role to maintain an adequate customers service level and an efficient production system. In a rolling planning horizon, MPS is periodically computed over whole operation...

  7. 49 CFR 176.4 - Port security and safety regulations.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Port security and safety regulations. 176.4... SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION HAZARDOUS MATERIALS REGULATIONS CARRIAGE BY VESSEL General § 176.4 Port security and safety regulations. (a) Each carrier, master, agent, and charterer of a...

  8. Integrated Food and Nutrition Security Programming to Address Undernutrition : The Plan Approach

    NARCIS (Netherlands)

    Boer, de F.A.; Verdonk, I.

    2012-01-01

    From a technical point of view, it is widely recognised that an integrated approach to food and nutrition security is an effective way to promote child nutritional well-being. In this desk review, based on project documents of the countries which took part in the PLAN NL supported Food and Nutrition

  9. A different paradigm for security planning

    International Nuclear Information System (INIS)

    Hagengruber, R.

    2002-01-01

    Full text: Security costs at nuclear facilities have been relatively high for many years. Since the 1970s, these expenditures in the United States have grown much faster than inflation. After the tragedy of September 11, the rate of increase appears to be exponential. Within the National Nuclear Security Administration, the cost of security now is about 10 % of the entire budget. Research and Development (R and D) has played a role in modern security, but the rate of advancement of security technology has not been sufficient to moderate the increasing costs and performance demands. Part of this problem is associated with both an inadequate investment level and the lack of a visionary roadmap for security technology. The other element of the problem is the lack of a strategic framework or architecture that would allow security technology to be effectively placed in an overall context of functionality. A new concept for an architecture for security will be presented. Within this architecture, a different approach to design, use of technology, and evaluation of effectiveness will be offered. Promising areas of technology and design will be illustrated by specific examples and suggestions for advanced R and D will be made. (author)

  10. [Some psychological problems in family planning work].

    Science.gov (United States)

    Chen, J

    1983-11-29

    Psychology has significance in family planning work, because it may promote the scientific nature of family planning work and thus increase its effectiveness. Since people have some common aspects in their psychological process, family planning workers should master some common rules of the people's psychological process in order to understand psychological trends and possible behavior. Through this method, family planning workers may find how to adjust to problems they may encounter in their daily work, such as the worries about a single child being too lonely, spoiled, and hard to handle for the parents, the traditional belief that more children represent good fortune, and more male children may provide security for one's old age. Traditionally, the Chinese people believed that only male children can carry on the family line and that more children will provide a larger labor force, which is beneficial to a family's financial situation. In family planning work, all such incorrect ways of thinking should be corrected and revised. Studies of children's psychology should also be developed so that children may develop a healthy mentality. All these are crucial to the success of family planning work and the promotion of population quality.

  11. Design of security scheme of the radiotherapy planning administration system based on the hospital information system

    International Nuclear Information System (INIS)

    Zhuang Yongzhi; Zhao Jinzao

    2010-01-01

    Objective: To design a security scheme of radiotherapy planning administration system. Methods: Power Builder 9i language was used to program the system through the model of client-server machine. Oracle 9i was used as the database server. Results In this system, user registration management, user login management, application-level functions of control, database access control, and audit trail were designed to provide system security. Conclusions: As a prototype for the security analysis and protection of this scheme provides security of the system, application system, important data and message, which ensures the system work normally. (authors)

  12. Emergency medical consequence planning and management for national special security events after September 11: Boston 2004.

    Science.gov (United States)

    Kade, Kristy A; Brinsfield, Kathryn H; Serino, Richard A; Savoia, Elena; Koh, Howard K

    2008-10-01

    The post-September 11 era has prompted unprecedented attention to medical preparations for national special security events (NSSE), requiring extraordinary planning and coordination among federal, state, and local agencies. For an NSSE, the US Secret Service (USSS) serves as the lead agency for all security operations and coordinates with relevant partners to provide for the safety and welfare of participants. For the 2004 Democratic National Convention (DNC), designated an NSSE, the USSS tasked the Boston Emergency Medical Services (BEMS) of the Boston Public Health Commission with the design and implementation of health services related to the Convention. In this article, we describe the planning and development of BEMS' robust 2004 DNC Medical Consequence Management Plan, addressing the following activities: public health surveillance, on-site medical care, surge capacity in the event of a mass casualty incident, and management of federal response assets. Lessons learned from enhanced medical planning for the 2004 DNC may serve as an effective model for future mass gathering events.

  13. Strategic Sustainability Performance Plan. Discovering Sustainable Solutions to Power and Secure America’s Future

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2010-09-01

    Sustainability is fundamental to the Department of Energy’s research mission and operations as reflected in the Department’s Strategic Plan. Our overarching mission is to discover the solutions to power and secure America’s future.

  14. Design of High-Security USB Flash Drives Based on Chaos Authentication

    Directory of Open Access Journals (Sweden)

    Teh-Lu Liao

    2018-05-01

    Full Text Available This paper aims to propose a novel design of high-security USB flash drives with the chaos authentication. A chaos authentication approach with the non-linear encryption and decryption function design is newly proposed and realized based on the controller design of chaos synchronization. To complete the design of high-security USB flash drives, first, we introduce six parameters into the original Henon map to adjust and obtain richer chaotic state responses. Then a discrete sliding mode scheme is proposed to solve the synchronization problem of discrete hyperchaotic Henon maps. The proposed sliding mode controller can ensure the synchronization of the master-slave Henon maps. The selection of the switching surface and the existence of the sliding motion are also addressed. Finally, the obtained results are applied to design a new high-security USB flash drive with chaos authentication. We built discrete hyperchaotic Henon maps in the smartphone (master and microcontroller (slave, respectively. The Bluetooth module is used to communicate between the master and the slave to achieve chaos synchronization such that the same random and dynamical chaos signal can be simultaneously obtained at both the USB flash drive and smartphone, and pass the chaos authentication. When users need to access data in the flash drive, they can easily enable the encryption APP in the smartphone (master for chaos authentication. After completing the chaos synchronization and authentication, the ARM-based microcontroller allows the computer to access the data in the high-security USB flash drive.

  15. MOECSW trains master trainers and supervisors.

    Science.gov (United States)

    1995-01-01

    The Ministry of Education, Culture and Social Welfare (MOECSW), as part of the Population Education Programs (formal and informal), undertook a series of training programs to upgrade the knowledge and skills of master trainers, supervisors, and resource persons. As part of the Population Education in the Formal School Sector Project (NEP/93/P01), under the Curriculum Development Centre five training courses were organized to train 220 master trainers. Under the "Three Steps Training Strategy," these 220 master trainers would teach 825 secondary school headmasters who would reach 2025 secondary school teachers. The training courses were held in Dhangadi, April 23-27, 1995; in Pokhara, April 2-7; and in Biratnagar, February 20-24. The areas covered included: 1) the pedagogical aspect of population education (content, scope, objectives, nature, teaching methodologies); 2) demography and population dynamics (composition, distribution and density, sources of population data, demographic transition, consequences and determinants of population growth); 3) family life and adolescence and human sexuality education, including acquired immunodeficiency syndrome (AIDS) education; 4) maternal and child health, and family planning; 5) environment; and 6) population policy and programs. As part of the Population Education Programme (NEP/93/P08), a Master Trainers Training Workshop was held in Makwanpur, March 26-28, 1995. These master trainers would train trainers who would train the facilitators and teachers at learning centers for adult learners under the literacy and post literacy programs. This course focused on the approaches and strategies for integrating population education in development programs, and non-formal education, adult literacy, post literacy, and out-of-school children programs. Dr. D. de Rebello and Mr. S. Hutabarat, CST Advisors on Population Education, organized the training courses and served as resource persons.

  16. Flexible high-speed FASTBUS master for data read-out and preprocessing

    International Nuclear Information System (INIS)

    Wurz, A.; Manner, R.

    1990-01-01

    This paper describes a single slot FASTBUS master module. It can be used for read-out and preprocessing of data that are read out from FASTBUS modules, e.g., and ADC system. The module consists of a 25 MHz, 32-bit processor MC 68030 with cache memory and memory management, a floating point coprocessor MC68882, 4 MBytes of main memory, and FASTBUS master and slave interfaces. In addition, a DMA controller for read-out of FASTBUS data is provided. The processor allows I/O via serial ports, a 16-bit parallel port, and a transputer link. Additional interfaces are planned. The main memory is multi-ported and can be accessed directly by the CPU, the FASTBUS, and external masters via the high-speed local bus that is accessible by way of a connector. The FASTBUS interface supports most of the standard operations in master and slave mode

  17. 76 FR 80205 - Instituting a National Action Plan On Women, Peace, And Security

    Science.gov (United States)

    2011-12-23

    ... strengthen its efforts to prevent--and protect women and children from--harm, exploitation, discrimination... systems through the integration of gender perspectives, and invest in women and girls' health, education... Instituting a National Action Plan On Women, Peace, And Security By the authority vested in me as President by...

  18. Penataan Menara BTS (Cell Planning)

    OpenAIRE

    Prijono, Wahyu Adi

    2010-01-01

    Penataan menara/BTS merupakan proses master plan penataan menara telekomunikasi seluler berdasarkan estetika dan kesesuaian dengan KKOP ( Kawasan Keselamatan Operasional Penerbangan ) dan tata ruang wilayah suatu daerah guna mendapatkan jumlah menara yang optimal di suatu wilayah.Penataan Menara Master plan meliputi, analisis potensi pengguna telepon seluler sampai 5 tahun ke depan, Prediksi deman BTS, perhitungan kapasitas BTS 5 tahun kedepan, pemetaan pola penataan pemakaian menara / tower ...

  19. Underground Test Area Activity Communication/Interface Plan, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro, Las Vegas, NV (United States); Rehfeldt, Kenneth [Navarro, Las Vegas, NV (United States)

    2016-10-01

    The purpose of this plan is to provide guidelines for effective communication and interfacing between Underground Test Area (UGTA) Activity participants, including the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) and its contractors. This plan specifically establishes the following: • UGTA mission, vision, and core values • Roles and responsibilities for key personnel • Communication with stakeholders • Guidance in key interface areas • Communication matrix

  20. Institutional Repositories: The Experience of Master's and Baccalaureate Institutions

    Science.gov (United States)

    Markey, Karen; St. Jean, Beth; Soo, Young Rieh; Yakel, Elizabeth; Kim, Jihyun

    2008-01-01

    In 2006, MIRACLE Project investigators censused library directors at all U.S. academic institutions about their activities planning, pilot testing, and implementing the institutional repositories on their campuses. Out of 446 respondents, 289 (64.8 percent) were from master's and baccalaureate institutions (M&BIs) where few operational…

  1. Mastering the Master Space

    CERN Document Server

    Forcella, Davide; He, Yang-Hui; Zaffaroni, Alberto

    2008-01-01

    Supersymmetric gauge theories have an important but perhaps under-appreciated notion of a master space, which controls the full moduli space. For world-volume theories of D-branes probing a Calabi-Yau singularity X the situation is particularly illustrative. In the case of one physical brane, the master space F is the space of F-terms and a particular quotient thereof is X itself. We study various properties of F which encode such physical quantities as Higgsing, BPS spectra, hidden global symmetries, etc. Using the plethystic program we also discuss what happens at higher number N of branes. This letter is a summary and some extensions of the key points of a longer companion paper arXiv:0801.1585.

  2. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  3. Test and Evaluation for Enhanced Security: A Quantitative Method to Incorporate Expert Knowledge into Test Planning Decisions.

    Energy Technology Data Exchange (ETDEWEB)

    Rizzo, Davinia [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Blackburn, Mark [Stevens Inst. of Technology, Hoboken, NJ (United States)

    2017-03-01

    Complex systems are comprised of technical, social, political and environmental factors as well as the programmatic factors of cost, schedule and risk. Testing these systems for enhanced security requires expert knowledge in many different fields. It is important to test these systems to ensure effectiveness, but testing is limited to due cost, schedule, safety, feasibility and a myriad of other reasons. Without an effective decision framework for Test and Evaluation (T&E) planning that can take into consideration technical as well as programmatic factors and leverage expert knowledge, security in complex systems may not be assessed effectively. Therefore, this paper covers the identification of the current T&E planning problem and an approach to include the full variety of factors and leverage expert knowledge in T&E planning through the use of Bayesian Networks (BN).

  4. The New Roles of the Dominican Armed Forces in the Dominican Republic National Security Plan

    National Research Council Canada - National Science Library

    Arias, Jose D

    2007-01-01

    ... in the 2005 National Security Plan. The resulting analysis provides a basis for determining what the new roles of the Dominican Armed Forces and the National Police should be for the 21st century...

  5. Y-12 National Security Complex National Historic Preservation Act Historic Preservation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2003-09-30

    The Historic Preservation Plan (HPP) recognizes that the Y-12 National Security Complex is a vital and long-term component of DOE and NNSA. In addition to NNSA missions, the Office of Science and Energy, the Office of Nuclear Energy, and the Office of Environmental Management have properties located at Y-12 that must be taken into consideration. The HPP also recognizes that the challenge for cultural resource management is incorporating the requirements of NNSA, SC, NE, and EM missions while preserving and protecting its historic resources. The HPP seeks to find an effective way to meet the obligations at Y-12 for historic and archeological protection while at the same time facilitating effective completion of ongoing site mission activities, including removal of obsolete or contaminated facilities, adaptive reuse of existing facilities whenever feasible, and construction of new facilities in order to meet site mission needs. The Y-12 Historic Preservation Plan (HPP) defines the preservation strategy for the Y-12 National Security Complex and will direct efficient compliance with the NHPA and federal archaeological protection legislation at Y-12 as DOE and NNSA continues mission activities of the site.

  6. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  7. The research of computer network security and protection strategy

    Science.gov (United States)

    He, Jian

    2017-05-01

    With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.

  8. IAEA Activities in Nuclear Security, 18 April 2013, Delft, The Netherlands

    International Nuclear Information System (INIS)

    Amano, Y.

    2013-01-01

    I am pleased to take part in this event marking the launch of the new Masters Programme in Nuclear Security at the Reactor Institute Delft. The Institute has been an IAEA Collaborating Centre for nearly four years. Our two organisations have worked closely together in training and research, as well as in areas such as establishing quality management systems at nuclear analytical laboratories in IAEA Member States. The launch of the new Masters Programme in Nuclear Security by the Delft University of Technology marks a new stage in our cooperation. Four other European universities are also taking part in the programme: the University of Oslo, the Technical University of Vienna, the Brandenburg University of Applied Sciences, and the University of Manchester Dalton Nuclear Institute. I am pleased that the syllabus for the course has been developed from the IAEA's Educational Programme in Nuclear Security. I commend this effort to train a new generation of experts who can help to improve global nuclear security. Strengthening nuclear security throughout the world remains a challenge for all of us. National governments have primary responsibility for nuclear security, but international cooperation is vital.

  9. Acceptance criteria for the evaluation of Category 1 fuel cycle facility physical security plans

    Energy Technology Data Exchange (ETDEWEB)

    Dwyer, P.A.

    1991-10-01

    This NUREG document presents criteria developed from US Nuclear Regulatory Commission regulations for the evaluation of physical security plans submitted by Category 1 fuel facility licensees. Category 1 refers to those licensees who use or possess a formula quantity of strategic special nuclear material.

  10. Acceptance criteria for the evaluation of Category 1 fuel cycle facility physical security plans

    International Nuclear Information System (INIS)

    Dwyer, P.A.

    1991-10-01

    This NUREG document presents criteria developed from US Nuclear Regulatory Commission regulations for the evaluation of physical security plans submitted by Category 1 fuel facility licensees. Category 1 refers to those licensees who use or possess a formula quantity of strategic special nuclear material

  11. Strain Rate Effects, Transition Behaviour and Master Curve Concept

    Czech Academy of Sciences Publication Activity Database

    Dlouhý, Ivo; Pluvinage, G.; Holzmann, Miloslav

    č. 8 (2004), s. IV 16-IV 22 ISSN 1291-8199 R&D Projects: GA AV ČR IAA2041003; GA ČR GA106/01/0342 Institutional research plan: CEZ:AV0Z2041904 Keywords : ferritic steel * pressure vessel steel * master curve Subject RIV: JL - Materials Fatigue, Friction Mechanics

  12. Predicting Social Security numbers from public data

    OpenAIRE

    Acquisti, Alessandro; Gross, Ralph

    2009-01-01

    Information about an individual's place and date of birth can be exploited to predict his or her Social Security number (SSN). Using only publicly available information, we observed a correlation between individuals' SSNs and their birth data and found that for younger cohorts the correlation allows statistical inference of private SSNs. The inferences are made possible by the public availability of the Social Security Administration's Death Master File and the widespread accessibility of per...

  13. 75 FR 10973 - Hazardous Materials: Risk-Based Adjustment of Transportation Security Plan Requirements

    Science.gov (United States)

    2010-03-09

    ... (explosive) material; (3) More than 1 L (1.06 qt.) per package of a material poisonous by inhalation in... controlled; and 6.1 materials poisonous by inhalation. We also proposed to require security plans for any... happens very rapidly, and in the process, the propane combines readily with air to form fuel air mixtures...

  14. No energy security without climate security

    International Nuclear Information System (INIS)

    Hiller, M.

    2006-06-01

    WWF urges the G8 nations to embark on a serious global 'Climate and Energy Security Plan' akin in dimension to the Marshall plan after the Second World War. The plan would aim at dramatically augmenting energy efficiency measures and renewable energy sources within the next five years

  15. 9 CFR 121.11 - Security.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Security. 121.11 Section 121.11... AGENTS AND TOXINS § 121.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard...

  16. A cost-benefit analysis of the Mexican Social Security Administration's family planning program.

    Science.gov (United States)

    Nortman, D L; Halvas, J; Rabago, A

    1986-01-01

    A cost-benefit analysis of the family planning program of the Mexican Social Security System (IMSS) was undertaken to test the hypothesis that IMSS's family planning services yield a net savings to IMSS by reducing the load on its maternal and infant care service. The cost data are believed to be of exceptionally high quality because they were empirically ascertained by a retrospective and prospective survey of unit time and personnel costs per specified detailed type of service in 37 IMSS hospitals and 16 clinics in 13 of Mexico's 32 states. Based on the average cost per case, the analysis disclosed that for every peso (constant 1983 currency) that IMSS spent on family planning services to its urban population during 1972-1984 inclusive, the agency saved nine pesos. The article concludes by raising the speculative question as to the proportion of the births averted by the IMSS family planning program that would have been averted in the absence of IMSS's family planning services.

  17. 42 CFR 73.11 - Security.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Security. 73.11 Section 73.11 Public Health PUBLIC... AND TOXINS § 73.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard the...

  18. Fast forward for the United Nations. Human security becomes a unifying force

    International Nuclear Information System (INIS)

    Annan, Kofi

    2005-01-01

    This paper speaks about the author's vision of a safer world and a better United Nations. The global threats of our age include terrorism, deadly weapons, genocide, infectious disease, poverty, environmental degradation and organized crime. They will not wait for States to sort out their differences. That is why we must act now to strengthen our collective defences. We must unite to master today's threats, and not allow them to divide and master us. And I submit that the only universal instrument that can bring States together in such a global effort is the United Nations. One must acknowledge that the United Nations is not perfect. At times, it shows its age. But our world will not easily find a better instrument for forging a sustained, global response to today's threats. We must use it to unite around common priorities - and act on them. And we must agree on a plan to reform the United Nations - and get on with the job of implementing it. This message lies at the heart of the recent report, A More Secure World: Our Shared Responsibility. It is the work of the Panel of 16 men and women from around the world I appointed last year. The report contains a powerful vision of collective security. Whether the threat is terrorism or AIDS, a threat to one is a threat to all. Our defences are only as strong as their weakest link. We will be safest if we work together

  19. (Congressional Interest) Network Information and Space Security Center

    Science.gov (United States)

    2011-09-30

    Zagreb , Croatia (City of Zagreb funding). Conducted three days of meetings with City/University of Zagreb , Croatia officials to structure terms for a...partnership with UCCS. In the short-term, UCCS will develop and deliver several courses in homeland security and assist the University of Zagreb in... Zagreb in maturing the Center of Excellence and designing, developing and delivering masters and doctoral degrees in homeland security. Hosted a group of

  20. Potencialidade do Planejamento Participativo no Brasil / Potentiality of Participative Planning in Brazil

    Directory of Open Access Journals (Sweden)

    Ideni Terezinha Antonello

    2013-10-01

    Full Text Available The main objective in this essay is making a reflection upon the potentialities presented by the recentmunicipal master plans in Brazil compared to the traditional plans, because the City Statute (2001brought a new meaning to these plans when designating them “participative master plans”, in the orientationof formulation of plans on the perspective of an effective popular participation. In order to reachthis goal, the concrete experience of two study objects will be developed: the Participative Master Planand the Participative Budget. The city of Londrina/Paraná will be taken to check the application of theassumptions of popular participation on the production of the municipal master plan, and the city ofPorto Alegre/Rio Grande do Sul, as an example of the participative budget application.

  1. Provocative Opinion: Let's Master Our Graduate Programs, Not Doctor Them Up

    Science.gov (United States)

    Pilar, Frank

    1974-01-01

    Criticizes recent Ph.D. programs carried out in many universities after World War II. Suggests university departments re-institute high quality two-year master's programs designed to train those who plan to make careers in chemistry at an applied level. (CC)

  2. Regional Master on Medical Physics

    International Nuclear Information System (INIS)

    Gutt, F.

    2001-01-01

    It points out: the master project; the master objective; the medical physicist profile and tasks; the requirements to be a master student; the master programmatic contents and the investigation priorities [es

  3. Water Security and Services in the Caribbean

    Directory of Open Access Journals (Sweden)

    Adrian Cashman

    2014-05-01

    Full Text Available The efficient management of water resources and services continues to be a concern in many of the small island states of the Caribbean. There are growing concerns over the ability of governments in the region to ensure the good management and provision of water without jeopardizing economic growth and the maintenance of social well-being. This paper provides an overview of the major factors influencing the water security facing the Caribbean Region and how the emerging concerns are being addressed. The key challenges and vulnerabilities may be summarized as lack of data and barriers to making available what information there is. Forward planning has been largely neglected and is symptomatic of a lack of appreciation of the need for having national water policies. In this respect Jamaica’s development of a national master water plan serves as a good example of what is needed. Water service providers have to be efficient, well managed and allowed to do their job. This means that they have to be on a sound financial footing. The challenge is to find the balance between appropriate political and regulatory oversight and the autonomy of water managers and service providers.

  4. The Evolution of Missile Defense Plan from Bush to Obama. Implications for the National Security of Romania

    Directory of Open Access Journals (Sweden)

    Ruxandra-Laura BOSILCA

    2012-06-01

    Full Text Available In 2011 Romania officially became part of the Obama administration’s missile defense system in Europe which has significantly changed the strategic military relations both in Europe and worldwide. The Bush approach has been revised and progress in several sections has been achieved, both strategically and technically. For Romania, the participation in the missile defence plan, ensures more solid security guarantees, especially in an unpredictable and risk-prone international environment where the U.S. reconsiders its presence in Europe under the pressure of the economic crisis and of a relative decline in power; it has also become a more visible actor – alongside Bulgaria – which were initially excluded by the Bush missile defence plan. This paper’s purpose is to review the main evolutions of the missile defense plan from the Bush to the Obama administration and to outline its implications on the national security of Romania.

  5. Underground Test Area Quality Assurance Project Plan Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Irene Farnham

    2011-05-01

    This Quality Assurance Project Plan (QAPP) provides the overall quality assurance (QA) program requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Underground Test Area (UGTA) Sub-Project (hereafter the Sub-Project) activities. The requirements in this QAPP are consistent with DOE Order 414.1C, Quality Assurance (DOE, 2005); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). The QAPP Revision 0 supersedes DOE--341, Underground Test Area Quality Assurance Project Plan, Nevada Test Site, Nevada, Revision 4.

  6. Interfaces entre a política habitacional e o Plano Diretor Participativo na metrópole Fortaleza-CE / Relations between the housing policy and participatory master plan in metropolis Fortaleza, Ceará, Brazil

    Directory of Open Access Journals (Sweden)

    Elizete de Oliveira Santos

    2013-12-01

    Full Text Available The housing question appears as essential element to understanding the production, consumption and appropriation processes of urban space, illuminating the relationship between sociospatial segregation and real state speculation that govern the brazilians' cities structuring. This paper proposes to discuss the relations between the Participatory Master Plan of Fortaleza (PDPFor and the Municipal Housing Policy (PHIS, aiming to contribute to the reflection of the importance of the urban and housing policies integration. The text is divided into three parts: the first discusses the context of the emergence of the master plans "new generation" in Brazil; the second reconstructs the preparation process of the PDPFor and PHIS; and the third proposes a questioning about the dialogue between the urban and housing political, based on the analysis of the content of PHIS and housing policy chapter in PDPFor.

  7. Nevada National Security Site Integrated Groundwater Sampling Plan, Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene

    2018-03-01

    The purpose is to provide a comprehensive, integrated approach for collecting and analyzing groundwater samples to meet the needs and objectives of the DOE/EM Nevada Program’s UGTA Activity. Implementation of this Plan will provide high-quality data required by the UGTA Activity for ensuring public protection in an efficient and cost-effective manner. The Plan is designed to ensure compliance with the UGTA Quality Assurance Plan (QAP) (NNSA/NFO, 2015); Federal Facility Agreement and Consent Order (FFACO) (1996, as amended); and DOE Order 458.1, Radiation Protection of the Public and the Environment (DOE, 2013). The Plan’s scope comprises sample collection and analysis requirements relevant to assessing both the extent of groundwater contamination from underground nuclear testing and impact of testing on water quality in downgradient communities. This Plan identifies locations to be sampled by CAU and location type, sampling frequencies, sample collection methodologies, and the constituents to be analyzed. In addition, the Plan defines data collection criteria such as well purging, detection levels, and accuracy requirements/recommendations; identifies reporting and data management requirements; and provides a process to ensure coordination between NNSS groundwater sampling programs for sampling analytes of interest to UGTA. Information used in the Plan development—including the rationale for selection of wells, sampling frequency, and the analytical suite—is discussed under separate cover (N-I, 2014) and is not reproduced herein. This Plan does not address compliance for those wells involved in a permitted activity. Sampling and analysis requirements associated with these wells are described in their respective permits and are discussed in NNSS environmental reports (see Section 5.2). In addition, sampling for UGTA CAUs that are in the Closure Report (CR) stage are not included in this Plan. Sampling requirements for these CAUs are described in the CR

  8. (Congressional Interest) Institute for Science, Space and Security (ISSS)

    Science.gov (United States)

    2012-03-19

    Studies program between UCCS and University of Zagreb , Croatia (City of Zagreb funding). Conducted three days of meetings with City/University of Zagreb ...security and assist the University of Zagreb in establishing a regional (Eastern Europe) Center of Excellence in Homeland Security. In the long-term...UCCS will assist the University of Zagreb in maturing the Center of Excellence and designing, developing and delivering masters and doctoral degrees

  9. The story of the social security number.

    Science.gov (United States)

    Puckett, Carolyn

    2009-01-01

    The use of the Social Security number (SSN) has expanded significantly since its inception in 1936. Created merely to keep track of the earnings history of U.S. workers for Social Security entitlement and benefit computation purposes, it has come to be used as a nearly universal identifier. Assigned at birth, the SSN enables government agencies to identify individuals in their records and businesses to track an individual's financial information. This article explores the history and meaning of the SSN and the Social Security card, as well as the Social Security Administration's (SSA's) SSN master file, generally known as the Numident. The article also traces the historical expansion of SSN use and the steps SSA has taken to enhance SSN integrity.

  10. Successful linking of the Society of Thoracic Surgeons Database to Social Security data to examine the accuracy of Society of Thoracic Surgeons mortality data.

    Science.gov (United States)

    Jacobs, Jeffrey P; O'Brien, Sean M; Shahian, David M; Edwards, Fred H; Badhwar, Vinay; Dokholyan, Rachel S; Sanchez, Juan A; Morales, David L; Prager, Richard L; Wright, Cameron D; Puskas, John D; Gammie, James S; Haan, Constance K; George, Kristopher M; Sheng, Shubin; Peterson, Eric D; Shewan, Cynthia M; Han, Jane M; Bongiorno, Phillip A; Yohe, Courtney; Williams, William G; Mayer, John E; Grover, Frederick L

    2013-04-01

    The Society of Thoracic Surgeons Adult Cardiac Surgery Database has been linked to the Social Security Death Master File to verify "life status" and evaluate long-term surgical outcomes. The objective of this study is explore practical applications of the linkage of the Society of Thoracic Surgeons Adult Cardiac Surgery Database to Social Securtiy Death Master File, including the use of the Social Securtiy Death Master File to examine the accuracy of the Society of Thoracic Surgeons 30-day mortality data. On January 1, 2008, the Society of Thoracic Surgeons Adult Cardiac Surgery Database began collecting Social Security numbers in its new version 2.61. This study includes all Society of Thoracic Surgeons Adult Cardiac Surgery Database records for operations with nonmissing Social Security numbers between January 1, 2008, and December 31, 2010, inclusive. To match records between the Society of Thoracic Surgeons Adult Cardiac Surgery Database and the Social Security Death Master File, we used a combined probabilistic and deterministic matching rule with reported high sensitivity and nearly perfect specificity. Between January 1, 2008, and December 31, 2010, the Society of Thoracic Surgeons Adult Cardiac Surgery Database collected data for 870,406 operations. Social Security numbers were available for 541,953 operations and unavailable for 328,453 operations. According to the Society of Thoracic Surgeons Adult Cardiac Surgery Database, the 30-day mortality rate was 17,757/541,953 = 3.3%. Linkage to the Social Security Death Master File identified 16,565 cases of suspected 30-day deaths (3.1%). Of these, 14,983 were recorded as 30-day deaths in the Society of Thoracic Surgeons database (relative sensitivity = 90.4%). Relative sensitivity was 98.8% (12,863/13,014) for suspected 30-day deaths occurring before discharge and 59.7% (2120/3551) for suspected 30-day deaths occurring after discharge. Linkage to the Social Security Death Master File confirms the accuracy of

  11. Elaboración de un plan para la implementación del sistema de gestión de seguridad de la información

    OpenAIRE

    Guerrón Eras, Jorge

    2013-01-01

    El objetivo del plan del proyecto es definir claramente el propósito del proyecto de implementación del Sistema de Gestión de Seguridad de la Información (SGSI). L'objectiu del pla del projecte és definir clarament el propòsit del projecte d'implementació del Sistema de Gestió de Seguretat de la Informació (SGSI). Master thesis for the ICT Security management program.

  12. Computer Security: Governmentwide Planning Process Had Limited Impact. Report to the Chairman, Committee on Science, Space, and Technology, House of Representatives.

    Science.gov (United States)

    General Accounting Office, Washington, DC. Information Management and Technology Div.

    As required by the Computer Security Act of 1987, federal agencies have to identify systems that contain sensitive information and develop plans to safeguard them. The planning process was assessed in 10 civilian agencies as well as the extent to which they had implemented planning controls described in 22 selected plans. The National Institute of…

  13. Chapter 8: Planning Tools to Simulate and Optimize Neighborhood Energy Systems

    Energy Technology Data Exchange (ETDEWEB)

    Zhivov, Alexander Michael; Case, Michael Patrick; Jank, Reinhard; Eicker, Ursula; Booth, Samuel

    2017-03-15

    This section introduces different energy modeling tools available in Europe and the USA for community energy master planning process varying from strategic Urban Energy Planning to more detailed Local Energy Planning. Two modeling tools used for Energy Master Planning of primarily residential communities, the 3D city model with CityGML, and the Net Zero Planner tool developed for the US Department of Defense installations are described in more details.

  14. A Study on the Optimum Bucket Size for Master Scheduling : For the Case of Hierarchically tured Products

    OpenAIRE

    木内, 正光

    2010-01-01

    The function of master scheduling is to plan the flow of order from its arrival to its completion. In this study, the problem of bucket size for master scheduling is taken up. The bucket size for master scheduling has much influence on the lead time of the order. However, to date there is no clear method for how to set the optimum bucket size. The purpose of this study is to propose a method to set the optimum bucket size. In this paper, an equation to estimate the optimum bucket size is prop...

  15. Transparency masters for mathematics revealed

    CERN Document Server

    Berman, Elizabeth

    1980-01-01

    Transparency Masters for Mathematics Revealed focuses on master diagrams that can be used for transparencies for an overhead projector or duplicator masters for worksheets. The book offers information on a compilation of master diagrams prepared by John R. Stafford, Jr., audiovisual supervisor at the University of Missouri at Kansas City. Some of the transparencies are designed to be shown horizontally. The initial three masters are number lines and grids that can be used in a mathematics course, while the others are adaptations of text figures which are slightly altered in some instances. The

  16. Master plan for renewable energies + Summary for policy makers + Presentation to the Council of Ministers

    International Nuclear Information System (INIS)

    Blanc, Julien; Bitot, Stephane

    2012-01-01

    This document reports a study which aimed at determining a master plan which would allow a mix with 50 per cent of renewable energies for electricity production to be reached by 2020 in the specific case of French Polynesia. It proposes a comprehensive analysis of of the present energetic situation in Tahiti and in eleven islands of the French Polynesia. After a presentation of the social and economic context, the report proposes a diagnosis of energy and electricity consumption in Polynesia, an analysis of electricity demand and of its possible evolutions (scenarios), and an analysis of the present production (fossil thermal, hydroelectric, photovoltaic, and wind energy, quality and requirements for an island grid). It reports the analysis the potential of development of renewable energies (hydroelectricity, photovoltaic, other solar production, wind, biomass, marine renewable energies, seawater air conditioning), and the analysis of the supply-demand balance in the different scenarios for Tahiti and the other islands. Short term perspectives are discussed, and an overview of installed renewable powers is provided. A second document proposes a summary of this study under the form of a Power Point presentation illustrated by many graphs

  17. Master Plan UMKM Berbasis Perikanan untuk Meningkatkan Pengolahan Produk Ikan yang Memiliki Nilai Tambah Tinggi

    Directory of Open Access Journals (Sweden)

    I Gede Riana

    2015-11-01

    Full Text Available This research aims to generate a Master plan of fisheries-based SME development concept in Bali region, in order to build Bali as the centre for production and processing of fishery products in the Coridor of Bali-Nusa Tenggara. In Year-1 of the study period, the research activities carried out includes three processes, including analysis of the potensial of SMEs, analyzes the business cycle, and identification of barriers and chalenges. By using the method of linear regression analysis, Geographic Information System (GIS and Analytical Hierarchy Process (AHP, the study result in Year-1, obtained some information about characteristics of fisheries based SMEs Bali, consisting of: 1 there is positive effect between GDP growth and energy work on the level of productivity (output value of SMEs; 2 the need for development of fisheries-based SMEs in Bali include some operational, capital, and market access aspects. To the Bali Provincial Government, SMEs and the poblic are expected to synergize themselves, in term of institutionally, improving the quality of human recources, empowering financial institutions at the local level, as well as active participation in marketing access to the international level.

  18. "Business Continuity and Information Security Maintenance" Masters’ Training Program

    OpenAIRE

    Miloslavskaya , Natalia; Senatorov , Mikhail; Tolstoy , Alexandr; Zapechnikov , Sergei

    2013-01-01

    Part 1: WISE 8; International audience; The experience of preparing for the "Business Continuity and Information Security Maintenance" (BC&ISM) Masters’ program implementation and realization at the "Information Security of Banking Systems" Department of the National Research Nuclear University MEPhI (NRNU MEPhI, Moscow, Russia) is presented. Justification of the educational direction choice for BC&ISM professionals is given. The model of IS Master being trained on this program is described. ...

  19. Hybrid quantum-classical master equations

    International Nuclear Information System (INIS)

    Diósi, Lajos

    2014-01-01

    We discuss hybrid master equations of composite systems, which are hybrids of classical and quantum subsystems. A fairly general form of hybrid master equations is suggested. Its consistency is derived from the consistency of Lindblad quantum master equations. We emphasize that quantum measurement is a natural example of exact hybrid systems. We derive a heuristic hybrid master equation of time-continuous position measurement (monitoring). (paper)

  20. Project Management with IT Security Focus

    OpenAIRE

    Felician Alecu; Paul Pocatilu; Sergiu Capisizu

    2011-01-01

    The paper focus on the main key points related to the IT security project management. The most important lifecycle stages are identified: IT security project proposal definition, project organization, project planning, quality planning, project team organization, IT security project activities management and project closing. The most important success factors for IT security projects are the support of top-management, customer satisfaction, prevention over remediation and continuous progress....

  1. Mastering System Center 2012 Configuration Manager

    CERN Document Server

    Rachui, Steve; Martinez, Santos; Daalmans, Peter

    2012-01-01

    Expert coverage of Microsoft's highly anticipated network software deployment tool The latest version of System Center Configuration Manager (SCCM) is a dramatic update of its predecessor Configuration Manager 2007, and this book offers intermediate-to-advanced coverage of how the new SCCM boasts a simplified hierarchy, role-based security, a new console, flexible application deployment, and mobile management. You'll explore planning and installation, migrating from SCCM 2007, deploying software and operating systems, security, monitoring and troubleshooting, and automating and customizing SCC

  2. IAEA Nuclear Security - Achievements 2002-2011

    International Nuclear Information System (INIS)

    2012-03-01

    The possibility that nuclear or other radioactive material could be used for malicious purposes is real. This calls for a collective commitment to the control of, and accountancy for, material, as well as to adequate levels of protection in order to prevent criminal or unauthorized access to the material or associated facilities. Sharing of knowledge and experience, coordination among States and collaboration with other international organizations, initiatives and industries supports an effective international nuclear security framework. In 2001, the Board of Governors tasked the IAEA with improving nuclear security worldwide. The report that follows provides an overview of accomplishments over the last decade and reflects the importance that States assign to keeping material in the right hands. The IAEA has established a comprehensive nuclear security programme, described first in the Nuclear Security Plan of 2002-2005 and subsequently in the second plan of 2006- 2009. Activities included developing internationally accepted nuclear security guidance, supporting international legal instruments, protecting material and facilities, securing transport and borders, detecting and interdicting illicit nuclear trafficking, strengthening human resource capacity and preparing response plans should a nuclear security event occur. The IAEA has begun the implementation of its third Nuclear Security Plan, to be completed at the end of 2013. This approach to nuclear security recognizes that an effective national nuclear security regime builds on a number of factors: the implementation of relevant international legal instruments; IAEA guidance and standards; information protection; physical protection; material accounting and control; detection of, and response to, trafficking in such material; national response plans and contingency measures. Implemented in a systematic manner, these building blocks make up a sustainable national nuclear security regime and contribute to global

  3. Exponential networked synchronization of master-slave chaotic systems with time-varying communication topologies

    International Nuclear Information System (INIS)

    Yang Dong-Sheng; Liu Zhen-Wei; Liu Zhao-Bing; Zhao Yan

    2012-01-01

    The networked synchronization problem of a class of master-slave chaotic systems with time-varying communication topologies is investigated in this paper. Based on algebraic graph theory and matrix theory, a simple linear state feedback controller is designed to synchronize the master chaotic system and the slave chaotic systems with a time-varying communication topology connection. The exponential stability of the closed-loop networked synchronization error system is guaranteed by applying Lyapunov stability theory. The derived novel criteria are in the form of linear matrix inequalities (LMIs), which are easy to examine and tremendously reduce the computation burden from the feedback matrices. This paper provides an alternative networked secure communication scheme which can be extended conveniently. An illustrative example is given to demonstrate the effectiveness of the proposed networked synchronization method. (general)

  4. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  5. MASTER-ICATE constraints on the outburst time of OGLE-2012-NOVA-002

    Science.gov (United States)

    Levato, H.; Saffe, C.; Mallamaci, C.; Lopez, C.; Denisenko, F. Podest D.; Gorbovskoy, E.; Lipunov, V.; Balanutsa, P.; Tiurina, N.; Kornilov, V.; Belinski, A.; Shatskiy, N.; Chazov, V.; Kuznetsov, A.; Zimnukhov, D.; Krushinsky, V.; Zalozhnih, I.; Popov, A.; Bourdanov, A.; Punanova, A.; Ivanov, K.; Yazev, S.; Budnev, N.; Konstantinov, E.; Chuvalaev, O.; Poleshchuk, V.; Gress, O.; Parkhomenko, A.; Tlatov, A.; Dormidontov, D.; Senik, V.; Yurkov, V.; Sergienko, Y.; Varda, D.; Sinyakov, E.; Shumkov, V.; Shurpakov, S.; Podvorotny, P.

    2012-10-01

    MASTER-ICATE very wide field camera (72-mm f/1.2 lens + 11 Mpx CCD) located at Observatorio Astronomico Felix Aguilar (OAFA) near San Juan, Argentina, has observed the position of possible Nova OGLE-2012-NOVA-002 reported by L. Wyrzykowski et al. (ATel #4483) several times before 2012 May 20 and then again after 2012 July 03. MASTER-WFC is continuously imaging the areas of sky (24x16 sq. deg. field of view) with 5-sec unfiltered exposures.

  6. Development of Design Technology on Thermal-Hydraulic Performance in Tight-Lattice Rod Bundles: I-Master Plan and Executive Summary

    Science.gov (United States)

    Ohnuki, Akira; Kureta, Masatoshi; Yoshida, Hiroyuki; Tamai, Hidesada; Liu, Wei; Misawa, Takeharu; Takase, Kazuyuki; Akimoto, Hajime

    R&D project to investigate thermal-hydraulic performance in tight-lattice rod bundles for Innovative Water Reactor for Flexible Fuel Cycle has been progressed at Japan Atomic Energy Agency in collaboration with power utilities, reactor vendors and universities since 2002. In this series-study, we will summarize the R&D achievements using large-scale test facility (37-rod bundle with full-height and full-pressure), model experiments and advanced numerical simulation technology. This first paper described the master plan for the development of design technology and showed an executive summary for this project up to FY2005. The thermal-hydraulic characteristics in the tight-lattice configuration were investigated and the feasibility was confirmed based on the experiments. We have developed the design technology including 3-D numerical simulation one to evaluate the effects of geometry/scale on the thermal-hydraulic behaviors.

  7. A European Master's Programme in Public Health Nutrition.

    Science.gov (United States)

    Yngve, A; Warm, D; Landman, J; Sjöström, M

    2001-12-01

    Effective population-based strategies require people trained and competent in the discipline of Public Health Nutrition. Since 1997, a European Master's Programme in Public Health Nutrition has been undergoing planning and implementation, by establishing initial quality assurance systems with the aid of funding from the European Commission (DG SANCO/F3). Partners from 17 European countries have been involved in the process. A European Network of Public Health Nutrition has been developed and accredited by the European Commission.

  8. The role of national security culture in crisis management : the case of Kardak crisis

    OpenAIRE

    Savaş, Özlem

    2008-01-01

    Ankara : The Department of International Relations, Bilkent University, 2008. Thesis (Master's) -- Bilkent University, 2008. Includes bibliographical references leaves 94-103. This thesis analyzes the role of national security culture in crisis management. The use and significance of national security culture in the management of a crisis is the main concern discussed throughout this study. It is assumed that national security culture serves as the main guideline of states d...

  9. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Science.gov (United States)

    2010-03-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...

  10. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  11. Master-slave manipulator

    International Nuclear Information System (INIS)

    Haaker, L.W.; Jelatis, D.G.

    1981-01-01

    A remote control master-slave manipulator for performing work on the opposite side of a barrier wall, is described. The manipulator consists of a rotatable horizontal support adapted to extend through the wall and two longitudinally extensible arms, a master and a slave, pivotally connected one to each end of the support. (U.K.)

  12. Design, implementation and testing of master slave robotic surgical system

    International Nuclear Information System (INIS)

    Ali, S.A.

    2015-01-01

    The autonomous manipulation of the medical robotics is needed to draw up a complete surgical plan in development. The autonomy of the robot comes from the fact that once the plan is drawn up off-line, it is the servo loops, and only these, that control the actions of the robot online, based on instantaneous control signals and measurements provided by the vision or force sensors. Using only these autonomous techniques in medical and surgical robotics remain relatively limited for two main reasons: Predicting complexity of the gestures, and human Safety. Therefore, Modern research in haptic force feedback in medical robotics is aimed to develop medical robots capable of performing remotely, what a surgeon does by himself. These medical robots are supposed to work exactly in the manner that a surgeon does in daily routine. In this paper the master slave tele-robotic system is designed and implemented with accuracy and stability by using 6DOF (Six Degree of Freedom) haptic force feedback devices. The master slave control strategy, haptic devices integration, application software designing using Visual C++ and experimental setup are considered. Finally, results are presented the stability, accuracy and repeatability of the system. (author)

  13. Design, Implementation and Testing of Master Slave Robotic Surgical System

    Directory of Open Access Journals (Sweden)

    Syed Amjad Ali

    2015-01-01

    Full Text Available The autonomous manipulation of the medical robotics is needed to draw up a complete surgical plan in development. The autonomy of the robot comes from the fact that once the plan is drawn up off-line, it is the servo loops, and only these, that control the actions of the robot online, based on instantaneous control signals and measurements provided by the vision or force sensors. Using only these autonomous techniques in medical and surgical robotics remain relatively limited for two main reasons: Predicting complexity of the gestures, and human Safety. Therefore, Modern research in haptic force feedback in medical robotics is aimed to develop medical robots capable of performing remotely, what a surgeon does by himself. These medical robots are supposed to work exactly in the manner that a surgeon does in daily routine. In this paper the master slave tele-robotic system is designed and implemented with accuracy and stability by using 6DOF (Six Degree of Freedom haptic force feedback devices. The master slave control strategy, haptic devices integration, application software designing using Visual C++ and experimental setup are considered. Finally, results are presented the stability, accuracy and repeatability of the system

  14. Master Veteran Index (MVI)

    Data.gov (United States)

    Department of Veterans Affairs — As of June 28, 2010, the Master Veteran Index (MVI) database based on the enhanced Master Patient Index (MPI) is the authoritative identity service within the VA,...

  15. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    terrorist or criminal targets based on their grade, assignment, symbolic value, criticality, and threat and vulnerability assessment. Levels of protection The recommendations contained in this criterion are intended to minimize the possibility of HRP casualties in buildings or portions of buildings in which they work and live. These recommendations provide appropriate and implementable measures to establish a level of protection against terrorist attacks where no known threat of terrorist activity currently exists. While complete protection against all potential threats is cost prohibitive, the intent of these recommendations can be achieved through prudent master planning, real estate acquisition, and design and construction practices. Tag number The tag number at the beginning of each physical security measure (recommendation is unique and is intended to be a communication aid when linking the requirement (recommendation to the supporting text or commentary. The three-character tag number uses the following legend. Tag Number First Character -The first character is an abbreviation for the defense zone layer that is most applicable for the countermeasure. “S” is used to represent site or external zone issues. “P” is used to represent the perimeter zone. “G” is used to represent issues relative to the property grounds. “E” is used to represent issues associated with the building exterior of the HRP office or residence. “I” is used to represent issues associated with the building interior. “H” is used to represent issues associated with the safe room or safe haven. Tag Number Second Character - The second character is a sequential number for countermeasures in a given zone - a requirement or a recommendation. This number ensures a unique tag number. Tag Number Third Character- The third character indicates whether the countermeasure is applicable to offices, residences, or both (common. “O” indicates a requirement or recommendation unique to

  16. Master classes - What do they offer?

    OpenAIRE

    Hanken, Ingrid Maria; Long, Marion

    2012-01-01

    Master classes are a common way to teach music performance, but how useful are they in helping young musicians in their musical development? Based on his experiences of master classes Lali (2003:24) states that “For better or for worse, master classes can be life-changing events.” Anecdotal evidence confirm that master classes can provide vital learning opportunities, but also that they can be of little use to the student, or worse, detrimental. Since master classes are a common component in ...

  17. MOOCs to internationalize Masters. A case study at the University of Salamanca

    Science.gov (United States)

    Pereira, Dolores; Recio, Marian; Perez, Ana Victoria; López, Santiago; Palacios, Esther

    2015-04-01

    Current major objectives of Master's degrees taught at the University of Salamanca are to incorporate multidisciplinary skills and to address international issues. It is important to ensure that students and early career scientists have all of the necessary skills to deal with professional development before career planning whether in academic research, professional practices or alternative careers, whether in Spain or elsewhere. However, many students choose a Master's programme without sufficient understanding of what they might need to deal with. A multidisciplinary degree course at the University of Salamanca, linked to the Institute of Social Studies for Science and Technology, focuses on training potential experts equipped to mediate between participants in science and technology and the wider public. Students participating in this course currently come from Spanish speaking countries. Because the course is taught mainly in Spanish, subsequent outreach might also be confined to Spanish speaking communities. Even so, it is essential to properly explain, at the outset, the aims of the Master's programme and the international potential of the qualification to attract more. Here we propose the use of MOOCs (Massive Open Online Courses) both to help students to know about the content and other details of the Master program before they join in and to internationalize the course to reach more potential interested students in the subject. This will be the first experience implementing MOOCs in the teaching of masters at the University of Salamanca and, if successful, the experience can be applied to other masters and courses in need of students and internationalization.

  18. Very Bright CV discovered by MASTER-ICATE (Argentina)

    Science.gov (United States)

    Saffe, C.; Levato, H.; Mallamaci, C.; Lopez, C.; Lipunov, F. Podest V.; Denisenko, D.; Gorbovskoy, E.; Tiurina, N.; Balanutsa, P.; Kornilov, V.; Belinski, A.; Shatskiy, N.; Chazov, V.; Kuznetsov, A.; Yecheistov, V.; Yurkov, V.; Sergienko, Y.; Varda, D.; Sinyakov, E.; Gabovich, A.; Ivanov, K.; Yazev, S.; Budnev, N.; Konstantinov, E.; Chuvalaev, O.; Poleshchuk, V.; Gress, O.; Frolova, A.; Krushinsky, V.; Zalozhnih, I.; Popov, A.; Bourdanov, A.; Parkhomenko, A.; Tlatov, A.; Dormidontov, D.; Senik, V.; Podvorotny, P.; Shumkov, V.; Shurpakov, S.

    2013-06-01

    MASTER-ICATE very wide-field camera (d=72mm f/1.2 lens + 11 Mpix CCD) located near San Juan, Argentina has discovered OT source at (RA, Dec) = 14h 20m 23.5s -48d 55m 40s on the combined image (exposure 275 sec) taken on 2013-06-08.048 UT. The OT unfiltered magnitude is 12.1m (limit 13.1m). There is no minor planet at this place. The OT is seen in more than 10 images starting from 2013-06-02.967 UT (275 sec exposure) when it was first detected at 12.4m.

  19. Development of security engineering curricula at US universities

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, M.L.

    1998-08-01

    The Southwest Surety Institute was formed in June 1996 by Arizona State University (ASU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL) to provide educational programs in Security Engineering, and to conduct research and development in security technologies. This is the first science-based program of its kind in the US, focused on educating Security Engineers to help government and industry address their security needs. Each member brings a unique educational capability to the Institute. NM Tech has a formidable explosives testing and evaluation facility. ASU is developing a Masters program in Security Engineering at their School of Technology located on a new campus in Mesa, Arizona. NMSU provides a Security Technology minor, merging programs in Criminal Justice and Engineering Technology. The Sandia National Laboratories security system design and evaluation process forms the basis for the Security Engineering curricula. In an effort to leverage the special capabilities of each university, distance education will be used to share courses among Institute members and eventually with other sites across the country.

  20. EXPERIENCE NETWORKING UNIVERSITY OF EDUCATION TRAINING MASTERS SAFETY OF LIFE

    Directory of Open Access Journals (Sweden)

    Elvira Mikhailovna Rebko

    2016-02-01

    Full Text Available The article discloses experience networking of universities (Herzen State Pedagogical University and Sakhalin State University in the development and implementation of joint training programs for master’s education in the field of life safety «Social security in the urban environment». The novelty of the work is to create a schematic design of basic educational training program for master’s education in the mode of networking, and to identify effective instructional techniques and conditions of networking.Purpose – present the results of the joint development of a network of the basic educational program (BEP, to identify the stages of networking, to design a generalized scheme of development and implementation of a network of educational training program for master’s education in the field of life safety.Results generalized model of networking partner institutions to develop and implement the basic educational program master.Practical implications: the education process for Master of Education in the field of health and safety in Herzen State Pedagogical University and Sakhalin State University.

  1. Theater Security Cooperation Planning with Article 98: How the 2002 Servicemembers' Protection Act Fosters China's Quest for Global Influence

    National Research Council Canada - National Science Library

    Hernandez, Jaime A

    2005-01-01

    The Combatant Commander is hindered in constructing Theater Security Cooperation plans due to the restrictions placed upon foreign military aid dispersal as a result of the 2002 American Servicemembers' Protection Act...

  2. Nuclear Security Education Program at the Pennsylvania State University

    International Nuclear Information System (INIS)

    Uenlue, Kenan; Jovanovic, Igor

    2015-01-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  3. Nuclear Security Education Program at the Pennsylvania State University

    Energy Technology Data Exchange (ETDEWEB)

    Uenlue, Kenan [The Pennsylvania State University, Radiation Science and Engineering Center, University Park, PA 16802-2304 (United States); The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States); Jovanovic, Igor [The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States)

    2015-07-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  4. A Unique Master's Program in Combined Nuclear Technology and Nuclear Chemistry at Chalmers University of Technology, Sweden

    International Nuclear Information System (INIS)

    Skarnemark, Gunnar; Allard, Stefan; Ekberg, Christian; Nordlund, Anders

    2009-01-01

    The need for engineers and scientists who can ensure safe and secure use of nuclear energy is large in Sweden and internationally. Chalmers University of Technology is therefore launching a new 2-year master's program in Nuclear Engineering, with start from the autumn of 2009. The program is open to Swedish and foreign students. The program starts with compulsory courses dealing with the basics of nuclear chemistry and physics, radiation protection, nuclear power and reactors, nuclear fuel supply, nuclear waste management and nuclear safety and security. There are also compulsory courses in nuclear industry applications and sustainable energy futures. The subsequent elective courses can be chosen freely but there is also a possibility to choose informal tracks that concentrate on nuclear chemistry or reactor technology and physics. The nuclear chemistry track comprises courses in e.g. chemistry of lanthanides, actinides and transactinides, solvent extraction, radioecology and radioanalytical chemistry and radiopharmaceuticals. The program is finished with a one semester thesis project. This is probably a unique master program in the sense of its combination of deep courses in both nuclear technology and nuclear chemistry.

  5. Planetary Sciences practical experiences at the Master level with small telescopes

    Science.gov (United States)

    Sanchez-Lavega, A.; Perez-Hoyos, S.; del Rio-Gaztelurrutia, T.; Hueso, R.; Ordonez Etxeberria, I.; Rojas, J. F.

    2016-12-01

    The Master in Space Science and Technology of the Basque Country University UPV/EHU in Bilbao (Spain) has been taught during 7 years (A. Sanchez-Lavega et al., Eur. J. of Eng. Education. 2014). Along the different courses, a series of practical observations and studies of planetary sciences have been conducted with Master students, using telescopes with diameters in the range 28-50 cm pertaining to the Aula EspaZio Gela Observatory (http://www.ehu.eus/aula-espazio/presentacion.html). Simple instrumentation (cameras and a spectrograph) have been employed to study planetary atmospheres (dynamics and cloud structure) and orbital mechanics using the Galilean satellites. Here we present a sample of these studies, which have lead to publications in refereed journals and have been presented at different meetings with the coauthoring of the students. Plans for the future include involving the master students in high-resolution observations of Solar System planets using a remote controlled 36 cm telescope at the Calar Alto observatory in Southern Spain (separated 1000 km from the teaching facilities in Bilbao).

  6. 46 CFR 122.503 - Voyage plan.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Voyage plan. 122.503 Section 122.503 Shipping COAST... Emergencies § 122.503 Voyage plan. (a) The master of the following vessels shall prepare a voyage plan: (1) A... United States Great Lakes port from a Canadian Great Lakes port. (b) The voyage plan required by...

  7. Learning profiles of Master students

    DEFF Research Database (Denmark)

    Sprogøe, Jonas; Hemmingsen, Lis

    2005-01-01

    at DPU in 2001 several evaluations and research have been carried out on several topics relating to form, content, and didactics, but one important focus is missing: the research about the psychological profile and learning style of the master student. Knowledge is lacking on how teaching methods......Master education as a part of lifelong learning/education has over the last years increased in Denmark. Danish Universities now offer more than110 different programmes. One of the characteristics of the master education is that the students get credits for their prior learning and practical work...... experiences, and during the study/education theory and practise is combined. At the Master of Adult Learning and Human Resource Development, one of DPU´s master programmes, the students have a very diverse background and have many different experiences and practises. Since the first programme was introduced...

  8. 75 FR 44803 - Privacy Act of 1974; Notice of a New Privacy Act System of Records (SORN), Ginnie Mae Master...

    Science.gov (United States)

    2010-07-29

    ...(s), social security number, date of birth, property address, telephone number, email address, and... Affairs (VA), Department of Agriculture Rural Housing Service (RHS), or HUD Office of Public and Indian... Agriculture RHS, and PIH Master Subservicer's loan numbers. Safeguards: Electronic records are maintained in a...

  9. Systematic elicitation of cyber-security controls for NPP I and C system

    Energy Technology Data Exchange (ETDEWEB)

    Lee, M. S.; Kim, T. H. [Formal Works Inc., Seoul (Korea, Republic of); Park, S. P. [AhnLab Inc., Seongnam (Korea, Republic of); Kim, Y. M. [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2015-05-15

    Cyber-security implementation starts with a development of a cyber security plan considering characteristics of I and C system. In this paper, we describe a method that develops a cyber security plan for NPP I and C system. Especially, we propose a method for systematic elicitation of technical security controls that should be applied to I and C system. We expect that this study can provide a basis to develop a cyber-security plan for I and C system. Also, the study can contribute enhancing security to NPP I and C system. The rest of the paper is organized as follows: Section 2 introduces activities to develop a cyber-security plan and presents the result of each activity of the security plan. Section 3 concludes the paper. We proposed a method for systematic elicitation of security controls and described the method through examples. Development companies that want to implement cyber-security in I and C system can develop a cyber-security plan and apply the cyber-security program to their system according to our method. We expect that this study can provide a basis to develop a cyber-security plan for I and C system. Also, the study can contribute enhancing security to NPP I and C system.

  10. Systematic elicitation of cyber-security controls for NPP I and C system

    International Nuclear Information System (INIS)

    Lee, M. S.; Kim, T. H.; Park, S. P.; Kim, Y. M.

    2015-01-01

    Cyber-security implementation starts with a development of a cyber security plan considering characteristics of I and C system. In this paper, we describe a method that develops a cyber security plan for NPP I and C system. Especially, we propose a method for systematic elicitation of technical security controls that should be applied to I and C system. We expect that this study can provide a basis to develop a cyber-security plan for I and C system. Also, the study can contribute enhancing security to NPP I and C system. The rest of the paper is organized as follows: Section 2 introduces activities to develop a cyber-security plan and presents the result of each activity of the security plan. Section 3 concludes the paper. We proposed a method for systematic elicitation of security controls and described the method through examples. Development companies that want to implement cyber-security in I and C system can develop a cyber-security plan and apply the cyber-security program to their system according to our method. We expect that this study can provide a basis to develop a cyber-security plan for I and C system. Also, the study can contribute enhancing security to NPP I and C system

  11. Safeguards and Security FY 1996 Program Plan: WBS 6.6

    International Nuclear Information System (INIS)

    Lee, F.D.

    1995-08-01

    The Safeguards and Security (SAS) Program is based upon integrity, competence and innovation in the protection of the public and Hanford resources through: (1) outstanding assistance, oversight, education, and counsel to their customers to ensure the protection of the public, site personnel, assets, and information; (2) value-added and cost-effective solutions to Hanford issues; and (3) risk management techniques to ensure effective asset protection, site accessibility, and the flexibility to adapt to changing customer needs. This plan is divided into two parts: overview and SAS WBS (work breakdown structure) dictionary sheets. The overview is divided into vision and mission, goals and objectives, assumptions and priorities, milestones, and a summary. The SAS WBS dictionary sheets are divided into department overhead, general and administrative, sitewide support, Hanford patrol, traffic safety, and locksmith services

  12. Safeguards and Security FY 1996 Program Plan: WBS 6.6

    Energy Technology Data Exchange (ETDEWEB)

    Lee, F.D.

    1995-08-01

    The Safeguards and Security (SAS) Program is based upon integrity, competence and innovation in the protection of the public and Hanford resources through: (1) outstanding assistance, oversight, education, and counsel to their customers to ensure the protection of the public, site personnel, assets, and information; (2) value-added and cost-effective solutions to Hanford issues; and (3) risk management techniques to ensure effective asset protection, site accessibility, and the flexibility to adapt to changing customer needs. This plan is divided into two parts: overview and SAS WBS (work breakdown structure) dictionary sheets. The overview is divided into vision and mission, goals and objectives, assumptions and priorities, milestones, and a summary. The SAS WBS dictionary sheets are divided into department overhead, general and administrative, sitewide support, Hanford patrol, traffic safety, and locksmith services.

  13. Security plan for the energy sector

    International Nuclear Information System (INIS)

    Tapias Stahelin, Fernando

    1998-01-01

    The explosion of pipelines is so alone the tip of the iceberg of a violent situation that, for many, sinks the economic and social panorama of Colombia in an uncertainty difficult to clarify. Although it is certain that we have the elements to build a country with a floating economy and in development, it is also certain that our own war doesn't allow leaving but there. At the moment 3,2% of the Gross Domestic Product - GDP of the country is dedicated to the military expense, it calculates alarming if one keeps in mind that the average of Latin America is of 1.7% and the world average has lowered ostensibly in the last 10 years, passing from 5.1% to so single 2.7 investments. Of continuing this way, in the 2004 the projected inversion of the GDP of Colombia for military expense will overcome 5%. A conscientious analysis reveals the data of this situation that it affects all the contour of the national life. When we speak of violence in the country we should refer to all those factors and actors that destabilize the society and the legally established political institutions, creating it keels and fear in the whole population. In a same way, it becomes necessary to speak of the security and the national defense that should be guaranteed by the government instances. The security of a state of tranquility and well being; the defense, is an activity situation so that in the case that the security loses temper, it can return to the situation of initial security

  14. 14 CFR 152.113 - Application requirements: Airport planning.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Application requirements: Airport planning....113 Application requirements: Airport planning. (a) Application for Federal assistance. An eligible sponsor or planning agency that desires to obtain Federal aid for eligible airport master planning or...

  15. Using the safety/security interface to the security manager's advantage

    International Nuclear Information System (INIS)

    Stapleton, B.W.

    1993-01-01

    Two aspects of the safety/security interface are discussed: (1) the personal safety of nuclear security officers; and (2) how the security manager can effectively deal with the safety/security interface in solving today's requirements yet supporting the overall mission of the facility. The basis of this presentation is the result of interviews, document analyses, and observations. The conclusion is that proper planning and communication between the players involved in the security/safety interface can benefit the two programs and help achieve overall system integration, ultimately contributing to the bottom line. This is especially important in today's cost conscious environment

  16. Arizona TeleMedicine Network: Engineering Master Plan.

    Science.gov (United States)

    Atlantic Research Corp., Alexandria, VA.

    As the planning document for establishing a statewide health communications system initially servicing the Papago, San Carlos and White Mountain Apache, Navajo, and Hopi reservations, this document prescribes the communications services to be provided by the Arizona TeleMedicine Network. Specifications include: (1) communications services for each…

  17. Subseabed Disposal Program Plan. Volume II. FY80 budget and subtask work plans

    International Nuclear Information System (INIS)

    1980-01-01

    This volume of the Subseabed Disposal Program Plan presents a breakdown of the master program structure by major activity. Each activity is described and accompanied by a specific cost plan schedule and a milestone plan. The costs have been compiled in the Cost Plan Schedules attached to each Subtask Work Plan. The FY 1980 budget for the Subseabed Disposal Program is summarized at the second level of the Work Breakdown Structure. The milestone plans for FY 80 are presented. The milestones can be changed only with the concurrence of the Sandia Subseabed Program Manager

  18. Strategic Planning for Computer-Based Educational Technology.

    Science.gov (United States)

    Bozeman, William C.

    1984-01-01

    Offers educational practitioners direction for the development of a master plan for the implementation and application of computer-based educational technology by briefly examining computers in education, discussing organizational change from a theoretical perspective, and presenting an overview of the planning strategy known as the planning and…

  19. Securing SQL Server Protecting Your Database from Attackers

    CERN Document Server

    Cherry, Denny

    2012-01-01

    Written by Denny Cherry, a Microsoft MVP for the SQL Server product, a Microsoft Certified Master for SQL Server 2008, and one of the biggest names in SQL Server today, Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server database as well as how to protect your database from these attacks. In this book, you will learn how to properly secure your database from both internal and external threats using best practices and specific tricks the author uses in his role as an independent consultant while working on some of the largest

  20. Retail Tactical Planning: An Aligned Process?

    OpenAIRE

    Dreyer , Heidi; Dukovska-Popovska , Iskra; Kiil , Kasper; Kaipia , Riikka

    2016-01-01

    Part 9: Quality in Production Management; International audience; This paper addresses tactical planning in retailing through a case study approach in one grocery retailing company. The issues are how tactical planning is conducted and how the different plans are connected. The study complements earlier retail planning studies by showing the sequence of planning phases and by studying the fragmented plans as a process. The master category planning is important and sets borders for the other p...

  1. Hanford Site Development Plan

    International Nuclear Information System (INIS)

    Rinne, C.A.; Curry, R.H.; Hagan, J.W.; Seiler, S.W.; Sommer, D.J.; Yancey, E.F.

    1990-01-01

    The Hanford Site Development Plan (Site Development Plan) is intended to guide the short- and long-range development and use of the Hanford Site. All acquisition, development, and permanent facility use at the Hanford Site will conform to the approved plan. The Site Development Plan also serves as the base document for all subsequent studies that involve use of facilities at the Site. This revision is an update of a previous plan. The executive summary presents the highlights of the five major topics covered in the Site Development Plan: general site information, existing conditions, planning analysis, Master Plan, and Five-Year Plan. 56 refs., 67 figs., 31 tabs

  2. Hanford Site Development Plan

    Energy Technology Data Exchange (ETDEWEB)

    Rinne, C.A.; Curry, R.H.; Hagan, J.W.; Seiler, S.W.; Sommer, D.J. (Westinghouse Hanford Co., Richland, WA (USA)); Yancey, E.F. (Pacific Northwest Lab., Richland, WA (USA))

    1990-01-01

    The Hanford Site Development Plan (Site Development Plan) is intended to guide the short- and long-range development and use of the Hanford Site. All acquisition, development, and permanent facility use at the Hanford Site will conform to the approved plan. The Site Development Plan also serves as the base document for all subsequent studies that involve use of facilities at the Site. This revision is an update of a previous plan. The executive summary presents the highlights of the five major topics covered in the Site Development Plan: general site information, existing conditions, planning analysis, Master Plan, and Five-Year Plan. 56 refs., 67 figs., 31 tabs.

  3. School Security: Planning and Costs.

    Science.gov (United States)

    Hunter, Richard C.; Mazingo, Terri H.

    2003-01-01

    Describes efforts by two school districts to address the potential threats of shootings and other school disruptions: Baltimore City Public Schools in Maryland and Charlotte-Mecklenburg Public Schools in North Carolina. Also describes the growing costs of providing safety and security in elementary and secondary schools. (Contains 13 references.)…

  4. Soil Management Plan for the Oak Ridge Y-12 National Security Complex Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2005-03-02

    This Soil Management Plan applies to all activities conducted under the auspices of the National Nuclear Security Administration (NNSA) Oak Ridge Y-12 National Security Complex (Y-12) that involve soil disturbance and potential management of waste soil. The plan was prepared under the direction of the Y-12 Environmental Compliance Department of the Environment, Safety, and Health Division. Soil disturbances related to maintenance activities, utility and building construction projects, or demolition projects fall within the purview of the plan. This Soil Management Plan represents an integrated, visually oriented, planning and information resource tool for decision making involving excavation or disturbance of soil at Y-12. This Soil Management Plan addresses three primary elements. (1) Regulatory and programmatic requirements for management of soil based on the location of a soil disturbance project and/or the regulatory classification of any contaminants that may be present (Chap. 2). Five general regulatory or programmatic classifications of soil are recognized to be potentially present at Y-12; soil may fall under one or more these classifications: (a) Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) pursuant to the Oak Ridge Reservation (ORR) Federal Facilities Agreement; (b) Resource Conservation and Recovery Act (RCRA); (c) RCRA 3004(u) solid waste managements units pursuant to the RCRA Hazardous and Solid Waste Amendments Act of 1984 permit for the ORR; (d) Toxic Substances and Control Act-regulated soil containing polychlorinated biphenyls; and (e) Radiologically contaminated soil regulated under the Atomic Energy Act review process. (2) Information for project planners on current and future planned remedial actions (RAs), as prescribed by CERCLA decision documents (including the scope of the actions and remedial goals), land use controls implemented to support or maintain RAs, RCRA post-closure regulatory requirements for

  5. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  6. Risk Assessment Planning for Airborne Systems: An Information Assurance Failure Mode, Effects and Criticality Analysis Methodology

    Science.gov (United States)

    2012-06-01

    Visa Investigate Data Breach March 30, 2012 Visa and MasterCard are investigating whether a data security breach at one of the main companies that...30). MasterCard and Visa Investigate Data Breach . New York Times . Stamatis, D. (2003). Failure Mode Effect Analysis: FMEA from Theory to Execution

  7. Social Security Administration

    Science.gov (United States)

    ... Suze Orman on Why Creating an Account is Important Suze Orman explains how a my Social Security account can help you plan for your retirement ... for same-sex couples? Open Government at Social Security Explore the benefits you may be due Plain ... About Us Accessibility FOIA Open Government Glossary ...

  8. Mastering jQuery mobile

    CERN Document Server

    Lambert, Chip

    2015-01-01

    You've started down the path of jQuery Mobile, now begin mastering some of jQuery Mobile's higher level topics. Go beyond jQuery Mobile's documentation and master one of the hottest mobile technologies out there. Previous JavaScript and PHP experience can help you get the most out of this book.

  9. Fiscal 2000 survey report. Foundation building project for international energy use rationalization. Master plan preparation for rationalized energy use; 2000 nendo kokusai energy shiyo gorika kiso seibi jigyo chosa hokokusho. Goriteki energy shiyo no tame no master plan sakusei

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-03-01

    For energy conservation and environmental protection using technologies for effective consumption of energy and for preventing pollution due to energy consumption, master plans were studied and prepared on photovoltaic power generation, wind power generation, natural gas utilization, and so on, for the Xinjiang Uygur Zizhiqu, Gansu Province, and Guandong Province, respectively. Propositions addressing the Xinjiang Uygur Zizhiqu involved a decrease in dependence on coal, utilization of natural gas, introduction of coal-fired cogeneration systems, introduction of wind power up to the level equivalent to the supply reserve capability, energy conversion and new industry development using natural gas, promotion of electrification of local communities, and so on. Propositions addressing Gansu Province involved the hydroelectric power system as the core of power sources, decrease in dependence on coal, enhanced utilization of natural gas, energy conversion and new industry development utilizing natural gas, and so on. Propositions addressing Guangdong Province involved a decrease in dependence on coal and oil, enhanced utilization of natural gas, introduction of natural gas-fired combined cycle power generation into urban sectors, accelerated utilization of wind power generation on isolated islands, and so on. (NEDO)

  10. A Development Framework for Software Security in Nuclear Safety Systems: Integrating Secure Development and System Security Activities

    Energy Technology Data Exchange (ETDEWEB)

    Park, Jaekwan; Suh, Yongsuk [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-02-15

    The protection of nuclear safety software is essential in that a failure can result in significant economic loss and physical damage to the public. However, software security has often been ignored in nuclear safety software development. To enforce security considerations, nuclear regulator commission recently issued and revised the security regulations for nuclear computer-based systems. It is a great challenge for nuclear developers to comply with the security requirements. However, there is still no clear software development process regarding security activities. This paper proposes an integrated development process suitable for the secure development requirements and system security requirements described by various regulatory bodies. It provides a three-stage framework with eight security activities as the software development process. Detailed descriptions are useful for software developers and licensees to understand the regulatory requirements and to establish a detailed activity plan for software design and engineering.

  11. Sustainable Planning Approaches for Water Resources: Case Studies

    OpenAIRE

    Samuel, Asumadu-Sarkodie

    2017-01-01

    Lake Okeechobee, Florida Louisiana's Comprehensive Master Plan for a Sustainable Coast Restoration Planning Process for the Gulf Coast. This record was migrated from the OpenDepot repository service in June, 2017 before shutting down.

  12. Gene expression variations: potentialities of master regulator polymorphisms in colorectal cancer risk

    Czech Academy of Sciences Publication Activity Database

    Pardini, Barbara; Naccarati, Alessio; Vodička, Pavel (ed.); Kumar, R.

    2012-01-01

    Roč. 27, č. 2 (2012), s. 161-167 ISSN 0267-8357 R&D Projects: GA ČR GP305/09/P194; GA ČR GAP304/10/1286 Institutional research plan: CEZ:AV0Z50390512 Keywords : master regulators of transcrition * genome-wide association studies (GWAS) * colorectal cancer Subject RIV: EB - Genetics ; Molecular Biology Impact factor: 3.500, year: 2012

  13. 46 CFR 154.1816 - Cargo location plan.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Cargo location plan. 154.1816 Section 154.1816 Shipping... FOR SELF-PROPELLED VESSELS CARRYING BULK LIQUEFIED GASES Operations § 154.1816 Cargo location plan. The master shall ensure that: (a) A cargo location plan is prepared that gives: (1) The location and...

  14. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  15. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  16. Developing an interdisciplinary certificate program in transportation planning.

    Science.gov (United States)

    2010-09-01

    This project develops and implements a graduate certificate in transportation planning. Texas A&M : University (A&M) currently offers instruction in transportation through its Master of Urban Planning (MUP) : and Civil Engineering (CE) programs; howe...

  17. CAREER INTENTIONS OF INTERNATIONAL MASTER STUDENTS IN HOSPITALITY AND TOURISM MANAGEMENT

    OpenAIRE

    Li, Wenjun

    2014-01-01

    The purpose of this qualitative study was to investigate career intentions of international master's students in hospitality and tourism management (HTM) in the United States. Semi-structured interviews were conducted with a sample of 19 participants at two different U.S. institutions. Interview questions were designed to better understand students' career intentions upon graduation and the determinants behind the plans. Results indicated that student's career intention should include measure...

  18. Considerations to Enhance the Florida Domestic Security Strategic Plan

    Science.gov (United States)

    2011-03-01

    security strategies. vi THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. INTRODUCTION ...Thank you all. xvi THIS PAGE INTENTIONALLY LEFT BLANK 1 I. INTRODUCTION A. PROBLEM STATEMENT After the terrorist attacks of September 11, 2001...State Homeland Security Strategy (Nebraska Emergency Mangement Agency, 2009) • Vermont Homeland Security Strategy (Vermont Department of Public

  19. 77 FR 30558 - Records Schedules; Availability and Request for Comments

    Science.gov (United States)

    2012-05-23

    ... statistical reports pertaining to pre-existing condition plans and enrollment. 6. Department of Health and... security inspections of facilities and certifications of secure shipping materials for construction...). Master files, audit data, and documentation of an electronic information system used to track usage of...

  20. Information security management handbook

    CERN Document Server

    2002-01-01

    The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.The changes in the tech

  1. 49 CFR 1542.301 - Contingency plan.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Contingency plan. 1542.301 Section 1542.301..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Contingency Measures § 1542.301 Contingency plan. (a) Each airport operator required to have a security program under § 1542.103(a) and (b...

  2. On the precise connection between the GRW master equation and master equations for the description of decoherence

    Energy Technology Data Exchange (ETDEWEB)

    Vacchini, Bassano [Dipartimento di Fisica dell' Universita di Milano, Via Celoria 16, 20133 Milan (Italy); Istituto Nazionale di Fisica Nucleare, sezione di Milano, Via Celoria 16, 20133 Milan (Italy)

    2007-03-09

    We point out that the celebrated GRW master equation is invariant under translations, reflecting the homogeneity of space, thus providing a particular realization of a general class of translation-covariant Markovian master equations. Such master equations are typically used for the description of decoherence due to momentum transfers between the system and environment. Building on this analogy we show the exact relationship between the GRW master equation and decoherence master equations, further providing a collisional decoherence model formally equivalent to the GRW master equation. This allows for a direct comparison of order of magnitudes of relevant parameters. This formal analogy should not lead to confusion on the utterly different spirit of the two research fields, in particular it has to be stressed that the decoherence approach does not lead to a solution of the measurement problem. Building on this analogy however the feasibility of the extension of spontaneous localization models in order to avoid the infinite energy growth is discussed. Apart from a particular case considered in the paper, it appears that the amplification mechanism is generally spoiled by such modifications.

  3. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  4. Annual training manual for security training: Protective force

    Energy Technology Data Exchange (ETDEWEB)

    1990-10-01

    Westinghouse is committed to high quality training relevant to the need of the Protective Forces at the Waste Isolation Pilot Plant (WIPP). The training programs at WIPP are designed to qualify Security personnel to perform WIPP security missions in a professional and responsible manner. The program consists of basic as well as sustainment training, as further described in this plan. This plan documents the WIPP Security training program for security personnel for calendar year 1990. The programs detailed in this plan are designed to adequately train persons to ensure the uninterrupted continuity of Department of Energy (DOE)/Westinghouse operations. The Security Training Program consists of four basic elements. These elements are (1) basic level training; (2) on-the-job training; (3) refresher training; and (4) in-service training.

  5. Present condition and theme of the planning standards of parks and open space planning. Koen ryokuchi keikaku gijutsu hyojun no genjo to kadai

    Energy Technology Data Exchange (ETDEWEB)

    Takanashi, M. (Kanagawa Prefectural Government, Kanagawa (Japan))

    1992-08-06

    With the dramatic progress of urbanization, the rapid decrease of the green area and the open space, which is basis for ensuring the safety and the comfort of city life and formation of a good city environment, lead to the worsen of city environment. For the basic purpose of achieving the harmony between development and environment by considering the preservation of the green area and the open space, the green master plan is a representative example, and was made as the constitution of from a ground plan to the various plans such as region, city and nation based on the space unit of developing the human action. One of the important planning approach for the green area plan from conception to implementation is the planning standards of park and open space planning. This paper introduced the change of the system about the planning standards of park and open space planning, and explained necessarily the present state of greens master plan about preservation of the national environment and adjustment the park and open space. 1tab.

  6. A Security Checklist for ERP Implementations

    Science.gov (United States)

    Hughes, Joy R.; Beer, Robert

    2007-01-01

    The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…

  7. IAEA support for the establishment of nuclear security education

    International Nuclear Information System (INIS)

    Braunegger-Guelich, Andrea; Rukhlo, Vladimir

    2010-01-01

    The threat of nuclear terrorism has not diminished. In response to the concerns of States, an international nuclear security framework has emerged through the establishment of a number of legally binding and non-binding international instruments which obligates or commits States to carry out a number of actions to protect against nuclear terrorism. In this context, the need for human resource development programmes in nuclear security was underscored at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors' Meetings. In the pursuit of this need, the IAEA has developed - together with academics and nuclear security experts from Member States - a technical guidance entitled IAEA Nuclear Security Series No. 12 - Educational Programme in Nuclear Security that consists of a model Master of Science (M.Sc.) and a certificate programme in nuclear security. The paper sets out IAEA efforts to support the establishment of nuclear security at educational institutions, underlines particularly the objective and content of the IAEA Nuclear Security Series No. 12 and discusses the efforts made by the IAEA to establish a network among educational and research institutions, and other stakeholders to enhance global nuclear security by developing, sharing and promoting excellence in nuclear security education. (orig.)

  8. Master-slave micromanipulator method

    Energy Technology Data Exchange (ETDEWEB)

    Morimoto, A.K.; Kozlowski, D.M.; Charles, S.T.; Spalding, J.A.

    1999-12-14

    A method is disclosed based on precision X-Y stages that are stacked. Attached to arms projecting from each X-Y stage are a set of two axis gimbals. Attached to the gimbals is a rod, which provides motion along the axis of the rod and rotation around its axis. A dual-planar apparatus that provides six degrees of freedom of motion precise to within microns of motion. Precision linear stages along with precision linear motors, encoders, and controls provide a robotics system. The motors can be remotized by incorporating a set of bellows on the motors and can be connected through a computer controller that will allow one to be a master and the other one to be a slave. Position information from the master can be used to control the slave. Forces of interaction of the slave with its environment can be reflected back to the motor control of the master to provide a sense of force sensed by the slave. Forces import onto the master by the operator can be fed back into the control of the slave to reduce the forces required to move it.

  9. 7 CFR 331.11 - Security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 5 2010-01-01 2010-01-01 false Security. 331.11 Section 331.11 Agriculture..., DEPARTMENT OF AGRICULTURE POSSESSION, USE, AND TRANSFER OF SELECT AGENTS AND TOXINS § 331.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan...

  10. The IAEA Assistance Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard R [ORNL; Hawk, Mark B [ORNL; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  11. A Planning Guide for Instructional Networks, Part I.

    Science.gov (United States)

    Daly, Kevin F.

    1994-01-01

    Discusses three phases in implementing a master plan for a school-based local area network (LAN): (1) network software selection; (2) hardware selection, network topology, and site preparation; and (3) implementation time table. Sample planning and specification worksheets and a list of planning guides are included. (Contains six references.) (KRN)

  12. Contemporary security management

    CERN Document Server

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  13. From convolutionless generalized master to Pauli master equations

    International Nuclear Information System (INIS)

    Capek, V.

    1995-01-01

    The paper is a continuation of previous work within which it has been proved that time integrals of memory function (i.e. Markovian transfer rates from Pauli Master Equations, PME) in Time-Convolution Generalized Master Equations (TC-GME) for probabilities of finding a state of an asymmetric system interacting with a bath with a continuous spectrum are exactly zero, provided that no approximation is involved, irrespective of the usual finite-perturbation-order correspondence with the Golden Rule transition rates. In this paper, attention is paid to an alternative way of deriving the rigorous PME from the TCL-GME. Arguments are given in favor of the proposition that the long-time limit of coefficients in TCL-GME for the above probabilities, under the same assumption and presuming that this limit exists, is equal to zero. 11 refs

  14. EPOS IP - Data, Data Products, Services and Software (DDSS Master Table)

    Science.gov (United States)

    Michalek, Jan; Atakan, Kuvvet

    2017-04-01

    The "European Plate Observing System - Implementation Phase" (EPOS IP, 2014-2019) project is about building a pan-European infrastructure for accessing solid Earth science data. This ambitious plan started in 2002 already with a Conception Phase and continued by an EPOS PP (Preparatory Phase, 2010-2014) where about 20 partners joined the project. The current EPOS IP project includes 47 partners plus 6 associate partners from 25 countries from all over Europe and several international organizations (ORFEUS, EMSC, EUREF). However, the community contributing to the EPOS integration plan is larger than the official partnership of EPOS IP project, because more countries are represented by the international organizations and because within each country there are several research institutions involved. The list of Data, Data Products, Services and Software (DDSS) provided by individual institutions, consortia or organizations which will become part of the EPOS system are currently collected in document called DDSS Master Table. There are 10 work packages (WP8-WP17) creating the Thematic Core Services (TCS) always grouped by a specific topic: Seismology, Near Fault Observatories, GNSS Data and Products, Volcano Observations, Satellite Data, Geomagnetic Observations, Anthropogenic Hazards, Geological Information and Modelling, Multi-scale laboratories and Geo-Energy Test Beds for Low Carbon Energy. Each of this group declared a list of DDSS elements which are about to be implemented. Currently there are about 455 DDSS elements in the DDSS Master Table. These DDSS elements are of different maturity and about 122 are declared by TCS groups to be ready for implementation which means that the data are well described with metadata, following the standards specific for their domain and, in the best case, with some services allowing their access already. The DDSS elements differ by its complexity as well. The DDSS Master Table serves as an overview of the DDSS elements and

  15. The study of business opportunities and value add of NFC applications in security

    OpenAIRE

    Niemelä, Harri

    2011-01-01

    Niemelä, Harri 2011. The study of business opportunities and value add of NFC applications in security access control solutions. Master´s Thesis. Kemi-Tornio University of Applied Sciences. Business and Culture. Pages 59. Appendices 2. Since wireless technologies and electrical identification is already our everyday life, it is naturally to utilize latest technologies and in this case Near Field Communication technology to security access control purposes what we meet in our life at wo...

  16. BIOMETRIC SECURITY: ALTERNATIF PENGENDALIAN DALAM SISTEM INFORMASI AKUNTANSI TERKOMPUTERISASI

    Directory of Open Access Journals (Sweden)

    Josua Tarigan

    2004-01-01

    Full Text Available As organization search more secure authentication method for user access, biometric security technology is gaining more and more attention. The implementation of biometric security technology in accounting information systems was physical access, virtual access, e-commerce applications and covert suveillance. There are three phase when an organization implementation biometric technology: strategic planning and budgeting, developing a system reliability plan and documentation. The challenges will face when develop biometric technology as control in accounting information system are standardization, hybrid technology uses, life cycle management. Abstract in Bahasa Indonesia : Adanya keinginan setiap organisasi untuk mencari metode pengamanan authentication yang lebih untuk akses user, dijawab dengan adanya teknologi biometric security yang mendapat perhatian yang cukup besar bagi organisasi. Implementasi teknologi biometric security cukup luas dalam sistem informasi akuntansi yaitu sebagai pengendalian pada physical access, virtual access, e-commerce applications dan covert surveillance. Dalam mengimplementasikan teknologi biometric, ada tiga tahapan yang harus dilakukan organisasi, yakni strategic planning and budgeting, developing a system reliability plan dan documentation. Tantangan yang akan dihadapi dalam mengembangkan teknologi biometric sebagai pengendalian dalam sistem informasi akuntansi yakni standarisasi, aplikasi teknologi hybrid dan manajemen siklus hidup pada biometric security. Kata kunci: authentication, akses user dan biometric security.

  17. Put in value of the Santa Teresa Park as a cultural landscape. Project and Ordinance of the Landscape in the General Guidelines of its Master Plan

    Directory of Open Access Journals (Sweden)

    Nair Rosana Sommaruga Montiel

    2018-03-01

    Full Text Available The paper is a summary of the landscape studies developed in the framework of 'Lineamientos generales para el Plan Director del Parque Santa Teresa' (General guidelines for Santa Teresa Park Master Plan, agreement made between the Ministry of Tourism, and the Faculty of Architecture, Design And Urbanism of the University of the Republic between August 2015 and July 2016. The purpose of the Convention is to position the Santa Teresa Park as a "model park" for Uruguay, putting in value its patrimonial, landscape and Environmental characteristics, thus contributing to its tourism and sociocultural promotion. The entire project includes and combines different disciplinary studies as well as external contributions. The Research program “Landscape and Public Space” from the Institute of Design in collaboration with VIDIALAB develops the Characterization and Landscape Assessment of the Park, through studies and proposals on its landscape structures, sociocultural perceptions and the qualification of the visual landscape.

  18. An integrated approach to validation of safeguards and security program performance

    International Nuclear Information System (INIS)

    Altman, W.D.; Hunt, J.S.; Hockert, J.W.

    1988-01-01

    Department of Energy (DOE) requirements for safeguards and security programs are becoming increasingly performance oriented. Master Safeguards and Security Agreemtns specify performance levels for systems protecting DOE security interests. In order to measure and validate security system performance, Lawrence Livermore National Laboratory (LLNL) has developed cost effective validation tools and a comprehensive validation approach that synthesizes information gained from different activities such as force on force exercises, limited scope performance tests, equipment testing, vulnerability analyses, and computer modeling; into an overall assessment of the performance of the protection system. The analytic approach employs logic diagrams adapted from the fault and event trees used in probabilistic risk assessment. The synthesis of the results from the various validation activities is accomplished using a method developed by LLNL, based upon Bayes' theorem

  19. La "capacidad vial" del plan regulador chileno, ¿es lo suficientemente buena para dar forma a un entorno edificado sostenible?/ The "road capacity" of the chilean master plan is it good enough for shaping a sustainable built environment?

    Directory of Open Access Journals (Sweden)

    Cárdenas Jirón, Luz Alicia

    2000-03-01

    Full Text Available The "road capacity" of the Chilean Master Plan is a tool developed to measure the capacity of streets in terms of supporting the size of vehicle flow. This tool considers topics such as land use, population density and street width. The purpose of this technique is to incorporate it to the Master Plan, as a town planning instrument, so as to cope with traffic forecasting and congestion. However, the technique does not embrace any sustainability concept, this is due to a disregard of any district ´s social or environmental needs. Therefore a sustainable urban development would doubtfully be reached. It is argued that some other approaches are required for shaping a sustainable built environment in which it is understood that the streets are a public space for people rather than a platform for moving vehicles only. This means, to promote accessibility as well as mobility. In this paper the author reviews borrowed concepts such as "carrying capacity" and "environmental capacity" from bioregionalist and ecological disciplines using a case study in outskirts of Santiago´s metro area./La "capacidad vial" del Plan Regulador chileno es una herramienta desarrollada para medir la capacidad de las calles en términos de apoyar el tamaño del flujo de vehículos. Esta herramienta considera temas como el uso de la tierra, la densidad de población y ancho de la calle. El propósito de esta técnica es su incorporación al Plan Maestro, como un instrumento de planificación de la ciudad, con el fin de hacer frente a la previsión del tráfico y la congestión. Sin embargo, la técnica no incluye ningún concepto de sostenibilidad. Por lo tanto un desarrollo urbano sostenible dudosamente sería alcanzado. Se argumenta que algunos otros enfoques son necesarios para dar forma a un medio ambiente sostenible integrado, en el que se entiende que las calles son un espacio público para las personas en lugar de una plataforma para mover los vehículos solamente

  20. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  1. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  2. EVALUATION OF THE MASTER MARKETER NEWSLETTER

    OpenAIRE

    McCorkle, Dean A.; Waller, Mark L.; Amosson, Stephen H.; Smith, Jackie; Bevers, Stanley J.; Borchardt, Robert

    2001-01-01

    Several support programs have been developed to help support, reinforce, enhance, and improve the effectiveness of the educational experience of Master Marketer graduates and other marketing club participants. One of those products, the Master Marketer Newsletter, is currently mailed to over 700 Master Marketer graduates and Extension faculty on a quarterly basis. In the June 2000 newsletter, a questionnaire was sent to newsletter recipients asking them to evaluate the various sections of the...

  3. An LNS Approach for Container Stowage Multi-port Master Planning

    DEFF Research Database (Denmark)

    Pacino, Dario

    2013-01-01

    The generation of competitive stowage plans have become a priority for the shipping industry. Stowage planning is NP-hard and is a challenging optimization problem in practice. Two-phase decomposition approaches have proved to give viable solutions. We propose a large neighborhood search (LNS) to...

  4. Metodología para elaborar el Plan Maestro de Validación de los procesos de producción del Centro Nacional de Sanidad Agropecuaria Methodology to design the Master Plan of Validation of production processes of National Center of Agricultural Health

    Directory of Open Access Journals (Sweden)

    Nivian Montes de Oca

    2010-06-01

    Full Text Available La metodología para la elaboración del Plan Maestro de Validación de los procesos de producción del Centro Nacional de Sanidad Agropecuaria, se diseñó a partir de los requisitos contenidos en la Regulación 16 del 2006 de Buenas Prácticas de Fabricación de medicamentos. Abarcó la política de la organización para la actividad de validación su estructura organizativa, las instalaciones, sistemas, equipos y procesos que se deben validar; el formato de la documentación a utilizar; la planificación y calendario de cada actividad; los resultados de cada protocolo ejecutado, el control de los cambios que se generan; un resumen de las validaciones anteriores; cumplimiento del plan propuesto; las conclusiones donde se precisan de forma resumida si los procesos validados están bajo control, los resultados más relevantes, así como las acciones correctivas y preventivas a tomar; por último se define la distribución de toda la información generada, conformando así el Plan Maestro de Validación. Este sistema de validación se muestra a través de procedimientos, protocolos y registros aplicados en el proceso de fabricación de Surfacen®, medicamento para uso humano que se fabrica en el Centro Nacional de Sanidad Agropecuaria.The methodology to design the Validation Master Plan the production processes of National Center of Agricultural Health was created from the requirements present in the Regulation 16, 2006 of Good Practices of drugs manufacture including the organization policy for validation activity of its organizing structure, installations, systems, equipments and processes to be validated, documentation format used, planning and calendar of each activity; the results from each protocol performed, the generating changes control, abstract of prior validations, fulfillment of proposed plan, conclusions where are determined in a summarized way if the validated processes are under control, the more relevant results, as well as how

  5. Master-slave type manipulator

    International Nuclear Information System (INIS)

    Haaker, L.W.; Jelatis, D.G.

    1979-01-01

    Remote control manipulator of the master-slave type for carrying out work on the other side of a shield wall. This appliance allows a Y movement relative displacement, the function of which is to extend the range of the manipulator towards the front and also to facilitate its installation, the lateral rotation or inclination of the slave arm in relation to the master arm, and the Z movement extension through which the length of the slave arm is increased in comparison with that of the master arm. Devices have been developed which transform the linear movements into rotational movements to enable these movements to be transmitted through rotational seal fittings capable of ensuring the safety of the separation between the operator's environment and that in the work area. Particular improvements have been made to the handles, handle seals, pincer mechanisms, etc [fr

  6. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  7. 49 CFR 193.2715 - Training: security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Training: security. 193.2715 Section 193.2715...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2715 Training: security. (a) Personnel responsible for security at an LNG plant must be trained in accordance with a written plan of...

  8. Employing mobile media technologies as a participatory planning tool in the suburban housing estate

    DEFF Research Database (Denmark)

    Andersson, Lasse; Knudsen, Anne-Marie Sanvig

    2013-01-01

    an on-going process, informed by mobile citizen generated information loops (open-source), the aim was to move beyond the master plan as a detached expert-driven product and towards an instant master planning process. In order to explore this iterative take on the planning process the research team...... and consulting firm employed mobile media technologies as a tool for creating new forms of citizen engagement. Based on the lessons learned from the research and development project we conclude by looking at what mobile media technologies afforded this planning process and what these experiences might add...

  9. A way to the Photo Master Expert

    Science.gov (United States)

    Inagaki, Toshihiko

    After the author presided over the photographer's group for 15 years or more, the author met with the Photo Master certificate examination. And the author took the certificate examination, and was authorized as a Photo Master Expert in 2005. In this report, the outline how photographic technology has been mastered in order to adapt the photographer's group to the great change of photography from film to digital and how the contents of the activity of a photographer's group have changed is described. And the progress which took the Photo Master certificate examination as a good opportunity to prove the achievement level of those activities is described. And as a photographic activity after Photo Master Expert authorization, the shooting method of mural painting in the royal tomb of Amenophis III is described.

  10. A reactive decision-making approach to reduce instability in a Master Production Schedule

    OpenAIRE

    Herrera , Carlos; Belmokhtar Berraf , Sana; Thomas , André; Parada , Victor

    2016-01-01

    International audience; One of the primary factors that impact the master production scheduling performance is demand fluctuation, which leads to frequently updated decisions, thereby causing instability. Consequently, global cost deteriorates, and productivity decreases. A reactive approach based on parametric mixed-integer programming is proposed that aims to provide a set of plans such that a compromise between production cost and production stability is ensured. Several stability measures...

  11. Impulsive control of time-delay systems using delayed impulse and its application to impulsive master-slave synchronization

    International Nuclear Information System (INIS)

    Sun Jitao; Han Qinglong; Jiang Xiefu

    2008-01-01

    This Letter is concerned with impulsive control of a class of nonlinear time-delay systems. Some uniform stability criteria for the closed-loop time-delay system under delayed impulsive control are derived by using piecewise Lyapunov functions. Then the criteria are applied to impulsive master-slave synchronization of some secure communication systems with transmission delays and sample delays under delayed impulsive control. Two numerical examples are given to illustrate the effectiveness of the derived results

  12. Planning an energy-conserving policy for Taiwan based on international examples of success

    International Nuclear Information System (INIS)

    Lu, S.-M.; Huang, Y.-S.; Lu, J.-M.

    2008-01-01

    Taiwan lacks indigenous energy resources and imports 99% of its energy supply. This heavy energy-dependence represents a hidden threat for Taiwan's energy security and economic development. The most effective solution thus is to adopt an energy-conservation policy, similar to those successfully implemented in certain highly developed countries, such as the UK, the USA, Japan, and Germany. From the successful experiences of these countries, this study proposes a general mechanism of increasing energy efficiency by 2% annually, together with an executive master plan, followed by a scenario breakdown for energy-conserving policy in Taiwan. The feasibility of these proposals has been confirmed by the finding that their achievements in terms of energy saving and CO 2 emission reduction conform to the goals of the 'Taiwan National Energy Conference 2005'

  13. 78 FR 5116 - NASA Information Security Protection

    Science.gov (United States)

    2013-01-24

    ... 2700-AD61 NASA Information Security Protection AGENCY: National Aeronautics and Space Administration..., projects, plans, or protection services relating to the national security; or (h) The development... implement the provisions of Executive Order (E.O.) 13526, Classified National Security Information, and...

  14. The IAEA Assistance and Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Hawk, Mark B [ORNL; Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard [Transport Security and Safety, Oak Ridge; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  15. 49 CFR 659.29 - Oversight agency safety and security reviews.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Oversight agency safety and security reviews. 659... Role of the State Oversight Agency § 659.29 Oversight agency safety and security reviews. At least... safety program plan and system security plan. Alternatively, the on-site review may be conducted in an on...

  16. 21 CFR 314.420 - Drug master files.

    Science.gov (United States)

    2010-04-01

    ... the context of an application under part 312 or this part. A drug master file may contain information... incorporate by reference all or part of the contents of any drug master file in support of the submission if... information in a drug master file (except the list required under paragraph (d) of this section) is required...

  17. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  18. Virtual reality in the creation of a tool to support planning of physical security at nuclear facilities

    International Nuclear Information System (INIS)

    Santo, Andre Cotelli do E.; Mol, Antonio Carlos de A.; Goncalves, Deise Galvao de S.; Marins, Eugenio; Freitas, Victor Goncalves G.

    2013-01-01

    In recent years was observed the importance of improving the physical security of nuclear facilities, mainly due to the increasing advancement of brazilian nuclear program. The present work aims to develop a tool that allows the visualization and planning of action strategies in a virtual environment, in order to improve this security. To this end, was created a virtual model of the Instituto de Engenharia Nuclear (IEN), which is located on Ilha do Fundao - Rio de Janeiro - Brazil. This environment is a three-dimensional model, with representations close to reality, where virtual characters (avatars) can move and interact in real time. In this virtual world, it was developed a dynamic weather system, where is possible to change between day and night, and climate changes such as: rain, storms, snow, among other features. Furthermore, the tool has a surveillance system using virtual cameras, allowing the monitoring of the environment. This way, making possible to simulate strategies approach, allowing an evaluation of the procedures performed, as well as assisting in the training of security installations subject to radiation. (author)

  19. Virtual reality in the creation of a tool to support planning of physical security at nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Santo, Andre Cotelli do E.; Mol, Antonio Carlos de A.; Goncalves, Deise Galvao de S.; Marins, Eugenio; Freitas, Victor Goncalves G., E-mail: cotelli.andre@gmail.com, E-mail: mol@ien.gov.br, E-mail: deise.galvao@gmail.com, E-mail: eugenio@ien.gov.br, E-mail: vgoncalves@ien.gov.br [Instituto de Engenharia Nuclear (IEN/CNEN-RJ), Rio De Janeiro, RJ (Brazil)

    2013-07-01

    In recent years was observed the importance of improving the physical security of nuclear facilities, mainly due to the increasing advancement of brazilian nuclear program. The present work aims to develop a tool that allows the visualization and planning of action strategies in a virtual environment, in order to improve this security. To this end, was created a virtual model of the Instituto de Engenharia Nuclear (IEN), which is located on Ilha do Fundao - Rio de Janeiro - Brazil. This environment is a three-dimensional model, with representations close to reality, where virtual characters (avatars) can move and interact in real time. In this virtual world, it was developed a dynamic weather system, where is possible to change between day and night, and climate changes such as: rain, storms, snow, among other features. Furthermore, the tool has a surveillance system using virtual cameras, allowing the monitoring of the environment. This way, making possible to simulate strategies approach, allowing an evaluation of the procedures performed, as well as assisting in the training of security installations subject to radiation. (author)

  20. [Research in the Master's Degree program in Social Medicine].

    Science.gov (United States)

    Laurell, C; Mercer, H

    1981-01-01

    The authors report on research as part of the master's degree in social medicine at the Metropolitan Autonomous University, Xochimilco campus, Mexico. They discuss research within the curriculum design, instructional research, teaching staff and research, and research as a source of knowledge. They explain that in order to establish guidelines for research it is necessary to consider the health-disease process and medical practice within the economic and social framework and therefore subject to analysis by the social sciences. Finally, they summarize ongoing research in the fields of social epidemiology, medical practice and planning, and human resources.

  1. Hospital security: "protecting the business".

    Science.gov (United States)

    Maas, Jos

    2013-01-01

    Implementing management science into security isn't hard and is more necessary than ever according to the author who presents and illustrates a five point plan that he says will get the security job done easier and with more commitment from the Board.

  2. Staying Secure for School Safety

    Science.gov (United States)

    Youngkin, Minu

    2012-01-01

    Proper planning and preventive maintenance can increase school security and return on investment. Preventive maintenance begins with planning. Through careful planning, education institutions can determine what is working and if any equipment, hardware or software needs to be replaced or upgraded. When reviewing a school's safety and security…

  3. Securing VoIP keeping your VoIP network safe

    CERN Document Server

    (Bud) Bates, Regis J Jr

    2015-01-01

    Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent

  4. Nuclear security. Improving correction of security deficiencies at DOE's weapons facilities

    International Nuclear Information System (INIS)

    Wells, James E.; Cannon, Doris E.; Fenzel, William F.; Lightner, Kenneth E. Jr.; Curtis, Lois J.; DuBois, Julia A.; Brown, Gail W.; Trujillo, Charles S.; Tumler, Pamela K.

    1992-11-01

    The US nuclear weapons research, development, and production are conducted at 10 DOE nuclear weapons facilities by contractors under the guidance and oversight of 9 DOE field offices. Because these facilities house special nuclear materials used in making nuclear weapons and nuclear weapons components, DOE administers a security program to protect (1) against theft, sabotage, espionage, terrorism, or other risks to national security and (2) the safety and health of DOE employees and the public. DOE spends almost $1 billion a year on this security program. DOE administers the security program through periodic inspections that evaluate and monitor the effectiveness of facilities' safeguards and security. Security inspections identify deficiencies, instances of noncompliance with safeguards and security requirements or poor performance of the systems being evaluated, that must be corrected to maintain adequate security. The contractors and DOE share responsibility for correcting deficiencies. Contractors, in correcting deficiencies, must comply with several DOE orders. The contractors' performances were not adequate in conducting four of the eight procedures considered necessary in meeting DOE's deficiency correction requirements. For 19 of the 20 deficiency cases we reviewed, contractors could not demonstrate that they had conducted three critical deficiency analyses (root cause, risk assessment, and cost-benefit) required by DOE. Additionally, the contractors did not always adequately verify that corrective actions taken were appropriate, effective, and complete. The contractors performed the remaining four procedures (reviewing deficiencies for duplication, entering deficiencies into a data base, tracking the status of deficiencies, and preparing and implementing a corrective action plan) adequately in all 20 cases. DOE's oversight of the corrective action process could be improved in three areas. The computerized systems used to track the status of security

  5. Biometric Security: Alternatif Pengendalian Dalam Sistem Informasi Akuntansi Terkomputerisasi

    OpenAIRE

    Tarigan, Josua

    2004-01-01

    As organization search more secure authentication method for user access, biometric security technology is gaining more and more attention. The implementation of biometric security technology in accounting information systems was physical access, virtual access, e-commerce applications and covert suveillance. There are three phase when an organization implementation biometric technology: strategic planning and budgeting, developing a system reliability plan and documentation. The challenges w...

  6. BIOMETRIC SECURITY: ALTERNATIF PENGENDALIAN DALAM SISTEM INFORMASI AKUNTANSI TERKOMPUTERISASI

    OpenAIRE

    Josua Tarigan

    2004-01-01

    As organization search more secure authentication method for user access, biometric security technology is gaining more and more attention. The implementation of biometric security technology in accounting information systems was physical access, virtual access, e-commerce applications and covert suveillance. There are three phase when an organization implementation biometric technology: strategic planning and budgeting, developing a system reliability plan and documentation. The challenges w...

  7. Security-by-design handbook.

    Energy Technology Data Exchange (ETDEWEB)

    Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

    2013-01-01

    This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

  8. Phase 1 RCRA Facility Investigation/Corrective Measures Study Work Plan for Single-Shell Tank (SST) Waste Management Areas

    International Nuclear Information System (INIS)

    MCCARTHY, M.M.

    1999-01-01

    This document is the master work plan for the Resource Conservation and Recovery Act of 1976 (RCRA) Corrective Action Program (RCAP) for single-shell tank (SST) farms at the US. Department of Energy's (DOE'S) Hanford Site. The DOE Office of River Protection (ORP) initiated the RCAP to address the impacts of past and potential future tank waste releases to the environment. This work plan defines RCAP activities for the four SST waste management areas (WMAs) at which releases have contaminated groundwater. Recognizing the potential need for future RCAP activities beyond those specified in this master work plan, DOE has designated the currently planned activities as ''Phase 1.'' If a second phase of activities is needed for the WMAs addressed in Phase 1, or if releases are detected at other SST WMAs, this master work plan will be updated accordingly

  9. Will Pre-Funding Provide Security for Social Security? A Review of the Literature

    OpenAIRE

    Robert L. Brown

    2000-01-01

    President Clinton has proposed creating larger social security funds and investing a portion of them in the private sector. Others have suggested more radical reforms such as moving social security from a defined-benefit scheme to a defined contribution plan based on the Chilean model. These proposals are based on the goal of creating higher investment returns, which would make social security benefits easier to finance in the long run. After an extensive review of the literature, this paper ...

  10. Semantic Description of IoT Security for Smart Grid

    OpenAIRE

    Ayele, Getinet

    2017-01-01

    Master's thesis Information- and communication technology IKT590 - University of Agder 2017 This research work proposed, developed and evaluated IoT Security ontology for smart home energy management system (SHEMS) in smart grids. The ontology description includes infrastructure, attacks, vulnerabilities and counter measures for the main components of SHEMS such as Smart Meter, Smart Appliance, Home Gateway, and Billing data. The ontology extends the SAREF energy management ontology with s...

  11. The International Atomic Energy Agency Nuclear Security Education Strategies

    International Nuclear Information System (INIS)

    BRAUNEGGER-GUELICH, A.; RUKHLO, V.; GREGORIC, M.; COLGAN, P.

    2011-01-01

    The threat of nuclear terrorism has not diminished. In response to the concerns of States, an international nuclear security framework has emerged through the establishment of a number of legally binding and non-binding international instruments which obligates or commits States to carry out a number of actions to protect against nuclear terrorism. In this context, the need for human resource development programmes in nuclear security was underscored at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors' Meetings. In the pursuit of this need, the IAEA provides a comprehensive nuclear security training programme to States on a regular basis, and has developed a concept that seeks to effectively pass ownership of nuclear security knowledge and skills to States through the establishment of a Nuclear Security Support Centre. In addition, the IAEA has developed a technical guidance titled IAEA Nuclear Security Series No. 12 - Educational Programme in Nuclear Security that consists of a model of a Master of Science (M.Sc.) and assists educational institutions to provide nuclear security education. The article sets out IAEA efforts in the area of nuclear security training and education, including the assistance to States for establishing a Nuclear Security Support Centre. It underlines the objective and content of the IAEA Nuclear Security Series No. 12, discusses different concepts on how to establish nuclear security at universities and, emphasizes on the IAEA efforts to assist educational and research institutions, and other stake holders to enhance global nuclear security by developing, sharing and promoting excellence in nuclear security education. (author)

  12. Food Security Attainment Role of Urban Agriculture: A Case Study ...

    African Journals Online (AJOL)

    user

    The information indicated in Adama Master Plan (1995) reveals that the mean annual .... 'access' marks the ability of a household to get command over. '... enough supply of ..... practices, resource utilization and management of urban farming.

  13. Barriers Preventing Food Security in Israel, 2050

    Directory of Open Access Journals (Sweden)

    Yoav Gal

    2013-03-01

    Full Text Available The article highlights the benefits of adopting the practice of long-term planning with the aim of helping decision makers and politicians to include scenario thinking in the process of determining food security in Israel, 2050. This study addresses the question of food security, a step that is in contrast with agricultural planning considerations of the past that have mainly focused on maximizing profits or relied on a closed mathematical model. Two teams of experts identified production limitations affecting long-term planning and the ability to ensure food security under these conditions. It was found that there are five key factors important for the decision process: population, land, water, technology and international trade. The data show that today Israel imports a very large scale of virtual land and virtual water in terms of agricultural products. This means that the attention of the decision makers must be diverted from considerations of short-term profit to long-term food security.

  14. Master plan of Mizunami underground research laboratory

    International Nuclear Information System (INIS)

    1999-04-01

    In June 1994, the Atomic Energy Commission of Japan reformulated the Long-Term Programme for Research, Development and Utilisation of Nuclear Energy (LTP). The LTP (item 7, chapter 3) sets out the guidelines which apply to promoting scientific studies of the deep geological environment, with a view to providing a sound basis for research and development programmes for geological disposal projects. The Japan Nuclear Cycle Development Institute (JNC) has been conducting scientific studies of the deep geological environment as part of its Geoscientific Research Programme. The LTP also emphasised the importance of deep underground research facilities in the following terms: Deep underground research facilities play an important role in research relating to geological disposal. They allow the characteristics and features of the geological environment, which require to be considered in performance assessment of disposal systems, to be investigated in situ and the reliability of the models used for evaluating system performance to be developed and refined. They also provide opportunities for carrying out comprehensive research that will contribute to an improved overall understanding of Japan's deep geological environment. It is recommended that more than one facility should be constructed, considering the range of characteristics and features of Japan's geology and other relevant factors. It is important to plan underground research facilities on the basis of results obtained from research and development work already carried out, particularly the results of scientific studies of the deep geological environment. Such a plan for underground research facilities should be clearly separated from the development of an actual repository. JNC's Mizunami underground research laboratory (MIU) Project will be a deep underground research facility as foreseen by the above provisions of the LTP. (author)

  15. MASTER OF THE SHIP, MANAGER AND INSTRUCTOR

    Directory of Open Access Journals (Sweden)

    Florin IORDANOAIA

    2010-01-01

    Full Text Available The master of the ship is the person on the board who has the qualification and the necessary certificate of competency for running a maritime transport ship. He is the one who takes the ship into administration from the ship-owner, he is the only leader, the legal and direct chief of the entire crew, being invested with authority upon all the members of the crew. The master fulfils the attributes and displays his activity according to the legal laws of his flag, of the marine regulations and of the international conventions. In all the relationships which he establishes with physical or juridical people, the master represents the ship-owner, in a double condition, as an officer and as a commercial manager. In this paper, it is analysed the situation of the ship masters, the relationships which these masters have with the crew and the problems which appear during their voyage. At the end of the paper there are proposed measures to increase the quality of the training of the ship masters, to solve the situations connected with the members of the crew.

  16. 48 CFR 606.302-6 - National security.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information, regardless...

  17. Green stormwater infrastructure eco-planning and development on the regional scale: a case study of Shanghai Lingang New City, East China

    Science.gov (United States)

    Xu, Haishun; Chen, Liang; Zhao, Bing; Zhang, Qiuzhuo; Cai, Yongli

    2016-06-01

    Urban underlying surface has been greatly changed with rapid urbanization, considered to be one of the major causes for the destruction of urban natural hydrological processes. This has imposed a huge challenge for stormwater management in cities. There has been a shift from gray water management to green stormwater management thinking. The green stormwater infrastructure (GSI) is regarded as an effective and cost-efficient stormwater management eco-landscape approach. China's GSI practice and the development of its theoretical framework are still in the initial stage. This paper presents an innovative framework for stormwater management, integrating green stormwater infrastructure and landscape security patterns on a regional scale based on an urban master plan. The core concept of green stormwater infrastructure eco-planning is to form an interconnected GSI network (i.e., stormwater management landscape security pattern) which consists of the location, portion, size, layout, and structure of GSI so as to efficiently safeguard natural hydrological processes. Shanghai Lingang New City, a satellite new town of Shanghai, China was selected as a case study for GSI studies. Simulation analyses of hydrological processes were carried out to identify the critical significant landscape nodes in the highpriority watersheds for stormwater management. GSI should be planned and implemented in these identified landscape nodes. The comprehensive stormwater management landscape security pattern of Shanghai Lingang New City is designed with consideration of flood control, stormwater control, runoff reduction, water quality protection, and rainwater utilization objectives which could provide guidelines for smart growth and sustainable development of this city.

  18. Idea Notebook: Wilderness Food Planning in the Computer Age.

    Science.gov (United States)

    Drury, Jack K.

    1986-01-01

    Explains the use of a computer as a planning and teaching tool in wilderness trip food planning. Details use of master food list and spreadsheet software such as VisiCalc to provide shopping lists for food purchasing, cost analysis, and diet analysis. (NEC)

  19. Dual arm master controller for a bilateral servo-manipulator

    Science.gov (United States)

    Kuban, Daniel P.; Perkins, Gerald S.

    1989-01-01

    A master controller for a mechanically dissimilar bilateral slave servo-manipulator is disclosed. The master controller includes a plurality of drive trains comprising a plurality of sheave arrangements and cables for controlling upper and lower degrees of master movement. The cables and sheaves of the master controller are arranged to effect kinematic duplication of the slave servo-manipulator, despite mechanical differences therebetween. A method for kinematically matching a master controller to a slave servo-manipulator is also disclosed.

  20. Beyond grid security

    International Nuclear Information System (INIS)

    Hoeft, B; Epting, U; Koenig, T

    2008-01-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls

  1. ATC calculation with steady-state security constraints using Benders decomposition

    International Nuclear Information System (INIS)

    Shaaban, M.; Yan, Z.; Ni, Y.; Wu, F.; Li, W.; Liu, H.

    2003-01-01

    Available transfer capability (ATC) is an important indicator of the usable amount of transmission capacity accessible by assorted parties for commercial trading, ATC calculation is nontrivial when steady-state security constraints are included. In hie paper, Benders decomposition method is proposed to partition the AC problem with steady-state security constraints into a base case master problem and a series of subproblems relevant to various contingencies to include their impacts on ATC. The mathematical model is formulated and the two solution schemes are presented. Computer testing on the 4-bus system and IEEE 30-bus system shows the effectiveness of the proposed method and the solution schemes. (Author)

  2. Evaluation of Urban Planning Projects Criteria Using Fuzzy AHP Technique

    Directory of Open Access Journals (Sweden)

    Walid Mustafa Kamas

    2017-05-01

    Full Text Available In this research, Fuzzy Analytic Hierarchy Process technique is applied (Fuzzy AHP which is one of multi-criteria decision making techniques to evaluate the criteria for urban planning projects, the project of developing master plan of Al-Muqdadiyah city to 2035 has been chosen as a case study. The researcher prepared a list of criteria in addition to the authorized departments criteria and previous researches in order to choose optimized master plan according to these criteria. This research aims at employing the foundations of (Fuzzy AHP technique in evaluating urban planning criteria precisely and flexible. The results of the data analysis to the individuals of the sample who are specialists, in this aspect. The land use criteria are more important than the rest of the criteria in these projects, where it received the relative importance with percentile (42.1 %.

  3. Masterful care of the aging triathlete.

    Science.gov (United States)

    Wright, Vonda J

    2012-12-01

    Current endurance champions are turning in winning performances in their late 30s and 40s. These masters-age athletes present a special challenge to Sport Medicine practitioners who in previous decades have simply advised masters-aged athletes to stop competing to prevent or treat injury. The fact is, many of the physical changes commonly attributed to aging alone are actually due to the rages of sedentary aging. Recently a body of literature emerged which begins to define what we are capable of with chronic high-level exercise and guides masters-age athletes to train and rehab smarter to stay competitive. The factors influencing the relative declines in overall performance in the various sports include both physiological and lifestyle changes. The following review summarizes age and sex-related changes in triathlon performance, the biology of aging as it relates to endurance sport and factors that affect performance in the masters athletes.

  4. Cyber security in digitalized nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Sohn, Kwang Young; Yi, Woo June [KoRTS Co., Ltd., Daejeon (Korea, Republic of)

    2008-10-15

    This paper analyzer the cyber security issues pertaining to networks and general systems, and provides cyber security activity model. For this, the importance of security, and the domestic and international trends of cyber security are surveyed in order to introduce the strategies and countermeasures of cyber security which should be interfaced with Quality Assurance (QA) plan Based on the result of cyber security model introduced in this paper, activities for cyber security, work load, necessary resources and process for activities, and duration could be estimated hopefully.

  5. Cyber security in digitalized nuclear power plants

    International Nuclear Information System (INIS)

    Sohn, Kwang Young; Yi, Woo June

    2008-01-01

    This paper analyzer the cyber security issues pertaining to networks and general systems, and provides cyber security activity model. For this, the importance of security, and the domestic and international trends of cyber security are surveyed in order to introduce the strategies and countermeasures of cyber security which should be interfaced with Quality Assurance (QA) plan Based on the result of cyber security model introduced in this paper, activities for cyber security, work load, necessary resources and process for activities, and duration could be estimated hopefully

  6. Impacts of the Master Settlement Agreement on the tobacco industry.

    Science.gov (United States)

    Sloan, F A; Mathews, C A; Trogdon, J G

    2004-12-01

    To assess effects of the Master Settlement Agreement (MSA) and the four individual state settlements on tobacco company decisions and performance. 10-K reports filed with the US Securities and Exchange Commission, firm and daily data from the Center for Research in Security Prices, stock price indices, market share and advertising data, cigarette export and domestic consumption data, and newspaper articles were used to assess changes before (1990-98) and after (1999-2002) the MSA was implemented. Five major tobacco manufacturers in the USA. Stockholder returns, operating performance of defendant companies, exports, market share of the original participants in the MSA, and advertising/promotion expenditures. Returns to investments in the tobacco industry exceeded returns from investments in securities of other companies, using each of four indexes as comparators. Domestic tobacco revenues increased during 1999-2002 from pre-MSA levels. Profits from domestic sales rose from levels prevailing immediately before the MSA. There is no indication that the MSA caused an increase in tobacco exports. Total market share of the original participating manufacturers in the MSA decreased. Total advertising expenditures by the tobacco companies increased at a higher rate than the 1990-98 trend during 1999-2002, but total advertising expenditures net of spending on coupons and promotions decreased. The experience during the post-MSA period demonstrates that the MSA did no major harm to the companies. Some features of the MSA appear to have increased company value and profitability.

  7. Dual arm master controller for a bilateral servo-manipulator

    International Nuclear Information System (INIS)

    Kuban, D.P.; Perkins, G.S.

    1989-01-01

    A master controller for a mechanically dissimilar bilateral slave servo-manipulator is disclosed. The master controller includes a plurality of drive trains comprising a plurality of sheave arrangements and cables for controlling upper and lower degrees of master movement. The cables and sheaves of the master controller are arranged to effect kinematic duplication of the slave servo-manipulator, despite mechanical differences there between. A method for kinematically matching a master controller to a slave servo-manipulator is also disclosed. 13 figs

  8. The value of ancient architecture for educational program of masters of architectural space design

    Directory of Open Access Journals (Sweden)

    Prishchepa Aleksandr

    2017-01-01

    Full Text Available The existence of archaeological sites of ancient Greek colony-towns and medieval fortresses gives a real insight into the interaction of all spheres of human activity in ancient times. Ancient Greek Emporium is a vivid example of the architecture, art, archaeology and urban planning synthesis. Archaeological excavations provide an opportunity to study the artefacts of the ancient world belonging to several fields, such as sculpture, decorative arts, fashion design and household. Studying history of archaeology right on the place of excavation of an ancient city masters can imagine the scale of buildings, streets layout and location of business, administrative and residential buildings. It allows students to form professional way of thinking in a short period in order to gather the material and work on the master thesis.

  9. Implementing an Information Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Glantz, Clifford S.; Lenaeus, Joseph D.; Landine, Guy P.; O' Neil, Lori Ross; Leitch, Rosalyn; Johnson, Christopher; Lewis, John G.; Rodger, Robert M.

    2017-11-01

    The threats to information security have dramatically increased with the proliferation of information systems and the internet. Chemical, biological, radiological, nuclear, and explosives (CBRNe) facilities need to address these threats in order to protect themselves from the loss of intellectual property, theft of valuable or hazardous materials, and sabotage. Project 19 of the European Union CBRN Risk Mitigation Centres of Excellence Initiative is designed to help CBRN security managers, information technology/cybersecurity managers, and other decision-makers deal with these threats through the application of cost-effective information security programs. Project 19 has developed three guidance documents that are publically available to cover information security best practices, planning for an information security management system, and implementing security controls for information security.

  10. Phase 1 RCRA Facility Investigation & Corrective Measures Study Work Plan for Single Shell Tank (SST) Waste Management Areas

    Energy Technology Data Exchange (ETDEWEB)

    MCCARTHY, M.M.

    1999-08-01

    This document is the master work plan for the Resource Conservation and Recovery Act of 1976 (RCRA) Corrective Action Program (RCAP) for single-shell tank (SST) farms at the US. Department of Energy's (DOE'S) Hanford Site. The DOE Office of River Protection (ORP) initiated the RCAP to address the impacts of past and potential future tank waste releases to the environment. This work plan defines RCAP activities for the four SST waste management areas (WMAs) at which releases have contaminated groundwater. Recognizing the potential need for future RCAP activities beyond those specified in this master work plan, DOE has designated the currently planned activities as ''Phase 1.'' If a second phase of activities is needed for the WMAs addressed in Phase 1, or if releases are detected at other SST WMAs, this master work plan will be updated accordingly.

  11. FY 2015 - Stockpile Stewardship and Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2014-04-01

    This Department of Energy’s (DOE) National Nuclear Security Administration (NNSA) Fiscal Year Stockpile Stewardship and Management Plan (SSMP) is a key planning document for the nuclear security enterprise.

  12. FY 2016 - Stockpile Stewardship and Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2015-03-01

    This Department of Energy’s (DOE) National Nuclear Security Administration (NNSA) Fiscal Year Stockpile Stewardship and Management Plan (SSMP) is a key planning document for the nuclear security enterprise.

  13. Carbon dioxide emissions and the overshoot ratio change resulting from the implementation of 2nd Energy Master Plan in South Korea

    Science.gov (United States)

    Yeo, M. J.; Kim, Y. P.

    2015-12-01

    The direction of the energy policies of the country is important in the projection of environmental impacts of the country. The greenhouse gases (GHGs) emission of the energy sector in South Korea is very huge, about 600 MtCO2e in 2011. Also the carbon footprint due to the energy consumption contributes to the ecological footprint is also large, more than 60%. Based on the official plans (the national greenhouse gases emission reduction target for 2030 (GHG target for 2030) and the 2nd Energy Master Plan (2nd EMP)), several scenarios were proposed and the sensitivity of the GHG emission amount and 'overshoot ratio' which is the ratio of ecological footprint to biocapacity were estimated. It was found that to meet the GHG target for 2030 the ratio of non-emission energy for power generation should be over 71% which would be very difficult. We also found that the overshoot ratio would increase from 5.9 in 2009 to 7.6 in 2035. Thus, additional efforts are required to reduce the environmental burdens in addition to optimize the power mix configuration. One example is the conversion efficiency in power generation. If the conversion efficiency in power generation rises up 50% from the current level, 40%, the energy demand and resultant carbon dioxide emissions would decrease about 10%. Also the influence on the environment through changes in consumption behavior, for example, the diet choice is expected to be meaningful.

  14. Macro Security Methodology for Conducting Facility Security and Sustainability Assessments

    International Nuclear Information System (INIS)

    Herdes, Greg A.; Freier, Keith D.; Wright, Kyle A.

    2007-01-01

    Pacific Northwest National Laboratory (PNNL) has developed a macro security strategy that not only addresses traditional physical protection systems, but also focuses on sustainability as part of the security assessment and management process. This approach is designed to meet the needs of virtually any industry or environment requiring critical asset protection. PNNL has successfully demonstrated the utility of this macro security strategy through its support to the NNSA Office of Global Threat Reduction implementing security upgrades at international facilities possessing high activity radioactive sources that could be used in the assembly of a radiological dispersal device, commonly referred to as a 'dirty bomb'. Traditional vulnerability assessments provide a snap shot in time of the effectiveness of a physical protection system without significant consideration to the sustainability of the component elements that make up the system. This paper describes the approach and tools used to integrate technology, plans and procedures, training, and sustainability into a simple, quick, and easy-to-use security assessment and management tool.

  15. Unmanned Aerial Vehicles Master Plan, 1994. Master Plan.

    Science.gov (United States)

    1994-05-31

    Terminal SINCGARS = Single-Channel Ground and Airborne Radio System Figure 3-5 Maneuver Variant CONOPS I Psychological operations. deployment with early...650 KM DAT M 3 K (300 DESIRED) BEYOND FORWARD LINE OF OWN TROOPS (FLOT) APPROXIMATE RADIUS OF ACTION LEGEND ATARS = Advanced Tactical Air

  16. Security Force Assistance: Building Foreign Security Forces and Joint Doctrine for the Future of U.S. Regional Security

    National Research Council Canada - National Science Library

    Sullivan, Michael D

    2008-01-01

    .... From training the Nicaraguan National Guard to the most recent efforts in Iraq, the U.S. Military has repeatedly shown a need for a coherent and comprehensive plan to develop foreign security forces. U.S...

  17. Planning Public Transport

    DEFF Research Database (Denmark)

    Andersen, Jonas Lohmann Elkjær; Landex, Alex

    2009-01-01

    This good practice guide is composed for the master course 13120 Public Transport Planning held at the Department of Transport, Technical University of Denmark. It is intended to use as guide in the different planning aspects and assignments of the course. Since the course is about the planning...... of new public transport infrastructure this guide also focuses on the planning of new infrastructure. Furthermore, the new infrastructure in the course is expected to be a light rail and even though this guide aims at being general for public transport some of the issues evidently become more relevant...... will enable a capability for planning both bus and rail. The guide is build as a full sketch investigation of a new public transport project ranging chronological from project clarification to physical and timetable planning to traffic modeling and project appraisal. The same steps that are expected...

  18. Development of a strategic plan for food security and safety in the Inuvialuit Settlement Region, Canada.

    Science.gov (United States)

    Fillion, Myriam; Laird, Brian; Douglas, Vasiliki; Van Pelt, Linda; Archie, Diane; Chan, Hing Man

    2014-01-01

    Current social and environmental changes in the Arctic challenge the health and well-being of its residents. Developing evidence-informed adaptive measures in response to these changes is a priority for communities, governments and researchers. To develop strategic planning to promote food security and food safety in the Inuvialuit Settlement Region (ISR), Northwest Territories (NWT), Canada. A qualitative study using group discussions during a workshop. A regional workshop gathered Inuit organizations and community representatives, university-based researchers from the Inuit Health Survey (IHS) and NWT governmental organizations. Discussions were structured around the findings from the IHS. For each key area, programs and activities were identified and prioritized by group discussion and voting. The working group developed a vision for future research and intervention, which is to empower communities to promote health, well-being and environmental sustainability in the ISR. The group elaborated missions for the region that address the following issues: (a) capacity building within communities; (b) promotion of the use of traditional foods to address food security; (c) research to better understand the linkages between diseases and contaminants in traditional foods, market foods and lifestyle choices; (d) and promotion of affordable housing. Five programs to address each key area were developed as follows: harvest support and traditional food sharing; education and promotion; governance and policy; research; and housing. Concrete activities were identified to guide future research and intervention projects. The results of the planning workshop provide a blueprint for future research and intervention projects.

  19. Ensuring Sustainable Development through Urban Planning in Pakistan

    Directory of Open Access Journals (Sweden)

    Mohammad Qasim

    2013-04-01

    Full Text Available Urban planning includes land use management and environmental change. It makes arrangement for community facilities and services. Since, sustainable development has been included as a vital end product of all planning goals it also provides for balanced use of land, housing and transportation and better quality of life. Present urban planning in Pakistan is not ensuring sustainable development in Pakistan. This is tested through the case study of master planning in Rawalpindi and its implementation through housing schemes in Rawalpindi, Pakistan. Large portions of provisions of master plans are not implemented. This paper explains how the urban planning will be made enabled to ensure sustainable development in Pakistan. Six numbers of housing schemes and two squatter settlements have been surveyed through questionnaires, secondary data, the opinions of the experts from related fields and site observations. Amenities and social services at far distance, very less green area, Less quantity and bad quality of water, absence of comprehensive solid waste management and sewage disposal system and nontreatment of solid waste, effluent and sewage, prevalent unhygienic conditions and air and water pollution are the existing factors effecting the sustainability. There is a need to revisit the urban planning and a comprehensive Urban and Environment Planning Law at national level and at provincial level is recommended to enable the urban planning to ensure the sustainable development in Pakistan

  20. Security Sector Reform in Liberia: Progress and Challenges Ahead of the United Nations Mission in Liberia (UNMIL) Drawdown

    Science.gov (United States)

    2017-06-09

    this long and challenging process. Thank you and may God bless you all. vi TABLE OF CONTENTS Page MASTER OF MILITARY ART AND SCIENCE THESIS...of UN Staff, facilities and civilians, support for humanitarian and human rights assistance, and support for security reform.30 According to the most...security assistance. Human Rights Promotion and Protection. This mainly discusses the promotion, protection, and monitoring of human rights in Liberia. It

  1. A secure communication system using projective-lag and/or projective-anticipating synchronizations of coupled multidelay feedback systems

    International Nuclear Information System (INIS)

    Thang Manh Hoang; Nakagawa, Masahiro

    2008-01-01

    In this paper, a chaotic secure communication system is proposed by using the schemes of projective-lag and/or projective-anticipating synchronizations of coupled multidelay feedback systems and the modulation technique of synchronization-manifold shift keying. Further, the security of the proposed system is enhanced by using non-stationary dynamics in the master and/or non-stationary synchronization manifolds. The specific examples using modified Ikeda systems demonstrate and verify the effectiveness of the proposed system

  2. Charge Master: Friend or Foe?

    Science.gov (United States)

    Wan, Wenshuai; Itri, Jason

    2016-01-01

    Prices charged for imaging services can be found in the charge master, a catalog of retail list prices for medical goods and services. This article reviews the evolution of reimbursement in the United States and provides a balanced discussion of the factors that influence charge master prices. Reduced payments to hospitals have pressured hospitals to generate additional revenue by increasing charge master prices. An unfortunate consequence is that those least able to pay for health care, the uninsured, are subjected to the highest charges. Yet, differences in pricing also represent an opportunity for radiology practices, which provide imaging services that are larger in scope or superior in quality to promote product differentiation. Physicians, hospital executives, and policy makers need to work together to improve the existing reimbursement system to promote high-quality, low-cost imaging. Copyright © 2016 Mosby, Inc. All rights reserved.

  3. Social security for seafarers globally

    DEFF Research Database (Denmark)

    Jensen, Olaf; Canals, Luisa; Haarløv, Erik

    2013-01-01

    Social security for seafarers globally Background: Social security protection is one of the essential elements of decent work. The issue is complex and no previous epidemiological studies of the coverage among seafarers have yet been performed. Objectives: The aim was to overcome the gap...... of knowledge to promote the discussion and planning of the implementation of social security for all seafarers. Methods: The seafarers completed a short questionnaire concerning their knowledge about their social security status. Results: Significant disparities of coverage of social security were pointed out...... comes from poorer countries without substantial social security systems. The solutions suggested are to implement the minimum requirements as recommended by the ILO 2006 Convention, to survey the implementation and in the long term to struggle for global social equality. Key words: Social security...

  4. The Nuclear Security Science and Policy Institute at Texas A&M University

    Directory of Open Access Journals (Sweden)

    Claudio A. Gariazzo

    2015-07-01

    Full Text Available The Nuclear Security Science and Policy Institute (NSSPI is a multidisciplinary organization at Texas A&M University and was the first U.S. academic institution focused on technical graduate education, research, and service related to the safeguarding of nuclear materials and the reduction of nuclear threats. NSSPI employs science, engineering, and policy expertise to: (1 conduct research and development to help detect, prevent, and reverse nuclear and radiological proliferation and guard against nuclear terrorism; (2 educate the next generation of nuclear security and nuclear nonproliferation leaders; (3 analyze the interrelationships between policy and technology in the field of nuclear security; and (4 serve as a public resource for knowledge and skills to reduce nuclear threats. Since 2006, over 31 Doctoral and 73 Master degrees were awarded through NSSPI-sponsored research. Forty-one of those degrees are Master of Science in Nuclear Engineering with a specialization in Nuclear Nonproliferation and 16 were Doctorate of Philosophy degrees with a specific focus on nuclear nonproliferation. Over 200 students from both technical and policy backgrounds have taken classes provided by NSSPI at Texas A&M. The model for creating safeguards and security experts, which has in large part been replicated worldwide, was established at Texas A&M by NSSPI faculty and staff. In addition to conventional classroom lectures, NSSPI faculty have provided practical experiences; advised students on valuable research projects that have contributed substantially to the overall nuclear nonproliferation, safeguards and security arenas; and engaged several similar academic and research institutes around the world in activities and research for the benefit of Texas A&M students. NSSPI has had an enormous impact on the nuclear nonproliferation workforce (across the international community in the past 8 years, and this paper is an attempt to summarize the activities

  5. Dual arm master controller development

    Science.gov (United States)

    Kuban, D. P.; Perkins, G. S.

    1985-01-01

    The advanced servomanipulator (ASM) slave was designed with an anthropomorphic stance gear/torque tube power drives, and modular construction. These features resulted in increased inertia, friction, and backlash relative to tape driven manipulators. Studies were performed which addressed to human factor design and performance tradeoffs associated with the corresponding master controller best suited for the ASM. The results of these studies, as well as the conceptual design of the dual arm master controller, are presented.

  6. Planning for Success: Constructing a First Responder Planning Methodology for Homeland Security

    National Research Council Canada - National Science Library

    Jankowski, Thaddeus K., Sr

    2005-01-01

    .... This thesis argues that the fire service and others in the first responder community will be able to contribute to homeland security missions much more effectively, and efficiently, by switching...

  7. Improving Flood Management Planning in Thailand | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    According to World Bank estimates, this disaster caused US$46.5 billion in ... This project seeks to improve the Flood Management Master Plan, proposing ... New Dutch-Canadian funding for the Climate and Development Knowledge Network.

  8. The master degree: A critical transition in STEM doctoral education

    Science.gov (United States)

    Lange, Sheila Edwards

    The need to broaden participation in the nation's science, technology, engineering, and mathematics (STEM) undergraduate and graduate programs is currently a matter of national urgency. The small number of women and underrepresented minorities (URM) earning doctoral degrees in STEM is particularly troubling given significant increases in the number of students earning master's degrees since 1990. In the decade between 1990 and 2000, the total number of master's recipients increased by 42%. During this same time period, the number of women earning master's degrees increased by 56%, African Americans increased by 132%, American Indians by 101%, Hispanics by 146%, and Asian Americans by 117% (Syverson, 2003). Growth in underrepresented group education at the master's level raises questions about the relationship between master's and doctoral education. Secondary data analysis of the Survey of Earned Doctorates (SED) was used to examine institutional pathways to the doctorate in STEM disciplines and transitions from master's to doctoral programs by race and gender. While the study revealed no significant gender differences in pathways, compared to White and Asian American students, URM students take significantly different pathways to the doctorate. URM students are significantly more likely to earn the bachelor's, master's, and doctoral degrees at three different institutions. Their path is significantly more likely to include earning a master's degree en route to the doctorate. Further, URM students are more likely to experience transition between the master's and doctoral degrees, and the transitions are not limited to those who earn master's degrees at master's-only institutions. These findings suggest that earning a master's degree is more often a stepping stone to the doctorate for URM students. Master's degree programs, therefore, have the potential to be a valuable resource for policymakers and graduate programs seeking to increase the diversity of URM students

  9. Reliability constrained generation expansion planning with consideration of wind farms uncertainties in deregulated electricity market

    International Nuclear Information System (INIS)

    Hemmati, Reza; Hooshmand, Rahmat-Allah; Khodabakhshian, Amin

    2013-01-01

    Highlights: • Generation expansion planning is presented in deregulated electricity market. • Wind farm uncertainty is modeled in the problem. • The profit of each GENCO is maximized and also the safe operation of system is satisfied. • Salve sector is managed as an optimization programming and solved by using PSO technique. • Master sector is considered in pool market and Cournot model is used to simulate it. - Abstract: This paper addresses reliability constrained generation expansion planning (GEP) in the presence of wind farm uncertainty in deregulated electricity market. The proposed GEP aims at maximizing the expected profit of all generation companies (GENCOs), while considering security and reliability constraints such as reserve margin and loss of load expectation (LOLE). Wind farm uncertainty is also considered in the planning and GENCOs denote their planning in the presence of wind farm uncertainty. The uncertainty is modeled by probability distribution function (PDF) and Monte-Carlo simulation (MCS) is used to insert uncertainty into the problem. The proposed GEP is a constrained, nonlinear, mixed-integer optimization programming and solved by using particle swarm optimization (PSO) method. In this paper, Electricity market structure is modeled as a pool market. Simulation results verify the effectiveness and validity of the proposed planning for maximizing GENCOs profit in the presence of wind farms uncertainties in electricity market

  10. 49 CFR 659.27 - Internal safety and security reviews.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Internal safety and security reviews. 659.27... State Oversight Agency § 659.27 Internal safety and security reviews. (a) The oversight agency shall... safety and security reviews in its system safety program plan. (b) The internal safety and security...

  11. Understand the Big Picture So You Can Plan for Network Security

    Science.gov (United States)

    Cervone, Frank

    2005-01-01

    This article discusses network security for libraries. It indicates that there were only six exploit (security exposure) problems, worldwide, reported to the CERT Coordination Center back in 1988. In that year, the CERT had just been established to provide a clearinghouse for exchanging information about network security problems. By 2003, the…

  12. Computer and Network Security in Small Libraries: A Guide for Planning.

    Science.gov (United States)

    Williams, Robert L.

    This manual is intended to provide a free resource on essential network security concepts for non-technical managers of small libraries. Managers of other small nonprofit or community organizations will also benefit from it. An introduction defines network security; outlines three goals of network security; discusses why a library should be…

  13. Security and privacy in billing services in cloud computing

    OpenAIRE

    Μακρή, Ελένη - Λασκαρίνα

    2013-01-01

    The purpose of this master thesis is to define cloud computing and to introduce its basic principles. Firstly, the history of cloud computing will be briefly discussed, starting from the past and ending up to the current and future situation. Furthermore, the most important characteristics of cloud computing, such as security, privacy and cost, will be analyzed. Moreover the three service and three deployment models of cloud computing will be defined and analyzed with examples. Finally, the a...

  14. Savannah River Site environmental implementation plan

    International Nuclear Information System (INIS)

    1989-01-01

    Formal sitewide environmental planning at the Savannah River Site (SRS) began in 1986 with the development and adoption of the Strategic Environmental Plan. The Strategic Environmental Plan describes the philosophy, policy, and overall program direction of environmental programs for the operation of the SRS. The Strategic Environmental Plan provided the basis for development of the Environmental Implementation Plan (EIP). The EIP is the detailed, comprehensive environmental master plan for operating contractor organizations at the SRS. The EIP provides a process to ensure that all environmental requirements and obligations are being met by setting specific measurable goals and objectives and strategies for implementation. The plan is the basis for justification of site manpower and funding requests for environmental projects and programs over a five-year planning period

  15. Marketing plan for company X

    OpenAIRE

    Trishkina, Olga

    2014-01-01

    The aim of this master´s thesis is to make a structured marketing plan for company X, which provide tourism services in Finland. The thesis is done with qualitative method, which is the most suitable for marketing research, because it is mostly analyzing and description rather than statistical or numerical reports. In the theoretical part is studied secondary data of the topic, including research about marketing, marketing plan, customer relationship management, customers´ satisfaction a...

  16. Master in ICT and Learning

    DEFF Research Database (Denmark)

    Danielsen, Oluf

    2004-01-01

    The Master in ICT and Learning (MIL)was started in 2000, and it is owned in collaboration by five Danish universities. It is an accredited virtual part-time 2-year education. MIL is unique in that it builds on the pedagogical framework of project pedagogy and is based in virtual collaboration....... It is organized around ICT and Learning. This is illustrated through a presentation of the study program, the four modules, the projects and the master thesis....

  17. TMS320C31 master

    International Nuclear Information System (INIS)

    Yun, Deok Yong

    1999-06-01

    The contents of this book are explanation of basic conception for DSP, perfect a complete master of TMS320C31, I/O interface design and memory, practice with PC print port, basic programing skill, assembly and C programing technique, timer and interrupt application skill, serial communication programing technique, application of digital conditioning and application of digital servo control. This book is divided into two parts, which is about TMS320C31 master of theory and application.

  18. Ankara Historic City Centre Restoration Site Conservation Plan, its Characteristics, and Rationales for its Revocation

    Directory of Open Access Journals (Sweden)

    Mehmet Tuncer

    2013-12-01

    Full Text Available This is a comprehensive evaluation of the 1: 5000 Ankara Historic City Centre Restoration Site Conservation Master Development Plan and the 1: 1000 Conservation Implementation Plans, which have become a matter of litigation against the Ankara Metropolitan Municipality, filed by various non-governmental organizations, universities, the Union of Chambers of Turkish Architects and Engineers (TMMOB and public institutions; in terms of the environment, transportation and traffic as regards the entirety of the planned location, and the integrity of the plan, based on conservation-reclamation planning essentials and public interest. Thus the Ulus Ankara Historic City Centre Restoration Site Conservation Master Development and Implementation Plan and Plan Notes as ratified by the Ankara Metropolitan Municipality and Conservation Board, are examined in this context in terms of restoration site, protected site, conservation site, interaction and transition sites and historic and cultural properties.

  19. 7 CFR 764.355 - Security requirements.

    Science.gov (United States)

    2010-01-01

    ... through the use of marketing contracts, hedging, options, or other revenue protection mechanisms, and includes a marketing plan or similar risk management practice; (3) The applicant has had positive net cash... applicant has pledged as security for the loan all available personal and business security, except as...

  20. Barriers Preventing Food Security in Israel, 2050

    OpenAIRE

    Yoav Gal

    2013-01-01

    The article highlights the benefits of adopting the practice of long-term planning with the aim of helping decision makers and politicians to include scenario thinking in the process of determining food security in Israel, 2050. This study addresses the question of food security, a step that is in contrast with agricultural planning considerations of the past that have mainly focused on maximizing profits or relied on a closed mathematical model. Two teams of experts identified production lim...

  1. Barriers preventing food security in Israel, 2050:

    OpenAIRE

    Gal, Yoav; Hadas, Efrat

    2014-01-01

    The article highlights the benefits of adopting the practice of long-term planning with the aim of helping decision makers and politicians to include scenario thinking in the process of determining food security in Israel, 2050. This study addresses the question of food security, a step that is in contrast with agricultural planning considerations of the past that have mainly focused on maximizing profits or relied on a closed mathematical model. Two teams of experts identified production lim...

  2. FY 2014 - Stockpile and Stewardship and Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2013-06-01

    This Department of Energy’s (DOE) National Nuclear Security Administration (NNSA) Fiscal Year Stockpile Stewardship and Management Plan (SSMP) is a key planning document for the nuclear security enterprise.

  3. Securing the energy industry : perspectives in security risk management

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, G.L. [Anadarko Canada Corp., Calgary, AB (Canada)

    2003-07-01

    This presentation offered some perspectives in security risk management as it relates to the energy sector. Since the events of September 11, 2001 much attention has been given to terrorism and the business is reviewing protection strategies. The paper made reference to each of the following vulnerabilities in the energy sector: information technology, globalization, business restructuring, interdependencies, political/regulatory change, and physical/human factors. The vulnerability of information technology is that it can be subject to cyber and virus attacks. Dangers of globalization lie in privacy and information security, forced nationalization, organized crime, and anti-globalization efforts. It was noted that the Y2K phenomenon provided valuable lessons regarding interdependencies and the effects of power outages, water availability, transportation disruption, common utility corridor accidents, and compounding incidents. The paper also noted the conflict between the government's desire to have a resilient infrastructure that can withstand and recover from attacks versus a company's ability to afford this capability. The physical/human factors that need to be considered in risk management include crime, domestic terrorism, and disasters such as natural disasters, industrial disasters and crisis. The energy industry has geographically dispersed vulnerable systems. It has done a fair job of physical security and has good emergency management practices, but it was noted that the industry cannot protect against all threats. A strategy of vigilance and awareness is needed to deal with threats. Other strategies include contingency planning, physical security, employee communication, and emergency response plans. tabs., figs.

  4. 17 CFR 250.44 - Sales of securities and assets.

    Science.gov (United States)

    2010-04-01

    ... not require prior Commission approval. (c) Sales pursuant to order or plan under section 11. No... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Sales of securities and assets... Various Financial Transactions 2 § 250.44 Sales of securities and assets. (a) Sales of utility securities...

  5. Leadership Profiling of Ocean Going Ship Masters1

    Directory of Open Access Journals (Sweden)

    Ioannis Theotokas

    2014-12-01

    This paper focuses on the ocean going ship Masters and aims at identifying their leadership profiles and understanding their attitudes and reactions in given circumstances. It analyses and discusses the results of a field study of ship officers of different nationalities employed as Masters on board ships of a leading international maritime group. Results of the research reveal that the characteristics and the competencies of ship Masters as identified using the specially developed questionnaire, are compatible with those proposed by situational leadership theories. Ship Masters seem to give priority to the people on board and their needs and try to be supportive in their decisions.

  6. The joint European TEMPUS project 'Human Security (environment, quality of food, public health, and society) on territories contaminated by radioactive agents'

    International Nuclear Information System (INIS)

    Goncharova, N.; Butchenkow, I.; Maestri, E.

    2016-01-01

    Full text: The Joint European TEMPUS Project 'Human Security (environment, quality of food, public health, and society) on Territories Contaminated by Radioactive Agents', started in 2012. The EU project participants are the following: University of Cordoba (Spain) - Project Coordinator, University of Parma (Italy), University of Florence (Italy), Swedish University of Agricultural Sciences (Sweden) and Riga Technical University (Latvia). The project involves three partner countries - Belarus, Russia, Ukraine, represented by the following institutions: Belarusian State University, International Sakharov Environmental University, Grodno State Medical University, Grodno State Agrarian University, Voronezh State University, Tyumen State Medical Academy, Ural Federal University (Yekaterinburg), Chelyabinsk State University, Nuclear Cities Information-Education Centre, Vinnitsa National Medical University, Zhytomyr State Technological University, Kyiv International University, Sevastopol National University of Nuclear Energy and Industry, Polissya branch of G.M. Vysotsky Ukrainian Research Institute of Forestry and Forest Melioration. The main objectives of the project are: to develop interdisciplinary Master and Doctoral (PhD) programs in the field of Human Security of people living in areas affected by accidents at nuclear power plants / plant for processing nuclear fuel within the following specialties: Ecology and Environment Sciences - 'Human Security and Environment'; Food quality control - 'Human Security and Quality of Food'; Medicine - 'Human Security and Public Health'; Political and Social Sciences - 'Human Security and Society'. These programs will be implemented at 12 universities, 4 from each partner country. During the project implementation it is expected to achieve the following main results: modified interdisciplinary Master and Doctoral (PhD) programs taking into account the studied European experience and practice; joint system of upgrade of

  7. The Consolidated Human Activity Database — Master Version (CHAD-Master) Technical Memorandum

    Science.gov (United States)

    This technical memorandum contains information about the Consolidated Human Activity Database -- Master version, including CHAD contents, inventory of variables: Questionnaire files and Event files, CHAD codes, and references.

  8. 21 CFR 225.102 - Master record file and production records.

    Science.gov (United States)

    2010-04-01

    ... or production run of medicated feed to which it pertains. The Master Record File or card shall... 21 Food and Drugs 4 2010-04-01 2010-04-01 false Master record file and production records. 225.102....102 Master record file and production records. (a) The Master Record File provides the complete...

  9. A decision support system for corporations cyber security risk management

    OpenAIRE

    Molina, Gabriela del Rocio Roldan

    2017-01-01

    This thesis presents a decision aiding system named C3-SEC (Contex-aware Corporative Cyber Security), developed in the context of a master program at Polytechnic Institute of Leiria, Portugal. The research dimension and the corresponding software development process that followed are presented and validated with an application scenario and case study performed at Universidad de las Fuerzas Armadas ESPE – Ecuador. C3-SEC is a decision aiding software intended to support cyber ri...

  10. Dual arm master controller concept

    International Nuclear Information System (INIS)

    Kuban, D.P.; Perkins, G.S.

    1984-01-01

    The Advanced Servomanipulator (ASM) slave was designed with an anthropomorphic stance, gear/torque tube power drives, and modular construction. These features resulted in increased inertia, friction, and backlash relative to tape-driven manipulators. Studies were performed which addressed the human factors design and performance trade-offs associated with the corresponding master controller best suited for the ASM. The results of these studies, as well as the conceptual design of the dual arm master controller, are presented. 6 references, 3 figures

  11. Master-slave-manipulator 'EMSM I'

    International Nuclear Information System (INIS)

    Koehler, G.W.; Salaske, M.

    1976-01-01

    A master-slave manipulator with electric force transmission and reflection was developed for the first time in the German Federal Republic. The apparatus belongs to the class of 200 N carrying capacity. It is intended mainly for nuclear purposes and especially for use in large hot cells and also for medium and heavy manipulator vehicles. The most innovations compared with previously known foreign electric master-slave manipulators are two additional possibilities of movement and the electric dead weight compensation. (orig.) [de

  12. Master-slave-manipulator EMSM I

    International Nuclear Information System (INIS)

    Koehler, G.W.; Salaske, M.

    1976-01-01

    A master-slave manipulator with electric force transmission and reflection was developed for the first time in the German Federal Republic. The aparatus belongs to the class of 200 N carrying capacity. It is intended mainly for nuclear purposes and especially for use in large hot cells and also for medium and heavy manipulator vehicles. The most obvious innovations compared with previously known foreign electric master-slave manipulators are two additional possibilities of movement and the electric dead weightcompensation. (orig.) [de

  13. 48 CFR 217.7103 - Master agreements and job orders.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Master agreements and job... SYSTEM, DEPARTMENT OF DEFENSE CONTRACTING METHODS AND CONTRACT TYPES SPECIAL CONTRACTING METHODS Master Agreement for Repair and Alteration of Vessels 217.7103 Master agreements and job orders. ...

  14. Acronym master list

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-06-01

    This document is a master list of acronyms and other abbreviations that are used by or could be useful to, the personnel at Los Alamos National Laboratory. Many specialized and well-known abbreviations are not included in this list.

  15. IAEA Nuclear Security Human Resource Development Program

    International Nuclear Information System (INIS)

    Braunegger-Guelich, A.

    2009-01-01

    The IAEA is at the forefront of international efforts to strengthen the world's nuclear security framework. The current Nuclear Security Plan for 2006-2009 was approved by the IAEA Board of Governors in September 2005. This Plan has three main points of focus: needs assessment, prevention, detection and response. Its overall objective is to achieve improved worldwide security of nuclear and other radioactive material in use, storage and transport, and of their associated facilities. This will be achieved, in particular, through the provision of guidelines and recommendations, human resource development, nuclear security advisory services and assistance for the implementation of the framework in States, upon request. The presentation provides an overview of the IAEA nuclear security human resource development program that is divided into two parts: training and education. Whereas the training program focuses on filling gaps between the actual performance of personnel working in the area of nuclear security and the required competencies and skills needed to meet the international requirements and recommendations described in UN and IAEA documents relating to nuclear security, the Educational Program in Nuclear Security aims at developing nuclear security experts and specialists, at fostering a nuclear security culture and at establishing in this way sustainable knowledge in this field within a State. The presentation also elaborates on the nuclear security computer based learning component and provides insights into the use of human resource development as a tool in achieving the IAEA's long term goal of improving sustainable nuclear security in States. (author)

  16. 78 FR 10211 - Agency Information Collection Activities; Submission for OMB Review; Comment Request; Securities...

    Science.gov (United States)

    2013-02-13

    ... for OMB Review; Comment Request; Securities Lending by Employee Benefit Plans ACTION: Notice. SUMMARY: The Department of Labor (DOL) is submitting the Employee Benefits Security Administration (EBSA) sponsored information collection request (ICR) titled, ``Securities Lending by Employee Benefit Plans,'' to...

  17. Master in nuclear engineering from the UPC (Master UPC-ENDESA)

    International Nuclear Information System (INIS)

    Batet, L.; Duch, M. A.; Calvino, F.; Val, L. del; Fernandez-Olano, P.

    2011-01-01

    The new Masters in Nuclear Engineering offers the UPC is the result of the confluence of wills and synergies between different units of the Universitat Politecnica de Catalunya (UPC) and Endesa. The paper describes the objectives of the proposal along with the program and the learning methodology.

  18. Development of a strategic plan for food security and safety in the Inuvialuit Settlement Region, Canada

    Directory of Open Access Journals (Sweden)

    Myriam Fillion

    2014-08-01

    Full Text Available Background: Current social and environmental changes in the Arctic challenge the health and well-being of its residents. Developing evidence-informed adaptive measures in response to these changes is a priority for communities, governments and researchers. Objectives: To develop strategic planning to promote food security and food safety in the Inuvialuit Settlement Region (ISR, Northwest Territories (NWT, Canada. Design: A qualitative study using group discussions during a workshop. Methods: A regional workshop gathered Inuit organizations and community representatives, university-based researchers from the Inuit Health Survey (IHS and NWT governmental organizations. Discussions were structured around the findings from the IHS. For each key area, programs and activities were identified and prioritized by group discussion and voting. Results: The working group developed a vision for future research and intervention, which is to empower communities to promote health, well-being and environmental sustainability in the ISR. The group elaborated missions for the region that address the following issues: (a capacity building within communities; (b promotion of the use of traditional foods to address food security; (c research to better understand the linkages between diseases and contaminants in traditional foods, market foods and lifestyle choices; (d and promotion of affordable housing. Five programs to address each key area were developed as follows: harvest support and traditional food sharing; education and promotion; governance and policy; research; and housing. Concrete activities were identified to guide future research and intervention projects. Conclusions: The results of the planning workshop provide a blueprint for future research and intervention projects.

  19. Prospects and Challenges in the Deliverance of Executive Masters ...

    African Journals Online (AJOL)

    In the recent decade Executive Masters degree programmes have become very popular deliverance in the Tanzanian higher learning institutions. ... Using The Open University of Tanzania as a case study, this article will focus on two programmes, namely; Executive Masters in Business Administration (EMBA) and Masters ...

  20. Collaborative planning of operations in industrial symbiosis

    DEFF Research Database (Denmark)

    Herczeg, Gabor; Akkerman, Renzo

    2014-01-01

    Industrial symbiosis (IS) is cooperation between companies to achieve collective benefits by supplying and reusing industrial waste to substitute virgin resources in production. In this paper, we investigate the IS phenomenon from a supply chain management perspective. We propose a collaborative...... planning model to coordinate master planning of operations of waste suppliers and buyers. Furthermore, we analyze planning decisions related to IS when waste exchange is combined with virgin resource procurement. We demonstrate that conditions of virgin resource procurement affect the economic feasibility...

  1. HITACHI security concept for industrial control systems

    International Nuclear Information System (INIS)

    Endoh, H.; Yamada, T.; Okubo, S.; Nakano, T.

    2012-01-01

    Security is a necessary factor for the safe and efficient operation of today's control systems. To ensure safe operation of control systems throughout their lifetime, security measures must be carefully planned in the development phase and then maintained continuously during the operation phase and other following phases. To ensure operation within the system's safe states, Hitachi proposes security concept processes (1) to derive security measures rationally and (2) to maintain the security model over the system life cycle. Hitachi also proposes security development programs which support the integration of standards-compliant systems and development of robust control equipment. (author)

  2. Master's and doctoral theses in family medicine and their publication output, Suez Canal University, Egypt.

    Science.gov (United States)

    Nour-Eldein, Hebatallah; Mansour, Nadia M; Abdulmajeed, Abdulmajeed A

    2015-01-01

    The completion of a thesis is a significant requirement for both a Master's and a doctorate degree in general practice/family medicine (GP/FM). A postgraduate thesis is a well-planned, time-intensive activity carried out over several years. The quality of the theses can be judged by the proportion of published papers. This study aimed to describe Master's and doctoral theses in family medicine and their publications between 1982 and 2014. GP/FM degree theses were reviewed at the Faculty of Medicine and central Suez Canal libraries. Several characteristics were extracted from each thesis relating to the main researcher, supervisors, themes, and study methods according to predefined criteria. Publications from the theses were described. Over 33 years, 208 theses were completed by 173 GP/FM researchers. The majority of the theses were for Master's degrees (84.1%). Regarding the study design, most of the degree theses were cross-sectional studies (76.9%). The adult population was targeted in 33.7% of research theses. Nonprobability sampling was used in 51%. Rural communities were the setting of research in 43.8%, and primary health center (PHC)-based studies in 59.1%. The "Patient" category exceeded the other categories (28.4%). Publication from theses started in the second decade of research production. Of the degree theses, 21.6% original articles were published. Only 13.3% of articles from theses were published in PubMed-indexed journals. The researcher was first author in 62.2% of published articles. The production of GP/FM theses and their publications are going to increase. Continuous assessment and planning for GP/FM studies are recommended.

  3. Russian Federation’s plans to deploy nuclear weapons in Crimea: the possible consequences for Ukraine and European security

    Directory of Open Access Journals (Sweden)

    O. S. Vonsovych

    2016-06-01

    Full Text Available The article investigates the possible consequences for Ukraine and European security in case of deploying by Russian Federation nuclear weapons in Crimea. It was determined that under current conditions of confrontation between Ukraine and Russia such actions could further complicate the process of resolving the situation in the east of our country and threaten the implementation of peace initiatives regarding the resumption of constructive dialogue. It was found that the reluctance to disclose or hide the real intentions of Russia produces around Ukraine’s borders space of uncertainty and danger. This directly threatens the national security of our state and continue to make use of the power factor in relations with the Russian Federation. It is proved that Ukraine needs to do more emphasis on their own national identity and opportunities to prove its independence with regard to solving such questions. Substantiated the thesis that the European community should now take the necessary measures to prevent the development of the Russian Federation’s plans regarding the deployment of nuclear weapons in Crimea. This will give the opportunity to avoid misunderstandings and create a ground to prevent the destabilization of the European security system.

  4. Energy audit and energy security

    Directory of Open Access Journals (Sweden)

    Beata Agnieszka Kulessa

    2013-07-01

    Full Text Available In article, we present the issue of energy security. This article to answer the questions concerning the future of energy in Poland. These activities are directly related to energy security and the reduction of CO2 emissions. One element of this plan is the introduction in the EU energy certification of buildings. The energy certificates in Poland launched on 01.01.2009 and implements the objectives adopted by the European Union and contribute to energy security, increasing energy efficiency in construction and environmental protection.

  5. Master Console System Monitoring and Control Development

    Science.gov (United States)

    Brooks, Russell A.

    2013-01-01

    The Master Console internship during the spring of 2013 involved the development of firing room displays at the John F. Kennedy Space Center (KSC). This position was with the Master Console Product Group (MCPG) on the Launch Control System (LCS) project. This project is responsible for the System Monitoring and Control (SMC) and Record and Retrieval (R&R) of launch operations data. The Master Console is responsible for: loading the correct software into each of the remaining consoles in the firing room, connecting the proper data paths to and from the launch vehicle and all ground support equipment, and initializing the entire firing room system to begin processing. During my internship, I developed a system health and status display for use by Master Console Operators (MCO) to monitor and verify the integrity of the servers, gateways, network switches, and firewalls used in the firing room.

  6. Transport accident emergency response plan

    International Nuclear Information System (INIS)

    Vallette-Fontaine, M.; Frantz, P.

    1998-01-01

    To comply with the IAEA recommendations for the implementation of an Emergency Response Plan as described in Safety Series 87, Transnucleaire, a company deeply involved in the road and rail transports of the fuel cycle, masters means of Emergency Response in the event of a transport accident. This paper aims at analyzing the solutions adopted for the implementation of an Emergency Response Plan and the development of a technical support and adapted means for the recovery of heavy packagings. (authors)

  7. Mastering Ninject for dependency injection

    CERN Document Server

    Baharestani, Daniel

    2013-01-01

    Mastering Ninject for Dependency Injection teaches you the most powerful concepts of Ninject in a simple and easy-to-understand format using lots of practical examples, diagrams, and illustrations.Mastering Ninject for Dependency Injection is aimed at software developers and architects who wish to create maintainable, extensible, testable, and loosely coupled applications. Since Ninject targets the .NET platform, this book is not suitable for software developers of other platforms. Being familiar with design patterns such as singleton or factory would be beneficial, but no knowledge of depende

  8. Enhanced Master Controller Unit Tester

    Science.gov (United States)

    Benson, Patricia; Johnson, Yvette; Johnson, Brian; Williams, Philip; Burton, Geoffrey; McCoy, Anthony

    2007-01-01

    The Enhanced Master Controller Unit Tester (EMUT) software is a tool for development and testing of software for a master controller (MC) flight computer. The primary function of the EMUT software is to simulate interfaces between the MC computer and external analog and digital circuitry (including other computers) in a rack of equipment to be used in scientific experiments. The simulations span the range of nominal, off-nominal, and erroneous operational conditions, enabling the testing of MC software before all the equipment becomes available.

  9. Safeguard Measures for Implementation of New Round of Land Consolidation Planning

    Institute of Scientific and Technical Information of China (English)

    LI Chen; LIU Xin-feng; PENG Zhe; SI Tao

    2012-01-01

    We conduct a comprehensive analysis of the current situation of security system for implementation of China’s land consolidation planning. The prominent problems in the process of implementing safeguard measures for planning are summarized as follows: the guiding ideology for planning formulation is imperfect; the legal basis is weak, and administrative means are not sound; the economic security mechanism is not brought into full play, and the social security measures still need to be further deepened; the technical safeguard measures are short. From laws and regulations, administrative management, economic security, social supervision, technology management and other aspects, we establish the scientific security system for implementation of land consolidation planning; put forth the recommendations for guaranteeing the implementation of planning in China.

  10. Security Transition Program Office 1994 fiscal year work plan WBS 6.11

    International Nuclear Information System (INIS)

    Brogdon, R.C. Jr.

    1993-10-01

    The Security Transition Program Office (STPO) will change the Hanford Safeguards and Security Protection Program from one that supported the national defense program to one that supports environmental restoration and waste management. A Successful Safeguards and Security Protection Program transition will have an industrial security foundation supplemented to protect material interests and information resources. The transition will change the current approaches to protection philosophy to ones that will provide the Hanford Site with the following: consolidation, reduction, and elimination of safeguards and security interests and targets; greater open Site access; maximum application of technology and automation; interpretation of security policies and procedures in light of the Hanford Site's environmental mission; coexistence with other emergency services; streamlined operations; and protection of employees and the public from health, safety, fire, security, and safeguards risks. This report describes the 1994 program objectives, the technical base, schedule baseline, cost, funding, manpower, and the 1993 program workscope

  11. Quantum trajectories for time-dependent adiabatic master equations

    Science.gov (United States)

    Yip, Ka Wa; Albash, Tameem; Lidar, Daniel A.

    2018-02-01

    We describe a quantum trajectories technique for the unraveling of the quantum adiabatic master equation in Lindblad form. By evolving a complex state vector of dimension N instead of a complex density matrix of dimension N2, simulations of larger system sizes become feasible. The cost of running many trajectories, which is required to recover the master equation evolution, can be minimized by running the trajectories in parallel, making this method suitable for high performance computing clusters. In general, the trajectories method can provide up to a factor N advantage over directly solving the master equation. In special cases where only the expectation values of certain observables are desired, an advantage of up to a factor N2 is possible. We test the method by demonstrating agreement with direct solution of the quantum adiabatic master equation for 8-qubit quantum annealing examples. We also apply the quantum trajectories method to a 16-qubit example originally introduced to demonstrate the role of tunneling in quantum annealing, which is significantly more time consuming to solve directly using the master equation. The quantum trajectories method provides insight into individual quantum jump trajectories and their statistics, thus shedding light on open system quantum adiabatic evolution beyond the master equation.

  12. New Design for Rapid Prototyping of Digital Master Casts for Multiple Dental Implant Restorations.

    Directory of Open Access Journals (Sweden)

    Luis Romero

    Full Text Available This study proposes the replacement of all the physical devices used in the manufacturing of conventional prostheses through the use of digital tools, such as 3D scanners, CAD design software, 3D implants files, rapid prototyping machines or reverse engineering software, in order to develop laboratory work models from which to finish coatings for dental prostheses. Different types of dental prosthetic structures are used, which were adjusted by a non-rotatory threaded fixing system.From a digital process, the relative positions of dental implants, soft tissue and adjacent teeth of edentulous or partially edentulous patients has been captured, and a maser working model which accurately replicates data relating to the patients oral cavity has been through treatment of three-dimensional digital data.Compared with the conventional master cast, the results show a significant cost savings in attachments, as well as an increase in the quality of reproduction and accuracy of the master cast, with the consequent reduction in the number of patient consultation visits. The combination of software and hardware three-dimensional tools allows the optimization of the planning of dental implant-supported rehabilitations protocol, improving the predictability of clinical treatments and the production cost savings of master casts for restorations upon implants.

  13. New Design for Rapid Prototyping of Digital Master Casts for Multiple Dental Implant Restorations.

    Science.gov (United States)

    Romero, Luis; Jiménez, Mariano; Espinosa, María Del Mar; Domínguez, Manuel

    2015-01-01

    This study proposes the replacement of all the physical devices used in the manufacturing of conventional prostheses through the use of digital tools, such as 3D scanners, CAD design software, 3D implants files, rapid prototyping machines or reverse engineering software, in order to develop laboratory work models from which to finish coatings for dental prostheses. Different types of dental prosthetic structures are used, which were adjusted by a non-rotatory threaded fixing system. From a digital process, the relative positions of dental implants, soft tissue and adjacent teeth of edentulous or partially edentulous patients has been captured, and a maser working model which accurately replicates data relating to the patients oral cavity has been through treatment of three-dimensional digital data. Compared with the conventional master cast, the results show a significant cost savings in attachments, as well as an increase in the quality of reproduction and accuracy of the master cast, with the consequent reduction in the number of patient consultation visits. The combination of software and hardware three-dimensional tools allows the optimization of the planning of dental implant-supported rehabilitations protocol, improving the predictability of clinical treatments and the production cost savings of master casts for restorations upon implants.

  14. New Design for Rapid Prototyping of Digital Master Casts for Multiple Dental Implant Restorations

    Science.gov (United States)

    Romero, Luis; Jiménez, Mariano; Espinosa, María del Mar; Domínguez, Manuel

    2015-01-01

    Aim This study proposes the replacement of all the physical devices used in the manufacturing of conventional prostheses through the use of digital tools, such as 3D scanners, CAD design software, 3D implants files, rapid prototyping machines or reverse engineering software, in order to develop laboratory work models from which to finish coatings for dental prostheses. Different types of dental prosthetic structures are used, which were adjusted by a non-rotatory threaded fixing system. Method From a digital process, the relative positions of dental implants, soft tissue and adjacent teeth of edentulous or partially edentulous patients has been captured, and a maser working model which accurately replicates data relating to the patients oral cavity has been through treatment of three-dimensional digital data. Results Compared with the conventional master cast, the results show a significant cost savings in attachments, as well as an increase in the quality of reproduction and accuracy of the master cast, with the consequent reduction in the number of patient consultation visits. The combination of software and hardware three-dimensional tools allows the optimization of the planning of dental implant-supported rehabilitations protocol, improving the predictability of clinical treatments and the production cost savings of master casts for restorations upon implants. PMID:26696528

  15. Security in cloud computing

    OpenAIRE

    Moreno Martín, Oriol

    2016-01-01

    Security in Cloud Computing is becoming a challenge for next generation Data Centers. This project will focus on investigating new security strategies for Cloud Computing systems. Cloud Computingisarecent paradigmto deliver services over Internet. Businesses grow drastically because of it. Researchers focus their work on it. The rapid access to exible and low cost IT resources on an on-demand fashion, allows the users to avoid planning ahead for provisioning, and enterprises to save money ...

  16. Human security policy challenges

    Directory of Open Access Journals (Sweden)

    Andrew Morton

    2008-10-01

    Full Text Available All evidence points towards climate- and environmentallyinduced migration becoming one of the major policychallenges of this century. Adequate planning for andmanagement of this phenomenon will be critical forhuman security.

  17. Presentation master thesis at EAPRIL 2015 Conference

    NARCIS (Netherlands)

    Iris Sutherland; Richard Kragten; Zac Woolfitt

    2015-01-01

    Three graduates of the Inholland Master Leren en Innoveren (Zac Woolfitt, Iris Sutherland and Richard Kragten) each presented their master thesis in an interactive 'flipped' session which involved providing content in advance via a video for those attending the session. The session was well attended

  18. Second Line of Defense Master Spares Catalog

    Energy Technology Data Exchange (ETDEWEB)

    Henderson, Dale L.; Muller, George; Mercier, Theresa M.; Brigantic, Robert T.; Perkins, Casey J.; Cooley, Scott K.

    2012-11-20

    This catalog is intended to be a comprehensive listing of repair parts, components, kits, and consumable items used on the equipment deployed at SLD sites worldwide. The catalog covers detection, CAS, network, ancillary equipment, and tools. The catalog is backed by a Master Parts Database which is used to generate the standard report views of the catalog. The master parts database is a relational database containing a record for every part in the master parts catalog along with supporting tables for normalizing fields in the records. The database also includes supporting queries, database maintenance forms, and reports.

  19. Savannah River Site Environmental Implementation Plan

    International Nuclear Information System (INIS)

    1989-01-01

    Formal sitewide environmental planning at the . Savannah River Site (SRS) began in 1986 with the development and adoption of the Strategic Environmental Plan. The Strategic Environmental Plan describes the philosophy, policy, and overall program direction of environmental programs for the operation of the SRS. The Strategic Environmental Plan (Volume 2) provided the basis for development of the Environmental Implementation Plan (EIP). The EIP is the detailed, comprehensive environmental master plan for operating contractor organizations at the SRS. The EIP provides a process to ensure that all environmental requirements and obligations are being met by setting specific measurable goals and objectives and strategies for implementation. The plan is the basis for justification of site manpower and funding requests for environmental projects and programs over a five-year planning period

  20. Savannah River Site Environmental Implementation Plan

    Energy Technology Data Exchange (ETDEWEB)

    1989-08-01

    Formal sitewide environmental planning at the . Savannah River Site (SRS) began in 1986 with the development and adoption of the Strategic Environmental Plan. The Strategic Environmental Plan describes the philosophy, policy, and overall program direction of environmental programs for the operation of the SRS. The Strategic Environmental Plan (Volume 2) provided the basis for development of the Environmental Implementation Plan (EIP). The EIP is the detailed, comprehensive environmental master plan for operating contractor organizations at the SRS. The EIP provides a process to ensure that all environmental requirements and obligations are being met by setting specific measurable goals and objectives and strategies for implementation. The plan is the basis for justification of site manpower and funding requests for environmental projects and programs over a five-year planning period.

  1. Remote handling devices for use behind shielding walls. Master-slave manipulators with three pivots, dimensions

    International Nuclear Information System (INIS)

    1993-08-01

    The standardized general dimensions as recommended in this standard will facilitate the planning and construction of shielding rooms in which master-slave manipulators as specified in this standard are to be used, as well as the interchangeability of these instruments. It will also help to shorten the time of delivery in the initial supply of maser-slave manipulators for these rooms and in the supply of replacement parts. (orig.) [de

  2. Security breaches: tips for assessing and limiting your risks.

    Science.gov (United States)

    Coons, Leeanne R

    2011-01-01

    As part of their compliance planning, medical practices should undergo a risk assessment to determine any vulnerability within the practice relative to security breaches. Practices should also implement safeguards to limit their risks. Such safeguards include facility access controls, information and electronic media management, use of business associate agreements, and education and enforcement. Implementation of specific policies and procedures to address security incidents is another critical step that medical practices should take as part of their security incident prevention plan. Medical practices should not only develop policies and procedures to prevent, detect, contain, and correct security violations, but should make sure that such policies and procedures are actually implemented in their everyday operations.

  3. MASTER-OAFA discovery: dwarf nova outburst

    Science.gov (United States)

    Shumkov, V.; Lipunov, V.; Podesta, R.; Levato, H.; Buckley, D.; Tiurina, N.; Balanutsa, P.; Kuznetsov, A.; Gorbovskoy, E.; Kornilov, V.; Chazov, V.; Vlasenko, D.; Vladimirov, V.; Gress, O.; Ivanov, K.; Lopez, C.; Podesta, F.; Saffe, C.; Pogrosheva, T.

    2016-10-01

    MASTER-OAFA (Argentina, San Juan National Univeristy's Observatorio Astronomico Felix Aguilar) auto-detection system ( Lipunov et al., "MASTER Global Robotic Net", Advances in Astronomy, 2010, 30L ) discovered OT source at (RA, Dec) = 02h 19m 51.96s -69d 26m 59.6s on 2016-10-18.23277 UT. The OT magnitude in unfiltered is 17.2m (limit 18.3m).

  4. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    International Nuclear Information System (INIS)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon

    2016-01-01

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  5. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  6. Improvement of RETRAN-MASTER-TORC transient capability and coupling optimization

    International Nuclear Information System (INIS)

    Cho, J. Y.; Song, J. S.; Joo, H. G.; Seo, K. W.; Whang, D. H.; Lee, C. C.; Zee, S. Q.

    2003-11-01

    This work is to improve MASTER-TORC transient calculation capability by complementing the previously developed consolidated code system RETRAN- MASTER-TORC, and to reduce the computing time by coupling optimization. The coupling soundness and optimization performance of the consolidated code system are evaluated by solving a YGN3 control bank ejection accident and the OECD Main Steam Line Break(MSLB) benchmark problems. The YGN3 control bank ejection accident is analyzed by the MASTER-TORC system. Most of all results including the transient core power, peak power and time are similar with those from the MASTER-COBRA system. In the computing time, the MASTER- TORC system is proved to be same as the MASTER-COBRA system, which means the coupling is sound and well-optimized. In the analysis of the OECD MSLB benchmark problem, the RETRAN-MASTER-TORC system shows the very similar results with the RETRAN-MASTER-COBRA system. However, minor differences due to fuel conductivity and thermal capacity model are noticed. In TORC, these parameters are treated as constants, while they are modeled as temperature dependent functions in COBRA. Therefore, in the future, TORC need to complement the temperature dependent thermal properties for accurate fuel and cladding temperature calculation. In the computing time for this problem, RETRAN-MASTER-TORC system shows a little bit faster than COBRA case

  7. Plan de negocio Security Info Consultores

    OpenAIRE

    Cardona Cubillos, Diego Alejandro

    2013-01-01

    La empresa a crear tiene como razón social Security Info Consultores, con domicilio principal en la ciudad de Bogotá, y su servicio principal consiste en implementar un modelo de seguridad informática acorde a cada empresa, en dar charlas y conferencia sobre normatividad, correcta custodia de la información, concientización sobre la importancia del manejo de la información, capacitar al personal para que tengan un conocimiento detallado y claro sobre le modelo implantado, desarrollar audito...

  8. Five Recession-Driven Strategies for Planning and Managing Campus Facilities

    Science.gov (United States)

    Rudden, Michael S.

    2010-01-01

    Colleges and universities continue to face significant fiscal challenges in the current recession. A review of ongoing campus facilities planning projects, coupled with a review of more than 30 recent campus master planning requests for proposals and the relevant literature, indicates that colleges and universities are finding innovative ways to…

  9. Mastering IDEAScript the definitive guide

    CERN Document Server

    Mueller, John Paul

    2011-01-01

    With approximately 44,000 users in the U.S. and Canada, as well as 42,000 in Europe, IDEA software has become a leading provider of data analysis software for use by auditors and accountants. Written to provide users with a quick access guide for optimal use of IDEAScript, Mastering IDEAScript: The Definitive Guide is IDEA's official guide to mastering IDEAScript, covering essential topics such as Introducing IDEAScript, Understanding the Basics of IDEAScript Editor, Designing Structured Applications, Understanding IDEA Databases and much more. For auditors, accountants and controllers.

  10. Nuclear security personnel for power plants. Content and review procedures for a security training and qualification program

    International Nuclear Information System (INIS)

    1978-06-01

    The applicant and licensee training and qualification plans will outline the process by which guard, watchman, armed response persons and other members of the security organization will be selected, trained, equipped and qualified. This plan should contain: (1) job descriptions for all security positions; (2) duties defined for all positions; (3) critical tasks defined for all duties; (4) skills, knowledge and abilities defined for all critical tasks; (5) performance objectives stated for all critical tasks; and (6) training and qualification plans to train and test to appropriate performance objectives. The document gives guidance on the preparation of this training and qualification plan and contains three parts: (1) an introduction to and brief explanation of job analysis and performance objectives; (2) a statement of the information that should be submitted in response to the requirements and the NRR review procedures; and (3) a sample qualification submittal

  11. Design and Analysis of a secure multi-party communication protocol

    OpenAIRE

    Herberth, Klaus

    2016-01-01

    In the past years digital communication became an important aspect in every day life. Everything is shared and discussed in groups of friends, family or business part- ners without a proper way to protect that information. This master thesis introduces the first secure robust multi-party communication protocol which mimics a physical conversation with the help of a Diffie-Hellman key tree and social behaviours. Robust- ness against offline group members is reached by taking advantage of trans...

  12. The Change Masters.

    Science.gov (United States)

    Kanter, Rosabeth Moss

    1984-01-01

    The change masters are identified as corporate managers who have the resources and the vision to effect an economic renaissance in the United States. Strategies for change should emphasize horizontal as well as vertical communication, and should reward enterprise and innovation at all levels. (JB)

  13. Planning oral narrative tasks: optimizing strategic planning condition through strategy instruction

    Directory of Open Access Journals (Sweden)

    André Luís Specht

    2017-06-01

    Full Text Available This article presents the results of a master thesis, which aimed at investigating the impact of strategic planning instruction on the speech performance of 6 L2 Brazilian learners. The participants, Letras-Inglês students, performed three now-and-there picture-cued narrative tasks under three different conditions: (1 no planning, (2 planning before instruction, and (3 planning after instruction. In addition, the participants filled in post-task questionnaires after the performance of each task, aiming at understanding their opinion on the conditions and tasks. Quantitative and qualitative analyses were conducted in order to examine participants’ oral production and perception, respectively. In general, there was no statistical evidence supporting the impact of instruction on participants’ oral planned performance; however, some statistical results approached significance, which may suggest some positive effects. Qualitative analyses provided positive evidence of the impact of strategic planning instruction on participant perception and their use of strategies during planning time. Moreover, the results of this study can contribute to the fields of Second Language Acquisition and Language Pegadogy.

  14. Capacity Credit and Security of Supply

    DEFF Research Database (Denmark)

    Chozas, Julia Fernandez; Mathiesen, Brian Vad

    2015-01-01

    electricity systems are planned, and how renewable energies fit in these systems. The second part of the article assesses the actual contribution that variable renewable energies can make to security of supply, firstly from a qualitative point of view and secondly in measurable terms. The study is based......This paper addresses the question of how renewable energies can contribute to security of supply. In order to analyse this subject, the paper has two differentiated parts. In the first part, the concept of security of supply is reviewed. This provides the baseline to understand how current...... demand for electricity is highest, the study focuses on the capacity credit of future Danish scenarios including high penetrations of offshore wind, onshore wind, wave and solar PV. The results of this project can ultimately lead towards the improvement of existing rules and methods in system planning...

  15. Health Security and Risk Aversion.

    Science.gov (United States)

    Herington, Jonathan

    2016-09-01

    Health security has become a popular way of justifying efforts to control catastrophic threats to public health. Unfortunately, there has been little analysis of the concept of health security, nor the relationship between health security and other potential aims of public health policy. In this paper I develop an account of health security as an aversion to risky policy options. I explore three reasons for thinking risk avoidance is a distinctly worthwhile aim of public health policy: (i) that security is intrinsically valuable, (ii) that it is necessary for social planning and (iii) that it is an appropriate response to decision-making in contexts of very limited information. Striking the right balance between securing and maximizing population health thus requires a substantive, and hitherto unrecognized, value judgment. Finally, I critically evaluate the current health security agenda in light of this new account of the concept and its relationship to the other aims of public health policy. © 2016 John Wiley & Sons Ltd.

  16. Revisiting the Master-Signifier, or, Mandela and Repression.

    Science.gov (United States)

    Hook, Derek; Vanheule, Stijn

    2015-01-01

    The concept of the master-signifier has been subject to a variety of applications in Lacanian forms of political discourse theory and ideology critique. While there is much to be commended in literature of this sort, it often neglects salient issues pertaining to the role of master signifiers in the clinical domain of (individual) psychical economy. The popularity of the concept of the master (or "empty") signifier in political discourse analysis has thus proved a double-edged sword. On the one hand it demonstrates how crucial psychical processes are performed via the operations of the signifier, extending thus the Lacanian thesis that identification is the outcome of linguistic and symbolic as opposed to merely psychological processes. On the other, the use of the master signifier concept within the political realm to track discursive formations tends to distance the term from the dynamics of the unconscious and operation of repression. Accordingly, this paper revisits the master signifier concept, and does so within the socio-political domain, yet while paying particular attention to the functioning of unconscious processes of fantasy and repression. More specifically, it investigates how Nelson Mandela operates as a master signifier in contemporary South Africa, as a vital means of knitting together diverse elements of post-apartheid society, enabling the fantasy of the post-apartheid nation, and holding at bay a whole series of repressed and negated undercurrents.

  17. Mastering Ext JS

    CERN Document Server

    Groner, Loiane

    2013-01-01

    Designed to be a structured guide, Mastering Ext JS is full of engaging examples to help you learn in a practical context.This book is for developers who are familiar with using Ext JS who want to augment their skills to create even better web applications.

  18. [Master course in biomedical engineering].

    Science.gov (United States)

    Jobbágy, Akos; Benyó, Zoltán; Monos, Emil

    2009-11-22

    The Bologna Declaration aims at harmonizing the European higher education structure. In accordance with the Declaration, biomedical engineering will be offered as a master (MSc) course also in Hungary, from year 2009. Since 1995 biomedical engineering course has been held in cooperation of three universities: Semmelweis University, Budapest Veterinary University, and Budapest University of Technology and Economics. One of the latter's faculties, Faculty of Electrical Engineering and Informatics, has been responsible for the course. Students could start their biomedical engineering studies - usually in parallel with their first degree course - after they collected at least 180 ECTS credits. Consequently, the biomedical engineering course could have been considered as a master course even before the Bologna Declaration. Students had to collect 130 ECTS credits during the six-semester course. This is equivalent to four-semester full-time studies, because during the first three semesters the curriculum required to gain only one third of the usual ECTS credits. The paper gives a survey on the new biomedical engineering master course, briefly summing up also the subjects in the curriculum.

  19. Task-oriented control of Single-Master Multi-Slave Manipulator System

    International Nuclear Information System (INIS)

    Kosuge, Kazuhiro; Ishikawa, Jun; Furuta, Katsuhisa; Hariki, Kazuo; Sakai, Masaru.

    1994-01-01

    A master-slave manipulator system, in general, consists of a master arm manipulated by a human and a slave arm used for real tasks. Some tasks, such as manipulation of a heavy object, etc., require two or more slave arms operated simultaneously. A Single-Master Multi-Slave Manipulator System consists of a master arm with six degrees of freedom and two or more slave arms, each of which has six or more degrees of freedom. In this system, a master arm controls the task-oriented variables using Virtual Internal Model (VIM) based on the concept of 'Task-Oriented Control'. VIM is a reference model driven by sensory information and used to describe the desired relation between the motion of a master arm and task-oriented variables. The motion of slave arms are controlled based on the task oriented variables generated by VIM and tailors the system to meet specific tasks. A single-master multi-slave manipulator system, having two slave arms, is experimentally developed and illustrates the concept. (author)

  20. Development of MR compatible laparoscope robot using master-slave control method

    International Nuclear Information System (INIS)

    Toyoda, Kazutaka; Jaeheon, Chung; Murata, Masaharu; Odaira, Takeshi; Hashizume, Makoto; Ieiri, Satoshi

    2011-01-01

    Recently, MRI guided robotic surgery has been studied. This surgery uses MRI, a surgical navigation system and a surgical robot system intraoperatively for realization of safer and assured surgeries. We have developed a MR compatible laparoscope robot and 4DOF master manipulator (master) independently. So, in this research we report system integration of the master and the laparoscope robot. The degrees of freedom between the master and the laparoscope robot is the same (4DOF), so that the relation of orientation between master and laparoscope robot is one to one. The network communication method between the master and the laparoscope robot is UDP connection based on TCP/IP protocol for reduction of communication delay. In future work we will do experiments of operability of master-slave laparoscope robot system. (author)

  1. The National Shipbuilding Research Program. United States Shipbuilding Standards Master Plan Update

    National Research Council Canada - National Science Library

    1997-01-01

    .... 7. Develop a marketing strategy for the plan. 8. Adopt or convert existing global standards for domestic use. This update includes an updated survey, the SP-6 tactical plan, new windows into standards on the internet, and more.

  2. The European cooperative approach to securing critical information infrastructure.

    Science.gov (United States)

    Purser, Steve

    2011-10-01

    This paper provides an overview of the EU approach to securing critical information infrastructure, as defined in the Action Plan contained in the Commission Communication of March 2009, entitled 'Protecting Europe from large-scale cyber-attacks and disruptions: enhancing preparedness, security and resilience' and further elaborated by the Communication of May 2011 on critical Information infrastructure protection 'Achievements and next steps: towards global cyber-security'. After explaining the need for pan-European cooperation in this area, the CIIP Action Plan is explained in detail. Finally, the current state of progress is summarised together with the proposed next steps.

  3. Urban planning after terrorism:The case of Oslo with focus on the impacts of the terrorist attack on the consideration of security, memorialisation and conservation in urban planning

    OpenAIRE

    Paizs, Franziska

    2013-01-01

    Terrorism is a targeted way to hurt a population but also to destroy and annihilate a part of the civilization by attacking the built environment, especially iconic and symbolic buildings with its values of collective memory and cultural heritage, which is at the latest created by the iconic act of destruction. The resilient city with its integrated plans and programs but also technical, personal or physical security aims to reduce the probability and the dimension of terrorist attacks. Howev...

  4. MASTER- an indigenous nuclear design code of KAERI

    International Nuclear Information System (INIS)

    Cho, Byung Oh; Lee, Chang Ho; Park, Chan Oh; Lee, Chong Chul

    1996-01-01

    KAERI has recently developed the nuclear design code MASTER for the application to reactor physics analyses for pressurized water reactors. Its neutronics model solves the space-time dependent neutron diffusion equations with the advanced nodal methods. The major calculation categories of MASTER consist of microscopic depletion, steady-state and transient solution, xenon dynamics, adjoint solution and pin power and burnup reconstruction. The MASTER validation analyses, which are in progress aiming to submit the Uncertainty Topical Report to KINS in the first half of 1996, include global reactivity calculations and detailed pin-by-pin power distributions as well as in-core detector reaction rate calculations. The objective of this paper is to give an overall description of the CASMO/MASTER code system whose verification results are in details presented in the separate papers

  5. Securing Major Events

    International Nuclear Information System (INIS)

    Loeoef, Susanna

    2013-01-01

    When asked why the IAEA should provide nuclear security support to countries that organize large public events, Nuclear Security Officer Sophia Miaw answers quickly and without hesitation. ''Imagine any major public event such as the Olympics, a football championship, or an Expo. If a dirty bomb were to be exploded at a site where tens of thousands of people congregate, the radioactive contamination would worsen the effects of the bomb, increase the number of casualties, impede a rapid emergency response, and cause long term disruption in the vicinity,'' she said. Avoiding such nightmarish scenarios is the driving purpose behind the assistance the IAEA offers States that host major sporting or other public events. The support can range from a single training course to a comprehensive programme that includes threat assessment, training, loaned equipment and exercises. The type and scope of assistance depends on the host country's needs. ''We incorporate nuclear security measures into their security plan. We don't create anything new,'' Miaw said

  6. Valuing Initial Teacher Education at Master's Level

    Science.gov (United States)

    Brooks, Clare; Brant, Jacek; Abrahams, Ian; Yandell, John

    2012-01-01

    The future of Master's-level work in initial teacher education (ITE) in England seems uncertain. Whilst the coalition government has expressed support for Master's-level work, its recent White Paper focuses on teaching skills as the dominant form of professional development. This training discourse is in tension with the view of professional…

  7. Collaborative development of Estonian nuclear master's program

    Energy Technology Data Exchange (ETDEWEB)

    Tkaczyk, A. H.; Kikas, A.; Realo, E.; Kirm, M.; Kiisk, M.; Isakar, K.; Suursoo, S.; Koch, R.; Feldbach, E.; Lushchik, A.; Reivelt, K. [Inst. of Physics, Univ. of Tartu, Riia 142, Tartu 51014 (Estonia)

    2012-07-01

    In 2009 Estonia approved the National Development Plan for the Energy Sector, including the nuclear energy option. This can be realized by construction of a nuclear power plant (NPP) in Estonia or by participation in neighboring nuclear projects (e.g., Lithuania and/or Finland). Either option requires the availability of competent personnel. It is necessary to prepare specialists with expertise in all aspects related to nuclear infrastructure and to meet workforce needs (e.g. energy enterprises, public agencies, municipalities). Estonia's leading institutions of higher education and research with the support of the European Social Fund have announced in this context a new nuclear master's curriculum to be developed. The language of instruction will be English. (authors)

  8. Counterweight system for master-slave manipulator

    International Nuclear Information System (INIS)

    Haaker, L.W.; Jelatis, D.G.

    1981-01-01

    A counterweight system is described for use in a remote control master-slave manipulator. The manipulator consists of a rotatable horizontal support adapted to extend through the wall and two longitudinally extensible arms, a master and a slave, pivotally connected one to each end of the support. Within the support there is a means of translating linear motion to rotary motion for transfer through the barrier wall and retranslating to linear motion. (U.K.)

  9. Computer Security: Bye, Bye, Windows XP security... Welcome infections!

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Rest in peace, Windows XP. Since your birth on 25 October 2001, you have struggled hard to survive this harsh Internet world. You fell prey to “Melissa”, “Sasser” and “Conficker”, and brought CERN its last large-scale infection with “Blaster” in 2004.    After being upgraded to “SP2”, you discovered software development lifecycles, regular “Patch Tuesdays” and a local firewall that rejected everything by default. In the end, you outlived your weird brother “Vista” and survived as the ugly duckling cousin to the beautiful Mr. Mac. But all your ups and downs are over now. On 8 April 2014, you were given your very last security updates. These life-sustaining measures will be stopped now. Game over. From now on, you are a zombie: presumed dead, but still kept running by your master/owner/user. They might not even understand that you now pose a risk ...

  10. Dual arm master controller development

    International Nuclear Information System (INIS)

    Kuban, D.P.; Perkins, G.S.

    1985-01-01

    The advanced servomanipulator (ASM) slave was designed with an anthropomorphic stance, gear/torque tube power drives, and modular construction. These features resulted in increased inertia, friction, and backlash relative to tape-driven manipulators. Studies were performed which addressed the human factors design and performance trade-offs associated with the corresponding master controller best suited for the ASM. The results of these studies, as well as the conceptual design of the dual arm master controller, are presented. This work was performed as part of the Consolidated Fuel Reprocessing Program at the Oak Ridge National Laboratory. 5 refs., 7 figs., 1 tab

  11. Highlights of the SSC Site Development Plan

    International Nuclear Information System (INIS)

    Sanford, J.R.

    1991-10-01

    This paper summarizes highlights of the Site Development Plan for the Superconducting Super Collider Laboratory. The Plan, sometimes called a Master Plan, was prepared by the architectural and engineering firm for the Laboratory: Parsons Brinckerhoff/Morrison Knudsen (PB/MK) working in association with CRSS. Their task was to interpret the SSC project needs in the context of the Ellis County, Texas site. The team effort was under the direction of Lewis May from CRSS, guided by Robert Sims from the SSC Laboratory. Conceptual drawings are presented in this report

  12. Accomplishments under the Airport Improvement Program: Fiscal Year 1988

    Science.gov (United States)

    1988-01-01

    WIND (PRIMARY) INDICATOR; SECURITY FENCING HOLBROOK 02 $22,766 CONDUCT MASTER PLAN UPDATE HOLBROOK MUNICIPAL (GENERAL AVIATION) KAYENTA 03 $1,238,484...CONSTRUCT RUNWAY, TAXIWAY, APRON AND KAYENTA ACCESS ROAD; INSTALL RUNWAY AND TAXIWAY (GENERAL AVIATION) LIGHTING SYSTEM, VISUAL APPROACH INDICATOR

  13. Transportation planning for planned special events

    Science.gov (United States)

    2011-05-01

    Unique among planned special event activities are those events that carry the National Special Security Event (NSSE) designation. NSSEs occur with some frequency, with 35 of these events held between September 1998 and February 2010. These events inc...

  14. Master Console System Monitoring and Control Development

    Science.gov (United States)

    Brooks, Russell A.

    2013-01-01

    The Master Console internship during the summer of 2013 involved the development of firing room displays and support applications at the John F. Kennedy Space Center (KSC). This position was with the Master Console Product Group (MCPG) on the Launch Control System (LCS) project. This project is responsible for the System Monitoring and Control (SMC) and Record and Retrieval (R&R) of launch operations data. The Master Console is responsible for: loading the correct software into each of the remaining consoles in the firing room, connecting the proper data paths to and from the launch vehicle and all ground support equipment, and initializing the entire firing room system to begin processing. During my internship, I created control scripts using the Application Control Language (ACL) to analyze the health and status of Kennedy Ground Control System (KGCS) programmable logic controllers (PLCs). This application provides a system health and status display I created with summarized data for use by Master Console Operators (MCO) to monitor and verify the integrity of KGCS subsystems.

  15. Review on Cyber Security Programs for NPP Application

    Energy Technology Data Exchange (ETDEWEB)

    Oh, Eung Se [KEPRI, Daejeon (Korea, Republic of)

    2010-10-15

    Increased history records of cyber security (CS) attacks and concerns for computers and networks technical mishaps pull out cyber security to open places. In spite of secrete nature of security, transparent and shared knowledge of many security features are more required at modern plant floors. Korea Institute of Nuclear Safety (KINS), US Government and Nuclear Regulatory Commission (NRC) requested to develop cyber security plans and enforce their implementing to the NPPs. [KINS; CFR; RG 5.71] This paper reviews various cyber security guidelines and suggests an applicable cyber security program development models during the life cycle of NPP's Instrumentation and Control (I and C) systems

  16. Review on Cyber Security Programs for NPP Application

    International Nuclear Information System (INIS)

    Oh, Eung Se

    2010-01-01

    Increased history records of cyber security (CS) attacks and concerns for computers and networks technical mishaps pull out cyber security to open places. In spite of secrete nature of security, transparent and shared knowledge of many security features are more required at modern plant floors. Korea Institute of Nuclear Safety (KINS), US Government and Nuclear Regulatory Commission (NRC) requested to develop cyber security plans and enforce their implementing to the NPPs. [KINS] [CFR] [RG 5.71] This paper reviews various cyber security guidelines and suggests an applicable cyber security program development models during the life cycle of NPP's Instrumentation and Control (I and C) systems

  17. Revisiting the master-signifier, or, Mandela and repression

    Directory of Open Access Journals (Sweden)

    Derek eHook

    2016-01-01

    Full Text Available The concept of the master-signifier has been subject to a variety of applications in Lacanian forms of political discourse theory and ideology critique. While there is much to be commended in literature of this sort, it often neglects salient issues pertaining to the role of master signifiers in the clinical domain of (individual psychical economy. The popularity of the concept of the master (or ‘empty’ signifier in political discourse analysis has thus proved a double-edged sword. On the one hand it demonstrates how crucial psychical processes are performed via the operations of the signifier, extending thus the Lacanian thesis that identification is as much the outcome of linguistic and symbolic as opposed to merely psychological processes. On the other, the use of the master signifier concept within the political realm to track discursive formations tends to distance the term from the dynamics of the unconscious and operation of repression. Accordingly, this paper revisits the master signifier concept, and does so within the socio-political domain, yet while paying particular attention to the functioning of unconscious processes of fantasy and repression. More specifically, it investigates how Nelson Mandela operates as a master signifier in contemporary South Africa, as a vital means of knitting together diverse elements of post-apartheid society, enabling the fantasy of the post-apartheid nation, and holding at bay a whole series of repressed and negated undercurrents.

  18. Defense Acquisitions: Antiarmor Munitions Master Plan Does Not Identify Potential Excesses or Support Planned Procurements

    National Research Council Canada - National Science Library

    2000-01-01

    .... According to the report, the plan should identify the projected armored threat and the projected quantity of all antiarmor weapons, whether fielded or in development, with the purpose of identifying...

  19. DIFFiCULTIES FOR THE CONCEPTUALIZATION OF SECURITY AND DEFENSE

    Directory of Open Access Journals (Sweden)

    JAIME GARCÍA COVARRUBIAS

    2017-12-01

    Full Text Available The purpose of this essay is to assist to make clear the current confusion when conceptualizing Security and Defense, a fact that impacts the production of educational plans and programs in this issues, taking at the same time a position regarding these concepts. In fact, one of the reasons in the theoretical arena of this difficulty is the existence of a grey zone between each of them, that impacts the security planning process that somehow looses its most important feature, that is, to be clear, precise and focused. To achieve this objective, a relationship between democracy and security is settled, and then differences between both of them will be established. After that, an analysis between “real security” and the one perceived, as well as between effects and conditions will be done in order to conclude that National Security integrates the different sectors’ securities and is vital for the prevailing of the State and its citizens, while citizen security is oriented toward the individuals and must not be confused with National Security. Also, that Defense is another sector of Security, and finally that governments must understood that there will be an space between the current situation or objective security and the perception of how the people believe to live.

  20. Security in the internet

    International Nuclear Information System (INIS)

    Seibel, R.M.M.; Kocher, K.; Landsberg, P.

    2000-01-01

    Aim of the study: Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Conclusions: Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet. (orig.) [de