WorldWideScience

Sample records for security plan moves

  1. Moving towards Cloud Security

    Directory of Open Access Journals (Sweden)

    Edit Szilvia Rubóczki

    2015-01-01

    Full Text Available Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment the users have to know the rule of cloud usage, however they have little knowledge about traditional IT security. It is important to measure the level of their knowledge, and evolve the training system to develop the security awareness. The article proves the importance of suggesting new metrics and algorithms for measuring security awareness of corporate users and employees to include the requirements of emerging cloud security.

  2. Moving towards Cloud Security

    OpenAIRE

    Edit Szilvia Rubóczki; Zoltán Rajnai

    2015-01-01

    Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment th...

  3. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  4. Information security : the moving target

    CSIR Research Space (South Africa)

    Dlamini, MT

    2009-01-01

    Full Text Available -product to an integral part of business operations (Conner and Coviello, 2004). This paper gives an overview of the following: � Where did information security come from? (the past) � How did it get to where it is today? (the present) � In what direction... operators were permitted to use these computers. Other users would submit their jobs to the operator through protected slots (batch processing). The key security issue during this era was ensuring that only the privileged computer operator (one user one...

  5. Strategic planning and security analysis

    International Nuclear Information System (INIS)

    DePasquale, S.

    1991-01-01

    Nuclear security master planning is a deliberative process, founded on the premise that the broad scope of security must be analyzed before any meaningful determinations may be reached on an individual security aspect. This paper examines the analytical process required in developing a Security Master Plan. It defines a four stage process concluding with the selection of security measures encompassing physical security, policy and procedure considerations and guard force deployment. The final product orchestrates each security measure in a complementary and supportive configuration

  6. Security planning an applied approach

    CERN Document Server

    Lincke, Susan

    2015-01-01

    This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan their defense and secure proprietary/confidential information. The process is documented in the supplemental online security workbook. Security Planning is designed for the busy IT practitioner, who does not have time to become a security expert, but needs a security plan now. It also serves to educate the reader of a broader set of concepts related to the security environment through the Introductory Concepts and Advanced sections. The book serv

  7. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  8. Moving ERP Systems to the Cloud - Data Security Issues

    Directory of Open Access Journals (Sweden)

    Pablo Saa

    2017-08-01

    Full Text Available This paper brings to light data security issues and concerns for organizations by moving their Enterprise Resource Planning (ERP systems to the cloud. Cloud computing has become the new trend of how organizations conduct business and has enabled them to innovate and compete in a dynamic environment through new and innovative business models. The growing popularity and success of the cloud has led to the emergence of cloud-based Software-as-a-Service (SaaS ERP systems, a new alternative approach to traditional on-premise ERP systems. Cloud-based ERP has a myriad of benefits for organizations. However, infrastructure engineers need to address data security issues before moving their enterprise applications to the cloud. Cloud-based ERP raises specific concerns about the confidentiality and integrity of the data stored in the cloud. Such concerns that affect the adoption of cloud-based ERP are based on the size of the organization. Small to medium enterprises (SMEs gain the maximum benefits from cloud-based ERP as many of the concerns around data security are not relevant to them. On the contrary, larger organizations are more cautious in moving their mission critical enterprise applications to the cloud. A hybrid solution where organizations can choose to keep their sensitive applications on-premise while leveraging the benefits of the cloud is proposed in this paper as an effective solution that is gaining momentum and popularity for large organizations.

  9. Moving ERP Systems to the Cloud - Data Security Issues

    OpenAIRE

    Pablo Saa; Andrés Cueva Costales; Oswaldo Moscoso-Zea; Sergio Lujan-Mora

    2017-01-01

    This paper brings to light data security issues and concerns for organizations by moving their Enterprise Resource Planning (ERP) systems to the cloud. Cloud computing has become the new trend of how organizations conduct business and has enabled them to innovate and compete in a dynamic environment through new and innovative business models. The growing popularity and success of the cloud has led to the emergence of cloud-based Software-as-a-Service (SaaS) ERP systems, a new alternative appr...

  10. 6 CFR 37.41 - Security plan.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security plan. 37.41 Section 37.41 Domestic... Security plan. (a) In General. States must have a security plan that addresses the provisions in paragraph (b) of this section and must submit the security plan as part of its REAL ID certification under § 37...

  11. Corporate strategic plan for safeguards and security

    International Nuclear Information System (INIS)

    1997-06-01

    Department of Energy (DOE) safeguards and security (S and S) is a team effort, consisting of Field, National Laboratories, Program Office, and Headquarters units cooperating to support the Department's diverse security needs. As an integral part of the nation's security structure, the DOE S and S Program regularly supports and works in cooperation with other US Government agencies and private industry to improve the national security posture. Thus, inter- and intra-agency partnerships play an invaluable role in the continuing efforts to integrate and implement improved ways of doing business. Their Corporate Strategic Plan provides a road map to guide, track, and provide feedback for the incorporation and implementation of S and S activities within DOE. Part 1 Planning Framework, describes those overarching factors which influence the planning endeavors. Part 2, Strategic Perspective, outlines where the S and S Program has been and how they will move to the future through core competencies, changing cultural thinking, and implementing their strategies. Part 3, Strategic and Operational Integration, details critical focus areas, strategies, and success indicators designed to enhance inter-agency S and S integration and promote cooperation with external agencies. This Plan will be reviewed annually to ensure it remains supportive and fully-engaged with the nation's and international security environments

  12. Tests to Help Plan Opportunity Moves

    Science.gov (United States)

    2005-01-01

    Rover engineers check how a test rover moves in material chosen to simulate some difficult Mars driving conditions. The scene is inside the In-Situ Instrument Laboratory at NASA's Jet Propulsion Laboratory, Pasadena, Calif. These tests in early May 2005 were designed to help plan the best way for the rover Opportunity to drive off of a soft-sand dune that the rover dug itself into the previous week. The mixture of sandy and powdery material brought in for these specific tests matched the way the soil underneath Opportunity caked onto wheels, filling the spaces between the cleats on the wheels.

  13. Global Security Program Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    Bretzke, John C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-03-25

    The Global Security Directorate mission is to protect against proliferant and unconventional nuclear threats –regardless of origin - and emerging new threats. This mission is accomplished as the Los Alamos National Laboratory staff completes projects for our numerous sponsors. The purpose of this Program Management Plan is to establish and clearly describe the GS program management requirements including instructions that are essential for the successful management of projects in accordance with our sponsor requirements. The detailed information provided in this document applies to all LANL staff and their subcontractors that are performing GS portfolio work. GS management is committed to a culture that ensures effective planning, execution, and achievement of measurable results in accordance with the GS mission. Outcomes of such a culture result in better communication, delegated authority, accountability, and increased emphasis on safely and securely achieving GS objectives.

  14. Planning Security Services for IT Systems

    OpenAIRE

    Henderson, Marie; Page, Howard Philip

    2014-01-01

    Often the hardest job is to get business representatives to look at security as something that makes managing their risks and achieving their objectives easier, with security compliance as just part of that journey. This paper addresses that by making planning for security services a 'business tool'.

  15. Integrated Nuclear Security Support Plan (INSSP)

    International Nuclear Information System (INIS)

    Moore, G.M.

    2010-01-01

    Integrated Nuclear Security Support Plan (INSSP) purposes the framework for a comprehensive approach to addressing specific national security needs. It provides means for coordinating nuclear security assistance to member states. Identifies responsible parties for completion of nuclear security activities which are necessary to build sustainable nuclear security programs. International Atomic Energy Agency INSSP development process is based on findings and recommendations from a range of nuclear security missions and other information needs assessments. Takes into account of the ongoing work activities of other bilateral assistance.

  16. Plans, Patterns, and Move Categories Guiding a Highly Selective Search

    Science.gov (United States)

    Trippen, Gerhard

    In this paper we present our ideas for an Arimaa-playing program (also called a bot) that uses plans and pattern matching to guide a highly selective search. We restrict move generation to moves in certain move categories to reduce the number of moves considered by the bot significantly. Arimaa is a modern board game that can be played with a standard Chess set. However, the rules of the game are not at all like those of Chess. Furthermore, Arimaa was designed to be as simple and intuitive as possible for humans, yet challenging for computers. While all established Arimaa bots use alpha-beta search with a variety of pruning techniques and other heuristics ending in an extensive positional leaf node evaluation, our new bot, Rat, starts with a positional evaluation of the current position. Based on features found in the current position - supported by pattern matching using a directed position graph - our bot Rat decides which of a given set of plans to follow. The plan then dictates what types of moves can be chosen. This is another major difference from bots that generate "all" possible moves for a particular position. Rat is only allowed to generate moves that belong to certain categories. Leaf nodes are evaluated only by a straightforward material evaluation to help avoid moves that lose material. This highly selective search looks, on average, at only 5 moves out of 5,000 to over 40,000 possible moves in a middle game position.

  17. National Security Technology Incubation Project Continuation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-09-30

    This document contains a project continuation plan for the National Security Technology Incubator (NSTI). The plan was developed as part of the National Security Preparedness Project (NSPP) funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This continuation plan describes the current status of NSTI (staffing and clients), long-term goals, strategies, and long-term financial solvency goals.The Arrowhead Center of New Mexico State University (NMSU) is the operator and manager of the NSTI. To realize the NSTI, Arrowhead Center must meet several performance objectives related to planning, development, execution, evaluation, and sustainability. This continuation plan is critical to the success of NSTI in its mission of incubating businesses with security technology products and services.

  18. 49 CFR 659.23 - System security plan: contents.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: contents. 659.23 Section 659... State Oversight Agency § 659.23 System security plan: contents. The system security plan must, at a... system security plan; and (e) Document the rail transit agency's process for making its system security...

  19. ADP Security Plan, Math Building, Room 1139

    Energy Technology Data Exchange (ETDEWEB)

    Melton, R.

    1985-08-27

    This document provides the draft copy of an updated (ADP) Security Plan for an IBM Personal Computer to be used in the Math Building at PNL for classified data base management. Using the equipment specified in this document and implementing the administrative and physical procedures as outlined will provide the secure environment necessary for this work to proceed.

  20. Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas

    Directory of Open Access Journals (Sweden)

    Ze Wang

    2015-09-01

    Full Text Available Network security is one of the most important issues in mobile sensor networks (MSNs. Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA is proposed to resist malicious attacks by using mobile nodes’ dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.

  1. Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.

    Science.gov (United States)

    Wang, Ze; Zhang, Haijuan; Wu, Luqiang; Zhou, Chang

    2015-09-25

    Network security is one of the most important issues in mobile sensor networks (MSNs). Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA) is proposed to resist malicious attacks by using mobile nodes' dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.

  2. School Security: Planning and Costs.

    Science.gov (United States)

    Hunter, Richard C.; Mazingo, Terri H.

    2003-01-01

    Describes efforts by two school districts to address the potential threats of shootings and other school disruptions: Baltimore City Public Schools in Maryland and Charlotte-Mecklenburg Public Schools in North Carolina. Also describes the growing costs of providing safety and security in elementary and secondary schools. (Contains 13 references.)…

  3. 6 CFR 27.225 - Site security plans.

    Science.gov (United States)

    2010-01-01

    ... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.225 Site security plans. (a) The Site Security Plan must... chemical facility security. (b) Except as provided in § 27.235, a covered facility must complete the Site...

  4. Ghana's Integrated Nuclear Security Support Plan

    International Nuclear Information System (INIS)

    Dahlstrom, Danielle

    2013-01-01

    At the Korle Bu Teaching Hospital outside Accra, Pearl Lovelyn Lawson checks the records of the next patient to undergo radiotherapy and adjusts the dose settings of the teletherapy machine. It is business as usual at the facility that treats over fifty patients each day. But Lawson's routine now includes additional procedures to ensure that the highly radioactive cobalt-60 source located inside the machine remains secure. Nuclear security devices and systems such as double locks, motion sensors, and cameras that transmit images to a central alarm system have been installed to ensure that the source cannot be stolen, the facility sabotaged, or unauthorized access gained. At Korle Bu physical protection measures were upgraded as part of Ghana's Integrated Nuclear Security Support Plan (INSSP). Preventing, detecting and responding to criminal acts like the theft or illegal transfer of a radioactive source, is an international priority that could be addressed through an INSSP. As one of its key nuclear security services, the IAEA assists Member States in drafting such plans. An INSSP is developed jointly with the Member State, using a holistic approach to nuclear security capacity building. It reinforces the primary objective of a State's nuclear security regime to protect people, society, and the environment from the harmful consequences of a nuclear security event. Addressing five components - the legal and regulatory framework, prevention, detection, and sustainability - the jointly developed plan identifies the needs, responsible entities and organizations within the State, as well as the timeframe for the implementation of agreed nuclear security related activities. Ghana's INSSP, tailored to its specific needs, is based on findings and recommendations from advisory service missions carried out in Ghana, including an International Nuclear Security Advisory Service mission and an International Physical Protection Advisory Service mission. Ghana's INSSP was

  5. A sequential-move game for enhancing safety and security cooperation within chemical clusters

    International Nuclear Information System (INIS)

    Pavlova, Yulia; Reniers, Genserik

    2011-01-01

    The present paper provides a game theoretic analysis of strategic cooperation on safety and security among chemical companies within a chemical industrial cluster. We suggest a two-stage sequential move game between adjacent chemical plants and the so-called Multi-Plant Council (MPC). The MPC is considered in the game as a leader player who makes the first move, and the individual chemical companies are the followers. The MPC's objective is to achieve full cooperation among players through establishing a subsidy system at minimum expense. The rest of the players rationally react to the subsidies proposed by the MPC and play Nash equilibrium. We show that such a case of conflict between safety and security, and social cooperation, belongs to the 'coordination with assurance' class of games, and we explore the role of cluster governance (fulfilled by the MPC) in achieving a full cooperative outcome in domino effects prevention negotiations. The paper proposes an algorithm that can be used by the MPC to develop the subsidy system. Furthermore, a stepwise plan to improve cross-company safety and security management in a chemical industrial cluster is suggested and an illustrative example is provided.

  6. A sequential-move game for enhancing safety and security cooperation within chemical clusters.

    Science.gov (United States)

    Pavlova, Yulia; Reniers, Genserik

    2011-02-15

    The present paper provides a game theoretic analysis of strategic cooperation on safety and security among chemical companies within a chemical industrial cluster. We suggest a two-stage sequential move game between adjacent chemical plants and the so-called Multi-Plant Council (MPC). The MPC is considered in the game as a leader player who makes the first move, and the individual chemical companies are the followers. The MPC's objective is to achieve full cooperation among players through establishing a subsidy system at minimum expense. The rest of the players rationally react to the subsidies proposed by the MPC and play Nash equilibrium. We show that such a case of conflict between safety and security, and social cooperation, belongs to the 'coordination with assurance' class of games, and we explore the role of cluster governance (fulfilled by the MPC) in achieving a full cooperative outcome in domino effects prevention negotiations. The paper proposes an algorithm that can be used by the MPC to develop the subsidy system. Furthermore, a stepwise plan to improve cross-company safety and security management in a chemical industrial cluster is suggested and an illustrative example is provided. Copyright © 2010 Elsevier B.V. All rights reserved.

  7. National Security Technology Incubator Business Plan

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  8. Plan Colombia or development as security

    Directory of Open Access Journals (Sweden)

    Juan Pablo Guevara Latorre

    2015-01-01

    the most relevant policy for the construction of the State in 21st-century Colombia from a critical standpoint. The document makes it possible to show that Plan Colombia is a privatized form of development, interpreted in terms of security based on an incomplete understanding of the Colombian conflict that prevails into our present

  9. 49 CFR 659.21 - System security plan: general requirements.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: general requirements. 659.21... State Oversight Agency § 659.21 System security plan: general requirements. (a) The oversight agency shall require the rail transit agency to implement a system security plan that, at a minimum, complies...

  10. 76 FR 40617 - Security Zone; 2011 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, Washington

    Science.gov (United States)

    2011-07-11

    ... better evaluate its effects on them and participate in the rulemaking process. Small businesses may send... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-0505] RIN 1625-AA87 Security Zone; 2011 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, Washington AGENCY...

  11. Computer Security Incident Response Planning at Nuclear Facilities

    International Nuclear Information System (INIS)

    2016-06-01

    The purpose of this publication is to assist Member States in developing comprehensive contingency plans for computer security incidents with the potential to impact nuclear security and/or nuclear safety. It provides an outline and recommendations for establishing a computer security incident response capability as part of a computer security programme, and considers the roles and responsibilities of the system owner, operator, competent authority, and national technical authority in responding to a computer security incident with possible nuclear security repercussions

  12. 49 CFR 659.25 - Annual review of system safety program plan and system security plan.

    Science.gov (United States)

    2010-10-01

    ... system security plan. 659.25 Section 659.25 Transportation Other Regulations Relating to Transportation... and system security plan. (a) The oversight agency shall require the rail transit agency to conduct an annual review of its system safety program plan and system security plan. (b) In the event the rail...

  13. A Tool for Optimizing Observation Planning for Faint Moving Objects

    Science.gov (United States)

    Arredondo, Anicia; Bosh, Amanda S.; Levine, Stephen

    2016-10-01

    Observations of small solar system bodies such as trans-Neptunian objects and Centaurs are vital for understanding the basic properties of these small members of our solar system. Because these objects are often very faint, large telescopes and long exposures may be necessary, which can result in crowded fields in which the target of interest may be blended with a field star. For accurate photometry and astrometry, observations must be planned to occur when the target is free of background stars; this restriction results in limited observing windows. We have created a tool that can be used to plan observations of faint moving objects. Features of the tool include estimates of best times to observe (when the object is not too near another object), a finder chart output, a list of possible astrometric and photometric reference stars, and an exposure time calculator. This work makes use of the USNOFS Image and Catalogue Archive operated by the United States Naval Observatory, Flagstaff Station (S.E. Levine and D.G. Monet 2000), the JPL Horizons online ephemeris service (Giorgini et al. 1996), the Minor Planet Center's MPChecker (http://cgi.minorplanetcenter.net/cgi-bin/checkmp.cgi), and source extraction software SExtractor (Bertin & Arnouts 1996). Support for this work was provided by NASA SSO grant NNX15AJ82G.

  14. Volume rendering in treatment planning for moving targets

    Energy Technology Data Exchange (ETDEWEB)

    Gemmel, Alexander [GSI-Biophysics, Darmstadt (Germany); Massachusetts General Hospital, Boston (United States); Wolfgang, John A.; Chen, George T.Y. [Massachusetts General Hospital, Boston (United States)

    2009-07-01

    Advances in computer technologies have facilitated the development of tools for 3-dimensional visualization of CT-data sets with volume rendering. The company Fovia has introduced a high definition volume rendering engine (HDVR trademark by Fovia Inc., Palo Alto, USA) that is capable of representing large CT data sets with high user interactivity even on standard PCs. Fovia provides a software development kit (SDK) that offers control of all the features of the rendering engine. We extended the SDK by functionalities specific to the task of treatment planning for moving tumors. This included navigation of the patient's anatomy in beam's eye view, fast point-and-click measurement of lung tumor trajectories as well as estimation of range perturbations due to motion by calculation of (differential) water equivalent path lengths for protons and carbon ions on 4D-CT data sets. We present patient examples to demonstrate the advantages and disadvantages of volume rendered images as compared to standard 2-dimensional axial plane images. Furthermore, we show an example of a range perturbation analysis. We conclude that volume rendering is a powerful technique for the representation and analysis of large time resolved data sets in treatment planning.

  15. Information Security: USDA Needs to Implement Its Departmentwide Information Security Plan

    National Research Council Canada - National Science Library

    2000-01-01

    USDA has taken positive steps to begin improving its information security by developing its August 1999 Action Plan with recommendations to strengthen department-wide information security and hiring...

  16. 75 FR 45055 - Security Zone; 2010 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, WA

    Science.gov (United States)

    2010-08-02

    ...-AA87 Security Zone; 2010 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, WA AGENCY: Coast Guard... (NCSM 710) which include all waters within 100 yards from the vessels while underway in the Puget Sound... authorized by the COTP, Puget Sound or Designated Representative. DATES: This rule is effective from 8 a.m...

  17. 77 FR 44475 - Security Zones; Seattle's Seafair Fleet Week Moving Vessels, Puget Sound, WA

    Science.gov (United States)

    2012-07-30

    ...-AA87 Security Zones; Seattle's Seafair Fleet Week Moving Vessels, Puget Sound, WA AGENCY: Coast Guard... temporary rule, call or email Lieutenant Junior Grade Anthony P. LaBoy, Sector Puget Sound, Waterways Management Division, U.S. Coast Guard; telephone 206-217-6323, email SectorPugetSound[email protected] . If you...

  18. Anticipatory Cyber Security Research: An Ultimate Technique for the First-Move Advantage

    Directory of Open Access Journals (Sweden)

    Bharat S.Rawal

    2016-02-01

    Full Text Available Across all industry segments, 96 percent of systems could be breached on average. In the game of cyber security, every moment a new player (attacker is entering the game with new skill sets. An attacker only needs to be effective once while defenders of cyberspace have to be successful all of the time. There will be a first-mover advantage in such a chasing game, which means that the first move often wins. In this paper, in order to face the security challenges brought in by attacker’s first move advantage, we analyzed the past ten years of cyber-attacks, studied the immediate attack’s pattern and offer the tools to predict the next move of the cyber attacker.

  19. Security administration plan for HANDI 2000 business management system

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, D.

    1998-09-29

    This document encompasses and standardizes the integrated approach for security within the PP and Ps applications, It also identifies the security tools and methods to be used. The Security Administration Plan becomes effective as of this document`s acceptance and will provide guidance through implementation efforts and, as a ``living document`` will support the operations and maintenance of the system.

  20. Information security management system planning for CBRN facilities

    International Nuclear Information System (INIS)

    Lenaeu, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.; Glantz, Clifford S.; Landine, Guy P.; Bryant, Janet L.; Lewis, John; Mathers, Gemma; Rodger, Robert; Johnson, Christopher

    2015-01-01

    The focus of this document is to provide guidance for the development of information security management system planning documents at chemical, biological, radiological, or nuclear (CBRN) facilities. It describes a risk-based approach for planning information security programs based on the sensitivity of the data developed, processed, communicated, and stored on facility information systems.

  1. Information security management system planning for CBRN facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lenaeu, Joseph D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); O' Neil, Lori Ross [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Leitch, Rosalyn M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Glantz, Clifford S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Landine, Guy P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Bryant, Janet L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lewis, John [National Nuclear Lab., Workington (United Kingdom); Mathers, Gemma [National Nuclear Lab., Workington (United Kingdom); Rodger, Robert [National Nuclear Lab., Workington (United Kingdom); Johnson, Christopher [National Nuclear Lab., Workington (United Kingdom)

    2015-12-01

    The focus of this document is to provide guidance for the development of information security management system planning documents at chemical, biological, radiological, or nuclear (CBRN) facilities. It describes a risk-based approach for planning information security programs based on the sensitivity of the data developed, processed, communicated, and stored on facility information systems.

  2. 49 CFR 172.802 - Components of a security plan.

    Science.gov (United States)

    2010-10-01

    ... from origin to destination, including shipments stored incidental to movement. (b) The security plan must also include the following: (1) Identification by job title of the senior management official... business and must make the security plan available upon request, at a reasonable time and location, to an...

  3. Security of legacy process control systems : Moving towards secure process control systems

    NARCIS (Netherlands)

    Oosterink, M.

    2012-01-01

    This white paper describes solutions which organisations may use to improve the security of their legacy process control systems. When we refer to a legacy system, we generally refer to old methodologies, technologies, computer systems or applications which are still in use, despite the fact that

  4. What moves you Arizona : long-range transportation plan : 2010-2035.

    Science.gov (United States)

    2011-11-01

    "What Moves You Arizona is the Arizona Department of Transportations (ADOT) Long-Range Transportation Plan (LRTP). The LRTP, or Plan, defines visionary, yet pragmatic, investment choices Arizona will make over the next 25 years to maintain a...

  5. Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan.

    Science.gov (United States)

    Sahi, Aqeel; Lai, David; Li, Yan

    2016-11-01

    Cloud computing was introduced as an alternative storage and computing model in the health sector as well as other sectors to handle large amounts of data. Many healthcare companies have moved their electronic data to the cloud in order to reduce in-house storage, IT development and maintenance costs. However, storing the healthcare records in a third-party server may cause serious storage, security and privacy issues. Therefore, many approaches have been proposed to preserve security as well as privacy in cloud computing projects. Cryptographic-based approaches were presented as one of the best ways to ensure the security and privacy of healthcare data in the cloud. Nevertheless, the cryptographic-based approaches which are used to transfer health records safely remain vulnerable regarding security, privacy, or the lack of any disaster recovery strategy. In this paper, we review the related work on security and privacy preserving as well as disaster recovery in the eHealth cloud domain. Then we propose two approaches, the Security-Preserving approach and the Privacy-Preserving approach, and a disaster recovery plan. The Security-Preserving approach is a robust means of ensuring the security and integrity of Electronic Health Records, and the Privacy-Preserving approach is an efficient authentication approach which protects the privacy of Personal Health Records. Finally, we discuss how the integrated approaches and the disaster recovery plan can ensure the reliability and security of cloud projects. Copyright © 2016 Elsevier Ltd. All rights reserved.

  6. Master planning for successful safeguard/security systems engineering

    International Nuclear Information System (INIS)

    Bruckner, D.G.

    1987-01-01

    The development and phased implementation of an overall master plan for weapons systems and facilities engaged in the complexities of high technology provides a logical road map for system accomplishment. An essential factor in such a comprehensive plan is development of an integrated systems security engineering plan. Some DOD programs use new military regulations and policy directives to mandate consideration of the safeguard/security disciplines be considered for weapons systems and facilities during the entire life cycle of the program. The emphasis is to make certain the weapon system and applicable facilities have complementary security features. Together they must meet the needs of the operational mission and, at the same time, provide the security forces practical solutions to their requirements. This paper discusses the process of meshing the safe- guards/security requirements with an overall the master plan and the challenges attendant to this activity

  7. A different paradigm for security planning

    International Nuclear Information System (INIS)

    Hagengruber, R.

    2002-01-01

    Full text: Security costs at nuclear facilities have been relatively high for many years. Since the 1970s, these expenditures in the United States have grown much faster than inflation. After the tragedy of September 11, the rate of increase appears to be exponential. Within the National Nuclear Security Administration, the cost of security now is about 10 % of the entire budget. Research and Development (R and D) has played a role in modern security, but the rate of advancement of security technology has not been sufficient to moderate the increasing costs and performance demands. Part of this problem is associated with both an inadequate investment level and the lack of a visionary roadmap for security technology. The other element of the problem is the lack of a strategic framework or architecture that would allow security technology to be effectively placed in an overall context of functionality. A new concept for an architecture for security will be presented. Within this architecture, a different approach to design, use of technology, and evaluation of effectiveness will be offered. Promising areas of technology and design will be illustrated by specific examples and suggestions for advanced R and D will be made. (author)

  8. Plan Colombia, Consequences for Venezuelan Natonal Security

    National Research Council Canada - National Science Library

    Arroyo, Alfredo

    2002-01-01

    ...% reduction in cocaine production), and narcotics trafficking groups move into Venezuela, the government will have to commit its Armed Forces but, under unequal military and technological conditions when compared to Colombia...

  9. The public transportation system security and emergency preparedness planning guide

    Science.gov (United States)

    2003-01-01

    Recent events have focused renewed attention on the vulnerability of the nation's critical infrastructure to major events, including terrorism. The Public Transportation System Security and Emergency Preparedness Planning Guide has been prepared to s...

  10. Plan for radiological security at a university health center

    International Nuclear Information System (INIS)

    Huiaman Mendoza, G.M.; Sanchez Riojas, M.M.; Felix JImenez, D.

    1998-01-01

    This work shows a radiological security plan applied to a Basic Radiological Service at a university health center. Factors taken into account were installation designs, equipment operation parameters, work procedures, image system and responsibilities

  11. Landscape and urban planning at 100: Looking back moving forward

    Science.gov (United States)

    Paul H. Gobster

    2011-01-01

    This issue completes the 100th volume of Landscape and Urban Planning, a benchmark that spans 37 years of publication during which more than 2500 research papers, review articles, and editorials have appeared in the journal and its predecessors, Landscape Planning and Urban Ecology. In commemoration of this achievement we have prepared this Special Issue, inviting...

  12. 78 FR 51754 - Request To Modify License by Replacing Security Plan With New Radiation Safety Plan; U.S...

    Science.gov (United States)

    2013-08-21

    ... Replacing Security Plan With New Radiation Safety Plan; U.S. Department of the Army, Jefferson Proving... security plan with a new radiation safety plan. DATES: Submit comments by September 20, 2013. Requests for.... The proposed change is to modify License Condition No. 12 D which refers to the security plan of...

  13. Security-Constrained Resource Planning in Electricity Market

    International Nuclear Information System (INIS)

    Roh, Jae Hyung; Shahidehpour, Mohammad; Yong Fu

    2007-06-01

    We propose a market-based competitive generation resource planning model in electricity markets. The objective of the model is to introduce the impact of transmission security in a multi-GENCO generation resource planning. The proposed approach is based on effective decomposition and coordination strategies. Lagrangian relaxation and Benders decomposition like structure are applied to the model. Locational price signal and capacity signal are defined for the simulation of competition among GENCOs and the coordination of security between GENCOs and the regulatory body (ISO). The numerical examples exhibit the effectiveness of the proposed generation planning model in electricity markets.

  14. Security plan for the energy sector

    International Nuclear Information System (INIS)

    Tapias Stahelin, Fernando

    1998-01-01

    The explosion of pipelines is so alone the tip of the iceberg of a violent situation that, for many, sinks the economic and social panorama of Colombia in an uncertainty difficult to clarify. Although it is certain that we have the elements to build a country with a floating economy and in development, it is also certain that our own war doesn't allow leaving but there. At the moment 3,2% of the Gross Domestic Product - GDP of the country is dedicated to the military expense, it calculates alarming if one keeps in mind that the average of Latin America is of 1.7% and the world average has lowered ostensibly in the last 10 years, passing from 5.1% to so single 2.7 investments. Of continuing this way, in the 2004 the projected inversion of the GDP of Colombia for military expense will overcome 5%. A conscientious analysis reveals the data of this situation that it affects all the contour of the national life. When we speak of violence in the country we should refer to all those factors and actors that destabilize the society and the legally established political institutions, creating it keels and fear in the whole population. In a same way, it becomes necessary to speak of the security and the national defense that should be guaranteed by the government instances. The security of a state of tranquility and well being; the defense, is an activity situation so that in the case that the security loses temper, it can return to the situation of initial security

  15. [Planning a Health Residence for Prison Security Measures, Tuscany (Italy)].

    Science.gov (United States)

    Porfido, Eugenio; Colombai, Renato; Scarpa, Franco; Totaro, Michele; Tani, Luca; Baldini, Claudio; Baggiani, Angelo

    2016-01-01

    Health Residences for Prison Security Measures are facilities hosting psychotic persons who have committed crimes and providing them with personalized rehabilitation and treatment plans to promote their reinstatement in society. The aim of this study was to describe the criteria for planning and designing a prison health residence in the Tuscany region (Italy), to be managed by the regional healthcare service, in line with current regulations, with dedicated staff for providing specific treatment plans and programmes.

  16. A Practice of Secure Development and Operational Environment Plan

    International Nuclear Information System (INIS)

    Park, Jaekwan; Seo, Sangmun; Suh, Yongsukl; Park, Cheol

    2017-01-01

    This paper suggests a practice of plan for SDOE establishment in a nuclear I and C. First, it is necessary to perform a requirements analysis to define key regulatory issues and determine the target systems. The analysis includes a survey to find out the applicable measures credited internationally. Based on the analysis results, this paper proposes an implementation plan including a process harmonizing security activities with legacy software activities and applicable technical, operational, and management measures for target systems. Recently, nuclear I and C has been faced with two security issues, cyber security (CS) and secure development and operational environment (SDOE). Unlike cyber security, few studies on planning SDOE have been presented. This paper suggests a plan for establishing an SDOE in a nuclear I and C. This paper defines three key considerations to comply with the regulatory position of RG. 1.152(R3) and proposes a process harmonizing the security activities with legacy software activities. In addition, this paper proposes technical, operational, and management measures applicable for SDOE.

  17. Managing the construction bidding process : a move to simpler construction plan sets

    Science.gov (United States)

    2001-01-31

    This project was conducted to determine whether construction plan sets could be significantly simplified to speed the process of moving projects to construction. The work steps included a literature review, a telephone survey of highway agencies in s...

  18. Plan de negocio Security Info Consultores

    OpenAIRE

    Cardona Cubillos, Diego Alejandro

    2013-01-01

    La empresa a crear tiene como razón social Security Info Consultores, con domicilio principal en la ciudad de Bogotá, y su servicio principal consiste en implementar un modelo de seguridad informática acorde a cada empresa, en dar charlas y conferencia sobre normatividad, correcta custodia de la información, concientización sobre la importancia del manejo de la información, capacitar al personal para que tengan un conocimiento detallado y claro sobre le modelo implantado, desarrollar audito...

  19. The Maritime Infrastructure Recovery Plan for the National Strategy for Maritime Security

    National Research Council Canada - National Science Library

    2006-01-01

    ... to the jurisdiction of the United States. The MIRP, the Maritime Commerce Security Plan, and the Maritime Transportation System Security Plan were developed in close coordination under the National Strategy for Maritime Security (NSMS...

  20. TECHNIQUE OF OPTIMAL AUDIT PLANNING FOR INFORMATION SECURITY MANAGEMENT SYSTEM

    Directory of Open Access Journals (Sweden)

    F. N. Shago

    2014-03-01

    Full Text Available Complication of information security management systems leads to the necessity of improving the scientific and methodological apparatus for these systems auditing. Planning is an important and determining part of information security management systems auditing. Efficiency of audit will be defined by the relation of the reached quality indicators to the spent resources. Thus, there is an important and urgent task of developing methods and techniques for optimization of the audit planning, making it possible to increase its effectiveness. The proposed technique gives the possibility to implement optimal distribution for planning time and material resources on audit stages on the basis of dynamics model for the ISMS quality. Special feature of the proposed approach is the usage of a priori data as well as a posteriori data for the initial audit planning, and also the plan adjustment after each audit event. This gives the possibility to optimize the usage of audit resources in accordance with the selected criteria. Application examples of the technique are given while planning audit information security management system of the organization. The result of computational experiment based on the proposed technique showed that the time (cost audit costs can be reduced by 10-15% and, consequently, quality assessments obtained through audit resources allocation can be improved with respect to well-known methods of audit planning.

  1. Moving from payg pensions to defined-contribution plan in the Russian Federation

    Directory of Open Access Journals (Sweden)

    Arnautova Yulia Valerievna

    2016-03-01

    Full Text Available This article is devoted to the moving from PAYG Pensions to Defined-Contribution Plan. The special aspects of this reorganization are analyzed. Pen-sion models of OECD countries are compared. Inability of the Defined-Contribution Plan in Russia is being proved. The present paper provides modern ways to improve the Defined-Contribution pension schemes.

  2. PLANNING INTELLIGENCE ACTIVITIES IN A DYNAMIC SECURITY ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    Anca Pavel

    2016-10-01

    Full Text Available The hypothesis introduced by this article is that, in order to perform intelligence missions and to obtain valuable intelligence for the consumers it is necessary to implement processes and tools to support planning activities. Today's challenges consist rather in the ability of intelligence organizations to identify and initiate new connections, processes and communication flows with other partners operating in the security environment than to plan in their own name secret operations. From this point of view, planning activities should focus on new procedures, at a much more extensive level in order to align institutional efforts beyond the boundaries of their own organization and the national community of information. Also, in order to coordinate intelligence activities, strategic planning must be anchored into a complex analysis of the potential impact of existing and possible future global phenomena that shape the security environment and thus identify better ways of improving results.

  3. Marketing Plan for the National Security Technology Incubator

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubator program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.

  4. Security's role in morgue operations: needed--a foolproof plan.

    Science.gov (United States)

    White, John M

    2012-01-01

    If handling the remains of dead patients is a responsibility of your security department, or you are being pressured to take on the role because of budget cuts, the need to anticipate and plan for complications which may arise is critical, the author points out.

  5. Nevada National Security Site Integrated Groundwater Sampling Plan, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Marutzky, Sam; Farnham, Irene

    2014-10-01

    The purpose of the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan) is to provide a comprehensive, integrated approach for collecting and analyzing groundwater samples to meet the needs and objectives of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) Activity. Implementation of this Plan will provide high-quality data required by the UGTA Activity for ensuring public protection in an efficient and cost-effective manner. The Plan is designed to ensure compliance with the UGTA Quality Assurance Plan (QAP). The Plan’s scope comprises sample collection and analysis requirements relevant to assessing the extent of groundwater contamination from underground nuclear testing. This Plan identifies locations to be sampled by corrective action unit (CAU) and location type, sampling frequencies, sample collection methodologies, and the constituents to be analyzed. In addition, the Plan defines data collection criteria such as well-purging requirements, detection levels, and accuracy requirements; identifies reporting and data management requirements; and provides a process to ensure coordination between NNSS groundwater sampling programs for sampling of interest to UGTA. This Plan does not address compliance with requirements for wells that supply the NNSS public water system or wells involved in a permitted activity.

  6. Risk evaluation system for facility safeguards and security planning

    International Nuclear Information System (INIS)

    Udell, C.J.; Carlson, R.L.

    1987-01-01

    The Risk Evaluation System (RES) is an integrated approach to determining safeguards and security effectiveness and risk. RES combines the planning and technical analysis into a format that promotes an orderly development of protection strategies, planning assumptions, facility targets, vulnerability and risk determination, enhancement planning, and implementation. In addition, the RES computer database program enhances the capability of the analyst to perform a risk evaluation of the facility. The computer database is menu driven using data input screens and contains an algorithm for determining the probability of adversary defeat and risk. Also, base case and adjusted risk data records can be maintained and accessed easily

  7. Risk evaluation system for facility safeguards and security planning

    International Nuclear Information System (INIS)

    Udell, C.J.; Carlson, R.L.

    1987-01-01

    The Risk Evaluation System (RES) is an integrated approach to determining safeguards and security effectiveness and risk. RES combines the planning and technical analysis into a format that promotes an orderly development of protection strategies, planing assumptions, facility targets, vulnerability and risk determination, enhancement planning, and implementation. In addition, the RES computer database program enhances the capability of the analyst to perform a risk evaluation of the facility. The computer database is menu driven using data input screens and contains an algorithm for determining the probability of adversary defeat and risk. Also, base case and adjusted risk data records can be maintained and accessed easily

  8. 76 FR 45645 - 10-Day Notice of Proposed Information Collection: Technology Security/Clearance Plans, Screening...

    Science.gov (United States)

    2011-07-29

    ...: Technology Security/Clearance Plans, Screening Records, and Non-Disclosure Agreements ACTION: Notice of... Information Collection: Technology Security/ Clearance Plans, Screening Records, and Non-Disclosure Agreements...: None. Respondents: Business and Nonprofit Organizations, Foreign Governments. Estimated Number of...

  9. The European Union as a Security Actor: Moving Beyond the Second Pillar

    Directory of Open Access Journals (Sweden)

    Kamil Zwolski

    2009-04-01

    Full Text Available It is suggested in this article that there is a discrepancy between, on the one hand, literature that focuses on the European Union (EU as a security actor and, on the other, contemporary security studies literature. This difference concerns the fact that the literature on the EU as a security actor treats security in a narrower sense than how it is approached in the literature on security studies. Over the past few decades, security studies literature has begun to fully acknowledge that the concept of security has broadened beyond traditional ‘hard’ security concerns and can encompass many different issues, for example the security implications of climate change. However, the literature on the EU as a security actor very often associates security only with the second pillar of the EU’s organisational structure; in particular the intergovernmental cooperation embodied by the Common Foreign and Security Policy (CFSP and the European Security and Defence Policy (ESDP. The main purpose of this article is to utilise the broader security studies approach to security as a means to expand the understanding of security in the context of the EU’s performance on the international stage. This is important because it allows the Union’s �����actorness’ in the field of security to be examined in a more holistic manner.

  10. Prospective in-patient cohort study of moves between levels of therapeutic security: the DUNDRUM-1 triage security, DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales and the HCR-20.

    LENUS (Irish Health Repository)

    Davoren, Mary

    2012-07-01

    We examined whether new structured professional judgment instruments for assessing need for therapeutic security, treatment completion and recovery in forensic settings were related to moves from higher to lower levels of therapeutic security and added anything to assessment of risk.

  11. 6 CFR 27.245 - Review and approval of site security plans.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...

  12. Younger apes and human children plan their moves in a maze task.

    Science.gov (United States)

    Völter, Christoph J; Call, Josep

    2014-02-01

    Planning defined as the predetermination of a sequence of actions towards some goal is crucial for complex problem solving. To shed light on the evolution of executive functions, we investigated the ontogenetic and phylogenetic origins of planning. Therefore, we presented all four great apes species (N=12) as well as 4- and 5-year-old human preschoolers (N=24) with a vertical maze task. To gain a reward placed on the uppermost level of the maze, subjects had to move the reward to the bottom through open gaps situated at each level of the maze. In total, there were ten gaps located over three of the maze's levels, and free passage through these gaps could be flexibly blocked using multiple traps. Due to the decision tree design of the maze, the subjects had to plan their actions depending on the trap configuration up to two steps ahead to successfully retrieve the reward. We found that (1) our measure of planning was negatively correlated with age in nonhuman apes, (2) younger apes as well as 5-year-old children planned their moves up to two steps ahead whereas 4-year-olds were limited to plan one step ahead, and (3) similar performance but different underlying limitations between apes and children. Namely, while all species of nonhuman apes were limited by a lack of motor control, human children exhibited a shortage in shifting their attention across a sequence of subgoals. Copyright © 2013 Elsevier B.V. All rights reserved.

  13. Cautious but Committed: Moving Toward Adaptive Planning and Operation Strategies for Renewable Energy's Wildlife Implications

    Science.gov (United States)

    Köppel, Johann; Dahmen, Marie; Helfrich, Jennifer; Schuster, Eva; Bulling, Lea

    2014-10-01

    Wildlife planning for renewable energy must cope with the uncertainties of potential wildlife impacts. Unfortunately, the environmental policies which instigate renewable energy and those which protect wildlife are not coherently aligned—creating a green versus green dilemma. Thus, climate mitigation efforts trigger renewable energy development, but then face substantial barriers from biodiversity protection instruments and practices. This article briefly reviews wind energy and wildlife interactions, highlighting the lively debated effects on bats. Today, planning and siting of renewable energy are guided by the precautionary principle in an attempt to carefully address wildlife challenges. However, this planning attitude creates limitations as it struggles to negotiate the aforementioned green versus green dilemma. More adaptive planning and management strategies and practices hold the potential to reconcile these discrepancies to some degree. This adaptive approach is discussed using facets of case studies from policy, planning, siting, and operational stages of wind energy in Germany and the United States, with one case showing adaptive planning in action for solar energy as well. This article attempts to highlight the benefits of more adaptive approaches as well as the possible shortcomings, such as reduced planning security for renewable energy developers. In conclusion, these studies show that adaptive planning and operation strategies can be designed to supplement and enhance the precautionary principle in wildlife planning for green energy.

  14. Cautious but committed: moving toward adaptive planning and operation strategies for renewable energy's wildlife implications.

    Science.gov (United States)

    Köppel, Johann; Dahmen, Marie; Helfrich, Jennifer; Schuster, Eva; Bulling, Lea

    2014-10-01

    Wildlife planning for renewable energy must cope with the uncertainties of potential wildlife impacts. Unfortunately, the environmental policies which instigate renewable energy and those which protect wildlife are not coherently aligned-creating a green versus green dilemma. Thus, climate mitigation efforts trigger renewable energy development, but then face substantial barriers from biodiversity protection instruments and practices. This article briefly reviews wind energy and wildlife interactions, highlighting the lively debated effects on bats. Today, planning and siting of renewable energy are guided by the precautionary principle in an attempt to carefully address wildlife challenges. However, this planning attitude creates limitations as it struggles to negotiate the aforementioned green versus green dilemma. More adaptive planning and management strategies and practices hold the potential to reconcile these discrepancies to some degree. This adaptive approach is discussed using facets of case studies from policy, planning, siting, and operational stages of wind energy in Germany and the United States, with one case showing adaptive planning in action for solar energy as well. This article attempts to highlight the benefits of more adaptive approaches as well as the possible shortcomings, such as reduced planning security for renewable energy developers. In conclusion, these studies show that adaptive planning and operation strategies can be designed to supplement and enhance the precautionary principle in wildlife planning for green energy.

  15. Guidelines for developing NASA (National Aeronautics and Space Administration) ADP security risk management plans

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    This report presents guidance to NASA Computer security officials for developing ADP security risk management plans. The six components of the risk management process are identified and discussed. Guidance is presented on how to manage security risks that have been identified during a risk analysis performed at a data processing facility or during the security evaluation of an application system.

  16. Dosimetric consequences of planning lung treatments on 4DCT average reconstruction to represent a moving tumour

    International Nuclear Information System (INIS)

    Dunn, L.F.; Taylor, M.L.; Kron, T.; Franich, R.

    2010-01-01

    Full text: Anatomic motion during a radiotherapy treatment is one of the more significant challenges in contemporary radiation therapy. For tumours of the lung, motion due to patient respiration makes both accurate planning and dose delivery difficult. One approach is to use the maximum intensity projection (MIP) obtained from a 40 computed tomography (CT) scan and then use this to determine the treatment volume. The treatment is then planned on a 4DCT average reco struction, rather than assuming the entire ITY has a uniform tumour density. This raises the question: how well does planning on a 'blurred' distribution of density with CT values greater than lung density but less than tumour density match the true case of a tumour moving within lung tissue? The aim of this study was to answer this question, determining the dosimetric impact of using a 4D-CT average reconstruction as the basis for a radiotherapy treatment plan. To achieve this, Monte-Carlo sim ulations were undertaken using GEANT4. The geometry consisted of a tumour (diameter 30 mm) moving with a sinusoidal pattern of amplitude = 20 mm. The tumour's excursion occurs within a lung equivalent volume beyond a chest wall interface. Motion was defined parallel to a 6 MY beam. This was then compared to a single oblate tumour of a magnitude determined by the extremes of the tumour motion. The variable density of the 4DCT average tumour is simulated by a time-weighted average, to achieve the observed density gradient. The generic moving tumour geometry is illustrated in the Figure.

  17. Acceptance criteria for the evaluation of nuclear power reactor security plans

    International Nuclear Information System (INIS)

    1982-08-01

    This guidance document contains acceptance criteria to be used in the NRC license review process. It contains specific criteria for use in evaluating the acceptability of nuclear power reactor security programs as detailed in security plans

  18. Tools for an effective annual review of the Security Management Plan.

    Science.gov (United States)

    Daniel, Matthew

    2014-01-01

    A hospital's Security Management Plan, required by the Joint Commission, can also be used by security management professionals, the author points out, to ensure that they are continually monitoring and improving the program in a changing healthcare environment.

  19. Nevada National Security Site Integrated Groundwater Sampling Plan, Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene

    2018-03-01

    The purpose is to provide a comprehensive, integrated approach for collecting and analyzing groundwater samples to meet the needs and objectives of the DOE/EM Nevada Program’s UGTA Activity. Implementation of this Plan will provide high-quality data required by the UGTA Activity for ensuring public protection in an efficient and cost-effective manner. The Plan is designed to ensure compliance with the UGTA Quality Assurance Plan (QAP) (NNSA/NFO, 2015); Federal Facility Agreement and Consent Order (FFACO) (1996, as amended); and DOE Order 458.1, Radiation Protection of the Public and the Environment (DOE, 2013). The Plan’s scope comprises sample collection and analysis requirements relevant to assessing both the extent of groundwater contamination from underground nuclear testing and impact of testing on water quality in downgradient communities. This Plan identifies locations to be sampled by CAU and location type, sampling frequencies, sample collection methodologies, and the constituents to be analyzed. In addition, the Plan defines data collection criteria such as well purging, detection levels, and accuracy requirements/recommendations; identifies reporting and data management requirements; and provides a process to ensure coordination between NNSS groundwater sampling programs for sampling analytes of interest to UGTA. Information used in the Plan development—including the rationale for selection of wells, sampling frequency, and the analytical suite—is discussed under separate cover (N-I, 2014) and is not reproduced herein. This Plan does not address compliance for those wells involved in a permitted activity. Sampling and analysis requirements associated with these wells are described in their respective permits and are discussed in NNSS environmental reports (see Section 5.2). In addition, sampling for UGTA CAUs that are in the Closure Report (CR) stage are not included in this Plan. Sampling requirements for these CAUs are described in the CR

  20. Path planning for first responders in the presence of moving obstacles

    Directory of Open Access Journals (Sweden)

    Zhiyong Wang

    2015-06-01

    Full Text Available Navigation services have gained much importance for all kinds of human activities ranging from tourist navigation to support of rescue teams in disaster management. However, despite the considerable amount of route guidance research that has been performed, many issues that are related to navigation for first responders still need to be addressed. During disasters, emergencies can result in different types of moving obstacles (e.g., fires, plumes, floods, which make some parts of the road network temporarily unavailable. After such incidents occur, responders have to go to different destinations to perform their tasks in the environment affected by the disaster. Therefore they need a path planner that is capable of dealing with such moving obstacles, as well as generating and coordinating their routes quickly and efficiently. During the past decades, more and more hazard simulations, which can modify the models with incorporation of dynamic data from the field, have been developed. These hazard simulations use methods such as data assimilation, stochastic estimation, and adaptive measurement techniques, and are able to generate more reliable results of hazards. This would allow the hazard simulation models to provide valuable information regarding the state of road networks affected by hazards, which supports path planning for first responders among the moving obstacles. The objective of this research is to develop an integrated navigation system for first responders in the presence of moving obstacles. Such system should be able to navigate one or more responders to one or multiple destinations avoiding the moving obstacles, using the predicted information of the moving obstacles generated from by hazard simulations. In this dissertation, the objective we have is expressed as the following research question: How do we safely and efficiently navigate one or more first responders to one or more destinations avoiding moving obstacles? To address

  1. MOVES: A knowledge-based system for maintenance planning for motor-operated valves

    International Nuclear Information System (INIS)

    Winter, M.

    1987-01-01

    Over the past several years, knowledge-based expert systems have emerged as an important part of the general research area known as artificial intelligence. This paper describes a cooperative effort between faculty members at Iowa State University and engineers at the Duane Arnold Energy Center [a 545-MW(electric) boiling water reactor operated by Iowa Electric Light and Power Company] to explore the development of an advisory system for valve maintenance planning. This knowledge-based program, known as Motor-Operated Valves Expert System (MOVES), has a data base that currently includes safety-related motor-operated valves (∼117 valves). Valve maintenance was selected as the subject for the expert system because of the importance of valves in nuclear plant and their impact of plant availability. MOVES is being developed using the microcomputer-(IBM compatible) based expert system tool INSIGHT2+. The authors have found that the project benefits both the university and the utility

  2. Global optimal path planning of an autonomous vehicle for overtaking a moving obstacle

    Directory of Open Access Journals (Sweden)

    B. Mashadi

    Full Text Available In this paper, the global optimal path planning of an autonomous vehicle for overtaking a moving obstacle is proposed. In this study, the autonomous vehicle overtakes a moving vehicle by performing a double lane-change maneuver after detecting it in a proper distance ahead. The optimal path of vehicle for performing the lane-change maneuver is generated by a path planning program in which the sum of lateral deviation of the vehicle from a reference path and the rate of steering angle become minimum while the lateral acceleration of vehicle does not exceed a safe limit value. A nonlinear optimal control theory with the lateral vehicle dynamics equations and inequality constraint of lateral acceleration are used to generate the path. The indirect approach for solving the optimal control problem is used by applying the calculus of variation and the Pontryagin's Minimum Principle to obtain first-order necessary conditions for optimality. The optimal path is generated as a global optimal solution and can be used as the benchmark of the path generated by the local motion planning of autonomous vehicles. A full nonlinear vehicle model in CarSim software is used for path following simulation by importing path data from the MATLAB code. The simulation results show that the generated path for the autonomous vehicle satisfies all vehicle dynamics constraints and hence is a suitable overtaking path for the following vehicle.

  3. Towards automatic patient positioning and scan planning using continuously moving table MR imaging.

    Science.gov (United States)

    Koken, Peter; Dries, Sebastian P M; Keupp, Jochen; Bystrov, Daniel; Pekar, Vladimir; Börnert, Peter

    2009-10-01

    A concept is proposed to simplify patient positioning and scan planning to improve ease of use and workflow in MR. After patient preparation in front of the scanner the operator selects the anatomy of interest by a single push-button action. Subsequently, the patient table is moved automatically into the scanner, while real-time 3D isotropic low-resolution continuously moving table scout scanning is performed using patient-independent MR system settings. With a real-time organ identification process running in parallel and steering the scanner, the target anatomy can be positioned fully automatically in the scanner's sensitive volume. The desired diagnostic examination of the anatomy of interest can be planned and continued immediately using the geometric information derived from the acquired 3D data. The concept was implemented and successfully tested in vivo in 12 healthy volunteers, focusing on the liver as the target anatomy. The positioning accuracy achieved was on the order of several millimeters, which turned out to be sufficient for initial planning purposes. Furthermore, the impact of nonoptimal system settings on the positioning performance, the signal-to-noise ratio (SNR), and contrast-to-noise ratio (CNR) was investigated. The present work proved the basic concept of the proposed approach as an element of future scan automation. (c) 2009 Wiley-Liss, Inc.

  4. Safeguarding National Security Through Public Release of Environmental Information: Moving the Debate to the Next Level

    National Research Council Canada - National Science Library

    Jacobson, Joseph

    2002-01-01

    ..., and the Chemical Safety Information, Site Security and Fuels Regulatory Relief Act The article then focuses on the current state of the law regarding release or withholding of chemical-hazard information...

  5. A guide for developing an ADP security plan for Navy Finance Center, Cleveland, Ohio

    OpenAIRE

    Barber, Daniel E.; Hodnett, Elwood Thomas, Jr.

    1982-01-01

    Approved for public release; distribution is unlimited This paper is intended to be used as a guide by personnel at the Navy Finance Center (NFC) Cleveland, Ohio in developing an Automatic Data Processing (ADP) Security Plan. An effort has been made to combine the requirements for an ADP security plan established by OPNAVINST5239.1A with pertinent information from other selected readings. The importance of the devotion of personnel, time and funds to ADP security planning has been emphas...

  6. Moving beyond probabilities – Strength of knowledge characterisations applied to security

    International Nuclear Information System (INIS)

    Askeland, Tore; Flage, Roger; Aven, Terje

    2017-01-01

    Many security experts avoid the concept of probability when assessing risk and vulnerabilities. Their main argument is that meaningful probabilities cannot be determined and they are consequently not useful for decision-making and security management. However, to give priority to some measures and not others, the likelihood dimension needs to be addressed in some way; the question is how. One approach receiving attention recently is to add strength of knowledge judgements to the probabilities and probability intervals generated. The judgements provide a qualitative labelling of how strong the knowledge supporting the probability assignments is. Criteria for such labelling have been developed, but not for a security setting. The purpose of this paper is to develop such criteria specific to security applications and, using some examples, to demonstrate their suitability. - Highlights: • The concept of probability is often avoided in security risk assessments. • We argue that the likelihood/probability dimension needs to be somehow addressed. • Probabilities should be supplemented by qualitative strength-of-knowledge scores. • Such criteria specific to security applications are developed. • Two examples are used to demonstrate the suitability of the suggested criteria.

  7. State and Urban Area Homeland Security Strategy v3.0: Evolving Strategic Planning

    National Research Council Canada - National Science Library

    Chen, Darren

    2006-01-01

    This thesis proposes to overhaul the state and urban area homeland security strategy program by improving the strategic planning process guidance and assistance and strategy review in collaboration...

  8. State and Urban Area Homeland Security Plans and Exercises: Issues for the 110th Congress

    National Research Council Canada - National Science Library

    Reese, Shawn

    2007-01-01

    ... for both terrorist attacks and natural disasters. Two potential activities that Congress might choose to focus on are the certification of state and urban area homeland security plans and the conduct of exercises to test the plans...

  9. State and Urban Area Homeland Security Plans and Exercises: Issues for the 109th Congress

    National Research Council Canada - National Science Library

    Reese, Shawn

    2006-01-01

    ... for both terrorist attacks and natural disasters. Two potential activities that Congress might choose to focus on are the certification of state and urban area homeland security plans, and the conduct of exercises to test the plans...

  10. Dynamic path planning for autonomous driving on various roads with avoidance of static and moving obstacles

    Science.gov (United States)

    Hu, Xuemin; Chen, Long; Tang, Bo; Cao, Dongpu; He, Haibo

    2018-02-01

    This paper presents a real-time dynamic path planning method for autonomous driving that avoids both static and moving obstacles. The proposed path planning method determines not only an optimal path, but also the appropriate acceleration and speed for a vehicle. In this method, we first construct a center line from a set of predefined waypoints, which are usually obtained from a lane-level map. A series of path candidates are generated by the arc length and offset to the center line in the s - ρ coordinate system. Then, all of these candidates are converted into Cartesian coordinates. The optimal path is selected considering the total cost of static safety, comfortability, and dynamic safety; meanwhile, the appropriate acceleration and speed for the optimal path are also identified. Various types of roads, including single-lane roads and multi-lane roads with static and moving obstacles, are designed to test the proposed method. The simulation results demonstrate the effectiveness of the proposed method, and indicate its wide practical application to autonomous driving.

  11. Assessment of Uncertainties in Treatment Planning for Scanned Ion Beam Therapy of Moving Tumors

    International Nuclear Information System (INIS)

    Hild, Sebastian; Durante, Marco; Bert, Christoph

    2013-01-01

    Purpose: To provide methods for quantification of uncertainties in 4-dimensional (4D) treatment during treatment planning. Methods and Materials: Uncertainty information was generated by multiple 4D treatment simulations with varying parameters. Sampled data were analyzed using uncertainty visualization methods that have been added to common treatment plan evaluation methods (eg, dose-volume histogram and dose distribution analysis). To illustrate the potential of the introduced methods, uncertainty analysis was completed for a single lung cancer case using 3 motion mitigation techniques: gating, slice-by-slice rescanning, and breath-controlled rescanning. Results: By repeating 4D dose calculations with varying parameters, we were able to show local uncertainties in dose distributions and to evaluate the stability of treatment setups. The new methods were found suitable for uncertainty evaluation in 4D treatment planning of moving tumors. Calculation time of the uncertainty base data was time consuming but contrivable overnight. Conclusions: Uncertainty analysis and visualization for 4D treatment planning provide an important tool in the decision process for an optimal treatment approach.

  12. A Move in the Security Measurement Stalemate: Elo-Style Ratings to Quantify Vulnerability

    DEFF Research Database (Denmark)

    Pieters, Wolter; van der Ven, Sanne H.G.; Probst, Christian W.

    2012-01-01

    One of the big problems of risk assessment in information security is the quantification of risk-related properties, such as vulnerability. Vulnerability expresses the likelihood that a threat agent acting against an asset will cause impact, for example, the likelihood that an attacker will be ab...... to its application to children solving math problems. It provides an innovative and sound way to quantify vulnerability in models of (information) security.......One of the big problems of risk assessment in information security is the quantification of risk-related properties, such as vulnerability. Vulnerability expresses the likelihood that a threat agent acting against an asset will cause impact, for example, the likelihood that an attacker will be able......-interprets security from the field of Item Response Theory. By observing the success of threat agents against assets, one can rate the strength of threats and controls, and predict the vulnerability of systems to particular threats. The application of Item Response Theory to the field of risk is new, but analogous...

  13. 33 CFR 103.505 - Elements of the Area Maritime Security (AMS) Plan.

    Science.gov (United States)

    2010-07-01

    ... port in case of security threats or breaches of security; (j) Procedures for periodic plan review... (CSO), Vessel Security Officers (VSO), public safety officers, emergency response personnel, and crisis management organization representatives within the port, including 24-hour contact details; (m) Measures to...

  14. 75 FR 43528 - Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan

    Science.gov (United States)

    2010-07-26

    ... National Health Security Strategy Biennial Implementation Plan AGENCY: Department of Health and Human... National Health Security Strategy (NHSS) of the United States of America (2009) and build upon the NHSS Interim Implementation Guide for the National Health Security Strategy of the United States of America...

  15. 48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007) All...

  16. 48 CFR 1252.239-71 - Information technology security plan and accreditation.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan and...

  17. Considerations to Enhance the Florida Domestic Security Strategic Plan

    Science.gov (United States)

    2011-03-01

    security strategies. vi THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. INTRODUCTION ...Thank you all. xvi THIS PAGE INTENTIONALLY LEFT BLANK 1 I. INTRODUCTION A. PROBLEM STATEMENT After the terrorist attacks of September 11, 2001...State Homeland Security Strategy (Nebraska Emergency Mangement Agency, 2009) • Vermont Homeland Security Strategy (Vermont Department of Public

  18. The architectural plan and the moving image. Audio-visual media for the plan: to document, to present, to diffuse.

    Directory of Open Access Journals (Sweden)

    Maria Letizia Gagliardi

    2009-06-01

    Full Text Available The architecture needs to be communicated and to communicate, that’s why, in every period, the architect has used innovative tools which could “make public” his work. From the convention of the architectural drawing, to the prospective, photography, cinema, computer and tele-vision, architecture’s communication has found in the dynamic image the right tool for the representation of the relation between space, time and human being, a relation which implies contrasts and framings, that is a succession of images. In this article we will identify three different ways of telling architecture through moving images, three narrations that correspond to three different techniques of planning, shooting and post-production: the documentary, the simulation and the tele-vision.

  19. Analysis of the security during power system expansion planning

    Directory of Open Access Journals (Sweden)

    Osak Alexey

    2017-01-01

    Full Text Available Increasing the intelligent level of the EPS control systems, caused by the implementation of Smart technologies, changes the structure and the properties of EPS and increases the importance of system reliability analysis. System reliability analysis includes two components – for the balance and for the regime. On the one hand, there is a large number of studies to assess the reliability of the power system, which examines various aspects and methods of solving this problem. On the other hand, in Russia there is no generally accepted methodology with clear criteria that could be used for feasibility studies of various technical solutions taking into consideration system reliability aspects. In practice, the security analysis is limited by the calculations of power flows, static and dynamic stability for a number of forecast periods for the normal and repair circuits considering the most severe disturbances. The existing approach allows defining the requirements and adjusting emergency control systems, but does not allow evaluating and comparing solutions for power grid constructions. The authors propose a new method for power system reliability evaluation, which is suitable for planning development and operation of power systems. The method includes a general description of the algorithm which allows to compare various development scenarios, as well as to assess the reliability level of their implementation. In particular, the method allows to determine where it is needed only the relay protection and emergency control system development, and where it is necessary grid, protection and control development and reconstruction.

  20. Bechtel Hanford, Inc. Network Security Plan for the Environmental Restoration Contract

    International Nuclear Information System (INIS)

    Slade, B.E.

    2000-01-01

    This document was created to address ERC computer security needs that are outlined by DOE Order 1360.2B, Unclassified Computer Security Program. DOE Order 1360.2B has been canceled and replaced with DOE Notice 205.1, Unclassified Cyber Security Program. The ERC response to DOE Notice 205.1 is to generate BHI-01343, Cyber Security Program Plan, which is not available for public access or viewing

  1. "It's Like Moving the Titanic:" Community Organizing to Address Food (In)Security.

    Science.gov (United States)

    Okamoto, Kristen E

    2017-08-01

    Health communication scholars are uniquely positioned to examine the ways in which individuals organize to address current and future exigencies related to social ills. In particular, organizations are key sites in understanding our health decisions related to food choice. From a young age, children develop habits of eating that stay with them throughout their life. More specifically, food insecurity impacts childhood nutrition. Children from low-income homes experience disproportional negative health outcomes. Appalachian Ohio is an area within the United States that experiences severe poverty. In 2013, community members in a small public school district in Appalachian Ohio formed the Appalachian Nutrition Advisory Council to address the nutritional needs of students in schools. This project stories the ways in which community members creatively organized to supplement existing structures in place designed to address school nutrition and food security.

  2. Airport surface moving map displays: OpEval-2 evaluation results and future plans

    Science.gov (United States)

    Livack, Garret; McDaniel, James I.; Battiste, Vernol

    2001-08-01

    The Federal Aviation Administration (FAA), in cooperation with the Cargo Airline Association (CAA) and three of its member airlines (Airborne Express, Federal Express, and United Parcel Service), have embarked upon an aggressive yet phased approach to introduce new Free Flight-enabling technologies into the U.S. National Airspace System (NAS). General aviation is also actively involved, represented primarily by the Aircraft Owners and Pilots Association (AOPA). These new technologies being evaluated include advanced cockpit avionics and a complimentary ground infrastructure. In support of this initiative, a series of operational evaluations (OpEvals) have been conducted or are planned. The OpEvals have evaluated in-flight as well as airport surface movement applications. Results from the second OpEval, conducted at Louisville, Kentucky in October 2000, indicated that runway incursions might be significantly reduced with the introduction of a cockpit-based moving map system derived from emerging technologies. An additional OpEval is planned to evaluate the utility of an integrated cockpit and airport surface architecture that provides enhanced pilot and controller awareness of airport surface operations. It is believed that the combination of such an airborne and a ground-based system best addresses many of the safety issues surrounding airport surface operations. Such a combined system would provide both flight crews and controllers with a common awareness, or shared picture of airport surface operations.

  3. Prospective in-patient cohort study of moves between levels of therapeutic security: the DUNDRUM-1 triage security, DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales and the HCR-20

    Directory of Open Access Journals (Sweden)

    Davoren Mary

    2012-07-01

    Full Text Available Abstract Background We examined whether new structured professional judgment instruments for assessing need for therapeutic security, treatment completion and recovery in forensic settings were related to moves from higher to lower levels of therapeutic security and added anything to assessment of risk. Methods This was a prospective naturalistic twelve month observational study of a cohort of patients in a forensic hospital placed according to their need for therapeutic security along a pathway of moves from high to progressively less secure units in preparation for discharge. Patients were assessed using the DUNDRUM-1 triage security scale, the DUNDRUM-3 programme completion scale and the DUNDRUM-4 recovery scale and assessments of risk of violence, self harm and suicide, symptom severity and global function. Patients were subsequently observed for positive moves to less secure units and negative moves to more secure units. Results There were 86 male patients at baseline with mean follow-up 0.9 years, 11 positive and 9 negative moves. For positive moves, logistic regression indicated that along with location at baseline, the DUNDRUM-1, HCR-20 dynamic and PANSS general symptom scores were associated with subsequent positive moves. The receiver operating characteristic was significant for the DUNDRUM-1 while ANOVA co-varying for both location at baseline and HCR-20 dynamic score was significant for DUNDRUM-1. For negative moves, logistic regression showed DUNDRUM-1 and HCR-20 dynamic scores were associated with subsequent negative moves, along with DUNDRUM-3 and PANSS negative symptoms in some models. The receiver operating characteristic was significant for the DUNDRUM-4 recovery and HCR-20 dynamic scores with DUNDRUM-1, DUNDRUM-3, PANSS general and GAF marginal. ANOVA co-varying for both location at baseline and HCR-20 dynamic scores showed only DUNDRUM-1 and PANSS negative symptoms associated with subsequent negative moves. Conclusions

  4. Prospective in-patient cohort study of moves between levels of therapeutic security: the DUNDRUM-1 triage security, DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales and the HCR-20.

    Science.gov (United States)

    Davoren, Mary; O'Dwyer, Sarah; Abidin, Zareena; Naughton, Leena; Gibbons, Olivia; Doyle, Elaine; McDonnell, Kim; Monks, Stephen; Kennedy, Harry G

    2012-07-13

    We examined whether new structured professional judgment instruments for assessing need for therapeutic security, treatment completion and recovery in forensic settings were related to moves from higher to lower levels of therapeutic security and added anything to assessment of risk. This was a prospective naturalistic twelve month observational study of a cohort of patients in a forensic hospital placed according to their need for therapeutic security along a pathway of moves from high to progressively less secure units in preparation for discharge. Patients were assessed using the DUNDRUM-1 triage security scale, the DUNDRUM-3 programme completion scale and the DUNDRUM-4 recovery scale and assessments of risk of violence, self harm and suicide, symptom severity and global function. Patients were subsequently observed for positive moves to less secure units and negative moves to more secure units. There were 86 male patients at baseline with mean follow-up 0.9 years, 11 positive and 9 negative moves. For positive moves, logistic regression indicated that along with location at baseline, the DUNDRUM-1, HCR-20 dynamic and PANSS general symptom scores were associated with subsequent positive moves. The receiver operating characteristic was significant for the DUNDRUM-1 while ANOVA co-varying for both location at baseline and HCR-20 dynamic score was significant for DUNDRUM-1. For negative moves, logistic regression showed DUNDRUM-1 and HCR-20 dynamic scores were associated with subsequent negative moves, along with DUNDRUM-3 and PANSS negative symptoms in some models. The receiver operating characteristic was significant for the DUNDRUM-4 recovery and HCR-20 dynamic scores with DUNDRUM-1, DUNDRUM-3, PANSS general and GAF marginal. ANOVA co-varying for both location at baseline and HCR-20 dynamic scores showed only DUNDRUM-1 and PANSS negative symptoms associated with subsequent negative moves. Clinicians appear to decide moves based on combinations of current and

  5. Secure environment for real-time tele-collaboration on virtual simulation of radiation treatment planning.

    Science.gov (United States)

    Ntasis, Efthymios; Maniatis, Theofanis A; Nikita, Konstantina S

    2003-01-01

    A secure framework is described for real-time tele-collaboration on Virtual Simulation procedure of Radiation Treatment Planning. An integrated approach is followed clustering the security issues faced by the system into organizational issues, security issues over the LAN and security issues over the LAN-to-LAN connection. The design and the implementation of the security services are performed according to the identified security requirements, along with the need for real time communication between the collaborating health care professionals. A detailed description of the implementation is given, presenting a solution, which can directly be tailored to other tele-collaboration services in the field of health care. The pilot study of the proposed security components proves the feasibility of the secure environment, and the consistency with the high performance demands of the application.

  6. Strategic Sustainability Performance Plan. Discovering Sustainable Solutions to Power and Secure America’s Future

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2010-09-01

    Sustainability is fundamental to the Department of Energy’s research mission and operations as reflected in the Department’s Strategic Plan. Our overarching mission is to discover the solutions to power and secure America’s future.

  7. The New Roles of the Dominican Armed Forces in the Dominican Republic National Security Plan

    National Research Council Canada - National Science Library

    Arias, Jose D

    2007-01-01

    ... in the 2005 National Security Plan. The resulting analysis provides a basis for determining what the new roles of the Dominican Armed Forces and the National Police should be for the 21st century...

  8. State and Urban Area Homeland Security Strategy v3.0: Evolving Strategic Planning

    National Research Council Canada - National Science Library

    Chen, Darren

    2006-01-01

    ... with state and local stakeholders. Federal state and local reviewers regard the current state and urban homeland security strategies as generally inadequate and indicative of limited strategic planning processes...

  9. Economic Security Environment and Implementation of Planning, Programming, Budgeting, Execution (PPBE) System in Georgia

    Science.gov (United States)

    2004-06-01

    Roy J. What Determines Economic Growth? Economic Review – Second Quarter 1993 [References: Barro (1991); Mankiw , Romer, and Well (1992); De Long...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release: distribution unlimited ECONOMIC SECURITY...DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE: Economic Security Environment and Implementation of Planning, Programming, Budgeting, Execution

  10. Interim format and content for a physical security plan for nuclear power plants

    International Nuclear Information System (INIS)

    1977-02-01

    The document serves as interim guidance to assist the licensee or applicant in the preparation of a physical security plan. It is to be used in conjunction with interim acceptance criteria for physical security programs, which will be distributed at a later date

  11. New fire and security rules change USA nuclear power plant emergency plans

    International Nuclear Information System (INIS)

    Garrou, A.L.

    1978-01-01

    New safety and security rules for nuclear power plants have resulted from the Energy Reorganisation Act and also from a review following the Browns Ferry fire. The content of the emergency plan which covers personnel, plant, site, as well as a general emergency, is outlined. New fire protection rules, the plan for security, local and state government assistance are also discussed, with a brief reference to the impact of the new rules on continuity of operations. (author)

  12. Alternate Futures for 2025: Security Planning to Avoid Surprise

    National Research Council Canada - National Science Library

    Engelbrecht, Joseph

    1996-01-01

    .... The methodology details how the study participants identified the three drivers, created the strategic planning space, selected the worlds of interest, created the plausible histories, and developed...

  13. Design of security scheme of the radiotherapy planning administration system based on the hospital information system

    International Nuclear Information System (INIS)

    Zhuang Yongzhi; Zhao Jinzao

    2010-01-01

    Objective: To design a security scheme of radiotherapy planning administration system. Methods: Power Builder 9i language was used to program the system through the model of client-server machine. Oracle 9i was used as the database server. Results In this system, user registration management, user login management, application-level functions of control, database access control, and audit trail were designed to provide system security. Conclusions: As a prototype for the security analysis and protection of this scheme provides security of the system, application system, important data and message, which ensures the system work normally. (authors)

  14. Moving to a Modernized Height Reference System in Canada: Rationale, Status and Plans

    Science.gov (United States)

    Veronneau, M.; Huang, J.

    2007-05-01

    technologies for positioning should naturally move users to the new height reference and offer the possibility of transferring heights over longer distances, within the precision of the geoid model. This transition will also reduce user dependency on a dense network of benchmarks and offer the possibility for geodetic agencies to provide the reference frame with a reduced number of 3D control points. While the rationale for moving to a modernized height system is easily understood, the acceptance of the new system by users will only occur gradually as they adopt new technologies and procedures to access the height reference. A stakeholder consultation indicates user readiness and an implementation plan is starting to unfold. This presentation will look at the current state of the geoid model and control networks that will support the modernized height system. Results of the consultation and the recommendations regarding the roles and responsibilities of the various stakeholders involved in implementing the transition will also be reported.

  15. 10 CFR 72.186 - Change to physical security and safeguards contingency plans.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Change to physical security and safeguards contingency... contingency plans. (a) The licensee shall make no change that would decrease the safeguards effectiveness of... licensee safeguards contingency plan without prior approval of the Commission. A licensee desiring to make...

  16. 29 CFR 2509.75-3 - Interpretive bulletin relating to investments by employee benefit plans in securities of...

    Science.gov (United States)

    2010-07-01

    ... Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR... Interpretive bulletin relating to investments by employee benefit plans in securities of registered investment.... That section provides that an investment by an employee benefit plan in securities issued by an...

  17. Background Information for the Nevada National Security Site Integrated Sampling Plan, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene; Marutzky, Sam

    2014-12-01

    This document describes the process followed to develop the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan). It provides the Plan’s purpose and objectives, and briefly describes the Underground Test Area (UGTA) Activity, including the conceptual model and regulatory requirements as they pertain to groundwater sampling. Background information on other NNSS groundwater monitoring programs—the Routine Radiological Environmental Monitoring Plan (RREMP) and Community Environmental Monitoring Program (CEMP)—and their integration with the Plan are presented. Descriptions of the evaluations, comments, and responses of two Sampling Plan topical committees are also included.

  18. Contraceptive security, information flow, and local adaptations: family planning Morocco.

    Science.gov (United States)

    Chandani, Y; Breton, G

    2001-12-01

    Many developing countries increasingly recognize and acknowledge family planning as a critical part of socio-economic development. However, with few health dollars to go around, countries tend to provide essential drugs for curative care, rather than for family planning products. Donors have historically provided free contraceptives for family planning services. Whether products are donated or purchased by the country, a successful family planning program depends on an uninterrupted supply of products, beginning with the manufacturer and ending with the customer. Any break in the supply chain may cause a family planning program to fail. A well-functioning logistics system can manage the supply chain and ensure that the customers have the products they need, when they need them. Morocco was selected for the case study. The researchers had ready access to key informants and information about the Logistics Management Information System. Because the study had time and resource constraints, research included desktop reviews and interview, rather than data collection in the field. The case study showed that even in a challenging environment an LMIS can be successfully deployed and fully supported by the users. It is critical to customize the system to a country-specific situation to ensure buy-in for the implementation. Significant external support funding and technical expertise are critical components to ensure the initial success of the system. Nonetheless, evidence from the case study shows that, after a system has been implemented, the benefits may not ensure its institutionalization. Other support, including local funding and technical expertise, is required.

  19. Plan Nacional de Desarrollo y Seguridad 1971-1975 (National Plan for Development and Security, 1971-1975).

    Science.gov (United States)

    Boletin del Centro Nacional de Documentacion e Informacion Educativa, 1971

    1971-01-01

    This article discusses the education provisions established in the Argentine Plan for Development and Security (1971-1975). The statements on educational development call for a diagnostic study of the current cultural and educational situation, the establishment of objectives and strategies, goals for each level of education, steps for the…

  20. Virtual reality in the creation of a tool to support planning of physical security at nuclear facilities

    International Nuclear Information System (INIS)

    Santo, Andre Cotelli do E.; Mol, Antonio Carlos de A.; Goncalves, Deise Galvao de S.; Marins, Eugenio; Freitas, Victor Goncalves G.

    2013-01-01

    In recent years was observed the importance of improving the physical security of nuclear facilities, mainly due to the increasing advancement of brazilian nuclear program. The present work aims to develop a tool that allows the visualization and planning of action strategies in a virtual environment, in order to improve this security. To this end, was created a virtual model of the Instituto de Engenharia Nuclear (IEN), which is located on Ilha do Fundao - Rio de Janeiro - Brazil. This environment is a three-dimensional model, with representations close to reality, where virtual characters (avatars) can move and interact in real time. In this virtual world, it was developed a dynamic weather system, where is possible to change between day and night, and climate changes such as: rain, storms, snow, among other features. Furthermore, the tool has a surveillance system using virtual cameras, allowing the monitoring of the environment. This way, making possible to simulate strategies approach, allowing an evaluation of the procedures performed, as well as assisting in the training of security installations subject to radiation. (author)

  1. Virtual reality in the creation of a tool to support planning of physical security at nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Santo, Andre Cotelli do E.; Mol, Antonio Carlos de A.; Goncalves, Deise Galvao de S.; Marins, Eugenio; Freitas, Victor Goncalves G., E-mail: cotelli.andre@gmail.com, E-mail: mol@ien.gov.br, E-mail: deise.galvao@gmail.com, E-mail: eugenio@ien.gov.br, E-mail: vgoncalves@ien.gov.br [Instituto de Engenharia Nuclear (IEN/CNEN-RJ), Rio De Janeiro, RJ (Brazil)

    2013-07-01

    In recent years was observed the importance of improving the physical security of nuclear facilities, mainly due to the increasing advancement of brazilian nuclear program. The present work aims to develop a tool that allows the visualization and planning of action strategies in a virtual environment, in order to improve this security. To this end, was created a virtual model of the Instituto de Engenharia Nuclear (IEN), which is located on Ilha do Fundao - Rio de Janeiro - Brazil. This environment is a three-dimensional model, with representations close to reality, where virtual characters (avatars) can move and interact in real time. In this virtual world, it was developed a dynamic weather system, where is possible to change between day and night, and climate changes such as: rain, storms, snow, among other features. Furthermore, the tool has a surveillance system using virtual cameras, allowing the monitoring of the environment. This way, making possible to simulate strategies approach, allowing an evaluation of the procedures performed, as well as assisting in the training of security installations subject to radiation. (author)

  2. FORMATION OF FINANCIAL SECURITY OF THE ENTERPRISE BASED ON STRATEGIC PLANNING

    Directory of Open Access Journals (Sweden)

    Nadiya Rushchyshyn

    2017-09-01

    Full Text Available The purpose of the study is to improve ways of forming financial security of the enterprise based onstrategic planning. The subject of the research: formation of financial security of the enterprise on the basis of strategicplanning. The methodological background of the research is a set of theoretical and general scientific methods:analysis and synthesis, theoretical and logical generalization, grouping, abstraction, and others. The paper providesa general description of the core approaches defining the concept of “financial security of the enterprise”. Functionalgoals of financial security of the enterprise are outlined, namely: ensuring financial stability and independence;achievement of high competitiveness in the market of goods, works, services; ensuring high efficiency of financialand economic activity; ensuring high liquidity of assets, and increasing the market value of the enterprise; supportfor the appropriate level of business activity and image; formation of information security and commercialsecrets; efficient organization of security of share capital and assets of the enterprise. The scheme of organizationof financial security organization is considered based on strategic planning. It is determined that the strategicplanning results in strategic plan (strategy for ensuring the financial security of the enterprise. Such a strategyshould be consistent with both financial and the company’s overall strategies, as well as main goals and objectives.For the most effective implementation of the chosen financial security strategy at the enterprise, it is expedientto develop and implement a system of plans covering all aspects of the strategic planning process, including thetarget program, strategic, tactical, calendar, and individual plans. The system of plans should specify: the purpose ofchanges in the functioning of internal systems of the enterprise; terms of making changes; the work that needs tobe done to make changes; their

  3. The Security Plan for the Joint Euratom/IAEA Remote Monitoring Network

    International Nuclear Information System (INIS)

    Stronkhorst, J.; Schoop, K.; Ruuska, K.; Kurek, S.; Levert, J.F.

    2015-01-01

    The European Commission and the IAEA have installed surveillance systems in all larger civil European nuclear facilities. The monitoring data is gathered by optical surveillance systems, electronic sealing systems and numerous measuring devices. The on-site joint Euratom/IAEA monitoring networks operate in general completely isolated from the operator's IT systems. To largely improve data security and reliability, remote data transmission (RDT) is installed on a growing number of sites, and the inspection data is daily transferred to the Data Collect Servers in Luxembourg and Vienna. A growing number of RDT connections and a growing number of security threats require an IT security policy that is pro-active as well as reactive in an efficient way. The risk based approach used in setting up the security plans assesses all elements of the monitoring network, from the implemented technical solution and the assessment of the security needs and threats, up to the incident handling and lessons learned. The results of the assessments are, for each individual RDT connection, described in the technical paragraphs and annexes, including system descriptions, network plans and contact information. The principles of secure data handling as implemented in the shared Euratom /IAEA monitoring network can apply to a broad range of industrial monitoring systems, where human interaction is in general the largest security risk. (author)

  4. Incorporating gender, equity, and human rights into the action planning process: moving from rhetoric to action

    Directory of Open Access Journals (Sweden)

    Sanjeev Sridharan

    2016-09-01

    Full Text Available Background: Mainstreaming of gender, equity, and human rights (GER is an important focus of the World Health Organization (WHO and other UN organizations. This paper explores the role of action plans in mainstreaming GER. This paper is informed by a theory-driven evaluation lens. Design: A theory of change framework explored the following seven dimensions of how action plans can implement mainstreaming of GER: awareness of the foundations of GER; understanding of context; planning to impact GER; implementation for GER; monitoring, evaluation, and learning; planning for sustainability; agenda setting and buy-in. The seven dimensions were used to analyze the action plans. Reviewers also explored innovations within each of the action plans for the seven dimensions. Results: GER mainstreaming is more prominent in the foundation, background, and planning components of the plan but becomes less so along the theory of change including implementation; monitoring and evaluation; sustainability; and agenda setting and buy-in. Conclusions: Our analysis demonstrates that much more can be done to incorporate GER considerations into the action planning process. Nine specific recommendations are identified for WHO and other organizations. A theory-driven approach as described in the paper is potentially helpful for developing clarity by which action plans can help with mainstreaming GER considerations.

  5. Compliance with federal and state regulations regarding the emergency response plan and physical security plan at the Oregon State TRIGA reactor

    International Nuclear Information System (INIS)

    Johnson, A.G.; Ringle, J.C.; Anderson, T.V.

    1976-01-01

    Recent legislative actions within the State of Oregon have had a significant impact upon the OSU TRIGA Emergency Response Plan, and to a lesser extent upon the Physical Security Plan. These state imposed changes will be reviewed in light of existing federal requirements. With the upcoming acquisition of FLIP fuel in August 1976, NRC required several major changes to the existing Physical Security Plan. Within the limitations of public disclosure, these changes will be contrasted to the present plan. (author)

  6. Underground Test Area Activity Communication/Interface Plan, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro, Las Vegas, NV (United States); Rehfeldt, Kenneth [Navarro, Las Vegas, NV (United States)

    2016-10-01

    The purpose of this plan is to provide guidelines for effective communication and interfacing between Underground Test Area (UGTA) Activity participants, including the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) and its contractors. This plan specifically establishes the following: • UGTA mission, vision, and core values • Roles and responsibilities for key personnel • Communication with stakeholders • Guidance in key interface areas • Communication matrix

  7. US energy security plans threatened by militant Venezuela

    International Nuclear Information System (INIS)

    Anon.

    2005-01-01

    Faced with the need to import increasing volumes of crude oil and the desire to avoid over-dependence on the Middle East, the United States is looking to its own hemisphere for more oil. Unfortunately for Washington, the continent's largest oil exporter does not appear to want to co-operate. Venezuela's President, Hugo Chavez, wants to reduce his country's political and economic ties with the US and is seeking other markets for its oil. He has also picked a fight with US oil companies operating in Venezuela, disputing their taxes and refusing to approve their upstream investment programmes, giving rise to fears that oil and gas production will not grow as planned, thereby reducing future export levels. (author)

  8. Planning for Success: Constructing a First Responder Planning Methodology for Homeland Security

    National Research Council Canada - National Science Library

    Jankowski, Thaddeus K., Sr

    2005-01-01

    .... This thesis argues that the fire service and others in the first responder community will be able to contribute to homeland security missions much more effectively, and efficiently, by switching...

  9. Information security in academic libraries: the role of the librarian in planning and introducing institutional policies

    Directory of Open Access Journals (Sweden)

    Juliana Soares Lima

    2017-04-01

    Full Text Available This study presents a short discussion about the role of the librarian as a mediator at planning, developing and implementing an Information Security Policy in Academic Libraries, by working together with professionals in the field of Information Technology. It also discusses the main virtual threats and some risks that are prone to infect computers in libraries. Based on the current legislation and on some normative documents about information security, it is confirmed the importance of the librarian take part in the main decision-making related to information security, such as planning a consistent Information Security Policy which be able to see the specific needs of Academic Libraries as institutions prone to cyberattacks. The main topics and guidelines to carry out an Information Security Policy are presented based on the results that were obtained through an action research, by visiting libraries to fill in application forms and to compose reports whose content was analyzed. Finally, the study concludes that Information Security Policy must be validated by managers of sectors or departments which the Academic Library is hierarchically subordinate to.

  10. Homeland Security is Hometown Security: Comparison and Case Studies of Vertically Synchronized Catastrophe Response Plans

    Science.gov (United States)

    2015-09-01

    Hurricanes Andrew, Hugo , and Katrina resonate as failures where there was little, if any, federal response in the initial hours, which left the depleted...was also initiated by several large scale incidents, including the Three Mile Island Disaster and Hurricanes Hugo and Andrew.67 This evolved at the...persist during large scale disasters, as was demonstrated during Hurricane Katrina and Super Storm Sandy. Catastrophe response planning at the

  11. Moving from Survival to Fulfillment: A Planning Framework for Community Schools

    Science.gov (United States)

    Shaia, Wendy E.; Finigan-Carr, Nadine

    2018-01-01

    Community schooling is an effective tool for combating the effects of poverty by integrating academic, social service, health, and economic supports for students, families, and community members. But this is complex work, requiring extraordinarily careful planning and assessment. This article suggests a planning framework that can help community…

  12. Integrated Food and Nutrition Security Programming to Address Undernutrition : The Plan Approach

    NARCIS (Netherlands)

    Boer, de F.A.; Verdonk, I.

    2012-01-01

    From a technical point of view, it is widely recognised that an integrated approach to food and nutrition security is an effective way to promote child nutritional well-being. In this desk review, based on project documents of the countries which took part in the PLAN NL supported Food and Nutrition

  13. Acceptance criteria for the evaluation of Category 1 fuel cycle facility physical security plans

    Energy Technology Data Exchange (ETDEWEB)

    Dwyer, P.A.

    1991-10-01

    This NUREG document presents criteria developed from US Nuclear Regulatory Commission regulations for the evaluation of physical security plans submitted by Category 1 fuel facility licensees. Category 1 refers to those licensees who use or possess a formula quantity of strategic special nuclear material.

  14. Acceptance criteria for the evaluation of Category 1 fuel cycle facility physical security plans

    International Nuclear Information System (INIS)

    Dwyer, P.A.

    1991-10-01

    This NUREG document presents criteria developed from US Nuclear Regulatory Commission regulations for the evaluation of physical security plans submitted by Category 1 fuel facility licensees. Category 1 refers to those licensees who use or possess a formula quantity of strategic special nuclear material

  15. 75 FR 10973 - Hazardous Materials: Risk-Based Adjustment of Transportation Security Plan Requirements

    Science.gov (United States)

    2010-03-09

    ... (explosive) material; (3) More than 1 L (1.06 qt.) per package of a material poisonous by inhalation in... controlled; and 6.1 materials poisonous by inhalation. We also proposed to require security plans for any... happens very rapidly, and in the process, the propane combines readily with air to form fuel air mixtures...

  16. 76 FR 80205 - Instituting a National Action Plan On Women, Peace, And Security

    Science.gov (United States)

    2011-12-23

    ... strengthen its efforts to prevent--and protect women and children from--harm, exploitation, discrimination... systems through the integration of gender perspectives, and invest in women and girls' health, education... Instituting a National Action Plan On Women, Peace, And Security By the authority vested in me as President by...

  17. Energy planning and security of supply in Spain and their compliance with the European legal framework

    International Nuclear Information System (INIS)

    Dolader, J.

    2004-01-01

    The electricity and gas markets in Spain were liberalized by the 1997 Electricity Act and the 1998 Hydrocarbons Act, respectively. The final step of the liberalization process was completed in January 2003 with the full eligibility of Spanish electricity and gas consumers. The liberalization Acts include in addition a two-way long-term energy planning process within a ten-year time scope. On the one hand the planning process involves binding planning concerning the so called 'basic infrastructures' (which include the electricity and gas transmission networks plus the total re-gasification capacity), and on the other hand, an indicative energy planning aimed at facilitating the decision making of administrations and agents by forecasting energy demand, and analyzing its coverage under the premises of security of supply. The present paper describes the current energy planning system in Spain, the provisions to ensure the security of supply and their compliance with the new European legislation - both the proposed and the existent one - regarding the security of supply in the EU.(author)

  18. Exclusión y seguridad social en el plan de desarrollo Exclusion and social security in the Development Plan

    Directory of Open Access Journals (Sweden)

    Rodríguez Salazar Oscar

    1999-06-01

    Full Text Available Este articulo analiza la forma en que el Plan de Desarrollo "Cambio para contruir la Paz" trata el sistema de seguridad social y su interpretacion sobre las causas de la exclusion social. El plan carece de una vision de conjunto del sistema por cuanto no aborda los aspectos reisgos profesionles y pensiones; articula el concepto de solidaridad a las relaciones interpersonales y, asi, subestima el papel del Estado en el logro de esa meta. Por otra parte, las politicas laborales esbozadas en el Plan conducen en forma inexorable a una mayor exclusion social. En cuanto al sistema de seguridad social en salud, dado que la cobertura se ha extendido mediante el regimen subsidiado, la ausencia de una politica que promueva el control social puede acentuar la clientelizacion que Estado manifiesta querer combatir.This article analyzes the way that the Development Plan "Changeto Build Peace" treats the social security system and its interpretation of the causes of social exclusion. The Plan lacks a vision of the system as a whole as it does not address the aspects of professional risks and pensions; it articula tes the concept of solidarity to interpersonal relations and thus underestimates the role of the State in achieving that goal. Moreover, the labor policies outlined in the Plan lead inexorably to greater social exclusion. As far as the social security system for health, given that coverage has been extended by meansof the subsidized regime, the absence of a policy that promotes social control may accentuate the clientelization of the State which the Plan claims to want to combato.

  19. CS651 Computer Systems Security Foundations 3d Imagination Cyber Security Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    Nielsen, Roy S. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-03-02

    3d Imagination is a new company that bases its business on selling and improving 3d open source related hardware. The devices that they sell include 3d imagers, 3d printers, pick and place machines and laser etchers. They have a fast company intranet for ease in sharing, storing and printing large, complex 3d designs. They have an employee set that requires a variety of operating systems including Windows, Mac and a variety of Linux both for running business services as well as design and test machines. There are a wide variety of private networks for testing transfer rates to and from the 3d devices, without interference with other network tra c. They do video conferencing conferencing with customers and other designers. One of their machines is based on the project found at delta.firepick.org(Krassenstein, 2014; Biggs, 2014), which in future, will perform most of those functions. Their devices all include embedded systems, that may have full blown operating systems. Most of their systems are designed to have swappable parts, so when a new technology is born, it can be quickly adopted by people with 3d Imagination hardware. This company is producing a fair number of systems and components, however to get the funding they need to mass produce quality parts, so they are preparing for an IPO to raise the funds they need. They would like to have a cyber-security audit performed so they can give their investors con dence that they are protecting their data, customers information and printers in a proactive manner.

  20. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  1. Bechtel Hanford, Inc. network security plan for the environmental restoration contract

    International Nuclear Information System (INIS)

    McCaffrey, M.B.

    1997-01-01

    As part of the Computer Protection Program, this Network Security Plan identifies the specific security measures used to protect the Bechtel Hanford, Inc. (BHI) enterprise network. The network consists of the communication infrastructure and information systems used by BHI to perform work related to the Environmental Restoration Contract (ERC) at the Hanford Site. It provides electronic communication between the ERC-leased facilities in Richland, Washington and other facilities located on the Hanford Site. Network gateways to other site and offsite networks provide electronic communication with the rest of the Hanford community. The enterprise network is comprised of several individual networks that operate under different conditions and perform different functions. The principal network used by BHI is the Bechtel Local Area Network (BLAN). This document identifies specific security issues surrounding the BLAN and the measures BHI takes to protect it. The other BHI-operated networks are discussed from the perspective of the security impact they have on the BLAN. This plan addresses security for individual and shared computer systems connected to the BHI networks as well as the gateways between other site and external networks. It specifically does not address computer-based information systems that store or process particularly sensitive data, computer systems connected to other site networks (e.g., Hanford Local Area Network), or standalone computers located in ERC facilities

  2. Four-dimensional treatment planning and fluoroscopic real-time tumor tracking radiotherapy for moving tumor

    International Nuclear Information System (INIS)

    Shirato, Hiroki; Shimizu, Shinichi; Kitamura, Kei; Nishioka, Takeshi; Kagei, Kenji; Hashimoto, Seiko; Aoyama, Hidefumi; Kunieda, Tatsuya; Shinohara, Nobuo; Dosaka-Akita, Hirotoshi; Miyasaka, Kazuo

    2000-01-01

    Purpose: To achieve precise three-dimensional (3D) conformal radiotherapy for mobile tumors, a new radiotherapy system and its treatment planning system were developed and used for clinical practice. Methods and Materials: We developed a linear accelerator synchronized with a fluoroscopic real-time tumor tracking system by which 3D coordinates of a 2.0-mm gold marker in the tumor can be determined every 0.03 second. The 3D relationships between the marker and the tumor at different respiratory phases are evaluated using CT image at each respiratory phase, whereby the optimum phase can be selected to synchronize with irradiation (4D treatment planning). The linac is triggered to irradiate the tumor only when the marker is located within the region of the planned coordinates relative to the isocenter. Results: The coordinates of the marker were detected with an accuracy of ± 1 mm during radiotherapy in the phantom experiment. The time delay between recognition of the marker position and the start or stop of megavoltage X-ray irradiation was 0.03 second. Fourteen patients with various tumors were treated by conformal radiotherapy with a 'tight' planning target volume (PTV) margin. They were surviving without relapse or complications with a median follow-up of 6 months. Conclusion: Fluoroscopic real-time tumor tracking radiotherapy following 4D treatment planning was developed and shown to be feasible to improve the accuracy of the radiotherapy for mobile tumors

  3. Business planning: can the health service move from strategy into action?

    Science.gov (United States)

    Bennett, A R

    1994-01-01

    Advances the case for the use of one particular business planning technique within a National Health Service Trust. At the present time, NHS trusts are required to write strategic direction statements. Evidence suggests that these documents provide an accurate account of past performance and present position of the trust, but do not express the future position intended to be achieved. These documents also tend to be lengthy and lack strategic focus, which means that they are not helpful to managers who want clear organizational goals and objectives to which to work. Attempts to address the difficulties associated with determining how existing skills and resources can be used as the platform for future growth strategies by using the Ansoff Matrix and SWOT Analysis planning tools, given the external changes in the marketplace. Also attempts to shed light on some of the important links between busines strategy and management development by extending planning theory into practice.

  4. Everything moves on: referral trends to a leavers' group in a high secure hospital and trial leave progress of group graduates.

    Science.gov (United States)

    Adshead, Gwen; Pyszora, Natalie; Wilson, Claire; Gopie, Ramesh; Thomas, Deryk; Smith, Julia; Glorney, Emily; Moore, Estelle; Tapp, James

    2017-04-01

    Moving on from high secure psychiatric care can be a complex and potentially stressful experience, which may hinder progression. A leavers' group in a UK high secure hospital is offered to support patients with this transition. The aims of this study are to investigate characteristics of patients referred for the leavers' group and compare outcomes for leavers' group graduates with those for patients who never attended a leavers' group for any reason. A retrospective quasi-experimental design was applied to data extracted from various records sources - within and outside the high security hospital. About one-fifth of patients who left the hospital on trial leave during the study were referred to the leavers' group (N = 109). Referred patients were significantly more likely to have either been admitted from another high-security hospital or transferred from prison for treatment and have a diagnosis of paranoid schizophrenia. Patients not referred had a significantly higher rate of previously refusing to participate in groups. There was a tendency for rate of return from trial leave for group graduates to be lower than that of patients who did not attend the leavers' group, but this just failed to reach statistical significance (rate ratio [RR] = 1.04; CI 0.97-1.11). A leavers' group appeared to be a valued therapy option for people who had spent a long time in high secure psychiatric care, or those who continued to require hospital treatment beyond prison tariffs. There was a low return rate from trial leave, which made the evaluation of this outcome difficult. A detailed study into both the reasons for return from trial leave and successes would provide further information on ideal preparation for moving on. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  5. Moving out or living on a mound? Jointly planning a Dutch flood adaptation project

    NARCIS (Netherlands)

    Roth, D.; Winnubst, M.

    2014-01-01

    All over the world spatial flood risk management policies are on the rise. This paper analyses the planning process for the Overdiepse polder, a so-called “Room for the River” project in the Netherlands. After high water in the 1990s, the Dutch government changed its flood risk management policy.

  6. Transmit Power Minimization and Base Station Planning for High-Speed Trains with Multiple Moving Relays in OFDMA Systems

    KAUST Repository

    Ghazzai, Hakim

    2016-03-15

    High-speed railway system equipped with moving relay stations placed on the middle of the ceiling of each train wagon is investigated. The users inside the train are served in two hops via the orthogonal frequency-division multiple access (OFDMA) technology. In this work, we first focus on minimizing the total downlink power consumption of the base station (BS) and the moving relays while respecting specific quality of service (QoS) constraints. We first derive the optimal resource allocation solution in terms of OFDMA subcarriers and power allocation using the dual decomposition method. Then, we propose an efficient algorithm based on the Hungarian method in order to find a suboptimal but low complexity solution. Moreover, we propose an OFDMA planning solution for high-speed train by finding the maximal inter-BS distance given the required user data rates in order to perform seamless handover. Our simulation results illustrate the performance of the proposed resource allocation schemes in the case of the 3GPP Long Term Evolution-Advanced (LTE-A) and compare them with previously developed algorithms as well as with the direct transmission scenario. Our results also highlight the significant planning gain obtained thanks to the use of multiple relays instead of the conventional single relay scenario.

  7. Long-term optimal energy mix planning towards high energy security and low GHG emission

    International Nuclear Information System (INIS)

    Thangavelu, Sundar Raj; Khambadkone, Ashwin M.; Karimi, Iftekhar A.

    2015-01-01

    Highlights: • We develop long-term energy planning considering the future uncertain inputs. • We analyze the effect of uncertain inputs on the energy cost and energy security. • Conventional energy mix prone to cause high energy cost and energy security issues. • Stochastic and optimal energy mix show benefits over conventional energy planning. • Nuclear option consideration reduces the energy cost and carbon emissions. - Abstract: Conventional energy planning focused on energy cost, GHG emission and renewable contribution based on future energy demand, fuel price, etc. Uncertainty in the projected variables such as energy demand, volatile fuel price and evolution of renewable technologies will influence the cost of energy when projected over a period of 15–30 years. Inaccurate projected variables could affect energy security and lead to the risk of high energy cost, high emission and low energy security. The energy security is an ability of generation capacity to meet the future energy demand. In order to minimize the risks, a generic methodology is presented to determine an optimal energy mix for a period of around 15 years. The proposed optimal energy mix is a right combination of energy sources that minimize the risk caused due to future uncertainties related to the energy sources. The proposed methodology uses stochastic optimization to address future uncertainties over a planning horizon and minimize the variations in the desired performance criteria such as energy security and costs. The developed methodology is validated using a case study for a South East Asian region with diverse fuel sources consists of wind, solar, geothermal, coal, biomass and natural gas, etc. The derived optimal energy mix decision outperformed the conventional energy planning by remaining stable and feasible against 79% of future energy demand scenarios at the expense of 0–10% increase in the energy cost. Including the nuclear option in the energy mix resulted 26

  8. Evaluation of the Dawson College Shooting Psychological Intervention: Moving Toward a Multimodal Extensive Plan

    Science.gov (United States)

    Séguin, Monique; Chawky, Nadia; Lesage, Alain; Boyer, Richard; Guay, Stéphane; Bleau, Pierre; Miquelon, Paule; Szkrumelak, Nadia; Steiner, Warren; Roy, Denise

    2013-01-01

    In 2006, following the shooting at Dawson College, the authorities implemented an intervention plan. This provided an opportunity to analyze the responses to services offered, and afforded a learning opportunity, which led to the proposal of an extensive multimodal short- and long-term psychological plan for future needs. Both quantitative and qualitative data were gathered 18 months after the event, involving the participation of 948 students and staff. Mental health problems and the perception of services offered after the shooting were investigated, using standardized measures. Second, focus groups and individual interviews were conducted among a subgroup of participants (support team members; teachers and employees; students and parents) and permitted to gather data on services received and services required. Individual report of events, the extent of psychological impact and services offered and received were analyzed in terms of the following dimensions: intervention philosophy, training, ongoing offer of services and finally, detection and outreach. A significant incidence of disorders and a high rate of exacerbation of preexisting mental disorders were observed within the 18 months following the shooting. Postimmediate and short-term intervention appeared adequate, but the long-term collective vision toward community support and availability of mental health services were lacking. Lessons learned from this evaluation and other school shootings suggest that preparedness and long-term community responses are often overlooked. A multimodal extensive plan is proposed based on a theoretical model from which interventions strategies could be drawn. PMID:24795790

  9. Sustainable Cattle Ranching in Practice: Moving from Theory to Planning in Colombia's Livestock Sector

    Science.gov (United States)

    Lerner, Amy M.; Zuluaga, Andrés Felipe; Chará, Julián; Etter, Andrés; Searchinger, Timothy

    2017-08-01

    A growing population with increasing consumption of milk and dairy require more agricultural output in the coming years, which potentially competes with forests and other natural habitats. This issue is particularly salient in the tropics, where deforestation has traditionally generated cattle pastures and other commodity crops such as corn and soy. The purpose of this article is to review the concepts and discussion associated with reconciling food production and conservation, and in particular with regards to cattle production, including the concepts of land-sparing and land-sharing. We then present these concepts in the specific context of Colombia, where there are efforts to increase both cattle production and protect tropical forests, in order to discuss the potential for landscape planning for sustainable cattle production. We outline a national planning approach, which includes disaggregating the diverse cattle sector and production types, identifying biophysical, and economic opportunities and barriers for sustainable intensification in cattle ranching, and analyzing areas suitable for habitat restoration and conservation, in order to plan for both land-sparing and land-sharing strategies. This approach can be used in other contexts across the world where there is a need to incorporate cattle production into national goals for carbon sequestration and habitat restoration and conservation.

  10. Sustainable Cattle Ranching in Practice: Moving from Theory to Planning in Colombia's Livestock Sector.

    Science.gov (United States)

    Lerner, Amy M; Zuluaga, Andrés Felipe; Chará, Julián; Etter, Andrés; Searchinger, Timothy

    2017-08-01

    A growing population with increasing consumption of milk and dairy require more agricultural output in the coming years, which potentially competes with forests and other natural habitats. This issue is particularly salient in the tropics, where deforestation has traditionally generated cattle pastures and other commodity crops such as corn and soy. The purpose of this article is to review the concepts and discussion associated with reconciling food production and conservation, and in particular with regards to cattle production, including the concepts of land-sparing and land-sharing. We then present these concepts in the specific context of Colombia, where there are efforts to increase both cattle production and protect tropical forests, in order to discuss the potential for landscape planning for sustainable cattle production. We outline a national planning approach, which includes disaggregating the diverse cattle sector and production types, identifying biophysical, and economic opportunities and barriers for sustainable intensification in cattle ranching, and analyzing areas suitable for habitat restoration and conservation, in order to plan for both land-sparing and land-sharing strategies. This approach can be used in other contexts across the world where there is a need to incorporate cattle production into national goals for carbon sequestration and habitat restoration and conservation.

  11. The SNL/NM Classified Waste Landfill Excavation: Lessons Learned Moving from Planning to Implementation

    International Nuclear Information System (INIS)

    Galloway, Robert B; Slavin, Paula

    1999-01-01

    The Sandia National Laboratories/New Mexico (SNL/NM) Environmental Restoration Project is halfway through excavating the Classified Waste Landfill in Technical Area II, a disposal area for weapon components for approximately 40 years. While the planning phase of any project is important, it is only a means of getting to the field implementation phase where reality quickly sinks in. Documents outlining the general processes are developed, heavy equipment, supply needs, requisite skills, and staffing levels are anticipated, and contingencies for waste management are put in place. However, the nature of landfill excavation dictates that even the most detailed plans will probably change. This project is proving that trying to account for undefined variables and predicting the total cost of landfill remediation is very difficult if the contents are not well known. In landfill excavation, contingency cannot be minimized. During development of the waste management plan, it was recognized that even the best forecasting could not formulate the perfect cradle-to-grave processes because waste streams are rarely definable before excavation begins. Typically, as excavation progresses and waste streams are generated, new characterization information allows further definition of disposal options which, in turn, modify the generation/management process. A general plan combined with close involvement of waste management personnel to resolve characterization and packaging questions during generation has worked very well. And, as expected, each new pit excavated creates new waste management challenges. The material excavated consists primarily of classified weapon assemblies and related components, so disposition must include demilitarization and sanitization. The demilitarization task at the start of the project was provided by an SNL/NM group that has since lost their funding and operational capability. This project is having to take on the task of disassembly, destruction, and

  12. Collaborative Adaptation Planning for Water Security: Preliminary Lessons, Challenges, and the Way Forward for Maipo Basin Adaptation Plan, Chile

    Science.gov (United States)

    Vicuna, S.; Scott, C. A.; Bonelli, S.; Bustos, E.; Meza, F. J.

    2014-12-01

    The Maipo basin holds 40% of Chile's total population and almost half of the country's Gross Domestic Product. The basin is located in the semiarid central region of the country and, aside from the typical pressures of growth in developing country basins, the Maipo river faces climate change impacts associated with a reduction in total runoff and changes in its seasonality. Surface water is the main water source for human settlements and economic activities including agriculture. In 2012 we started a research project to create a climate variability and climate change adaptation plan for the basin. The pillars of the plan are co-produced by researchers and a Scenario Building Team (SBT) with membership of relevant water and land use stakeholders (including from civil society, public and private sectors) in the basin. Following similar experiences in other regions in the world that have faced the challenges of dealing with long term planning under uncertainty, the project has divided the task of developing the plan into a series of interconnected elements. A critical first component is to work on the desired vision(s) of the basin for the future. In this regards, the "water security" concept has been chosen as a framework that accommodates all objectives of the SBT members. Understanding and quantifying the uncertainties that could affect the future water security of the basin is another critical aspect of the plan. Near and long term climate scenarios are one dimension of these uncertainties that are combined with base development uncertainties such as urban growth scenarios. A third component constructs the models/tools that allows the assessment of impacts on water security that could arise under these scenarios. The final critical component relates to the development of the adaptation measures that could avoid the negative impacts and/or capture the potential opportunities. After two years in the development of the adaptation plan a series of results has been

  13. Bio-inspired motion planning algorithms for autonomous robots facilitating greater plasticity for security applications

    Science.gov (United States)

    Guo, Yi; Hohil, Myron; Desai, Sachi V.

    2007-10-01

    Proposed are techniques toward using collaborative robots for infrastructure security applications by utilizing them for mobile sensor suites. A vast number of critical facilities/technologies must be protected against unauthorized intruders. Employing a team of mobile robots working cooperatively can alleviate valuable human resources. Addressed are the technical challenges for multi-robot teams in security applications and the implementation of multi-robot motion planning algorithm based on the patrolling and threat response scenario. A neural network based methodology is exploited to plan a patrolling path with complete coverage. Also described is a proof-of-principle experimental setup with a group of Pioneer 3-AT and Centibot robots. A block diagram of the system integration of sensing and planning will illustrate the robot to robot interaction to operate as a collaborative unit. The proposed approach singular goal is to overcome the limits of previous approaches of robots in security applications and enabling systems to be deployed for autonomous operation in an unaltered environment providing access to an all encompassing sensor suite.

  14. New Design of Mobile Robot Path Planning with Randomly Moving Obstacles

    Directory of Open Access Journals (Sweden)

    T. A. Salih

    2013-05-01

    Full Text Available The navigation of a mobile robot in an unknown environment has always been a very challenging task. In order to achieve safe and autonomous navigation, the mobile robot needs to sense the surrounding environment and plans a collision-free path. This paper focuses on designing and implementing a mobile robot which has the ability of navigating smoothly in an unknown environment, avoiding collisions, without having to stop in front of obstacles, detecting leakage of combustible gases and transmitting a message of detection results to the civil defense unit automatically through the Internet to the E-mail. This design uses the implementation of artificial neural network (ANN on a new technology represented by Field Programmable Analog Array (FPAA for controlling the motion of the robot. The robot with the proposed controller is tested and has completed the required objective successfully.

  15. Emergency medical consequence planning and management for national special security events after September 11: Boston 2004.

    Science.gov (United States)

    Kade, Kristy A; Brinsfield, Kathryn H; Serino, Richard A; Savoia, Elena; Koh, Howard K

    2008-10-01

    The post-September 11 era has prompted unprecedented attention to medical preparations for national special security events (NSSE), requiring extraordinary planning and coordination among federal, state, and local agencies. For an NSSE, the US Secret Service (USSS) serves as the lead agency for all security operations and coordinates with relevant partners to provide for the safety and welfare of participants. For the 2004 Democratic National Convention (DNC), designated an NSSE, the USSS tasked the Boston Emergency Medical Services (BEMS) of the Boston Public Health Commission with the design and implementation of health services related to the Convention. In this article, we describe the planning and development of BEMS' robust 2004 DNC Medical Consequence Management Plan, addressing the following activities: public health surveillance, on-site medical care, surge capacity in the event of a mass casualty incident, and management of federal response assets. Lessons learned from enhanced medical planning for the 2004 DNC may serve as an effective model for future mass gathering events.

  16. Underground Test Area Quality Assurance Project Plan Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Irene Farnham

    2011-05-01

    This Quality Assurance Project Plan (QAPP) provides the overall quality assurance (QA) program requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Underground Test Area (UGTA) Sub-Project (hereafter the Sub-Project) activities. The requirements in this QAPP are consistent with DOE Order 414.1C, Quality Assurance (DOE, 2005); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). The QAPP Revision 0 supersedes DOE--341, Underground Test Area Quality Assurance Project Plan, Nevada Test Site, Nevada, Revision 4.

  17. Theater Security Cooperation Planning with Article 98: How the 2002 Servicemembers' Protection Act Fosters China's Quest for Global Influence

    National Research Council Canada - National Science Library

    Hernandez, Jaime A

    2005-01-01

    The Combatant Commander is hindered in constructing Theater Security Cooperation plans due to the restrictions placed upon foreign military aid dispersal as a result of the 2002 American Servicemembers' Protection Act...

  18. Soil Management Plan for the Oak Ridge Y-12 National Security Complex Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2005-03-02

    This Soil Management Plan applies to all activities conducted under the auspices of the National Nuclear Security Administration (NNSA) Oak Ridge Y-12 National Security Complex (Y-12) that involve soil disturbance and potential management of waste soil. The plan was prepared under the direction of the Y-12 Environmental Compliance Department of the Environment, Safety, and Health Division. Soil disturbances related to maintenance activities, utility and building construction projects, or demolition projects fall within the purview of the plan. This Soil Management Plan represents an integrated, visually oriented, planning and information resource tool for decision making involving excavation or disturbance of soil at Y-12. This Soil Management Plan addresses three primary elements. (1) Regulatory and programmatic requirements for management of soil based on the location of a soil disturbance project and/or the regulatory classification of any contaminants that may be present (Chap. 2). Five general regulatory or programmatic classifications of soil are recognized to be potentially present at Y-12; soil may fall under one or more these classifications: (a) Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) pursuant to the Oak Ridge Reservation (ORR) Federal Facilities Agreement; (b) Resource Conservation and Recovery Act (RCRA); (c) RCRA 3004(u) solid waste managements units pursuant to the RCRA Hazardous and Solid Waste Amendments Act of 1984 permit for the ORR; (d) Toxic Substances and Control Act-regulated soil containing polychlorinated biphenyls; and (e) Radiologically contaminated soil regulated under the Atomic Energy Act review process. (2) Information for project planners on current and future planned remedial actions (RAs), as prescribed by CERCLA decision documents (including the scope of the actions and remedial goals), land use controls implemented to support or maintain RAs, RCRA post-closure regulatory requirements for

  19. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  20. A cost-benefit analysis of the Mexican Social Security Administration's family planning program.

    Science.gov (United States)

    Nortman, D L; Halvas, J; Rabago, A

    1986-01-01

    A cost-benefit analysis of the family planning program of the Mexican Social Security System (IMSS) was undertaken to test the hypothesis that IMSS's family planning services yield a net savings to IMSS by reducing the load on its maternal and infant care service. The cost data are believed to be of exceptionally high quality because they were empirically ascertained by a retrospective and prospective survey of unit time and personnel costs per specified detailed type of service in 37 IMSS hospitals and 16 clinics in 13 of Mexico's 32 states. Based on the average cost per case, the analysis disclosed that for every peso (constant 1983 currency) that IMSS spent on family planning services to its urban population during 1972-1984 inclusive, the agency saved nine pesos. The article concludes by raising the speculative question as to the proportion of the births averted by the IMSS family planning program that would have been averted in the absence of IMSS's family planning services.

  1. Development of a strategic plan for food security and safety in the Inuvialuit Settlement Region, Canada.

    Science.gov (United States)

    Fillion, Myriam; Laird, Brian; Douglas, Vasiliki; Van Pelt, Linda; Archie, Diane; Chan, Hing Man

    2014-01-01

    Current social and environmental changes in the Arctic challenge the health and well-being of its residents. Developing evidence-informed adaptive measures in response to these changes is a priority for communities, governments and researchers. To develop strategic planning to promote food security and food safety in the Inuvialuit Settlement Region (ISR), Northwest Territories (NWT), Canada. A qualitative study using group discussions during a workshop. A regional workshop gathered Inuit organizations and community representatives, university-based researchers from the Inuit Health Survey (IHS) and NWT governmental organizations. Discussions were structured around the findings from the IHS. For each key area, programs and activities were identified and prioritized by group discussion and voting. The working group developed a vision for future research and intervention, which is to empower communities to promote health, well-being and environmental sustainability in the ISR. The group elaborated missions for the region that address the following issues: (a) capacity building within communities; (b) promotion of the use of traditional foods to address food security; (c) research to better understand the linkages between diseases and contaminants in traditional foods, market foods and lifestyle choices; (d) and promotion of affordable housing. Five programs to address each key area were developed as follows: harvest support and traditional food sharing; education and promotion; governance and policy; research; and housing. Concrete activities were identified to guide future research and intervention projects. The results of the planning workshop provide a blueprint for future research and intervention projects.

  2. Y-12 National Security Complex National Historic Preservation Act Historic Preservation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2003-09-30

    The Historic Preservation Plan (HPP) recognizes that the Y-12 National Security Complex is a vital and long-term component of DOE and NNSA. In addition to NNSA missions, the Office of Science and Energy, the Office of Nuclear Energy, and the Office of Environmental Management have properties located at Y-12 that must be taken into consideration. The HPP also recognizes that the challenge for cultural resource management is incorporating the requirements of NNSA, SC, NE, and EM missions while preserving and protecting its historic resources. The HPP seeks to find an effective way to meet the obligations at Y-12 for historic and archeological protection while at the same time facilitating effective completion of ongoing site mission activities, including removal of obsolete or contaminated facilities, adaptive reuse of existing facilities whenever feasible, and construction of new facilities in order to meet site mission needs. The Y-12 Historic Preservation Plan (HPP) defines the preservation strategy for the Y-12 National Security Complex and will direct efficient compliance with the NHPA and federal archaeological protection legislation at Y-12 as DOE and NNSA continues mission activities of the site.

  3. Moving forward in plant food safety and security through NanoBioSensors: Adopt or adapt biomedical technologies?

    Science.gov (United States)

    Sharma, Tarun K; Ramanathan, Rajesh; Rakwal, Randeep; Agrawal, Ganesh K; Bansal, Vipul

    2015-05-01

    Plant-based foods are integral part of our day-to-day diet. Increasing world population has put forth an ever increasing demand for plant-based foods, and food security remains a major concern. Similarly, biological, chemical, and physical threats to our food and increasing regulatory demands to control the presence of foreign species in food products have made food safety a growing issue. Nanotechnology has already established its roots in diverse disciplines. However, the food industry is yet to harness the full potential of the unique capabilities offered by this next-generation technology. While there might be safety concerns in regards to integration of nanoproducts with our food products, an aspect of nanotechnology that can make remarkable contribution to different elements of the food chain is the use of nanobiosensors and diagnostic platforms for monitoring food traceability, quality, safety, and nutritional value. This brings us to an important question that whether existing diagnostic platforms that have already been well developed for biomedical and clinical application are suitable for food industry or whether the demands of the food industry are altogether different that may not allow adoption/adaptation of the existing technology. This review is an effort to raise this important "uncomfortable" yet "timely" question. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  4. Safeguards and Security FY 1996 Program Plan: WBS 6.6

    Energy Technology Data Exchange (ETDEWEB)

    Lee, F.D.

    1995-08-01

    The Safeguards and Security (SAS) Program is based upon integrity, competence and innovation in the protection of the public and Hanford resources through: (1) outstanding assistance, oversight, education, and counsel to their customers to ensure the protection of the public, site personnel, assets, and information; (2) value-added and cost-effective solutions to Hanford issues; and (3) risk management techniques to ensure effective asset protection, site accessibility, and the flexibility to adapt to changing customer needs. This plan is divided into two parts: overview and SAS WBS (work breakdown structure) dictionary sheets. The overview is divided into vision and mission, goals and objectives, assumptions and priorities, milestones, and a summary. The SAS WBS dictionary sheets are divided into department overhead, general and administrative, sitewide support, Hanford patrol, traffic safety, and locksmith services.

  5. Safeguards and Security FY 1996 Program Plan: WBS 6.6

    International Nuclear Information System (INIS)

    Lee, F.D.

    1995-08-01

    The Safeguards and Security (SAS) Program is based upon integrity, competence and innovation in the protection of the public and Hanford resources through: (1) outstanding assistance, oversight, education, and counsel to their customers to ensure the protection of the public, site personnel, assets, and information; (2) value-added and cost-effective solutions to Hanford issues; and (3) risk management techniques to ensure effective asset protection, site accessibility, and the flexibility to adapt to changing customer needs. This plan is divided into two parts: overview and SAS WBS (work breakdown structure) dictionary sheets. The overview is divided into vision and mission, goals and objectives, assumptions and priorities, milestones, and a summary. The SAS WBS dictionary sheets are divided into department overhead, general and administrative, sitewide support, Hanford patrol, traffic safety, and locksmith services

  6. Development of a strategic plan for food security and safety in the Inuvialuit Settlement Region, Canada

    Directory of Open Access Journals (Sweden)

    Myriam Fillion

    2014-08-01

    Full Text Available Background: Current social and environmental changes in the Arctic challenge the health and well-being of its residents. Developing evidence-informed adaptive measures in response to these changes is a priority for communities, governments and researchers. Objectives: To develop strategic planning to promote food security and food safety in the Inuvialuit Settlement Region (ISR, Northwest Territories (NWT, Canada. Design: A qualitative study using group discussions during a workshop. Methods: A regional workshop gathered Inuit organizations and community representatives, university-based researchers from the Inuit Health Survey (IHS and NWT governmental organizations. Discussions were structured around the findings from the IHS. For each key area, programs and activities were identified and prioritized by group discussion and voting. Results: The working group developed a vision for future research and intervention, which is to empower communities to promote health, well-being and environmental sustainability in the ISR. The group elaborated missions for the region that address the following issues: (a capacity building within communities; (b promotion of the use of traditional foods to address food security; (c research to better understand the linkages between diseases and contaminants in traditional foods, market foods and lifestyle choices; (d and promotion of affordable housing. Five programs to address each key area were developed as follows: harvest support and traditional food sharing; education and promotion; governance and policy; research; and housing. Concrete activities were identified to guide future research and intervention projects. Conclusions: The results of the planning workshop provide a blueprint for future research and intervention projects.

  7. Underground Test Area Activity Quality Assurance Plan Nevada National Security Site, Nevada. Revision 2

    Energy Technology Data Exchange (ETDEWEB)

    Krenzien, Susan [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2015-06-01

    This Quality Assurance Plan (QAP) provides the overall quality assurance (QA) requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) activities. The requirements in this QAP are consistent with DOE Order 414.1D, Change 1, Quality Assurance (DOE, 2013a); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). If a participant’s requirement document differs from this QAP, the stricter requirement will take precedence. NNSA/NFO, or designee, must review this QAP every two years. Changes that do not affect the overall scope or requirements will not require an immediate QAP revision but will be incorporated into the next revision cycle after identification. Section 1.0 describes UGTA objectives, participant responsibilities, and administrative and management quality requirements (i.e., training, records, procurement). Section 1.0 also details data management and computer software requirements. Section 2.0 establishes the requirements to ensure newly collected data are valid, existing data uses are appropriate, and environmental-modeling methods are reliable. Section 3.0 provides feedback loops through assessments and reports to management. Section 4.0 provides the framework for corrective actions. Section 5.0 provides references for this document.

  8. Underground Test Area Activity Quality Assurance Plan Nevada National Security Site, Nevada. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Krenzien, Susan [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2012-10-01

    This Quality Assurance Plan (QAP) provides the overall quality assurance (QA) requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Underground Test Area (UGTA) activities. The requirements in this QAP are consistent with DOE Order 414.1C, Quality Assurance (DOE, 2005); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). NNSA/NSO, or designee, must review this QAP every two years. Changes that do not affect the overall scope or requirements will not require an immediate QAP revision but will be incorporated into the next revision cycle after identification. Section 1.0 describes UGTA objectives, participant responsibilities, and administrative and management quality requirements (i.e., training, records, procurement). Section 1.0 also details data management and computer software requirements. Section 2.0 establishes the requirements to ensure newly collected data are valid, existing data uses are appropriate, and environmental-modeling methods are reliable. Section 3.0 provides feedback loops through assessments and reports to management. Section 4.0 provides the framework for corrective actions. Section 5.0 provides references for this document.

  9. Will Pre-Funding Provide Security for Social Security? A Review of the Literature

    OpenAIRE

    Robert L. Brown

    2000-01-01

    President Clinton has proposed creating larger social security funds and investing a portion of them in the private sector. Others have suggested more radical reforms such as moving social security from a defined-benefit scheme to a defined contribution plan based on the Chilean model. These proposals are based on the goal of creating higher investment returns, which would make social security benefits easier to finance in the long run. After an extensive review of the literature, this paper ...

  10. The Evolution of Missile Defense Plan from Bush to Obama. Implications for the National Security of Romania

    Directory of Open Access Journals (Sweden)

    Ruxandra-Laura BOSILCA

    2012-06-01

    Full Text Available In 2011 Romania officially became part of the Obama administration’s missile defense system in Europe which has significantly changed the strategic military relations both in Europe and worldwide. The Bush approach has been revised and progress in several sections has been achieved, both strategically and technically. For Romania, the participation in the missile defence plan, ensures more solid security guarantees, especially in an unpredictable and risk-prone international environment where the U.S. reconsiders its presence in Europe under the pressure of the economic crisis and of a relative decline in power; it has also become a more visible actor – alongside Bulgaria – which were initially excluded by the Bush missile defence plan. This paper’s purpose is to review the main evolutions of the missile defense plan from the Bush to the Obama administration and to outline its implications on the national security of Romania.

  11. Test and Evaluation for Enhanced Security: A Quantitative Method to Incorporate Expert Knowledge into Test Planning Decisions.

    Energy Technology Data Exchange (ETDEWEB)

    Rizzo, Davinia [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Blackburn, Mark [Stevens Inst. of Technology, Hoboken, NJ (United States)

    2017-03-01

    Complex systems are comprised of technical, social, political and environmental factors as well as the programmatic factors of cost, schedule and risk. Testing these systems for enhanced security requires expert knowledge in many different fields. It is important to test these systems to ensure effectiveness, but testing is limited to due cost, schedule, safety, feasibility and a myriad of other reasons. Without an effective decision framework for Test and Evaluation (T&E) planning that can take into consideration technical as well as programmatic factors and leverage expert knowledge, security in complex systems may not be assessed effectively. Therefore, this paper covers the identification of the current T&E planning problem and an approach to include the full variety of factors and leverage expert knowledge in T&E planning through the use of Bayesian Networks (BN).

  12. Computer Security: Governmentwide Planning Process Had Limited Impact. Report to the Chairman, Committee on Science, Space, and Technology, House of Representatives.

    Science.gov (United States)

    General Accounting Office, Washington, DC. Information Management and Technology Div.

    As required by the Computer Security Act of 1987, federal agencies have to identify systems that contain sensitive information and develop plans to safeguard them. The planning process was assessed in 10 civilian agencies as well as the extent to which they had implemented planning controls described in 22 selected plans. The National Institute of…

  13. Understand the Big Picture So You Can Plan for Network Security

    Science.gov (United States)

    Cervone, Frank

    2005-01-01

    This article discusses network security for libraries. It indicates that there were only six exploit (security exposure) problems, worldwide, reported to the CERT Coordination Center back in 1988. In that year, the CERT had just been established to provide a clearinghouse for exchanging information about network security problems. By 2003, the…

  14. Computer and Network Security in Small Libraries: A Guide for Planning.

    Science.gov (United States)

    Williams, Robert L.

    This manual is intended to provide a free resource on essential network security concepts for non-technical managers of small libraries. Managers of other small nonprofit or community organizations will also benefit from it. An introduction defines network security; outlines three goals of network security; discusses why a library should be…

  15. [Security of hospital infusion practices: From an a priori risk analysis to an improvement action plan].

    Science.gov (United States)

    Pignard, J; Cosserant, S; Traore, O; Souweine, B; Sautou, V

    2016-03-01

    Infusion in care units, and all the more in intensive care units, is a complex process which can be the source of many risks for the patient. Under cover of an institutional approach for the improvement of the quality and safety of patient healthcare, a risk mapping infusion practices was performed. The analysis was focused on intravenous infusion situations in adults, the a priori risk assessment methodology was applied and a multidisciplinary work group established. Forty-three risks were identified for the infusion process (prescription, preparation and administration). The risks' assessment and the existing means of control showed that 48% of them would have a highly critical patient security impact. Recommendations were developed for 20 risks considered to be most critical, to limit their occurrence and severity, and improve their control level. An institutional action plan was developed and validated in the Drug and Sterile Medical Devices Commission. This mapping allowed the realization of an exhaustive inventory of potential risks associated with the infusion. At the end of this work, multidisciplinary groups were set up to work on different themes and regular quarterly meetings were established to follow the progress of various projects. Risk mapping will be performed in pediatric and oncology unit where the risks associated with the handling of toxic products is omnipresent. Copyright © 2015 Académie Nationale de Pharmacie. Published by Elsevier Masson SAS. All rights reserved.

  16. Security Transition Program Office 1994 fiscal year work plan WBS 6.11

    International Nuclear Information System (INIS)

    Brogdon, R.C. Jr.

    1993-10-01

    The Security Transition Program Office (STPO) will change the Hanford Safeguards and Security Protection Program from one that supported the national defense program to one that supports environmental restoration and waste management. A Successful Safeguards and Security Protection Program transition will have an industrial security foundation supplemented to protect material interests and information resources. The transition will change the current approaches to protection philosophy to ones that will provide the Hanford Site with the following: consolidation, reduction, and elimination of safeguards and security interests and targets; greater open Site access; maximum application of technology and automation; interpretation of security policies and procedures in light of the Hanford Site's environmental mission; coexistence with other emergency services; streamlined operations; and protection of employees and the public from health, safety, fire, security, and safeguards risks. This report describes the 1994 program objectives, the technical base, schedule baseline, cost, funding, manpower, and the 1993 program workscope

  17. 41 CFR 102-192.80 - How do we develop written security policies and plans?

    Science.gov (United States)

    2010-07-01

    ... Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION...) Operating procedures; (d) Plan to provide a visible mail screening operation; (e) Training mail center...) Managing threats; (h) Communications plan; (i) Occupant Emergency Plan (OEP); (j) Continuity of Operations...

  18. Looking Back to Move Forward: Collaborative Planning to Revise the Green Mountain and Finger Lakes National Forests Land and Resource Management Plans

    Directory of Open Access Journals (Sweden)

    Michael J Dockry

    2015-07-01

    Full Text Available The United States Department of Agriculture Forest Service (Forest Service manages 154 national forests and 20 grasslands in 44 states and Puerto Rico. National Forest Land and Resource Management Plans (forest plans form the basis for land and resource management of national forests in the United States. For more than a decade the Forest Service has been attempting to incorporate innovative, collaborative public involvement strategies into the process for revising forest plans. In 2012 and 2015 the Forest Service codified new regulations for developing, revising, and amending forest plans. Collaboration and public involvement are explicit goals of the new regulations. This paper briefly reviews the literature on collaborative planning on national forests and explores a successful collaborative planning process used by the Green Mountain and Finger Lakes National Forests, located in Vermont and New York respectively, to develop their 2006 forest plans. This paper shows how the Green Mountain and Finger Lakes National Forests developed parallel public and internal collaborative processes to build trust, relationships, and partnership, and discusses the implications for process design, capacity building, and facilitating agreements. By looking back at this successful case of collaborative forest planning, key lessons can provide ideas for developing collaborative processes for future planning efforts.

  19. Looking back to move forward: collaborative planning to revise the Green Mountain and Finger Lakes National Forests land and resource management plans

    Science.gov (United States)

    Michael J. Dockry

    2015-01-01

    The United States Department of Agriculture Forest Service (Forest Service) manages 154 national forests and 20 grasslands in 44 states and Puerto Rico. National Forest Land and Resource Management Plans (forest plans) form the basis for land and resource management of national forests in the United States. For more than a decade the Forest Service has been attempting...

  20. Transmit Power Minimization and Base Station Planning for High-Speed Trains with Multiple Moving Relays in OFDMA Systems

    KAUST Repository

    Ghazzai, Hakim; Bouchoucha, Taha; Alsharoa, Ahmad; Yaacoub, Elias; Alouini, Mohamed-Slim; Al-Naffouri, Tareq Y.

    2016-01-01

    of the 3GPP Long Term Evolution-Advanced (LTE-A) and compare them with previously developed algorithms as well as with the direct transmission scenario. Our results also highlight the significant planning gain obtained thanks to the use of multiple relays

  1. Corrective Action Plan for Corrective Action Unit 562: Waste Systems, Nevada National Security Site, Nevada

    International Nuclear Information System (INIS)

    2011-01-01

    This Corrective Action Plan has been prepared for Corrective Action Unit (CAU) 562, Waste Systems, in accordance with the Federal Facility Agreement and Consent Order (1996; as amended March 2010). CAU 562 consists of 13 Corrective Action Sites (CASs) located in Areas 2, 23, and 25 of the Nevada National Security Site. Site characterization activities were performed in 2009 and 2010, and the results are presented in Appendix A of the Corrective Action Decision Document for CAU 562. The scope of work required to implement the recommended closure alternatives is summarized. (1) CAS 02-26-11, Lead Shot, will be clean closed by removing shot. (2) CAS 02-44-02, Paint Spills and French Drain, will be clean closed by removing paint and contaminated soil. As a best management practice (BMP), asbestos tile will be removed. (3) CAS 02-59-01, Septic System, will be clean closed by removing septic tank contents. As a BMP, the septic tank will be removed. (4) CAS 02-60-01, Concrete Drain, contains no contaminants of concern (COCs) above action levels. No further action is required; however, as a BMP, the concrete drain will be removed. (5) CAS 02-60-02, French Drain, was clean closed. Corrective actions were completed during corrective action investigation activities. As a BMP, the drain grates and drain pipe will be removed. (6) CAS 02-60-03, Steam Cleaning Drain, will be clean closed by removing contaminated soil. As a BMP, the steam cleaning sump grate and outfall pipe will be removed. (7) CAS 02-60-04, French Drain, was clean closed. Corrective actions were completed during corrective action investigation activities. (8) CAS 02-60-05, French Drain, will be clean closed by removing contaminated soil. (9) CAS 02-60-06, French Drain, contains no COCs above action levels. No further action is required. (10) CAS 02-60-07, French Drain, requires no further action. The french drain identified in historical documentation was not located during corrective action investigation

  2. National Plan to Achieve Maritime Domain Awareness for the National Strategy for Maritime Security

    National Research Council Canada - National Science Library

    2005-01-01

    Maritime Domain Awareness (MDA) is the effective understanding of anything associated with the global maritime domain that could impact the security, safety, economy, or environment of the United States...

  3. Planning, organizational and management issues in moving from operation to decommissioning and their impact on waste management

    International Nuclear Information System (INIS)

    Laraia, M.

    2001-01-01

    The transition from a nuclear facility's operating phase to decommissioning is critical. A number of modifications are required during this period to adapt the facility to new objectives and requirements. There are various activities to prepare for implementation of the decommissioning strategy that may be started before final plant closure or immediately afterwards: these serve to support the decommissioning planning process and ease the burden of operating requirements. (Author)

  4. Planning policy, sustainability and housebuilder practices: The move into (and out of?) the redevelopment of previously developed land.

    Science.gov (United States)

    Karadimitriou, Nikos

    2013-05-01

    This paper explores the transformations of the housebuilding industry under the policy requirement to build on previously developed land (PDL). This requirement was a key lever in promoting the sustainable urban development agenda of UK governments from the early 1990s to 2010 and has survived albeit somewhat relaxed and permutated in the latest National Planning Policy Framework (NPPF). The paper therefore looks at the way in which the policy push towards densification and mixed use affected housebuilders' business strategy and practices and their ability to cope with the 2007 downturn of the housing market and its aftermath. It also points out the eventual feedback of some of these practices into planning policy. Following the gradual shift of British urban policy focus towards sustainability which started in the early 1990s, new configurations of actors, new skills, strategies and approaches to managing risk emerged in property development and housebuilding. There were at least two ways in which housebuilders could have responded to the requirements of developing long term mixed use high density projects on PDL. One way was to develop new products and to employ practices and combinations of practices involving phasing, a flexible approach to planning applications and innovative production methods. Alternatively, they could approach PDL development as a temporary turn of policy or view mixed use high density schemes as a niche market to be explored without drastically overhauling the business model of the entire firm. These transformations of the UK housebuilding sector were unfolding during a long period of buoyancy in the housing market which came to an end in 2007. Very little is known both about how housebuilder strategies and production practices evolved during the boom years as well as about how these firms coped with the effects of the 2007 market downturn. The paper draws on published data (company annual reports, government statistics) and primary

  5. Planning policy, sustainability and housebuilder practices: The move into (and out of?) the redevelopment of previously developed land

    Science.gov (United States)

    Karadimitriou, Nikos

    2013-01-01

    This paper explores the transformations of the housebuilding industry under the policy requirement to build on previously developed land (PDL). This requirement was a key lever in promoting the sustainable urban development agenda of UK governments from the early 1990s to 2010 and has survived albeit somewhat relaxed and permutated in the latest National Planning Policy Framework (NPPF). The paper therefore looks at the way in which the policy push towards densification and mixed use affected housebuilders’ business strategy and practices and their ability to cope with the 2007 downturn of the housing market and its aftermath. It also points out the eventual feedback of some of these practices into planning policy. Following the gradual shift of British urban policy focus towards sustainability which started in the early 1990s, new configurations of actors, new skills, strategies and approaches to managing risk emerged in property development and housebuilding. There were at least two ways in which housebuilders could have responded to the requirements of developing long term mixed use high density projects on PDL. One way was to develop new products and to employ practices and combinations of practices involving phasing, a flexible approach to planning applications and innovative production methods. Alternatively, they could approach PDL development as a temporary turn of policy or view mixed use high density schemes as a niche market to be explored without drastically overhauling the business model of the entire firm. These transformations of the UK housebuilding sector were unfolding during a long period of buoyancy in the housing market which came to an end in 2007. Very little is known both about how housebuilder strategies and production practices evolved during the boom years as well as about how these firms coped with the effects of the 2007 market downturn. The paper draws on published data (company annual reports, government statistics) and primary

  6. Corrective Action Investigation Plan for Corrective Action Unit 573: Alpha Contaminated Sites, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick

    2014-05-01

    Corrective Action Unit (CAU) 573 is located in Area 5 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. CAU 573 is a grouping of sites where there has been a suspected release of contamination associated with non-nuclear experiments and nuclear testing. This document describes the planned investigation of CAU 573, which comprises the following corrective action sites (CASs): • 05-23-02, GMX Alpha Contaminated Area • 05-45-01, Atmospheric Test Site - Hamilton These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives.

  7. Higher Education as a Matter of National Security: Can a Democracy Plan Ahead?

    Science.gov (United States)

    Skaggs, David

    2014-01-01

    What is often viewed as the fairly arcane business of determining and administering higher education policy is a matter of great national interest and, actually, a matter of national security. It thus makes a difference for American society in ways you may not have considered. The ability of the United States to protect itself and its interests…

  8. Nuclear power reactor security personnel training and qualification plan reviewer workbook

    International Nuclear Information System (INIS)

    1979-06-01

    The Training and Qualification Plan Reviewer Workbook has been developed to provide the information required for evaluating the adequacy of the Training and Qualification (T and Q) Plans developed to meet the requirements of 10 CFR 73.55(b)(4) and 10 CFR 73, Appendix B

  9. Knowledge Networking for Family Planning: The Potential for Virtual Communities of Practice to Move Forward the Global Reproductive Health Agenda

    Directory of Open Access Journals (Sweden)

    Megan O’Brien

    2010-06-01

    Full Text Available This paper highlights experience from five years of using virtual communication tools developed by the World Health Organization Department of Reproductive Health and Research (WHO/RHR and its partners in the Implementing Best Practices (IBP in Reproductive Health Initiative to help bridge the knowledge-to-practice gap among family planning and reproductive health professionals. It explores how communities of practice and virtual networks offer a unique low-cost way to convene public health practitioners around the world to share experiences. It offers examples of how communities of practice can contribute to the development and dissemination of evidence-based health information products, and explores the potential for online networking and collaboration to enhance and inform program design and management. The paper is intended to inform the reproductive health community, as well as others working in health and development, of the potential for using virtual communities of practice to work towards achieving common goals and provide some examples of their successful use.

  10. Moving from theory to practice: A participatory social network mapping approach to address unmet need for family planning in Benin.

    Science.gov (United States)

    Igras, Susan; Diakité, Mariam; Lundgren, Rebecka

    2017-07-01

    In West Africa, social factors influence whether couples with unmet need for family planning act on birth-spacing desires. Tékponon Jikuagou is testing a social network-based intervention to reduce social barriers by diffusing new ideas. Individuals and groups judged socially influential by their communities provide entrée to networks. A participatory social network mapping methodology was designed to identify these diffusion actors. Analysis of monitoring data, in-depth interviews, and evaluation reports assessed the methodology's acceptability to communities and staff and whether it produced valid, reliable data to identify influential individuals and groups who diffuse new ideas through their networks. Results indicated the methodology's acceptability. Communities were actively and equitably engaged. Staff appreciated its ability to yield timely, actionable information. The mapping methodology also provided valid and reliable information by enabling communities to identify highly connected and influential network actors. Consistent with social network theory, this methodology resulted in the selection of informal groups and individuals in both informal and formal positions. In-depth interview data suggest these actors were diffusing new ideas, further confirming their influence/connectivity. The participatory methodology generated insider knowledge of who has social influence, challenging commonly held assumptions. Collecting and displaying information fostered staff and community learning, laying groundwork for social change.

  11. New plans for increasing transmission and intertie capacity : moving towards a more integrated power market in Atlantic Canada

    International Nuclear Information System (INIS)

    Roberge, F.

    2003-01-01

    This PowerPoint presentation provided a brief review of the electric power industry in Quebec after deregulation. It included an outline of non-regulated activity and regulated activities in terms of power generation, transmission, distribution and customer service. Both the transmission and distribution components of the power industry in Quebec are regulated by the Regie de l'energie. Transmission networks offer access to all wholesalers. Quebec does not have an energy spot market and electricity prices are currently very low. Hydro-Quebec TransEnergie was created in 1997 as a functionally independent open access transmission provider with high reliability standards. TransEnergie can address seams issues with neighbouring networks. The three types of services offered in terms of tariffs were also discussed in this presentation along with data regarding Hydro-Quebec assets, revenue and net income. Hydro-Quebec's relation with the Atlantic provinces were also described. Interconnection with New Brunswick totals 785 MW. No new interconnection is planned. 1 tab., 4 figs

  12. Development of a comprehensive plan for utilization of digester gas moves towards energy self-sufficiency in Chicago, USA.

    Science.gov (United States)

    Kunetz, Thomas E; Fink-Finowicki, Jarek; McGowan, Steve; Auerbach, Eric

    2012-01-01

    The Metropolitan Water Reclamation District (MWRD) of Greater Chicago's Stickney Water Reclamation Plant (SWRP) anaerobically digests approximately 430 dry tons per day (dtpd) (390 dry metric tons per day) of solids and produces 3.4 million ft(3)/day (96 thousand m(3)/day) of biogas from the anaerobic digesters, making it one of the largest municipal digester gas complexes in the world. Installation of new treatment processes, as well as future increases in flows and loads to the plant, are expected to significantly increase production of biologically degradable sludge and biogas. This paper presents a comprehensive planning study that was completed to identify and evaluate alternatives for utilization of this biogas. The best, sustainable approach was identified, taking into consideration economics, social impacts, and environmental impacts. The model results indicate that the most economically favorable scenario involves installing a cogeneration facility to produce electricity on-site, and operating it in conjunction with the plant's existing boilers to satisfy the heating needs of the plant. This scenario also provides the greatest reduction in GHG offsets at the power plants.

  13. Moving from awareness to action: Advancing climate change vulnerability assessments and adaptation planning for Idaho and Montana National Forests

    Science.gov (United States)

    Kershner, Jessi; Woodward, Andrea; Torregrosa, Alicia

    2016-01-01

    The rugged landscapes of northern Idaho and western Montana support biodiverse ecosystems, and provide a variety of natural resources and services for human communities. However, the benefits provided by these ecosystems may be at risk as changing climate magnifies existing stressors and allows new stressors to emerge. Preparation for and response to these potential changes can be most effectively addressed through multi-stakeholder partnerships, evaluating vulnerability of important resources to climate change, and developing response and preparation strategies for managing key natural resources in a changing world. This project will support climate-smart conservation and management across forests of northern Idaho and western Montana through three main components: (1) fostering partnerships among scientists, land managers, regional landowners, conservation practitioners, and the public; (2) assessing the vulnerability of a suite of regionally important resources to climate change and other stressors; and (3) creating a portfolio of adaptation strategies and actions to help resource managers prepare for and respond to the likely impacts of climate change. The results of this project will be used to inform the upcoming land management plan revisions for national forests, helping ensure that the most effective and robust conservation and management strategies are implemented to preserve our natural resources.

  14. Unlocking the electric mobility potential of Toronto: moving toward an electric mobility master plan for the city

    International Nuclear Information System (INIS)

    Gleeson, A.; Scratch, K.

    2010-10-01

    This report is an analysis of the current state of electric transportation and its potential integration in the transportation system of the city of Toronto. In this document, electric vehicles include every mode of transport involving the use of energy drawn from the electricity grid, such as plug-in hybrid electric vehicles (PHEV), extended range electric vehicles (EREV), battery electric vehicles (BEV), grid connected transit vehicles and electrified locomotives. An overview of the movement of people and goods, including the consideration of patterns of commuting and modes of transportation, is provided in the first section of this document. It has been demonstrated that most of the trips taking place in the city correspond to the predicted operating range of many EVs. Section one also provides a description of the local electricity grid system serving Toronto neighbourhoods and of the sources and movements of air contaminants. It gives a evaluation of the state of EV technologies and analyzes the economic and social factors that have an impact on the public perceptions regarding these technologies. Current policies and programs designed to promote market adoption of EVs around the world are outlined in the conclusion of this section. A simulation work was performed through a collaborative work with Toronto Hydro Electric System Limited in order to analyze the consequences of different EV charging scenarios on the electricity grid system. The results of this simulation are described in section two of the report. The document also presents the outcomes of the workshop on the implementation of an electric mobility master plan held in Toronto in April, 2010. 176 refs.

  15. Moving towards precision orthodontics: An evolving paradigm shift in the planning and delivery of customized orthodontic therapy.

    Science.gov (United States)

    Jheon, A H; Oberoi, S; Solem, R C; Kapila, S

    2017-06-01

    Advances in precision medicine portend similar progress in orthodontics and will be increasingly harnessed to achieve customized treatment approaches and enhance treatment efficiencies. Our goal is to provide a background on emerging advances in computer technologies and biomedicine and highlight their current and likely future applications to precision orthodontics. A review of orthodontically relevant technologies and advances in pertinent biological research was undertaken. Innovations in computer hardware and software, and 3D imaging technologies offer the ability for customized treatment and biomechanical planning that will be more fully realized within the next few decades. These technologies combined with 3D printing are already being applied to customized appliance fabrication such as aligners and retainers. The future prospects for custom fabrication of orthodontic brackets of appropriate material properties and smart devices are highly desirable and compelling goals. Within biomedicine, the fundamental understanding of cartilage growth and bone biology is currently being tested in animal models to modify mandibular growth and modulate tooth movement, respectively. Some of these discoveries will ultimately have clinical applications in orthodontics including for growth modification, accelerating orthodontic tooth movement, and enhancing anchorage or retention of teeth. Additional genomic and proteomic information will add to further customization of orthodontic diagnosis and treatments. Over the coming decades, precision orthodontics will continue to benefit from advances in many fields and will require the integration of advances in technology, and biomedical and clinical research to deliver optimal, efficient, safe, and reproducible personalized orthodontic treatment. © 2017 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  16. Russian Federation’s plans to deploy nuclear weapons in Crimea: the possible consequences for Ukraine and European security

    Directory of Open Access Journals (Sweden)

    O. S. Vonsovych

    2016-06-01

    Full Text Available The article investigates the possible consequences for Ukraine and European security in case of deploying by Russian Federation nuclear weapons in Crimea. It was determined that under current conditions of confrontation between Ukraine and Russia such actions could further complicate the process of resolving the situation in the east of our country and threaten the implementation of peace initiatives regarding the resumption of constructive dialogue. It was found that the reluctance to disclose or hide the real intentions of Russia produces around Ukraine’s borders space of uncertainty and danger. This directly threatens the national security of our state and continue to make use of the power factor in relations with the Russian Federation. It is proved that Ukraine needs to do more emphasis on their own national identity and opportunities to prove its independence with regard to solving such questions. Substantiated the thesis that the European community should now take the necessary measures to prevent the development of the Russian Federation’s plans regarding the deployment of nuclear weapons in Crimea. This will give the opportunity to avoid misunderstandings and create a ground to prevent the destabilization of the European security system.

  17. Multi-Organizational Collaborative Public Safety and Security Planning for the 2010 Vancouver Winter Games

    Science.gov (United States)

    2012-10-01

    intermediaries bridging the gap between safety and security officials. The OCS also had the closest relationship to the three main organizations in the...a clearly shared mission and boundary-spanning personnel that are able to bridge organizational cultures and adapt to the complex challenges...commandement et contrôle) et le transfert des connaissances à partir d’événements semblables passés ou en fonction d’événements futurs. Pendant

  18. Analysis of Marine Corps renewable energy planning to meet installation energy security requirements

    OpenAIRE

    Chisom, Christopher M.; Templenton, Jack C., II

    2013-01-01

    Approved for public release; distribution is unlimited. The purpose of this thesis is to analyze Marine Corps installation energy consumption and the pursuit of increased renewable energy generation goals across Marine Corps installations. The main objective of this report is to determine the cost of interruption and the net present value (NPV) of renewable energy generation needed to meet the Marine Corps energy security objectives. First, we determine installation-specific energy consump...

  19. Nuclear Waste Management Organization: moving forward together - program update: Canada's plan for the long-term management of used nuclear fuel

    International Nuclear Information System (INIS)

    Nash, K.

    2011-01-01

    In June 2007, the Government of Canada selected Adaptive Phased Management as Canada's plan for safeguarding the public and environment over the very long time in which used nuclear fuel must be managed. The plan requires that Canada's used nuclear fuel be safely and securely contained and isolated from people and the environment in a deep geological repository in a suitable rock formation. In May 2010, the NWMO published a process for identifying an informed and willing community to host the project and currently a number of communities in northwestern Ontario and Saskatchewan have expressed interest in learning about the project. The NWMO anticipates that it will take between seven and ten years to decide on where to locate the deep geological repository and associated facilities. By international standards, this is an ambitious timeline. Ultimately, there will have to be a compelling demonstration of willingness expressed by the citizens of any interested community after a long period of site assessment, and learning about the project, before it is selected to host the project. The presentation will cover the history leading to the 2007 government decision and the full range of activities being undertaken to implement that decision.

  20. Transportation Secure Data Center: Real-World Data for Planning, Modeling, and Analysis

    Energy Technology Data Exchange (ETDEWEB)

    2018-01-19

    The Transportation Secure Data Center (TSDC) at www.nrel.gov/tsdc provides free, web-based access to detailed transportation data from a variety of travel surveys conducted across the nation. While preserving the privacy of survey participants, this online repository makes vital transportation data broadly available to users from the comfort of their own desks via a secure online connection. Data Available through the TSDC: Maintained by the U.S. Department of Energy's National Renewable Energy Laboratory (NREL) in partnership with the U.S. Department of Transportation (DOT), the TSDC houses data from travel surveys and studies conducted using global positioning system (GPS) devices. It features millions of data points - second-by-second GPS readings, vehicle characteristics (if applicable), and demographics - for all modes of travel. NREL screens the initial data for quality control, translates each data set into a consistent format, and interprets the data for spatial analysis. NREL's processing routines add information on vehicle fuel economy and road grades and join data points to the road network.

  1. Asian Security Challenges-Planning in the Face of Strategic Uncertainties. Volume 2. Appendices

    Science.gov (United States)

    1994-10-01

    marketing franchises and sharing core competencies where it makes sense to do so. Finally, they take a swipe at traditional strategic planning, criticizing...Richard P. "How Much Does Industry Matter?" Strategic Management Journal, no. 12 (1991), pp. 167-85 (UNCLASSIFIED). "Theory, Strategy and Entrepreneurship

  2. CARTOGRAPHICAL-GEOINFORMATICAL SECURITY OF TERRITORIAL PLANNING IN THE RUSSIAN FEDERATION

    Directory of Open Access Journals (Sweden)

    A. N. Panin

    2017-01-01

    Full Text Available The adoption of the town planning code of the Russian Federation in 2004, started the modern stage of spatial planning in Russia at all administrative-territorial levels. Despite the fact that it was more than 12 years ago, the system of preparation documents of territorial planning and zoning has continued the path of improvement [Chistobaev, 2013]. Quite significant aspects of these documents preparation is related to the cartographic unit. Over the period there has been a qualitative shift in the preparation of the documents that is connected first of all with an increasing role of geographic information systems, and strengthening synchronization of documents of various administrative and territorial rank, including due to transition to a unified cartographic basis [Skaterschikov, 2007].It is important to note that in the post-Soviet period, actually work on the documents of spatial planning in the country has conducted. Thus, the first stage after a significant break was characterized by misunderstandings on the part of authorities of “customer” role and significance of this document on the one hand, and the other, was associated with the shortage of specialists, which was simply not enough for large-scale operation in the country. These problems led to what in fact was complete absence of current methods and requirements for the formation of the documents. So the preparation of the graphic part was limited at best, issuing paper copies and receiving electronic copies of maps as raster images.The second stage is characterized by a number of positive trends – first, the town planning code of the Russian Federation has undergone significant changes and second, there has been put into effect additional normative legal acts, guidelines governing the preparation of the documents related to the software shells, and meeting the needs of the Federal Service for State Registration, Cadastre and Cartography of the Russian Federation. Since the

  3. Move up,Move out

    Institute of Scientific and Technical Information of China (English)

    Guo Yan

    2007-01-01

    @@ China has already become the world's largest manufacturer of cement,copper and steel.Chinese producers have moved onto the world stage and dominated the global consumer market from textiles to electronics with amazing speed and efficiency.

  4. SMART Security Cooperation Objectives: Improving DoD Planning and Guidance

    Science.gov (United States)

    2016-01-01

    been validated, they would constitute the basis for dis- cussions with defense industry representatives, providing them with a clear idea of DoD...tasks, which constitute the basic steps required to achieve effects. These stra- tegic tasks are evaluated by measures of performance, resources...Serbia Slovakia Slovenia Sweden Turkey Ukraine Vatican Wales EUCOM Findings 51 well as in the Joint Strategic Capabilities Plan. At the CCMD level

  5. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  6. 17 CFR 230.701 - Exemption for offers and sales of securities pursuant to certain compensatory benefit plans and...

    Science.gov (United States)

    2010-04-01

    ... irrevocable election to defer is made. (iii) Derivative securities. In calculating outstanding securities for..., must be delivered. (6) If the sale involves a stock option or other derivative security, the issuer... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Exemption for offers and sales...

  7. Streamlined Approach for Environmental Restoration Plan for Corrective Action Unit 574: Neptune, Nevada National Security Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Restoration

    2011-08-31

    This Streamlined Approach for Environmental Restoration (SAFER) Plan identifies the activities required for closure of Corrective Action Unit (CAU) 574, Neptune. CAU 574 is included in the Federal Facility Agreement and Consent Order (FFACO) (1996 [as amended March 2010]) and consists of the following two Corrective Action Sites (CASs) located in Area 12 of the Nevada National Security Site: (1) CAS 12-23-10, U12c.03 Crater (Neptune); (2) CAS 12-45-01, U12e.05 Crater (Blanca). This plan provides the methodology for the field activities that will be performed to gather the necessary information for closure of the two CASs. There is sufficient information and process knowledge regarding the expected nature and extent of potential contaminants to recommend closure of CAU 574 using the SAFER process. Based on historical documentation, personnel interviews, site process knowledge, site visits, photographs, field screening, analytical results, the results of the data quality objective (DQO) process (Section 3.0), and an evaluation of corrective action alternatives (Appendix B), closure in place with administrative controls is the expected closure strategy for CAU 574. Additional information will be obtained by conducting a field investigation to verify and support the expected closure strategy and provide a defensible recommendation that no further corrective action is necessary. This will be presented in a Closure Report that will be prepared and submitted to the Nevada Division of Environmental Protection (NDEP) for review and approval.

  8. Planning method for integration and expansion of renewable energy sources with special attention to security supply in distribution system

    Energy Technology Data Exchange (ETDEWEB)

    Cerda-Arias, Jose Luis

    2012-07-01

    Today's structure of power systems with competitive wholesale markets for electricity encourages the introduction of new agents and products, customers with self-generating capacity and the specialization of generators, network operators and power suppliers. Furthermore one has to take into account the variation of the fossil fuel prices in the world market, which even anticipates the closeness of its scarcity, the instability of the fulfilment of contracts, and the existence of import restrictions. In addition the implementation of policies aiming to control CO{sub 2} emissions, and efficient use of energy plus the advent of more efficient technologies have to be incorporated in new network expansion projects. These are forcing utilities and society to seek new forms of electric system expansion without affecting their economic growth. This expresses a challenge to sustain such a growth changing the vision for the power system and the required security of electricity supply, usually based on internal factors of the electric sector, without considering the connection between the current transmission and distribution networks, the uncertainties related to the competition in the electricity market and the effect of distributed generation units. The high penetration of distributed generation resources, based on renewable energy sources, is increasingly observed worldwide and it depends on the cost of the technologies, market design, and subsidies. On that account, it is necessary to find alternatives and offers to develop a sustainable strategic plan for power system expansion. Currently, efforts are oriented to develop planning models which consider the income of power generation based on renewable energy sources founded on these new requirements, bearing in mind the relationship between the competitive markets and the power system planning. In this Thesis a general planning method for the expansion of the power grids is proposed. This planning method should

  9. Streamlined Approach for Environmental Restoration (SAFER) Plan for Corrective Action Unit 465: Hydronuclear Nevada National Security Site, Nevada, with ROTC 1, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2011-11-01

    This Streamlined Approach for Environmental Restoration (SAFER) Plan addresses the actions needed to achieve closure for Corrective Action Unit (CAU) 465, Hydronuclear, identified in the Federal Facility Agreement and Consent Order (FFACO). Corrective Action Unit 465 comprises the following four corrective action sites (CASs) located in Areas 6 and 27 of the Nevada National Security Site: (1) 00-23-01, Hydronuclear Experiment; (2) 00-23-02, Hydronuclear Experiment; (3) 00-23-03, Hydronuclear Experiment; (4) 06-99-01, Hydronuclear. The sites will be investigated based on the data quality objectives (DQOs) developed on July 6, 2011, by representatives of the Nevada Division of Environmental Protection (NDEP) and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to determine and implement appropriate corrective actions for each CAS in CAU 465. For CAU 465, two potential release components have been identified. The subsurface release component includes potential releases of radiological and nonradiological contaminants from the subsurface hydronuclear experiments and disposal boreholes. The surface release component consists of other potential releases of radiological and nonradiological contaminants to surface soils that may have occurred during the pre- and post-test activities. This plan provides the methodology for collection of the necessary information for closing each CAS component. There is sufficient information and process knowledge from historical documentation, contaminant characteristics, existing regional and site groundwater models, and investigations of similar sites regarding the expected nature and extent of potential contaminants to recommend closure of CAU 465 using the SAFER process. For potential subsurface releases, flow and transport models will be developed to integrate existing data into a conservative

  10. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  11. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  12. Securing abundance : The politics of energy security

    NARCIS (Netherlands)

    Kester, Johannes

    2016-01-01

    Energy Security is a concept that is known in the literature for its ‘slippery’ nature and subsequent wide range of definitions. Instead of another attempt at grasping the essence of this concept, Securing Abundance reformulates the problem and moves away from a definitional problem to a theoretical

  13. Security Considerations and Recommendations in Computer-Based Testing

    Directory of Open Access Journals (Sweden)

    Saleh M. Al-Saleem

    2014-01-01

    Full Text Available Many organizations and institutions around the globe are moving or planning to move their paper-and-pencil based testing to computer-based testing (CBT. However, this conversion will not be the best option for all kinds of exams and it will require significant resources. These resources may include the preparation of item banks, methods for test delivery, procedures for test administration, and last but not least test security. Security aspects may include but are not limited to the identification and authentication of examinee, the risks that are associated with cheating on the exam, and the procedures related to test delivery to the examinee. This paper will mainly investigate the security considerations associated with CBT and will provide some recommendations for the security of these kinds of tests. We will also propose a palm-based biometric authentication system incorporated with basic authentication system (username/password in order to check the identity and authenticity of the examinee.

  14. Security considerations and recommendations in computer-based testing.

    Science.gov (United States)

    Al-Saleem, Saleh M; Ullah, Hanif

    2014-01-01

    Many organizations and institutions around the globe are moving or planning to move their paper-and-pencil based testing to computer-based testing (CBT). However, this conversion will not be the best option for all kinds of exams and it will require significant resources. These resources may include the preparation of item banks, methods for test delivery, procedures for test administration, and last but not least test security. Security aspects may include but are not limited to the identification and authentication of examinee, the risks that are associated with cheating on the exam, and the procedures related to test delivery to the examinee. This paper will mainly investigate the security considerations associated with CBT and will provide some recommendations for the security of these kinds of tests. We will also propose a palm-based biometric authentication system incorporated with basic authentication system (username/password) in order to check the identity and authenticity of the examinee.

  15. Standard format and content for a licensee physical security plan for the protection of special nuclear material of moderate or low strategic significance (Revision 1, Feb. 1983)

    International Nuclear Information System (INIS)

    Anon.

    1983-01-01

    This regulatory guide describes the information required in the physical security plan submitted as part of an application for a license to possess, use, or transport Special Nuclear Materials (SNM) of moderate strategic significance or 10 kg or more of SNM of low strategic significance and recommends a standard format for presenting the information in an orderly arrangement. This standard format will thus serve as an aid to uniformity and completeness in the preparation and review of the physical security plan of the license application. This document can also be used as guidance by licensees possessing or transporting less than 10 kg of SNM of low strategic significance in understanding the intent and implementing the requirements of paragraphs 73.67(a), 73.67(f), and 73.67(g) of 10 CFR Part 73

  16. Moving a House by Moved Participants

    DEFF Research Database (Denmark)

    Axel, Erik

    himself in controlling every detail of the shape of the concrete slaps. He pushed all the other participants of the meetings, asking for details, information, the change of drawings etc. He explained the technical issues he was pursuing, was prepared for problems at the meetings, was well informed, always......? The participant observer believed it was a matter of changing coordinates, but the engineers immediately saw it was an issue of pipes in the ground, could they be moved and still function as planned? To decide the possibility of this suggestion the engineer was given the task of investigating the consequences...... they saw him as a bit pushy. On the other hand they understood why he was so since his firm would be fined if the concrete slabs did not meet specifications. The case will be the basis for a discussion of double motivation of the engineer, his evident interest in his professional work, and the wish...

  17. Young People with High-Functioning Autism and Asperger's Syndrome Planning for and Anticipating the Move to College: What Supports a Positive Transition?

    Science.gov (United States)

    Mitchell, Wendy; Beresford, Bryony

    2014-01-01

    For many young people in England, the move into continuing education involves a transfer from the school where they were educated to a further education college. For those with high-functioning autism or Asperger's syndrome, this can be a challenging process. Past research has demonstrated some of the problems that these young people can…

  18. Corrective Action Investigation Plan for Corrective Action Unit 550: Smoky Contamination Area Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Grant Evenson

    2012-05-01

    Corrective Action Unit (CAU) 550 is located in Areas 7, 8, and 10 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. CAU 550, Smoky Contamination Area, comprises 19 corrective action sites (CASs). Based on process knowledge of the releases associated with the nuclear tests and radiological survey information about the location and shape of the resulting contamination plumes, it was determined that some of the CAS releases are co-located and will be investigated as study groups. This document describes the planned investigation of the following CASs (by study group): (1) Study Group 1, Atmospheric Test - CAS 08-23-04, Atmospheric Test Site T-2C; (2) Study Group 2, Safety Experiments - CAS 08-23-03, Atmospheric Test Site T-8B - CAS 08-23-06, Atmospheric Test Site T-8A - CAS 08-23-07, Atmospheric Test Site T-8C; (3) Study Group 3, Washes - Potential stormwater migration of contaminants from CASs; (4) Study Group 4, Debris - CAS 08-01-01, Storage Tank - CAS 08-22-05, Drum - CAS 08-22-07, Drum - CAS 08-22-08, Drums (3) - CAS 08-22-09, Drum - CAS 08-24-03, Battery - CAS 08-24-04, Battery - CAS 08-24-07, Batteries (3) - CAS 08-24-08, Batteries (3) - CAS 08-26-01, Lead Bricks (200) - CAS 10-22-17, Buckets (3) - CAS 10-22-18, Gas Block/Drum - CAS 10-22-19, Drum; Stains - CAS 10-22-20, Drum - CAS 10-24-10, Battery. These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each study group. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the data quality objectives (DQOs) developed

  19. Corrective Action Investigation Plan for Corrective Action Unit 550: Smoky Contamination Area Nevada National Security Site, Nevada

    International Nuclear Information System (INIS)

    Evenson, Grant

    2012-01-01

    Corrective Action Unit (CAU) 550 is located in Areas 7, 8, and 10 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. CAU 550, Smoky Contamination Area, comprises 19 corrective action sites (CASs). Based on process knowledge of the releases associated with the nuclear tests and radiological survey information about the location and shape of the resulting contamination plumes, it was determined that some of the CAS releases are co-located and will be investigated as study groups. This document describes the planned investigation of the following CASs (by study group): (1) Study Group 1, Atmospheric Test - CAS 08-23-04, Atmospheric Test Site T-2C; (2) Study Group 2, Safety Experiments - CAS 08-23-03, Atmospheric Test Site T-8B - CAS 08-23-06, Atmospheric Test Site T-8A - CAS 08-23-07, Atmospheric Test Site T-8C; (3) Study Group 3, Washes - Potential stormwater migration of contaminants from CASs; (4) Study Group 4, Debris - CAS 08-01-01, Storage Tank - CAS 08-22-05, Drum - CAS 08-22-07, Drum - CAS 08-22-08, Drums (3) - CAS 08-22-09, Drum - CAS 08-24-03, Battery - CAS 08-24-04, Battery - CAS 08-24-07, Batteries (3) - CAS 08-24-08, Batteries (3) - CAS 08-26-01, Lead Bricks (200) - CAS 10-22-17, Buckets (3) - CAS 10-22-18, Gas Block/Drum - CAS 10-22-19, Drum; Stains - CAS 10-22-20, Drum - CAS 10-24-10, Battery. These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each study group. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the data quality objectives (DQOs) developed

  20. Urban planning after terrorism:The case of Oslo with focus on the impacts of the terrorist attack on the consideration of security, memorialisation and conservation in urban planning

    OpenAIRE

    Paizs, Franziska

    2013-01-01

    Terrorism is a targeted way to hurt a population but also to destroy and annihilate a part of the civilization by attacking the built environment, especially iconic and symbolic buildings with its values of collective memory and cultural heritage, which is at the latest created by the iconic act of destruction. The resilient city with its integrated plans and programs but also technical, personal or physical security aims to reduce the probability and the dimension of terrorist attacks. Howev...

  1. Incorporating palaeoclimate data into water security planning and decision making - a case study from southeast Queensland, Australia

    Science.gov (United States)

    Kiem, Anthony; Vance, Tessa; Tozer, Carly; Roberts, Jason

    2017-04-01

    Regional Stochastic Model (SEQRSM) of catchment hydrology to (a) demonstrate the utility of a palaeoclimate proxy approach in producing more robust estimates of hydroclimatic risk under climate variability and change; (b) gain improved insights into the characteristics (e.g. location, duration, frequency, magnitude, spatial extent, sequencing) of hydroclimate extremes for water security planning and (c) deliver optimised solutions for hydroclimatic risk adaptation strategies to water managers (e.g. optimal and sustainable supply of water to meet current and future urban requirements and also to nearby catchments to support irrigation for dairy, vegetable and forage crops).

  2. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  3. Creating an Effective National Security Industrial Base for the 21st Century: An Action Plan to Address the Coming Crisis

    National Research Council Canada - National Science Library

    Scneider, Jr., William; Gansler, Jacques

    2008-01-01

    .... To accommodate both the current and emerging National Security needs associated with this dynamic environment, DoD has acknowledged the importance of a significant transformation of its relationship...

  4. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  5. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  6. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  7. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  8. Care planning for aggression management in a specialist secure mental health service: An audit of user involvement.

    Science.gov (United States)

    Hallett, Nutmeg; Huber, Jörg W; Sixsmith, Judith; Dickens, Geoffrey L

    2016-12-01

    This paper describes an audit of prevention and management of violence and aggression care plans and incident reporting forms which aimed to: (i) report the compliance rate of completion of care plans; (ii) identify the extent to which patients contribute to and agree with their care plan; (iii) describe de-escalation methods documented in care plans; and (iv) ascertain the extent to which the de-escalation methods described in the care plan are recorded as having been attempted in the event of an incident. Care plans and incident report forms were examined for all patients in men's and women's mental health care pathways who were involved in aggressive incidents between May and October 2012. In total, 539 incidents were examined, involving 147 patients and 121 care plans. There was no care plan in place at the time of 151 incidents giving a compliance rate of 72%. It was documented that 40% of patients had contributed to their care plans. Thematic analysis of de-escalation methods documented in the care plans revealed five de-escalation themes: staff interventions, interactions, space/quiet, activities and patient strategies/skills. A sixth category, coercive strategies, was also documented. Evidence of adherence to de-escalation elements of the care plan was documented in 58% of incidents. The reasons for the low compliance rate and very low documentation of patient involvement need further investigation. The inclusion of coercive strategies within de-escalation documentation suggests that some staff fundamentally misunderstand de-escalation. © 2016 Australian College of Mental Health Nurses Inc.

  9. No energy security without climate security

    International Nuclear Information System (INIS)

    Hiller, M.

    2006-06-01

    WWF urges the G8 nations to embark on a serious global 'Climate and Energy Security Plan' akin in dimension to the Marshall plan after the Second World War. The plan would aim at dramatically augmenting energy efficiency measures and renewable energy sources within the next five years

  10. Embracing the Devil: An Analysis of the Formal Adoption of Red Teaming in the Security Planning for Major Events

    Science.gov (United States)

    2017-03-01

    little hope of a better solution, low self - esteem temporarily induced by recent failures, and difficulties in determining feasible alternatives in...The ability to think creatively and communicate potentially negative findings effectively are unique skills improved with formal training and...Homeland Security Presidential Directive IC intelligence community IED improvised explosive device JCCIC Joint Congressional Committee on

  11. Standard format and content for a licensee physical security plan for the protection of special nuclear material of moderate or low strategic significance - January 1980

    International Nuclear Information System (INIS)

    Anon.

    1981-01-01

    This guide describes the information required in the physical security plan submitted as part of an application for a license to possess, use, or transport special nuclear material (SNM) of moderate strategic significance or 10 kg or more of SNM of low strategic significance and recommends a standard format for presenting the information in an orderly arrangement. This standards format will thus serve as an aid to uniformity and completeness in the preparation and review of the physical protection plan of the license application. This document can also be used as guidance by licensees possessing or transporting less than 10 kg of SNM of low strategic significance in understanding the intent and implementing the requirements of paragraphs 73.67(a), 73.67(f), and 73.67(g) of 10 CRF Part 73

  12. Assessing the Alignment of Information Security with Strategic Business, and Strategic Information System Planning: A Department of Defense Perspective

    Science.gov (United States)

    2010-06-01

    Wolfgang. "Appraisal of the effectivness and efficiency of an Information Security Management System based on ISO 27001 ." International Conference on...of corporate information resources (Doherty and 29 Fulford, 2006) ( ISO /IEC 17799, 2005). Both public and private sectors of business have...Science Ltd, 2002. Iacovou, Charalambos L. "The IPACS project: when IT hits the fan." Journal of Information Technology, 1999: 267-275. ISO /IEC 17799

  13. Analyzing the Feasibility of Using Secure Application Integration Methodology (SAIM) for Integrating DON Enterprise Resource Planning (ERP) Applications

    National Research Council Canada - National Science Library

    Marin, Ramon

    2004-01-01

    ...) would provide useful information about a beneficial methodology. SAIM is analyzed, by accessing its step by step directions, for suitability in the integration of the Enterprise Resource Planning (ERP...

  14. Y-12 Groundwater Protection Program Monitoring Optimization Plan for Groundwater Monitoring Wells at the U.S. Department of Energy Y-12 National Security Complex

    International Nuclear Information System (INIS)

    2006-01-01

    This document is the monitoring optimization plan for groundwater monitoring wells associated with the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee (Figure A.1). The plan describes the technical approach that will be implemented under the Y-12 Groundwater Protection Program (GWPP) to focus available resources on the monitoring wells at Y-12 that provide the most useful hydrologic and water-quality monitoring data. The technical approach is based on the GWPP status designation for each well (Section 2.0). Under this approach, wells granted ''active'' status are used by the GWPP for hydrologic monitoring and/or groundwater quality sampling (Section 3.0), whereas wells granted ''inactive'' status are not used for either purpose. The status designation also defines the frequency at which the GWPP will inspect applicable wells, the scope of these well inspections, and extent of any maintenance actions initiated by the GWPP (Section 3.0). Details regarding the ancillary activities associated with implementation of this plan (e.g., well inspection) are deferred to the referenced GWPP plans and procedures (Section 4.0). This plan applies to groundwater wells associated with Y-12 and related waste management areas and facilities located within three hydrogeologic regimes (Figure A.1): the Bear Creek Hydrogeologic Regime (Bear Creek Regime), the Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime), and the Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime). The Bear Creek Regime encompasses a section of Bear Creek Valley (BCV) immediately west of Y-12. The East Fork Regime encompasses most of the Y-12 process, operations, and support facilities in BCV and, for the purposes of this plan, includes a section of Union Valley east of the DOE Oak Ridge Reservation (ORR) boundary along Scarboro Road. The Chestnut Ridge Regime encompasses a section of Chestnut Ridge directly south of Y-12 that is bound on the

  15. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  16. The Sandys White Paper of 1957 and the move to the British new look. An analysis of nuclear weapons, conventional forces and strategic planning 1955-57

    International Nuclear Information System (INIS)

    Navias, Martin Stephen

    1989-01-01

    This study seeks to analyse the significance of the 1957 Defence White Paper in the context of British strategic planning during the mid-1950s. Claims that the White Paper represented a culmination of trends already prevalent in British defence planning are assessed while continuities and discontinuities in strategic policies are identified. This is done by highlighting the main features of the document and then tracing their development in the 1955-57 period. A major theme throughout is the relationship between the growing declaratory emphasis on nuclear deterrence and the determination of the shape and size of conventional forces and capabilities. It is contended that the defence decision making process that was in place prior to January 1957 was incapable of generating a British New Look - that is a consistent set of declaratory and action policies which reflected a cutback in conventional forces accompanied by a greater reliance on the threat of nuclear retaliation. Prior to Duncan Sandys becoming Minister of Defence, the inability of that ministry to readily impose itself on the service departments meant that the latter's attachment to preparations for global war and the national service programme could not be overruled. It is also unclear whether during the 1955-56 period the basis for a truly independent deterrent was being established. An analysis of the negotiations surrounding the 1957 White Paper indicates that Sandys was able to overrule traditional service preferences. The result was a policy which rejected the imposition of a conventional strategy on a nuclear one in favour of a British New Look. Consequently, conventional forces were reduced, greater relative importance was placed on the nuclear deterrent, but once more the requirements of a unilateral independent deterrent did not receive priority. (author)

  17. Groundwater Protection Program Management Plan for the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental LLC; Environmental Compliance Department Environment, Safety, and Health Division Y-12 National Security Complex

    2004-03-31

    This document presents the Groundwater Protection Program (GWPP) management plan for the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12). The Y-12 GWPP functions as the primary point-of-contact for groundwater-related issues at Y-12, provides stewardship of the extensive network of groundwater monitoring wells at Y-12, and serves as a resource for technical expertise, support, and historical data for groundwater-related activities at Y-12. These organizational functions each serve the primary programmatic purpose of the GWPP, which is to ensure that groundwater monitoring activities within areas under Y-12 administrative control provide representative data in compliance with the multiple purposes of applicable state and federal regulations, DOE orders, and the corporate policies of BWXT Y-12, L.L.C. (hereafter referenced as BWXT), the Y-12 management and operations (M&O) contractor for DOE. This GWPP management plan addresses the requirements of DOE Order 450.1 (BWXT Y12 S/RID) regarding the implementation of a site-wide approach for groundwater protection at each DOE facility. Additionally, this plan is a ''living'' document that is reviewed annually, revised and reissued every three years, and is formatted to provide for updating individual sections independent of the rest of the document. Section 2 includes a short description of the groundwater system at Y-12, the history of groundwater monitoring at Y-12 and the corresponding evolution of the GWPP, and an overview of ongoing Y-12 groundwater monitoring activities. Section 3 describes the key elements of the GWPP management strategy. Organizational roles and responsibilities of GWPP personnel are outlined in Section 4. Section 5 presents an overview of the GWPP project plans for applicable programmatic elements. Section 6 lists the reports, plans, and documents that are referenced for technical and administrative details.

  18. 2006 U.S. Department of Energy Strategic Plan: Discovering the Solutions to Power and Secure America’s Future

    Energy Technology Data Exchange (ETDEWEB)

    None,

    2006-10-11

    The Department of Energy Organization Act, which created DOE, was enacted in 1977 and DOE officially came into existence in October of that year. That law brought together for the first time, not only most of the government’s energy programs, but also science and technology programs and defense responsibilities that included the design, construction, and testing of nuclear weapons. Over its history, DOE has shifted its emphasis and focus as the energy and security needs of the Nation have changed. Today, DOE stands at the forefront of helping the Nation meet our energy, scientific, environmental, and national security goals. These include developing and deploying new energy technologies, reducing our dependence on foreign energy sources, protecting our nuclear weapons stockpile, and ensuring that America remains competitive in the global marketplace. To help achieve these goals, President Bush has launched two key initiatives: the American Competitiveness Initiative (ACI) and the Advanced Energy Initiative (AEI). The President launched these initiatives recognizing that science, technology, and engineering hold the answers to many of the critical challenges our world faces. These new initiatives to spur scientific innovation and technology development expand DOE’s continuing support for the competitive energy markets, both domestically and internationally, and of policies that facilitate continued private investment in the energy sector. In addition, DOE supports the demonstration and deployment of energy technologies through collaborative efforts with the private sector and public sector entities.

  19. Status, progress and plans for the U.S. Department of Energy, National Nuclear Security Administration, Global Threat Reduction Initiative

    International Nuclear Information System (INIS)

    Bieniawski, Andrew

    2005-01-01

    This presentation discusses the efforts under the US Department of Energy/National Nuclear Security Administration's Global Threat Reduction Initiative, also known as GTRI. On May 26, 2004, then Secretary of Energy Abraham established GTRI. GTRI is a cooperative program to provide international support for countries' national programs to identify, secure, recover or facilitate the disposition of vulnerable nuclear and radiological materials around the world that pose a potential threat to the international community. The formation of GTRI consolidated a number of nonproliferation programs you may be familiar with that work together to minimize and, to the extent possible, eliminate the use of highly enriched uranium (HEU) in civil nuclear applications worldwide. In particular, the Office of Global Threat Reduction, which was set up to implement GTRI, has oversight of the Reduced Enrichment for Research and Test Reactors program, the Foreign Research Reactor Spent Nuclear Fuel Acceptance program, and the Russian Research Reactor Fuel Return program. This consolidation allows these three programs to work in concert to bring about the elimination of research reactor materials as a source of proliferation concern. This speech is highlighting the work that these programs have undertaken in cooperation with the global research reactor community and the importance placed on fuel development under the RERTR program It contains an update on the work done to support the US - Russian Presidential Bratislava Summit Statement

  20. Job Surfing: Move On to Move Up.

    Science.gov (United States)

    Martin, Justin

    1997-01-01

    Looks at the process of switching jobs and changing careers. Discusses when to consider options and make the move as well as the need to be flexible and open minded. Provides a test for determining the chances of promotion and when to move on. (JOW)

  1. Development of the good food planning tool: A food system approach to food security in indigenous Australian remote communities.

    Science.gov (United States)

    Brimblecombe, Julie; van den Boogaard, Christel; Wood, Beverley; Liberato, Selma C; Brown, Jacqui; Barnes, Adam; Rogers, Alison; Coveney, John; Ritchie, Jan; Bailie, Ross

    2015-07-01

    Few frameworks exist to assist food system planning, especially for Indigenous Australian remote communities. We developed a Good Food Planning Tool to support stakeholders to collectively plan and take action for local food system improvement. Development occurred over a four-year period through an evolving four phase participatory process that included literature review, several meetings with representatives of various organisations and communities and application of the Tool with multi-sector groups in each of four Indigenous Australian remote communities. A diverse range of 148 stakeholders, 78 of whom were Indigenous, had input to its development. Five food system domains: (i) Leadership and partnerships; (ii) Traditional food and local food production; (iii) Food businesses; (iv) Buildings, public places and transport; (v) Community and services and 28 activity areas form the framework of the Tool. The Good Food Planning Tool provides a useful framework to facilitate collective appraisal of the food system and to identify opportunities for food system improvement in Indigenous Australian remote communities, with potential for adaptation for wider application. Copyright © 2015 Elsevier Ltd. All rights reserved.

  2. Y-12 Groundwater Protection Program Monitoring Optimization Plan for Groundwater Monitoring Wells at the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2003-09-30

    This document is the monitoring optimization plan for groundwater monitoring wells associated with the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee (Figure 1). The plan describes the technical approach that will be implemented under the Y-12 Groundwater Protection Program (GWPP) to focus available resources on the monitoring wells at Y-12 which provide the most useful hydrologic and water-quality monitoring data. The technical approach is based on the GWPP status designation for each well (Section 2.0). Under this approach, wells granted ''active'' status are used by the GWPP for hydrologic monitoring and/or groundwater sampling (Section 3.0), whereas well granted ''inactive'' status are not used for either purpose. The status designation also determines the frequency at which the GWPP will inspect applicable wells, the scope of these well inspections, and extent of any maintenance actions initiated by the GWPP (Section 4.0). Details regarding the ancillary activities associated with implementation of this plan (e.g., well inspection) are deferred to the referenced GWPP plans and procedures (Section 5.0). This plan applies to groundwater monitoring wells associated with Y-12 and related waste management facilities located within three hydrogeologic regimes (Figure 1): the Bear Creek Hydrogeologic Regime (Bear Creek Regime), the Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime), and the Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime). The Bear Creek Regime encompasses a section of Bear Creek Valley (BCV) immediately west of Y-12. The East Fork Regime encompasses most of the Y-12 process, operations, and support facilities in BCV and, for the purposes of this plan, includes a section of Union Valley east of the DOE Oak Ridge Reservation (ORR) boundary along Scarboro Road. The Chestnut Ridge Regime is directly south of Y-12 and encompasses a section of Chestnut Ridge that is bound to the

  3. Succession Planning in Homeland Security - How Can We Ensure the Effective Transfer of Knowledge to a New Generation of Employees

    Science.gov (United States)

    2010-03-01

    experience in the book Administration Industrielle et Générale, where he developed his fourteen principles of administration. Fayol claimed that...is at the heart of succession planning. The LAFD should recognize the innovation and new ideas of our young generation, and incorporate them into...created, and shared in an organizational context; to foster creativity and innovation for competitive advantage. According to Nonaka, knowledge is

  4. Investigation of productivity in a south Indian Malabari goat herd shows opportunities for planned animal health management to improve food security.

    Science.gov (United States)

    Sargison, N D; Ivil, S A J; Abraham, J; Abubaker, S P S; Hopker, A M; Mazeri, S; Otter, I A; Otter, N

    2017-03-18

    Here the authors report the objective veterinary clinical measurement of productivity in a representative south Indian Malabari goat herd. The authors show failure to meet pragmatic production targets that are commensurate with the animals' genetic potential or adequate to meet the demands of global food security. The authors suggest that this situation may have arisen as a consequence of animal husbandry constraints and protein undernutrition and imply the involvement of nematode parasitism. Benzimidazole resistance was detected in Haemonchus species, showing the need for better understanding of the principles of sustainable helminth parasite control within the southern Indian context. This study highlights the need to understand the true costs of goat production in seasonally resource-poor environments, while also considering its impact on the overall ecosystem in which the animals are placed. They conclude that pragmatic opportunities for improvements in goat production efficiency lie in the development of problem-focused planned animal health and nutrition management. British Veterinary Association.

  5. Groundwater Protection Program Management Plan for the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2001-06-01

    This document presents the Groundwater Protection Program (GWPP) management plan for the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12). The Y-12 GWPP functions as the primary point-of-contact for groundwater-related issues at Y-12, provides stewardship of the extensive network of groundwater monitoring wells at Y-12, and serves as a resource for technical expertise, support, and historical data for groundwater-related activities at Y-12. These organizational functions each serve the primary programmatic purpose of the GWPP, which is to ensure that groundwater monitoring activities within areas under Y-12 administrative control provide representative data in compliance with the multiple purposes of applicable state and federal regulations, DOE orders, and the corporate policies of BWXT Y-12, L.L.C. (hereafter referenced as BWXT Y-12), the Y-12 management and operations (M and O) subcontractor for DOE.

  6. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  7. Information security management handbook

    CERN Document Server

    2002-01-01

    The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.The changes in the tech

  8. Groundwater Protection Program Management Plan For The U.S. Department Of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental, LLC

    2009-09-01

    This document presents the Groundwater Protection Program (GWPP) management plan for the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12). The Y-12 GWPP functions as the primary point-of-contact for groundwater-related issues at Y-12, provides stewardship of the extensive network of groundwater monitoring wells at Y-12, and serves as a resource for technical expertise, support, and historical data for groundwater-related activities at Y-12. These organizational functions each serve the primary programmatic purpose of the GWPP, which is to ensure that groundwater monitoring activities within areas under Y-12 administrative control provide representative data in compliance with the multiple purposes of applicable state and federal regulations, DOE orders, and the corporate policies of Babcock & Wilcox Technical Services Y-12 LLC (hereafter referenced as B&W Y-12), the Y-12 management and operations (M&O) contractor for DOE. B&W Y-12 is a new corporate name, assumed in January 2007, for the company formerly known as BWXT Y-12, L.L.C., hereafter referenced as BWXT. This GWPP management plan addresses the requirements of DOE Order 450.1A Environmental Protection Program (hereafter referenced as DOE O 450.1A), which emphasize a site-wide approach for groundwater protection at each DOE facility through implementation of groundwater surveillance monitoring. Additionally, this plan addresses the relevant and applicable GWPP elements and goals described in the DOE O 450.1A technical guidance documents issued in June 2004 (DOE 2004) and May 2005 (DOE 2005). This GWPP management plan is a 'living' document that is reviewed annually, revised and reissued every three years, and is formatted to provide for updating individual sections independent of the rest of the document. Section 2 includes a short description of the groundwater system at Y-12, the history of groundwater monitoring at Y-12 and the corresponding evolution of the GWPP

  9. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  10. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  11. Impact of spatial plan on the conversion of Subak rice fields and food security, in Badung and Gianyar Regencies, Bali Province

    Science.gov (United States)

    Lanya, Indayati; Netera Subadiyasa, N.; Ratna Adi, Gst. P.

    2018-05-01

    Regional Spatial Plan of Bali Province 2009-2029, allocating rice fields can be converted 10% (± 10.800 ha). Over the next 20 years, the conversion of rice field is permitted 540 ha year-1, the real condition in Bali is 800 ha year-1.Research location in Badung and Gianyar Regencies. Visual satellite image interpretation methods, digitization of on-screen, delineation of subak rice field, field survey, superimpose analysis of Spatial Plan (SP) map with rice field map, trough toolbox-analysis tools–overlay-intersect using QGIS, Harvest Index (HI) of cropping pattern in one year. SP has a negative impact on agricultural land resources and food security. Local Regulation (SP), subak rice fields outside the agricultural area licensed to be converted, and food deficits. Regency of Badung, potential land conversion of 3,324.97 ha (34.44%) from 119 subak with paddy field area of 24,184.85 ha. There are 10 subak 100% and 8 subak > 95% can be converted; projected food deficit -115.343 tons of rice by 2020 for HI 2. In Gianyar Regency, potential land conversion 13,021.41 ha (53.51%) of 66 subak with an area of 24184.85 ha; 8 subak 100% and 8 subak with area food deficit is about -194438 tons of rice in 2040 for HI 2.

  12. Remedial Investigation Work Plan for Chestnut Ridge Operable Unit 1 (Chestnut Ridge Security Pits) at the Oak Ridge Y-12 Plant, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    1993-09-01

    This Remedial Investigation (RI) Work Plan specifically addresses Chestnut Ridge Operable Unit 1, (OU1) which consists of the Chestnut Ridge Security Pits (CRSP). The CRSP are located {approximately}800 ft southeast of the central portion of the Y-12 Plant atop Chestnut Ridge, which is bounded to the northwest by Bear Creek Valley and to the southeast by Bethel Valley. Operated from 1973 to 1988, the CRSP consisted of a series of trenches used for the disposal of classified hazardous and nonhazardous waste materials. Disposal of hazardous waste materials was discontinued in December 1984, while nonhazardous waste disposal ended on November 8, 1988. An RI is being conducted at this site in response to CERCLA regulations. The overall objectives of the RI are to collect data necessary to evaluate the nature and extent of contaminants of concern (COC), support an ecological risk assessment (ERA) and a human health risk assessment (HHRA), support the evaluation of remedial alternatives, and ultimately develop a Record of Decision for the site. The purpose of this Work Plan is to outline RI activities necessary to define the nature and extent of suspected contaminants at Chestnut Ridge OU1. Potential migration pathways also will be investigated. Data collected during the RI will be used to evaluate the overall risk posed to human health and the environment by OU1.

  13. Streamlined Approach for Environmental Restoration (SAFER) Plan for Corrective Action Unit 575: Area 15 Miscellaneous Sites, Nevada National Security Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2014-12-01

    This Streamlined Approach for Environmental Restoration (SAFER) Plan addresses the actions needed to achieve closure for Corrective Action Unit (CAU) 575, Area 15 Miscellaneous Sites, identified in the Federal Facility Agreement and Consent Order (FFACO). CAU 575 comprises the following four corrective action sites (CASs) located in Area 15 of the Nevada National Security Site: 15-19-02, Waste Burial Pit, 15-30-01, Surface Features at Borehole Sites, 15-64-01, Decontamination Area, 15-99-03, Aggregate Plant This plan provides the methodology for field activities needed to gather the necessary information for closing each CAS. There is sufficient information and process knowledge from historical documentation and investigations of similar sites regarding the expected nature and extent of potential contaminants to recommend closure of CAU 575 using the SAFER process. Additional information will be obtained by conducting a field investigation to document and verify the adequacy of existing information, to affirm the predicted corrective action decisions, and to provide sufficient data to implement the corrective actions. This will be presented in a closure report that will be prepared and submitted to the Nevada Division of Environmental Protection (NDEP) for review and approval.

  14. Remedial Investigation Work Plan for Chestnut Ridge Operable Unit 1 (Chestnut Ridge Security Pits) at the Oak Ridge Y-12 Plant, Oak Ridge, Tennessee

    International Nuclear Information System (INIS)

    1993-09-01

    This Remedial Investigation (RI) Work Plan specifically addresses Chestnut Ridge Operable Unit 1, (OU1) which consists of the Chestnut Ridge Security Pits (CRSP). The CRSP are located ∼800 ft southeast of the central portion of the Y-12 Plant atop Chestnut Ridge, which is bounded to the northwest by Bear Creek Valley and to the southeast by Bethel Valley. Operated from 1973 to 1988, the CRSP consisted of a series of trenches used for the disposal of classified hazardous and nonhazardous waste materials. Disposal of hazardous waste materials was discontinued in December 1984, while nonhazardous waste disposal ended on November 8, 1988. An RI is being conducted at this site in response to CERCLA regulations. The overall objectives of the RI are to collect data necessary to evaluate the nature and extent of contaminants of concern (COC), support an ecological risk assessment (ERA) and a human health risk assessment (HHRA), support the evaluation of remedial alternatives, and ultimately develop a Record of Decision for the site. The purpose of this Work Plan is to outline RI activities necessary to define the nature and extent of suspected contaminants at Chestnut Ridge OU1. Potential migration pathways also will be investigated. Data collected during the RI will be used to evaluate the overall risk posed to human health and the environment by OU1

  15. Corrective Action Investigation Plan for Corrective Action Unit 541: Small Boy Nevada National Security Site and Nevada Test and Training Range, Nevada with ROTC 1

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2014-09-01

    Corrective Action Unit (CAU) 541 is co-located on the boundary of Area 5 of the Nevada National Security Site and Range 65C of the Nevada Test and Training Range, approximately 65 miles northwest of Las Vegas, Nevada. CAU 541 is a grouping of sites where there has been a suspected release of contamination associated with nuclear testing. This document describes the planned investigation of CAU 541, which comprises the following corrective action sites (CASs): 05-23-04, Atmospheric Tests (6) - BFa Site; 05-45-03, Atmospheric Test Site - Small Boy. These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the investigation report. The sites will be investigated based on the data quality objectives (DQOs) developed on April 1, 2014, by representatives of the Nevada Division of Environmental Protection; U.S. Air Force; and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 541. The site investigation process also will be conducted in accordance with the Soils Activity Quality Assurance Plan, which establishes requirements, technical planning, and general quality practices to be applied to this activity. The potential contamination sources associated with CASs 05-23-04 and 05-45-03 are from nuclear testing activities conducted at the Atmospheric Tests (6) - BFa Site and Atmospheric Test Site - Small Boy sites. The presence and nature of

  16. 42 CFR 73.11 - Security.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Security. 73.11 Section 73.11 Public Health PUBLIC... AND TOXINS § 73.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard the...

  17. 9 CFR 121.11 - Security.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Security. 121.11 Section 121.11... AGENTS AND TOXINS § 121.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard...

  18. Corrective Action Investigation Plan for Corrective Action Unit 365: Baneberry Contamination Area, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2010-12-01

    Corrective Action Unit 365 comprises one corrective action site (CAS), CAS 08-23-02, U-8d Contamination Area. This site is being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for the CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document. The site will be investigated based on the data quality objectives (DQOs) developed on July 6, 2010, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for the Baneberry site. The primary release associated with Corrective Action Unit 365 was radiological contamination from the Baneberry nuclear test. Baneberry was an underground weapons-related test that vented significant quantities of radioactive gases from a fissure located in close proximity to ground zero. A crater formed shortly after detonation, which stemmed part of the flow from the fissure. The scope of this investigation includes surface and shallow subsurface (less than 15 feet below ground surface) soils. Radionuclides from the Baneberry test with the potential to impact groundwater are included within the Underground Test Area Subproject. Investigations and corrective actions associated with the Underground Test Area Subproject include the radiological inventory resulting from the Baneberry test.

  19. Corrective Action Investigation Plan for Corrective Action Unit 105: Area 2 Yucca Flat Atmospheric Test Sites Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2012-09-01

    Corrective Action Unit (CAU) 105 is located in Area 2 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. CAU 105 is a geographical grouping of sites where there has been a suspected release of contamination associated with atmospheric nuclear testing. This document describes the planned investigation of CAU 105, which comprises the following corrective action sites (CASs): • 02-23-04, Atmospheric Test Site - Whitney • 02-23-05, Atmospheric Test Site T-2A • 02-23-06, Atmospheric Test Site T-2B • 02-23-08, Atmospheric Test Site T-2 • 02-23-09, Atmospheric Test Site - Turk These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the data quality objectives (DQOs) developed on April 30, 2012, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 105. The site investigation process will also be conducted in accordance with the Soils Activity Quality Assurance Plan, which establishes requirements, technical planning, and general quality practices to be applied to this activity. The potential contamination sources associated with all CAU 105 CASs are from atmospheric nuclear testing activities. The presence and nature of contamination at CAU

  20. Human security policy challenges

    Directory of Open Access Journals (Sweden)

    Andrew Morton

    2008-10-01

    Full Text Available All evidence points towards climate- and environmentallyinduced migration becoming one of the major policychallenges of this century. Adequate planning for andmanagement of this phenomenon will be critical forhuman security.

  1. Corrective Action Decision Document/Corrective Action Plan for Corrective Action Unit 97: Yucca Flat/Climax Mine Nevada National Security Site, Nevada, Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro, Las Vegas, NV (United States)

    2017-08-01

    This corrective action decision document (CADD)/corrective action plan (CAP) has been prepared for Corrective Action Unit (CAU) 97, Yucca Flat/Climax Mine, Nevada National Security Site (NNSS), Nevada. The Yucca Flat/Climax Mine CAU is located in the northeastern portion of the NNSS and comprises 720 corrective action sites. A total of 747 underground nuclear detonations took place within this CAU between 1957 and 1992 and resulted in the release of radionuclides (RNs) in the subsurface in the vicinity of the test cavities. The CADD portion describes the Yucca Flat/Climax Mine CAU data-collection and modeling activities completed during the corrective action investigation (CAI) stage, presents the corrective action objectives, and describes the actions recommended to meet the objectives. The CAP portion describes the corrective action implementation plan. The CAP presents CAU regulatory boundary objectives and initial use-restriction boundaries identified and negotiated by DOE and the Nevada Division of Environmental Protection (NDEP). The CAP also presents the model evaluation process designed to build confidence that the groundwater flow and contaminant transport modeling results can be used for the regulatory decisions required for CAU closure. The UGTA strategy assumes that active remediation of subsurface RN contamination is not feasible with current technology. As a result, the corrective action is based on a combination of characterization and modeling studies, monitoring, and institutional controls. The strategy is implemented through a four-stage approach that comprises the following: (1) corrective action investigation plan (CAIP), (2) CAI, (3) CADD/CAP, and (4) closure report (CR) stages.

  2. Social Security Administration

    Science.gov (United States)

    ... Suze Orman on Why Creating an Account is Important Suze Orman explains how a my Social Security account can help you plan for your retirement ... for same-sex couples? Open Government at Social Security Explore the benefits you may be due Plain ... About Us Accessibility FOIA Open Government Glossary ...

  3. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  4. Securing the Cloud Cloud Computer Security Techniques and Tactics

    CERN Document Server

    Winkler, Vic (JR)

    2011-01-01

    As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, o

  5. Contemporary security management

    CERN Document Server

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  6. Transatlantic Homeland Security

    DEFF Research Database (Denmark)

    Dalgaard-Nielsen, Anja; Hamilton, Daniel

    This major new study presents both conceptual and practical guidance at a crucial time when intellectual and practical efforts to protect against the new terrorism should move beyond a purely domestic focus. Creating an effective and integrated national homeland security effort is a significant...

  7. The European idea in Central Europe and Scandinavia as a part of the security and peaceful co-existence policy in the framework of the postwar planning

    Directory of Open Access Journals (Sweden)

    Chernyshev Yevgeny

    2011-12-01

    Full Text Available This article is dedicated to the development of European unity in Central Europe and Scandinavia as a mechanism of collective security and intergovernmental cooperation development. The cultural and historical features of Central Europe and Scandinavia emphasize the need for a comparative study into the European idea. This article considers the tendencies and factors which affected the development of the European idea in the framework of the post-war planning. This research sets out to compare and identify similar or analogous features and elements of the theoretical bases of movements for European unity in Central and Northern Europe. The author comes to the conclusion about the correlation between the “Europe of regions” model and the European unity concept. The ideas of Scandinavian and Central European integration rested on national, cultural and historical connections of the neighbouring countries were expected to constitute such formations, which contradicted and were opposed to by the theoretical framework of Western European integration. On the other hand, regional integration implied that a federation or union of the neighbouring states could be considered a step towards a more universal organisation, which would not mean the isolation of Scandinavia and Central Europe from the rest of the world. The theoretical and practical significance of this work lies in the comparative approach to the analysis of the phenomena which have been considered individually in the framework of historiography. It is the major contribution of the article to the research on history of ideas and European diplomacy. Moreover, the subject of research is immediately connected to the problem of security in the Baltic region and the Soviet factor, as well as political stereotypes produced in this field. The author employed historical comparative and inductive types of the historical typological method.

  8. Corrective Action Investigation Plan for Corrective Action Unit 366: Area 11 Plutonium Valley Dispersion Sites, Nevada National Security Site, Nevada

    International Nuclear Information System (INIS)

    Matthews, Patrick

    2011-01-01

    Corrective Action Unit 366 comprises the six corrective action sites (CASs) listed below: (1) 11-08-01, Contaminated Waste Dump No.1; (2) 11-08-02, Contaminated Waste Dump No.2; (3) 11-23-01, Radioactively Contaminated Area A; (4) 11-23-02, Radioactively Contaminated Area B; (5) 11-23-03, Radioactively Contaminated Area C; and (6) 11-23-04, Radioactively Contaminated Area D. These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the data quality objectives (DQOs) developed July 6, 2011, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 366. The presence and nature of contamination at CAU 366 will be evaluated based on information collected from a field investigation. Radiological contamination will be evaluated based on a comparison of the total effective dose (TED) at sample locations to the dose-based final action level (FAL). The TED will be calculated by summing the estimates of internal and external dose. Results from the analysis of soil samples collected from sample plots will be used to calculate internal radiological dose. Thermoluminescent dosimeters placed at each sample location will be used to measure external radiological dose. Based on historical documentation of the releases

  9. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  10. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Science.gov (United States)

    2010-03-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...

  11. Moving and Being Moved: Implications for Practice.

    Science.gov (United States)

    Kretchmar, R. Scott

    2000-01-01

    Uses philosophical writings, a novel about baseball, and a nonfiction work on rowing to analyze levels of meaning in physical activity, showing why three popular methods for enhancing meaning have not succeeded and may have moved some students away from deeper levels of meaning. The paper suggests that using hints taken from the three books could…

  12. Corrective Action Investigation Plan for Corrective Action Unit 576: Miscellaneous Radiological Sites and Debris Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick [Navarro, Las Vegas, NV (United States)

    2016-12-01

    Corrective Action Unit (CAU) 576 is located in Areas 2, 3, 5, 8, and 9 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. CAU 576 is a grouping of sites where there has been a suspected release of contamination associated with nuclear testing. This document describes the planned investigation of CAU 576, which comprises the following corrective action sites (CASs): 00-99-01, Potential Source Material; 02-99-12, U-2af (Kennebec) Surface Rad-Chem Piping; 03-99-20, Area 3 Subsurface Rad-Chem Piping; 05-19-04, Frenchman Flat Rad Waste Dump ; 09-99-08, U-9x (Allegheny) Subsurface Rad-Chem Piping; 09-99-09, U-9its u24 (Avens-Alkermes) Surface Contaminated Flex Line These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document (CADD).

  13. Moving Field Guides

    Science.gov (United States)

    Cassie Meador; Mark Twery; Meagan. Leatherbury

    2011-01-01

    The Moving Field Guides (MFG) project is a creative take on site interpretation. Moving Field Guides provide an example of how scientific and artistic endeavors work in parallel. Both begin with keen observations that produce information that must be analyzed, understood, and interpreted. That interpretation then needs to be communicated to others to complete the...

  14. People on the Move

    Science.gov (United States)

    Mohan, Audrey

    2018-01-01

    The purpose of this 2-3 day lesson is to introduce students in Grades 2-4 to the idea that people move around the world for a variety of reasons. In this activity, students explore why people move through class discussion, a guided reading, and interviews. The teacher elicits student ideas using the compelling question (Dimension 1 of the C3…

  15. Corrective Action Investigation Plan for Corrective Action Unit 571: Area 9 Yucca Flat Plutonium Dispersion Sites, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Bailey, Bernadine; Matthews, Patrick

    2013-07-01

    CAU 571 is a grouping of sites where there has been a suspected release of contamination associated with nuclear testing. This document describes the planned investigation of CAU 571, which comprises the following corrective action sites (CASs): • 09-23-03, Atmospheric Test Site S-9F • 09-23-04, Atmospheric Test Site T9-C • 09-23-12, Atmospheric Test Site S-9E • 09-23-13, Atmospheric Test Site T-9D • 09-45-01, Windrows Crater These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the investigation report. The sites will be investigated based on the data quality objectives (DQOs) developed on March 6, 2013, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (now the Nevada Field Office). The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 571. The site investigation process will also be conducted in accordance with the Soils Activity Quality Assurance Plan, which establishes requirements, technical planning, and general quality practices to be applied to this activity. The potential contamination sources associated with CAU 571 CASs are from nuclear testing activities. The DQO process resulted in an assumption that total effective dose (TED) within a default contamination boundary exceeds the final action level (FAL) and requires corrective action. The presence and nature of contamination outside the default

  16. Corrective Action Investigation Plan for Corrective Action Unit 567: Miscellaneous Soil Sites, Nevada National Security Site, Nevada, with ROTC 1 Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick K.

    2013-07-01

    Corrective Action Unit (CAU) 567 is located in Areas 1, 3, 5, 20, and 25 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. CAU 567 is a grouping of sites where there has been a suspected release of contamination associated with nuclear testing. This document describes the planned investigation of CAU 567, which comprises the following corrective action sites (CASs): • 01-23-03, Atmospheric Test Site T-1 • 03-23-25, Seaweed E Contamination Area • 05-23-07, A5b RMA • 20-23-08, Colby Mud Spill • 25-23-23, J-11 Soil RMA These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the investigation report. The sites will be investigated based on the data quality objectives (DQOs) developed on May 6, 2013, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 567. The site investigation process will also be conducted in accordance with the Soils Activity Quality Assurance Plan, which establishes requirements, technical planning, and general quality practices to be applied to this activity. The potential contamination sources associated with CAU 567 releases are nuclear test operations and other NNSS operations. The DQO process resulted in an assumption that total effective dose (TED) within a default contamination boundary

  17. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  18. Embodied affectivity: On moving and being moved

    Directory of Open Access Journals (Sweden)

    Thomas eFuchs

    2014-06-01

    Full Text Available There is a growing body of research indicating that bodily sensation and behaviour strongly influences one’s emotional reaction towards certain situations or objects. On this background, a framework model of embodied affectivity is suggested: we regard emotions as resulting from the circular interaction between affective qualities or affordances in the environment and the subject’s bodily resonance, be it in the form of sensations, postures, expressive movements or movement tendencies. Motion and emotion are thus intrinsically connected: one is moved by movement (perception; impression; affection and moved to move (action; expression; e-motion. Through its resonance, the body functions as a medium of emotional perception: it colours or charges self-experience and the environment with affective valences while it remains itself in the background of one’s own awareness. This model is then applied to emotional social understanding or interaffectivity which is regarded as an intertwinement of two cycles of embodied affectivity, thus continuously modifying each partner’s affective affordances and bodily resonance. We conclude with considerations of how embodied affectivity is altered in psychopathology and can be addressed in psychotherapy of the embodied self.

  19. Planning U.S. Security,

    Science.gov (United States)

    1981-01-01

    Crisis. Boston: Little, Brown & Co., 1971. Ansoff , H. Igor . Strategic Management. New York: John Wiley & Sons, 1979. Antonelli, Theodore, Major General...Shirley, Michael H. Peters, and Adel I. EI-Ansary, Strategy and Policy Formation (New York: Wiley, 1976); H. Igor Ansoff , Strategic Manage- ment (New

  20. Corrective Action Investigation Plan for Corrective Action Unit 570: Area 9 Yucca Flat Atmospheric Test Sites Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2012-08-01

    CAU 570 comprises the following six corrective action sites (CASs): • 02-23-07, Atmospheric Test Site - Tesla • 09-23-10, Atmospheric Test Site T-9 • 09-23-11, Atmospheric Test Site S-9G • 09-23-14, Atmospheric Test Site - Rushmore • 09-23-15, Eagle Contamination Area • 09-99-01, Atmospheric Test Site B-9A These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the data quality objectives (DQOs) developed on April 30, 2012, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 570. The site investigation process will also be conducted in accordance with the Soils Activity Quality Assurance Plan, which establishes requirements, technical planning, and general quality practices to be applied to this activity. The presence and nature of contamination at CAU 570 will be evaluated based on information collected from a field investigation. Radiological contamination will be evaluated based on a comparison of the total effective dose at sample locations to the dose-based final action level. The total effective dose will be calculated as the total of separate estimates of internal and external dose. Results from the analysis of soil samples will be used to calculate internal radiological

  1. PARALLEL MOVING MECHANICAL SYSTEMS

    Directory of Open Access Journals (Sweden)

    Florian Ion Tiberius Petrescu

    2014-09-01

    Full Text Available Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 Moving mechanical systems parallel structures are solid, fast, and accurate. Between parallel systems it is to be noticed Stewart platforms, as the oldest systems, fast, solid and precise. The work outlines a few main elements of Stewart platforms. Begin with the geometry platform, kinematic elements of it, and presented then and a few items of dynamics. Dynamic primary element on it means the determination mechanism kinetic energy of the entire Stewart platforms. It is then in a record tail cinematic mobile by a method dot matrix of rotation. If a structural mottoelement consists of two moving elements which translates relative, drive train and especially dynamic it is more convenient to represent the mottoelement as a single moving components. We have thus seven moving parts (the six motoelements or feet to which is added mobile platform 7 and one fixed.

  2. The Moving image

    DEFF Research Database (Denmark)

    Hansen, Lennard Højbjerg

    2014-01-01

    Every day we are presented with bodily expressions in audiovisual media – by anchors, journalists and characters in films for instance. This article explores how body language in the moving image has been and can be approached in a scholarly manner.......Every day we are presented with bodily expressions in audiovisual media – by anchors, journalists and characters in films for instance. This article explores how body language in the moving image has been and can be approached in a scholarly manner....

  3. Nuclear and radiological Security: Introduction.

    Energy Technology Data Exchange (ETDEWEB)

    Miller, James Christopher [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-02-24

    Nuclear security includes the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer, or other malicious acts involving nuclear or other radioactive substances or their associated facilities. The presentation begins by discussing the concept and its importance, then moves on to consider threats--insider threat, sabotage, diversion of materials--with considerable emphasis on the former. The intrusion at Pelindaba, South Africa, is described as a case study. The distinction between nuclear security and security of radiological and portable sources is clarified, and the international legal framework is touched upon. The paper concludes by discussing the responsibilities of the various entities involved in nuclear security.

  4. Nuclear and radiological Security: Introduction

    International Nuclear Information System (INIS)

    Miller, James Christopher

    2016-01-01

    Nuclear security includes the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer, or other malicious acts involving nuclear or other radioactive substances or their associated facilities. The presentation begins by discussing the concept and its importance, then moves on to consider threats--insider threat, sabotage, diversion of materials--with considerable emphasis on the former. The intrusion at Pelindaba, South Africa, is described as a case study. The distinction between nuclear security and security of radiological and portable sources is clarified, and the international legal framework is touched upon. The paper concludes by discussing the responsibilities of the various entities involved in nuclear security.

  5. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  6. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  7. Beyond grid security

    International Nuclear Information System (INIS)

    Hoeft, B; Epting, U; Koenig, T

    2008-01-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls

  8. Security in cloud computing

    OpenAIRE

    Moreno Martín, Oriol

    2016-01-01

    Security in Cloud Computing is becoming a challenge for next generation Data Centers. This project will focus on investigating new security strategies for Cloud Computing systems. Cloud Computingisarecent paradigmto deliver services over Internet. Businesses grow drastically because of it. Researchers focus their work on it. The rapid access to exible and low cost IT resources on an on-demand fashion, allows the users to avoid planning ahead for provisioning, and enterprises to save money ...

  9. A Security Checklist for ERP Implementations

    Science.gov (United States)

    Hughes, Joy R.; Beer, Robert

    2007-01-01

    The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…

  10. Heavy Lift for National Security: The Ares V

    Science.gov (United States)

    Sumrall, Phil

    2009-01-01

    The NASA Ares Projects Office is developing the launch vehicles to move the United States and humanity beyond low earth orbit. Ares I is a crewed vehicle, and Ares V is a heavy lift vehicle being designed to launch cargo into LEO and transfer cargo and crews to the Moon. This is a snapshot of development and capabilities. Ares V is early in the requirements formulation stage of development pending the outcome of the Review of U.S. Human Space Flight Plans Committee and White House action. The Ares V vehicle will be considered a national asset, creating unmatched opportunities for human exploration, science, national security, and space business.

  11. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  12. Corrective Action Decision Document/Corrective Action Plan for Corrective Action Unit 547: Miscellaneous Contaminated Waste Sites, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Mark Krauss

    2011-09-01

    The purpose of this CADD/CAP is to present the corrective action alternatives (CAAs) evaluated for CAU 547, provide justification for selection of the recommended alternative, and describe the plan for implementing the selected alternative. Corrective Action Unit 547 consists of the following three corrective action sites (CASs): (1) CAS 02-37-02, Gas Sampling Assembly; (2) CAS 03-99-19, Gas Sampling Assembly; and(3) CAS 09-99-06, Gas Sampling Assembly. The gas sampling assemblies consist of inactive process piping, equipment, and instrumentation that were left in place after completion of underground safety experiments. The purpose of these safety experiments was to confirm that a nuclear explosion would not occur in the case of an accidental detonation of the high-explosive component of the device. The gas sampling assemblies allowed for the direct sampling of the gases and particulates produced by the safety experiments. Corrective Action Site 02-37-02 is located in Area 2 of the Nevada National Security Site (NNSS) and is associated with the Mullet safety experiment conducted in emplacement borehole U2ag on October 17, 1963. Corrective Action Site 03-99-19 is located in Area 3 of the NNSS and is associated with the Tejon safety experiment conducted in emplacement borehole U3cg on May 17, 1963. Corrective Action Site 09-99-06 is located in Area 9 of the NNSS and is associated with the Player safety experiment conducted in emplacement borehole U9cc on August 27, 1964. The CAU 547 CASs were investigated in accordance with the data quality objectives (DQOs) developed by representatives of the Nevada Division of Environmental Protection (NDEP) and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to determine and implement appropriate corrective actions for CAU 547. Existing radiological survey data and historical knowledge of

  13. MOVES regional level sensitivity analysis

    Science.gov (United States)

    2012-01-01

    The MOVES Regional Level Sensitivity Analysis was conducted to increase understanding of the operations of the MOVES Model in regional emissions analysis and to highlight the following: : the relative sensitivity of selected MOVES Model input paramet...

  14. Move of ground water

    International Nuclear Information System (INIS)

    Kimura, Shigehiko

    1983-01-01

    As a ground water flow which is difficult to explain by Darcy's theory, there is stagnant water in strata, which moves by pumping and leads to land subsidence. This is now a major problem in Japan. Such move on an extensive scale has been investigated in detail by means of 3 H such as from rainfall in addition to ordinary measurement. The move of ground water is divided broadly into that in an unsaturated stratum from ground surface to water-table and that in a saturated stratum below the water-table. The course of the analyses made so far by 3 H contained in water, and the future trend of its usage are described. A flow model of regarding water as plastic fluid and its flow as channel assembly may be available for some flow mechanism which is not possible to explain with Darcy's theory. (Mori, K.)

  15. Moving toroidal limiter

    International Nuclear Information System (INIS)

    Ikuta, Kazunari; Miyahara, Akira.

    1983-06-01

    The concept of the limiter-divertor proposed by Mirnov is extended to a toroidal limiter-divertor (which we call moving toroidal limiter) using the stream of ferromagnetic balls coated with a low Z materials such as plastics, graphite and ceramics. An important advantage of the use of the ferromagnetic materials would be possible soft landing of the balls on a catcher, provided that the temperature of the balls is below Curie point. Moreover, moving toroidal limiter would work as a protector of the first wall not only against the vertical movement of plasma ring but also against the violent inward motion driven by major disruption because the orbit of the ball in the case of moving toroidal limiter distributes over the small major radius side of the toroidal plasma. (author)

  16. Moving to Jobs?

    OpenAIRE

    Dave Maré; Jason Timmins

    2003-01-01

    This paper examines whether New Zealand residents move from low-growth to high-growth regions, using New Zealand census data from the past three inter-censal periods (covering 1986-2001). We focus on the relationship between employment growth and migration flows to gauge the strength of the relationship and the stability of the relationship over the business cycle. We find that people move to areas of high employment growth, but that the probability of leaving a region is less strongly relate...

  17. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  18. Vietnam: expanding the social security system.

    Science.gov (United States)

    Pruzin, D

    1996-01-01

    Viet Nam's shift toward a market-oriented economy has been associated with annual gross domestic product growth of more than 8% over the past 5 years. At the same time, the emergence of private-sector enterprises and subsequent closure of many state-run enterprises have had profound implications for Viet Nam's social protection systems. At present, only 5.6 million of the country's 33 million workers are covered under the state-run social insurance system. In 1995, the government moved to include private enterprises with 10 or more employees in its state benefits system. The International Labor Organization (ILO) has been working with the Vietnamese Government to design and implement a social security system that would extend coverage progressively to excluded sectors and provide support to workers who have become unemployed as a result of the economic transition process. At its Eighth National Congress, the Vietnamese Communist Party approved a 5-year social and economic plan calling for such an expansion of the social insurance system as well as for a guaranteed standard of living for pensioners. To facilitate anticipated changes, activities that were previously divided between the Ministry of Labor, Invalids, and Social Affairs and the Vietnam General Confederation of Labor have been assigned to the newly formed Vietnam Social Insurance (VSI) Organization. Under consideration is a plan to combine some VSI activities with those of the Vietnam Health Insurance Organization. The ILO will assist with training, computerization, and social security fund investing. Noncompliance is a major obstacle to planned expansion of the social security system; about 90% of private firms are still not paying into the system.

  19. Staying Secure for School Safety

    Science.gov (United States)

    Youngkin, Minu

    2012-01-01

    Proper planning and preventive maintenance can increase school security and return on investment. Preventive maintenance begins with planning. Through careful planning, education institutions can determine what is working and if any equipment, hardware or software needs to be replaced or upgraded. When reviewing a school's safety and security…

  20. The Underbelly of Global Security

    DEFF Research Database (Denmark)

    Mynster Christensen, Maya

    2015-01-01

    -militias, facilitated by a British security company and the Sierra Leone government. In doing so, the article contributes to the ongoing scholarly debate on the privatization of security by offering a “local” ethnographically informed perspective on the micro-dynamics of “global” security. It is argued that the supply......In the aftermath of the Sierra Leone civil war, demobilized militia soldiers have become an attractive resource to private security companies. Based on extensive ethnographic fieldwork, this article traces the outsourcing of security at American military bases in Iraq to Sierra Leonean ex...... of global security depends on a form of local immobility: on a population that is “stuck”, yet constantly on the move to seize opportunities for survival and recognition. Structured by a chronological account of the recruitment, deployment, and deportation of Sierra Leonean ex-militias, the article...

  1. Operation Iraqi Freedom: DOD Should Apply Lessons Learned Concerning the Need for Security over Conventional Munitions Storage Sites to Future Operations Planning

    National Research Council Canada - National Science Library

    D'Agostino, Davi M

    2007-01-01

    The Government Accountability Office (GAO) is releasing a report today on lessons learned concerning the need for security over conventional munitions storage sites that provides the basis for this testimony...

  2. Coast guard : better logistics planning needed to aid operational decisions related to the deployment of the national security cutter and its support assets.

    Science.gov (United States)

    2009-07-01

    As part of its more than $$24 billion Deepwater program to replace aging vessels and aircraft with new or upgraded assets, the Coast Guard is preparing the National Security Cutter (NSC) for service. GAO previously reported on Deepwater assets' deplo...

  3. Increasing Financial Security

    Science.gov (United States)

    Kiss, Elizabeth

    2006-01-01

    Earning, spending, saving and investing, and using credit are important aspects of money management that teens need to understand as they move into adulthood. Family and consumer sciences (FCS) professionals have a long history of addressing this important life skill. This brief article describes the High School Financial Planning Program (HSFPP),…

  4. International Nuclear Security Education Network (INSEN): Promoting nuclear security education

    International Nuclear Information System (INIS)

    Muhamad Samudi Yasir

    2013-01-01

    Full-text: The need for human resource development programmes in nuclear security was underlined at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors Meetings. Successive IAEA Nuclear Security Plans, the most recent of which was agreed by the Board of Governors in September 2009, give high priority to assisting States in establishing educational programmes in nuclear security in order to ensure the sustainability of nuclear security improvements. The current Nuclear Security Plan 1 covering 2010-2013 emphasizes on the importance of considering existing capacities at international, regional and national levels while designing nuclear security academic programmes. In the course of implementing the Plan, the IAEA developed a guide entitled Educational Programme in Nuclear Security (IAEA Nuclear Security Series No. 12) that consists of a model of a MAster of Science (M.Sc.) and a Certificate Programme in Nuclear Security. This guide was aims at assisting universities or other educational institutes to developed academic programmes in nuclear security. Independently, some universities already offered academic programmes covering some areas of nuclear security, while other universities have asked the IAEA to support the implementation of these programmes. In order to better address current and future request for assistance in this area, the IAEA establish a collaboration network-International Nuclear Security Education Network (INSEN), among universities who are providing nuclear security education or who are interested in starting an academic programme/ course(s) in nuclear security. Universiti Kebangsaan Malaysia (UKM) is a first local university became a member of INSEN since the beginning of the establishment. (author)

  5. Project Management with IT Security Focus

    OpenAIRE

    Felician Alecu; Paul Pocatilu; Sergiu Capisizu

    2011-01-01

    The paper focus on the main key points related to the IT security project management. The most important lifecycle stages are identified: IT security project proposal definition, project organization, project planning, quality planning, project team organization, IT security project activities management and project closing. The most important success factors for IT security projects are the support of top-management, customer satisfaction, prevention over remediation and continuous progress....

  6. Libraries on the MOVE.

    Science.gov (United States)

    Edgar, Jim; And Others

    1986-01-01

    Presents papers from Illinois State Library and Shawnee Library System's "Libraries on the MOVE" conference focusing on how libraries can impact economic/cultural climate of an area. Topics addressed included information services of rural libraries; marketing; rural library development; library law; information access; interagency…

  7. Sense of moving

    DEFF Research Database (Denmark)

    Christensen, Mark Schram; Grünbaum, Thor

    2017-01-01

    In this chapter, we assume the existence of a sense of “movement activity” that arises when a person actively moves a body part. This sense is usually supposed to be part of sense of agency (SoA). The purpose of the chapter is to determine whether the already existing experimental paradigms can...

  8. Indexing Moving Points

    DEFF Research Database (Denmark)

    Agarwal, Pankaj K.; Arge, Lars Allan; Erickson, Jeff

    2003-01-01

    We propose three indexing schemes for storing a set S of N points in the plane, each moving along a linear trajectory, so that any query of the following form can be answered quickly: Given a rectangle R and a real value t, report all K points of S that lie inside R at time t. We first present an...

  9. Moving up in industry.

    Science.gov (United States)

    Covell, Charlotte

    2016-01-23

    Charlotte Covell is commercial business manager at Virbac UK, a role that gives her responsibility for the company's sales to corporate practices, some buying groups and internet pharmacies. She began her career as a veterinary nurse, but moved into industry and now has a role in senior business management. British Veterinary Association.

  10. Optics of moving media

    Science.gov (United States)

    Piwnicki, P.; Leonhardt, U.

    2001-01-01

    Light experiences a moving medium as an effective gravitational field. In the limit of low medium velocities the medium flow plays the role of a magnetic vector potential. We review the background of our theory [U. Leonhardt and P. Piwnicki, Phys. Rev. A 60, 4301 (1999); Phys. Rev. Lett. 84, 822 (2000)], including our proposal of making optical black holes.

  11. Moving Another Big Desk.

    Science.gov (United States)

    Fawcett, Gay

    1996-01-01

    New ways of thinking about leadership require that leaders move their big desks and establish environments that encourage trust and open communication. Educational leaders must trust their colleagues to make wise choices. When teachers are treated democratically as leaders, classrooms will also become democratic learning organizations. (SM)

  12. Making Images That Move

    Science.gov (United States)

    Rennie, Richard

    2015-01-01

    The history of the moving image (the cinema) is well documented in books and on the Internet. This article offers a number of activities that can easily be carried out in a science class. They make use of the phenomenon of "Persistence of Vision." The activities presented herein demonstrate the functionality of the phenakistoscope, the…

  13. Aboard the "Moving School."

    Science.gov (United States)

    Ainscow, Mel; Hopkins, David

    1992-01-01

    In many countries, education legislation embodies contradictory pressures for centralization and decentralization. In the United Kingdom, there is growing government control over policy and direction of schools; schools are also being given more responsibility for resource management. "Moving" schools within Improving the Quality of…

  14. Machine Learning for Security

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    Applied statistics, aka ‘Machine Learning’, offers a wealth of techniques for answering security questions. It’s a much hyped topic in the big data world, with many companies now providing machine learning as a service. This talk will demystify these techniques, explain the math, and demonstrate their application to security problems. The presentation will include how-to’s on classifying malware, looking into encrypted tunnels, and finding botnets in DNS data. About the speaker Josiah is a security researcher with HP TippingPoint DVLabs Research Group. He has over 15 years of professional software development experience. Josiah used to do AI, with work focused on graph theory, search, and deductive inference on large knowledge bases. As rules only get you so far, he moved from AI to using machine learning techniques identifying failure modes in email traffic. There followed digressions into clustered data storage and later integrated control systems. Current ...

  15. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  16. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  17. 78 FR 10211 - Agency Information Collection Activities; Submission for OMB Review; Comment Request; Securities...

    Science.gov (United States)

    2013-02-13

    ... for OMB Review; Comment Request; Securities Lending by Employee Benefit Plans ACTION: Notice. SUMMARY: The Department of Labor (DOL) is submitting the Employee Benefits Security Administration (EBSA) sponsored information collection request (ICR) titled, ``Securities Lending by Employee Benefit Plans,'' to...

  18. Moving in Circles

    DEFF Research Database (Denmark)

    Simonsen, Gunvor

    2008-01-01

    The article examines the development of African diaspora history during the last fifty years. It outlines the move from a focus on African survivals to a focus on deep rooted cultural principles and back again to a revived interest in concrete cultural transfers from Africa to the Americas....... This circular movement can be explained by a combination of elements characterizing African Atlantic and black Atlantic history. Among them is a lack of attention to questions of periodisation and change. Likewise, it has proven difficult to conceptualize Africa and America at one and the same time...... as characterized by cultural diversity and variation. Moreover, the field has been haunted by a tendency of moving to easily from descriptive evidence to conclusions about African identity in the Americas. A promising way to overcome these problems, it is suggested, is to develop research that focuses on single...

  19. Electric moving shadow garden

    OpenAIRE

    Bracey, Andrew

    2010-01-01

    Electric Moving Shadow Garden is a multi-directional exploration of the links between artists and cinema, with multiple reference and contextual points. it accompanied the exhibition, UnSpooling: Artists & Cinema, curated by Bracey and Dave Griffiths at Corernhouse, Manchester, who also edited the publication. Published to accompany the Cornerhouse exhibition, UnSpooling: Artists & Cinema, curated by artists Andrew Bracey and Dave Griffiths. This illustrated catalogue explores how internat...

  20. TCR moves to MCR

    CERN Multimedia

    Peter Sollander, AB/OP/TI

    2005-01-01

    The monitoring of CERN's technical infrastructure has moved from the Technical Control Room in building 212 to the Meyrin Control Room (MCR) in building 354 (see map) and from the TS/CSE group to AB/OP. The operation's team as well as the services provided remain the same as before and you can still reach the operator on shift by calling 72201. Peter Sollander, AB/OP/TI

  1. CERN Pension Fund move

    CERN Multimedia

    HR Department

    2007-01-01

    The CERN Pension Fund has moved to new offices on the 5th floor of Building 5. The Benefits Service of the Fund is now located in Offices 5-5-017 - 5-5-021 - 5-5-023. We remind you that the office hours are: Tuesday/Wednesday/Thursday from 10 am to 12 am and from 3 pm to 5 pm. The Fund would like to take this opportunity to warmly thank all the persons involved in the relocation.

  2. Lecture - "Move! Eat better"

    CERN Multimedia

    2012-01-01

    As part of the "Move! Eat better" campaign, Novae’s nutrition adviser, Irène Rolfo, will give a talk on the subject of everyday good nutrition. This will be held in the main building auditorium at 12:30 on Thursday, 20 September 2012. Don’t miss this informative event. For more information, go to http://cern.ch/bpmm            

  3. Hospital security: "protecting the business".

    Science.gov (United States)

    Maas, Jos

    2013-01-01

    Implementing management science into security isn't hard and is more necessary than ever according to the author who presents and illustrates a five point plan that he says will get the security job done easier and with more commitment from the Board.

  4. Security in the internet

    International Nuclear Information System (INIS)

    Seibel, R.M.M.; Kocher, K.; Landsberg, P.

    2000-01-01

    Aim of the study: Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Conclusions: Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet. (orig.) [de

  5. A moving experience !

    CERN Document Server

    2005-01-01

    The Transport Service pulled out all the stops and, more specifically, its fleet of moving and lifting equipment for the Discovery Monday on 6 June - a truly moving experience for all the visitors who took part ! Visitors could play at being machine operator, twiddling the controls of a lift truck fitted with a jib to lift a dummy magnet into a wooden mock-up of a beam-line.They had to show even greater dexterity for this game of lucky dip...CERN-style.Those with a head for heights took to the skies 20 m above ground in a telescopic boom lift.Children were allowed to climb up into the operator's cabin - this is one of the cranes used to move the LHC magnets around. Warm thanks to all members of the Transport Service for their participation, especially B. Goicoechea, T. Ilkei, R. Bihery, S. Prodon, S. Pelletier, Y. Bernard, A.  Sallot, B. Pigeard, S. Guinchard, B. Bulot, J. Berrez, Y. Grandjean, A. Bouakkaz, M. Bois, F. Stach, T. Mazzarino and S. Fumey.

  6. Health Security and Risk Aversion.

    Science.gov (United States)

    Herington, Jonathan

    2016-09-01

    Health security has become a popular way of justifying efforts to control catastrophic threats to public health. Unfortunately, there has been little analysis of the concept of health security, nor the relationship between health security and other potential aims of public health policy. In this paper I develop an account of health security as an aversion to risky policy options. I explore three reasons for thinking risk avoidance is a distinctly worthwhile aim of public health policy: (i) that security is intrinsically valuable, (ii) that it is necessary for social planning and (iii) that it is an appropriate response to decision-making in contexts of very limited information. Striking the right balance between securing and maximizing population health thus requires a substantive, and hitherto unrecognized, value judgment. Finally, I critically evaluate the current health security agenda in light of this new account of the concept and its relationship to the other aims of public health policy. © 2016 John Wiley & Sons Ltd.

  7. Implementing an Information Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Glantz, Clifford S.; Lenaeus, Joseph D.; Landine, Guy P.; O' Neil, Lori Ross; Leitch, Rosalyn; Johnson, Christopher; Lewis, John G.; Rodger, Robert M.

    2017-11-01

    The threats to information security have dramatically increased with the proliferation of information systems and the internet. Chemical, biological, radiological, nuclear, and explosives (CBRNe) facilities need to address these threats in order to protect themselves from the loss of intellectual property, theft of valuable or hazardous materials, and sabotage. Project 19 of the European Union CBRN Risk Mitigation Centres of Excellence Initiative is designed to help CBRN security managers, information technology/cybersecurity managers, and other decision-makers deal with these threats through the application of cost-effective information security programs. Project 19 has developed three guidance documents that are publically available to cover information security best practices, planning for an information security management system, and implementing security controls for information security.

  8. Social security for seafarers globally

    DEFF Research Database (Denmark)

    Jensen, Olaf; Canals, Luisa; Haarløv, Erik

    2013-01-01

    Social security for seafarers globally Background: Social security protection is one of the essential elements of decent work. The issue is complex and no previous epidemiological studies of the coverage among seafarers have yet been performed. Objectives: The aim was to overcome the gap...... of knowledge to promote the discussion and planning of the implementation of social security for all seafarers. Methods: The seafarers completed a short questionnaire concerning their knowledge about their social security status. Results: Significant disparities of coverage of social security were pointed out...... comes from poorer countries without substantial social security systems. The solutions suggested are to implement the minimum requirements as recommended by the ILO 2006 Convention, to survey the implementation and in the long term to struggle for global social equality. Key words: Social security...

  9. Cyber security in digitalized nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Sohn, Kwang Young; Yi, Woo June [KoRTS Co., Ltd., Daejeon (Korea, Republic of)

    2008-10-15

    This paper analyzer the cyber security issues pertaining to networks and general systems, and provides cyber security activity model. For this, the importance of security, and the domestic and international trends of cyber security are surveyed in order to introduce the strategies and countermeasures of cyber security which should be interfaced with Quality Assurance (QA) plan Based on the result of cyber security model introduced in this paper, activities for cyber security, work load, necessary resources and process for activities, and duration could be estimated hopefully.

  10. Cyber security in digitalized nuclear power plants

    International Nuclear Information System (INIS)

    Sohn, Kwang Young; Yi, Woo June

    2008-01-01

    This paper analyzer the cyber security issues pertaining to networks and general systems, and provides cyber security activity model. For this, the importance of security, and the domestic and international trends of cyber security are surveyed in order to introduce the strategies and countermeasures of cyber security which should be interfaced with Quality Assurance (QA) plan Based on the result of cyber security model introduced in this paper, activities for cyber security, work load, necessary resources and process for activities, and duration could be estimated hopefully

  11. Masters in Nuclear Security

    International Nuclear Information System (INIS)

    Rickwood, Peter

    2013-01-01

    Continuing global efforts to improve the security of nuclear and other radioactive material against the threat of malicious acts are being assisted by a new initiative, the development of a corps of professional experts to strengthen nuclear security. The IAEA, the European Commission, universities, research institutions and other bodies working in collaboration have established an International Nuclear Security Education Network (INSEN). In 2011, six European academic institutions, the Vienna University of Technology, the Brandenburg University of Applied Sciences, the Demokritos National Centre for Scientific Research in Greece, the Reactor Institute Delft of the Delft University of Technology in the Netherlands, the University of Oslo, and the University of Manchester Dalton Nuclear Institute, started developing a European Master of Science Programme in Nuclear Security Management. In March 2013, the masters project was inaugurated when ten students commenced studies at the Brandenburg University of Applied Sciences in Germany for two weeks. In April, they moved to the Delft University of Technology in the Netherlands for a further two weeks of studies. The pilot programme consists of six teaching sessions in different academic institutions. At the inauguration in Delft, IAEA Director General Yukiya Amano commended this effort to train a new generation of experts who can help to improve global nuclear security. ''It is clear that we will need a new generation of policy-makers and nuclear professionals - people like you - who will have a proper understanding of the importance of nuclear security,'' Mr. Amano told students and faculty members. ''The IAEA's goal is to support the development of such programmes on a global basis,'' said David Lambert, Senior Training Officer in the IAEA's Office of Nuclear Security. ''An existing postgraduate degree programme focused on nuclear security at Naif Arab University for Security Sciences (NAUSS) is currently supported by

  12. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  13. Secure messaging via the cloud and mobile devices: data security issues emerge with new technologies.

    Science.gov (United States)

    Prestigiacomo, Jennifer

    2011-05-01

    The secure messaging space is alive with new innovations that are moving the industry forward. Key in this space is the push toward moving secure messaging to the cloud and pushing it out to mobile devices. Among the examples are solutions that allow physicians to receive encrypted email on mobile devices, as well as ones that allow doctors to securely text-message each other to coordinate care. However, the security issues around these emerging technologies in this very active space must be further explored.

  14. CERN Pension Fund move

    CERN Multimedia

    HR Department

    2007-01-01

    The CERN Pension Fund has moved to new offices at the 5th floor of Building 5. The Benefits Service of the Fund will henceforth receive you in the offices: 5-5-017 - 5-5-021 - 5-5-023. We remind you that the office hours are: Tuesday/Wednesday/Thursday from 10 am to 12 am and from 3 pm to 5 pm. The Fund would like to take this opportunity to warmly thank all the persons involved in the Removal.

  15. Computational cameras for moving iris recognition

    Science.gov (United States)

    McCloskey, Scott; Venkatesha, Sharath

    2015-05-01

    Iris-based biometric identification is increasingly used for facility access and other security applications. Like all methods that exploit visual information, however, iris systems are limited by the quality of captured images. Optical defocus due to a small depth of field (DOF) is one such challenge, as is the acquisition of sharply-focused iris images from subjects in motion. This manuscript describes the application of computational motion-deblurring cameras to the problem of moving iris capture, from the underlying theory to system considerations and performance data.

  16. Moving related to separation : who moves and to what distance

    NARCIS (Netherlands)

    Mulder, Clara H.; Malmberg, Gunnar

    We address the issue of moving from the joint home on the occasion of separation. Our research question is: To what extent can the occurrence of moves related to separation, and the distance moved, be explained by ties to the location, resources, and other factors influencing the likelihood of

  17. Energy security in ASEAN: A quantitative approach for sustainable energy policy

    International Nuclear Information System (INIS)

    Tongsopit, Sopitsuda; Kittner, Noah; Chang, Youngho; Aksornkij, Apinya; Wangjiraniran, Weerin

    2016-01-01

    We investigate energy security of the Association of Southeast Asian Nations (ASEAN) under the 4-A’s framework. The ASEAN Economic Community (AEC) agreement launched in 2015 renewed a regional focus on energy security and sustainability. We employ an analytic framework to quantitatively assess progress in different categories including availability, acceptability, affordability, and applicability. Key metrics include the documentation of CO_2 emissions, energy access measures, and energy supply reserves from 2005–2010. We identify relevant energy indicators using high quality historical data from the IEA and World Bank. We find that ASEAN made little progress toward establishing energy security in the previous five-year planning period (2005–2010) as it regressed in most categories except applicability. Therefore, we suggest that increased development of renewable energy and energy efficiency technologies would move ASEAN in a positive direction toward achieving energy security and sustainable energy policy goals. - Highlights: • We investigate energy security in ASEAN across four dimensions. • Energy security in ASEAN has mostly regressed from 2005–2010. • Future cooperative agreements will help ASEAN improve energy security.

  18. Evaluation of the effectiveness of the implementation of power plans in Kenya

    Energy Technology Data Exchange (ETDEWEB)

    Ruwah, N.; Chang, C., E-mail: ndumzilla@email.kings.ac.kr, E-mail: ckchang@kings.ac.kr [KEPCO International Nuclear Graduate School, Ulsan (Korea, Republic of)

    2014-07-01

    The purpose of this research is to make an in depth analysis on why developing countries do not seem to move forward towards electric energy security as projected in their energy plans. It is evident that electric energy plan in developing countries do not work very well. Is it because of poor planning or is it due to poor implementation? This research was done with Kenya as the case study. The primary data collection method was interviews of electric energy planners in Kenya. Least cost power development plans and electric energy plans were assessed and compared to what has been actually implemented, according to the plans. After the problem analysis, this research aims at finding possible solutions to the problems. The solutions to be proposed shall be aimed at advising the developing countries' governments, the electric energy planners and policy makers and the relevant stakeholders on the best planning and implementation strategies. (author)

  19. Evaluation of the effectiveness of the implementation of power plans in Kenya

    International Nuclear Information System (INIS)

    Ruwah, N.; Chang, C.

    2014-01-01

    The purpose of this research is to make an in depth analysis on why developing countries do not seem to move forward towards electric energy security as projected in their energy plans. It is evident that electric energy plan in developing countries do not work very well. Is it because of poor planning or is it due to poor implementation? This research was done with Kenya as the case study. The primary data collection method was interviews of electric energy planners in Kenya. Least cost power development plans and electric energy plans were assessed and compared to what has been actually implemented, according to the plans. After the problem analysis, this research aims at finding possible solutions to the problems. The solutions to be proposed shall be aimed at advising the developing countries' governments, the electric energy planners and policy makers and the relevant stakeholders on the best planning and implementation strategies. (author)

  20. Secure Authentication of Cloud Data Mining API

    OpenAIRE

    Bhadauria, Rohit; Borgohain, Rajdeep; Biswas, Abirlal; Sanyal, Sugata

    2013-01-01

    Cloud computing is a revolutionary concept that has brought a paradigm shift in the IT world. This has made it possible to manage and run businesses without even setting up an IT infrastructure. It offers multi-fold benefits to the users moving to a cloud, while posing unknown security and privacy issues. User authentication is one such growing concern and is greatly needed in order to ensure privacy and security in a cloud computing environment. This paper discusses the security at different...

  1. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  2. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  3. FY 2015 - Stockpile Stewardship and Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2014-04-01

    This Department of Energy’s (DOE) National Nuclear Security Administration (NNSA) Fiscal Year Stockpile Stewardship and Management Plan (SSMP) is a key planning document for the nuclear security enterprise.

  4. FY 2016 - Stockpile Stewardship and Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2015-03-01

    This Department of Energy’s (DOE) National Nuclear Security Administration (NNSA) Fiscal Year Stockpile Stewardship and Management Plan (SSMP) is a key planning document for the nuclear security enterprise.

  5. Ready, set, move!

    CERN Multimedia

    Anaïs Schaeffer

    2012-01-01

    This year, the CERN Medical Service is launching a new public health campaign. Advertised by the catchphrase “Move! & Eat Better”, the particular aim of the campaign is to encourage people at CERN to take more regular exercise, of whatever kind.   The CERN annual relay race is scheduled on 24 May this year. The CERN Medical Service will officially launch its “Move! & Eat Better” campaign at this popular sporting event. “We shall be on hand on the day of the race to strongly advocate regular physical activity,” explains Rachid Belkheir, one of the Medical Service doctors. "We really want to pitch our campaign and answer any questions people may have. Above all we want to set an example. So we are going to walk the same circuit as the runners to underline to people that they can easily incorporate movement into their daily routine.” An underlying concern has prompted this campaign: during their first few year...

  6. Slow light in moving media

    Science.gov (United States)

    Leonhardt, U.; Piwnicki, P.

    2001-06-01

    We review the theory of light propagation in moving media with extremely low group velocity. We intend to clarify the most elementary features of monochromatic slow light in a moving medium and, whenever possible, to give an instructive simplified picture.

  7. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  8. The State-Society/Citizen Relationship in Security Analysis: Implications for Planning and Implementation of U.S. Intervention and Peace/State-Building Operations

    Science.gov (United States)

    2015-04-01

    of the state. Such threats may come into existence when 9 the organizing principles of two states contradict each other in a context where the...security is that the normal condition of actors in a market econ - omy is one of risk, competition, and uncertainty.12 In other words, the actors in the...liberal principles , federative states have no natural unifying principle and, consequently, are more vulnerable to dismemberment, separatism, and

  9. 49 CFR 1542.301 - Contingency plan.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Contingency plan. 1542.301 Section 1542.301..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Contingency Measures § 1542.301 Contingency plan. (a) Each airport operator required to have a security program under § 1542.103(a) and (b...

  10. 49 CFR 193.2715 - Training: security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Training: security. 193.2715 Section 193.2715...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2715 Training: security. (a) Personnel responsible for security at an LNG plant must be trained in accordance with a written plan of...

  11. 7 CFR 331.11 - Security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 5 2010-01-01 2010-01-01 false Security. 331.11 Section 331.11 Agriculture..., DEPARTMENT OF AGRICULTURE POSSESSION, USE, AND TRANSFER OF SELECT AGENTS AND TOXINS § 331.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan...

  12. 78 FR 5116 - NASA Information Security Protection

    Science.gov (United States)

    2013-01-24

    ... 2700-AD61 NASA Information Security Protection AGENCY: National Aeronautics and Space Administration..., projects, plans, or protection services relating to the national security; or (h) The development... implement the provisions of Executive Order (E.O.) 13526, Classified National Security Information, and...

  13. The What, Why and How of Generic Skills: A Financial Planning Case Study

    OpenAIRE

    Craig Cameron; Mark Brimble; Julie Knutsen; Brett Freudenberg

    2014-01-01

    Financial planning in Australia is moving away from its traditional characterisation as an “industry” and towards a “profession”. A key feature of any profession is an educational framework that facilitates the development of technical knowledge and generic skills by students so that they can successfully transition into the workplace. The Australian Securities and Investments Commission (ASIC) is currently reviewing changes to that educational framework (ASIC 2011; ASIC 2013), while the Fina...

  14. Get up and Move!

    Science.gov (United States)

    Spicer, Sally

    2012-01-01

    Assessing children's learning is a key part of teaching. In all curriculum areas it is used for informing planning of future learning experiences and assessing pupil progress. Specifically in science, it identifies knowledge and understanding of scientific concepts, reasoning, and practical skill development. There are various ways to assess,…

  15. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  16. Internet security technologies

    CERN Multimedia

    CERN. Geneva

    2003-01-01

    The three pillars of Internet Security are Infrastructure, Applications and People. In this series of lectures we will examine those three pillars and how vital it is for individuals to understand the vulnerabilities of this technology so they can made informed decisions about risks and how they can reduce those risks for themselves and their colleagues.First we will focus on the infrastructure: network; servers; operating systems and all those things that are mostly invisible. Moving up a level, into the visible realm, we discuss the application and see things like buffer overflows, viruses and how as application developers and users we can protect ourselves. Finally, it's all about people. The strongest security technology in the world is easily defeated if people don't understand their role in the whole system.

  17. "Our federalism" moves indoors.

    Science.gov (United States)

    Ruger, Theodore W

    2013-04-01

    A great deal of the US Supreme Court's federalism jurisprudence over the past two decades has focused on the outer limits of federal power, suggesting a mutually exclusive division of jurisdiction between the states and the federal government, where subjects are regulated by one sovereign or the other but not both. This is not an accurate picture of American governance as it has operated over the past half century - most important areas of American life are regulated concurrently by both the federal government and the states. The Supreme Court's June 2012 decision clearing the way for the Patient Protection and Affordable Care Act (PPACA) to move forward thus should not be regarded as an affront to state sovereignty but as a realistic embrace of state power in its active, modern form. The PPACA is infused with multiple major roles for the states, and as the statute goes into operation over the next few years, states retain, and are already exercising, substantial policy discretion.

  18. Moving Spatial Keyword Queries

    DEFF Research Database (Denmark)

    Wu, Dingming; Yiu, Man Lung; Jensen, Christian S.

    2013-01-01

    propose two algorithms for computing safe zones that guarantee correct results at any time and that aim to optimize the server-side computation as well as the communication between the server and the client. We exploit tight and conservative approximations of safe zones and aggressive computational space...... text data. State-of-the-art solutions for moving queries employ safe zones that guarantee the validity of reported results as long as the user remains within the safe zone associated with a result. However, existing safe-zone methods focus solely on spatial locations and ignore text relevancy. We...... pruning. We present techniques that aim to compute the next safe zone efficiently, and we present two types of conservative safe zones that aim to reduce the communication cost. Empirical studies with real data suggest that the proposals are efficient. To understand the effectiveness of the proposed safe...

  19. Move! Eat better: news

    CERN Multimedia

    2013-01-01

    Are you curious to know whether you’re doing enough daily exercise…? Test yourself with a pedometer!   Through the Move! Eat better campaign, launched in May 2012, the CERN medical service is aiming to improve the health of members of the personnel by encouraging them to prioritise physical activity in conjunction with a balanced diet. Various successful activities have already taken place: relay race/Nordic walk, Bike2work, Zumba and fitness workshops, two conferences (“Physical activity for health” and “Good nutrition every day”), events in the restaurants, as well as posters and a website. Although everyone has got the message from our various communications that physical activity is good for your health, there is still a relevant question being asked: “What is the minimum amount of exercise recommended?” 10,000 steps per day is the ideal figure, which has been demonstrated as beneficial by scientific studies ...

  20. What moves us?

    DEFF Research Database (Denmark)

    2015-01-01

    Katalog til udstillingen på Museum Jorn - What moves us? Le Corbusier & Asger Jorn - 12. sept. - 13. dec. 2015. Kataloget undersøger Le Corbusiers skifte fra en rationelt funderet tilgang til arkitekturen til en poetisk, materialistisk tilgang i efterkrigstiden. Den viser hans indflydelse på den...... yngre Asger Jorn og beskriver danskerens første beundring, som sidenhen forvandledes til skarp kritik. Kataloget, som er rigt illustreret med billeder af Le Corbusiers og Asger Jorns kunst og arkitektur, indeholder også genoptryk af originale tekster, samt bidrag i ord og billeder fra fremtrædende...... eksperter. Kataloget indeholder en række artikler af internationale skribenter under flg. overskrifter: Le Corbusier - kunstnerarkitekten i efterkrigstidens Europa Le Corbusier og Asger Jorn - David mod Goliat Gensyn med Le Corbusier - spor i dansk arkitektur og byrum...

  1. Mechanics of moving materials

    CERN Document Server

    Banichuk, Nikolay; Neittaanmäki, Pekka; Saksa, Tytti; Tuovinen, Tero

    2014-01-01

    This book deals with theoretical aspects of modelling the mechanical behaviour of manufacturing, processing, transportation or other systems in which the processed or supporting material is travelling through the system. Examples of such applications include paper making, transmission cables, band saws, printing presses, manufacturing of plastic films and sheets, and extrusion of aluminium foil, textiles and other materials.   The work focuses on out-of-plane dynamics and stability analysis for isotropic and orthotropic travelling elastic and viscoelastic materials, with and without fluid-structure interaction, using analytical and semi-analytical approaches.  Also topics such as fracturing and fatigue are discussed in the context of moving materials. The last part of the book deals with optimization problems involving physical constraints arising from the stability and fatigue analyses, including uncertainties in the parameters.   The book is intended for researchers and specialists in the field, providin...

  2. Transportation planning for planned special events

    Science.gov (United States)

    2011-05-01

    Unique among planned special event activities are those events that carry the National Special Security Event (NSSE) designation. NSSEs occur with some frequency, with 35 of these events held between September 1998 and February 2010. These events inc...

  3. Mobile code security

    Science.gov (United States)

    Ramalingam, Srikumar

    2001-11-01

    A highly secure mobile agent system is very important for a mobile computing environment. The security issues in mobile agent system comprise protecting mobile hosts from malicious agents, protecting agents from other malicious agents, protecting hosts from other malicious hosts and protecting agents from malicious hosts. Using traditional security mechanisms the first three security problems can be solved. Apart from using trusted hardware, very few approaches exist to protect mobile code from malicious hosts. Some of the approaches to solve this problem are the use of trusted computing, computing with encrypted function, steganography, cryptographic traces, Seal Calculas, etc. This paper focuses on the simulation of some of these existing techniques in the designed mobile language. Some new approaches to solve malicious network problem and agent tampering problem are developed using public key encryption system and steganographic concepts. The approaches are based on encrypting and hiding the partial solutions of the mobile agents. The partial results are stored and the address of the storage is destroyed as the agent moves from one host to another host. This allows only the originator to make use of the partial results. Through these approaches some of the existing problems are solved.

  4. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  5. Moving In, Moving Through, and Moving Out: The Transitional Experiences of Foster Youth College Students

    Science.gov (United States)

    Gamez, Sara I.

    2017-01-01

    The purpose of this qualitative study was to explore the transitional experiences of foster youth college students. The study explored how foster youth experienced moving into, moving through, and moving out of the college environment and what resources and strategies they used to thrive during their college transitions. In addition, this study…

  6. Plan now to make your retirement active, productive.

    Science.gov (United States)

    Schlepp, S

    1989-12-01

    In his book Planning to the Years Ahead, Lester I. Tenney, PhD, professor emeritus at Arizona State University, Tempe, links Abraham Maslow's hierarchy of needs to retirement planning. According to Maslow, economic and security needs can be achieved through a family environment (eg, food clothing, shelter), and social acceptance, self-worth, and self-satisfaction can be achieved from social interaction, work, or leisure activities. After the basic needs of food, clothing, and shelter have been achieved, people are able to move to the next level of achieving safety and security. The level of dependency that people have on satisfying these needs through work will determine how well they are at adapting to retirement. The more people depend on work alone, the harder will be the adjustment; people who are less dependent on work will find retirement easier to accept.

  7. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  8. HITACHI security concept for industrial control systems

    International Nuclear Information System (INIS)

    Endoh, H.; Yamada, T.; Okubo, S.; Nakano, T.

    2012-01-01

    Security is a necessary factor for the safe and efficient operation of today's control systems. To ensure safe operation of control systems throughout their lifetime, security measures must be carefully planned in the development phase and then maintained continuously during the operation phase and other following phases. To ensure operation within the system's safe states, Hitachi proposes security concept processes (1) to derive security measures rationally and (2) to maintain the security model over the system life cycle. Hitachi also proposes security development programs which support the integration of standards-compliant systems and development of robust control equipment. (author)

  9. Xingu Project - Integrating Land Use Planning and Water Governance in Amazonia: Towards Improved Freshwater Security in the Agricultural Frontier of Mato Grosso.

    Science.gov (United States)

    Krusche, A. V.; Ballester, M. V.; Neill, C.; Elsenbeer, H.; Johnson, M. S.; Coe, M. T.; Garavello, M.; Molina, S. G.; Empinotti, V.; Reichardt, F.; Deegan, L.; Harris, L.

    2014-12-01

    The main goal of this project is to identify how impacts from land conversion, cropland expansion and intensification of both crop and animal production interact to affect regional evapotranspiration, rainfall generation, river flooding, and water quality and stream habitats, allowing us to identify thresholds of change that will endanger agricultural production, livelihoods of non-agricultural settlers and the region's new urban population and infrastructure. We will survey the effects of this on (1) soybean farmers, (2) cattle ranchers, (3) small-scale farm families, (4) rural non-agriculturists, including fishers, and (5) urban residents and map their roles as stakeholders. We will also conduct current water use surveys among the different stakeholder groups, accompanied by questions on desired aspects for future freshwater security to identify targets for desirable outcomes of water governance strategies. These targets, together with the information on land use drivers, water quantity and quality and predicted scenarios for global changes will be incorporated into a fully integrated and interactive geospatially oriented socio-ecological model that can serve as framework for future water governance that enhances Freshwater Security in such systems. This is an international cooperation initiative lead by Brazil and with the participation of Canada, Germany and United States of America.

  10. Colombia to Nigeria: Exploring the Possibilities of a Security Cooperation Strategy for Nigeria Based on the Successes Realized Through Plan Colombia

    Science.gov (United States)

    2016-06-10

    achieving its objective. Using that same operational approach design and enviromental framework, but simply replacing key words with Nigeria, Boko Haram...and smuggling we get the following operational approch and current/desired enstate enviromental framework for Nigeria. 96 Figure 30...overall military enviromental similarity received a score of 3. This places the risk of applying elements of Plan Colombia to current state

  11. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  12. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  13. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  14. Role of moving planes and moving spheres following Dupin cyclides

    KAUST Repository

    Jia, Xiaohong

    2014-03-01

    We provide explicit representations of three moving planes that form a μ-basis for a standard Dupin cyclide. We also show how to compute μ-bases for Dupin cyclides in general position and orientation from their implicit equations. In addition, we describe the role of moving planes and moving spheres in bridging between the implicit and rational parametric representations of these cyclides. © 2014 Elsevier B.V.

  15. Role of moving planes and moving spheres following Dupin cyclides

    KAUST Repository

    Jia, Xiaohong

    2014-01-01

    We provide explicit representations of three moving planes that form a μ-basis for a standard Dupin cyclide. We also show how to compute μ-bases for Dupin cyclides in general position and orientation from their implicit equations. In addition, we describe the role of moving planes and moving spheres in bridging between the implicit and rational parametric representations of these cyclides. © 2014 Elsevier B.V.

  16. Improving the physical health of people with severe mental illness in a low secure forensic unit: An uncontrolled evaluation study of staff training and physical health care plans.

    Science.gov (United States)

    Haddad, Mark; Llewellyn-Jones, Sian; Yarnold, Steve; Simpson, Alan

    2016-12-01

    The life expectancy of people with severe mental illnesses is substantially reduced, and monitoring and screening for physical health problems is a key part of addressing this health inequality. Inpatient admission presents a window of opportunity for this health-care activity. The present study was conducted in a forensic mental health unit in England. A personal physical health plan incorporating clearly-presented and easily-understood values and targets for health status in different domains was developed. Alongside this, a brief physical education session was delivered to health-care staff (n = 63). Printed learning materials and pedometers and paper tape measures were also provided. The impact was evaluated by a single-group pretest post-test design; follow-up measures were 4 months' post-intervention. The feasibility and acceptability of personal health plans and associated resources were examined by free-text questionnaire responses. Fifty-seven staff provided measures of attitudes and knowledge before training and implementation of the physical health plans. Matched-pairs analysis indicated a modest but statistically-significant improvement in staff knowledge scores and attitudes to involvement in physical health care. Qualitative feedback indicated limited uptake of the care plans and perceived need for additional support for better adoption of this initiative. Inpatient admission is a key setting for assessing physical health and promoting improved management of health problems. Staff training and purpose-designed personalized care plans hold potential to improve practice and outcomes in this area, but further support for such innovations appears necessary for their uptake in inpatient mental health settings. © 2016 Australian College of Mental Health Nurses Inc.

  17. Move and eat better

    CERN Document Server

    2012-01-01

    CERN has many traditions, but in a week that’s seen the launch of the Medical Service’s  ‘Move & eat better’ campaign, it’s refreshing to note that among the oldest is a sporting one.  The CERN relay race dates back to 15 October 1971 when 21 pioneering teams set off to pound the pavements of CERN. Back then, the Focus users group came in first with a time of 12 minutes and 42 seconds. Today’s route is slightly different, and the number of teams has risen to over 100, with a new category of Nordic Walking introduced, as part of the campaign, for the first time.   The relay has provided some memorable events, and perhaps one of the longest-standing records in the history of sport, with the UA1 strollers’ 10 minutes and 13 seconds unbeaten for thirty years. In the women’s category, the UN Gazelles set the fastest time of 13 minutes and 16 seconds in 1996, while in the veterans category, you wi...

  18. ATLAS starts moving in

    CERN Multimedia

    Della Mussia, S

    2004-01-01

    The first large active detector component was lowered into the ATLAS cavern on 1st March. It consisted of the 8 modules forming the lower part of the central barrel of the tile hadronic calorimeter. The work of assembling the barrel, which comprises 64 modules, started the following day. Two road trailers each with 64 wheels, positioned side by side. This was the solution chosen to transport the lower part of the central barrel of ATLAS' tile hadronic calorimeter from Building 185 to the PX16 shaft at Point 1 (see Figure 1). The transportation, and then the installation of the component in the experimental cavern, which took place over three days were, to say the least, rather spectacular. On 25 February, the component, consisting of eight 6-metre modules, was loaded on to the trailers. The segment of the barrel was transported on a steel support so that it wouldn't move an inch during the journey. On 26 February, once all the necessary safety checks had been carried out, the convoy was able to leave Buildi...

  19. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  20. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  1. Successful Transitions: Making the Move to High School. PHP-c108

    Science.gov (United States)

    PACER Center, 2005

    2005-01-01

    Moving from middle school to high school can be challenging and exciting, but students with special needs may need to begin preparing for the move earlier than other students. As with other major changes in a child's life, the move to high school will go more smoothly if parents gather information and do some planning. A good time to begin…

  2. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  3. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  4. Lessons drawn in matters of preparation, conduct and planning of ''off-site'' nuclear security exercises on basis of three drills recently performed in France

    International Nuclear Information System (INIS)

    Ginot, P.

    1993-01-01

    Most exercises on nuclear security have, up to now, be devoted to the accident phase of the installation and the reflex protection measures during the first hours. The post accidental phase, which deals with the characterization of the contaminated zones and the management of the economic and social life, has been much less tested in exercises. Three recent exercises performed in France bring the following propositions to work out an off site exercise policy: - to benefit from the analysis of the non nuclear accidents - to select the technical and professional aspects of the off site management and to give them priority in the orientation of the exercises or the manoeuvres - to involve representatives of local population - to let the initiative to local Prefect, to enhance the value of the local exercises by specialized services, to accumulate these experiences at a national level

  5. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  6. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  7. Security and the networked society

    CERN Document Server

    Gregory, Mark

    2013-01-01

    This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, and the ubiquity of social networks. It covers key technological issues such as hacking, cyber-crime, cyber-security and cyber-warfare, the internet, smart phones, electronic security, and information privacy. This book traces the rise into prominence of these issues while also exploring the resulting cultural reaction. The authors' analysis forms the basis of a discussion on future technological directions and their potential impact on society. T

  8. Optimizing a neural network for detection of moving vehicles in video

    NARCIS (Netherlands)

    Fischer, N.M.; Kruithof, M.C.; Bouma, H.

    2017-01-01

    In the field of security and defense, it is extremely important to reliably detect moving objects, such as cars, ships, drones and missiles. Detection and analysis of moving objects in cameras near borders could be helpful to reduce illicit trading, drug trafficking, irregular border crossing,

  9. 17 CFR 250.44 - Sales of securities and assets.

    Science.gov (United States)

    2010-04-01

    ... not require prior Commission approval. (c) Sales pursuant to order or plan under section 11. No... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Sales of securities and assets... Various Financial Transactions 2 § 250.44 Sales of securities and assets. (a) Sales of utility securities...

  10. 49 CFR 659.27 - Internal safety and security reviews.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Internal safety and security reviews. 659.27... State Oversight Agency § 659.27 Internal safety and security reviews. (a) The oversight agency shall... safety and security reviews in its system safety program plan. (b) The internal safety and security...

  11. Radiation by moving charges

    International Nuclear Information System (INIS)

    Geloni, Gianluca; Kocharyan, Vitali; Saldin, Evgeni

    2017-04-01

    It is generally accepted that in order to describe the dynamics of relativistic particles in the laboratory (lab) frame it is sufficient to take into account the relativistic dependence of the particle momenta on the velocity. This solution of the dynamics problem in the lab frame makes no reference to Lorentz transformations. For this reason they are not discussed in particle tracking calculations in accelerator and plasma physics. It is generally believed that the electrodynamics problem can be treated within the same ''single inertial frame'' description without reference to Lorentz transformations. In particular, in order to evaluate radiation fields arising from charged particles in motion we need to know their velocities and positions as a function of the lab frame time t. The relativistic motion of a particle in the lab frame is described by Newton's second law ''corrected'' for the relativistic dependence of momentum on velocity. It is assumed in all standard derivations that one can perform identification of the trajectories in the source part of the usual Maxwell's equations with the trajectories vector x(t) measured (or calculated by using the corrected Newton's second law) in the lab frame. This way of coupling fields and particles is considered since more than a century as the relativistically correct procedure.We argue that this procedure needs to be changed, and we demonstrate the following, completely counterintuitive statement: the results of conventional theory of radiation by relativistically moving charges are not consistent with the principle of relativity. In order to find the trajectory of a particle in the lab frame consistent with the usual Maxwell's equations, one needs to solve the dynamic equation inmanifestly covariant form by using the coordinate-independent proper time τ to parameterize the particle world-line in space-time. We show that there is a difference between ''true'' particle trajectory vector x(t) calculated or measured in

  12. Effect of Loading Dose of Atorvastatin Prior to Planned Percutaneous Coronary Intervention on Major Adverse Cardiovascular Events in Acute Coronary Syndrome: The SECURE-PCI Randomized Clinical Trial.

    Science.gov (United States)

    Berwanger, Otavio; Santucci, Eliana Vieira; de Barros E Silva, Pedro Gabriel Melo; Jesuíno, Isabella de Andrade; Damiani, Lucas Petri; Barbosa, Lilian Mazza; Santos, Renato Hideo Nakagawa; Laranjeira, Ligia Nasi; Egydio, Flávia de Mattos; Borges de Oliveira, Juliana Aparecida; Dall Orto, Frederico Toledo Campo; Beraldo de Andrade, Pedro; Bienert, Igor Ribeiro de Castro; Bosso, Carlos Eduardo; Mangione, José Armando; Polanczyk, Carisi Anne; Sousa, Amanda Guerra de Moraes Rego; Kalil, Renato Abdala Karam; Santos, Luciano de Moura; Sposito, Andrei Carvalho; Rech, Rafael Luiz; Sousa, Antônio Carlos Sobral; Baldissera, Felipe; Nascimento, Bruno Ramos; Giraldez, Roberto Rocha Corrêa Veiga; Cavalcanti, Alexandre Biasi; Pereira, Sabrina Bernardez; Mattos, Luiz Alberto; Armaganijan, Luciana Vidal; Guimarães, Hélio Penna; Sousa, José Eduardo Moraes Rego; Alexander, John Hunter; Granger, Christopher Bull; Lopes, Renato Delascio

    2018-04-03

    The effects of loading doses of statins on clinical outcomes in patients with acute coronary syndrome (ACS) and planned invasive management remain uncertain. To determine if periprocedural loading doses of atorvastatin decrease 30-day major adverse cardiovascular events (MACE) in patients with ACS and planned invasive management. Multicenter, double-blind, placebo-controlled, randomized clinical trial conducted at 53 sites in Brazil among 4191 patients with ACS evaluated with coronary angiography to proceed with a percutaneous coronary intervention (PCI) if anatomically feasible. Enrollment occurred between April 18, 2012, and October 6, 2017. Final follow-up for 30-day outcomes was on November 6, 2017. Patients were randomized to receive 2 loading doses of 80 mg of atorvastatin (n = 2087) or matching placebo (n = 2104) before and 24 hours after a planned PCI. All patients received 40 mg of atorvastatin for 30 days starting 24 hours after the second dose of study medication. The primary outcome was MACE, defined as a composite of all-cause mortality, myocardial infarction, stroke, and unplanned coronary revascularization through 30 days. Among the 4191 patients (mean age, 61.8 [SD, 11.5] years; 1085 women [25.9%]) enrolled, 4163 (99.3%) completed 30-day follow-up. A total of 2710 (64.7%) underwent PCI, 333 (8%) underwent coronary artery bypass graft surgery, and 1144 (27.3%) had exclusively medical management. At 30 days, 130 patients in the atorvastatin group (6.2%) and 149 in the placebo group (7.1%) had a MACE (absolute difference, 0.85% [95% CI, -0.70% to 2.41%]; hazard ratio, 0.88; 95% CI, 0.69-1.11; P = .27). No cases of hepatic failure were reported; 3 cases of rhabdomyolysis were reported in the placebo group (0.1%) and 0 in the atorvastatin group. Among patients with ACS and planned invasive management with PCI, periprocedural loading doses of atorvastatin did not reduce the rate of MACE at 30 days. These findings do not support the routine use

  13. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  14. Corrective Action Decision Document/Corrective Action Plan for the 92-Acre Area and Corrective Action Unit 111: Area 5 WMD Retired Mixed Waste Pits, Nevada National Security Site, Nevada

    International Nuclear Information System (INIS)

    2010-01-01

    This Corrective Action Decision Document/Corrective Action Plan (CADD/CAP) has been prepared for the 92-Acre Area, the southeast quadrant of the Radioactive Waste Management Site, located in Area 5 of the Nevada National Security Site (NNSS). The 92-Acre Area includes Corrective Action Unit (CAU) 111, 'Area 5 WMD Retired Mixed Waste Pits.' Data Quality Objectives (DQOs) were developed for the 92-Acre Area, which includes CAU 111. The result of the DQO process was that the 92-Acre Area is sufficiently characterized to provide the input data necessary to evaluate corrective action alternatives (CAAs) without the collection of additional data. The DQOs are included as Appendix A of this document. This CADD/CAP identifies and provides the rationale for the recommended CAA for the 92-Acre Area, provides the plan for implementing the CAA, and details the post-closure plan. When approved, this CADD/CAP will supersede the existing Pit 3 (P03) Closure Plan, which was developed in accordance with Title 40 Code of Federal Regulations (CFR) Part 265, 'Interim Status Standards for Owners and Operators of Hazardous Waste Treatment, Storage, and Disposal Facilities.' This document will also serve as the Closure Plan and the Post-Closure Plan, which are required by 40 CFR 265, for the 92-Acre Area. After closure activities are complete, a request for the modification of the Resource Conservation and Recovery Act Permit that governs waste management activities at the NNSS will be submitted to the Nevada Division of Environmental Protection to incorporate the requirements for post-closure monitoring. Four CAAs, ranging from No Further Action to Clean Closure, were evaluated for the 92-Acre Area. The CAAs were evaluated on technical merit focusing on performance, reliability, feasibility, safety, and cost. Based on the evaluation of the data used to develop the conceptual site model; a review of past, current, and future operations at the site; and the detailed and comparative

  15. Corrective Action Decision Document/Corrective Action Plan for the 92-Acre Area and Corrective Action Unit 111: Area 5 WMD Retired Mixed Waste Pits, Nevada National Security Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Restoration

    2010-11-22

    This Corrective Action Decision Document/Corrective Action Plan (CADD/CAP) has been prepared for the 92-Acre Area, the southeast quadrant of the Radioactive Waste Management Site, located in Area 5 of the Nevada National Security Site (NNSS). The 92-Acre Area includes Corrective Action Unit (CAU) 111, 'Area 5 WMD Retired Mixed Waste Pits.' Data Quality Objectives (DQOs) were developed for the 92-Acre Area, which includes CAU 111. The result of the DQO process was that the 92-Acre Area is sufficiently characterized to provide the input data necessary to evaluate corrective action alternatives (CAAs) without the collection of additional data. The DQOs are included as Appendix A of this document. This CADD/CAP identifies and provides the rationale for the recommended CAA for the 92-Acre Area, provides the plan for implementing the CAA, and details the post-closure plan. When approved, this CADD/CAP will supersede the existing Pit 3 (P03) Closure Plan, which was developed in accordance with Title 40 Code of Federal Regulations (CFR) Part 265, 'Interim Status Standards for Owners and Operators of Hazardous Waste Treatment, Storage, and Disposal Facilities.' This document will also serve as the Closure Plan and the Post-Closure Plan, which are required by 40 CFR 265, for the 92-Acre Area. After closure activities are complete, a request for the modification of the Resource Conservation and Recovery Act Permit that governs waste management activities at the NNSS will be submitted to the Nevada Division of Environmental Protection to incorporate the requirements for post-closure monitoring. Four CAAs, ranging from No Further Action to Clean Closure, were evaluated for the 92-Acre Area. The CAAs were evaluated on technical merit focusing on performance, reliability, feasibility, safety, and cost. Based on the evaluation of the data used to develop the conceptual site model; a review of past, current, and future operations at the site; and the detailed

  16. Moving On (Editorial

    Directory of Open Access Journals (Sweden)

    Lindsay Glynn

    2008-12-01

    Full Text Available Well, here we are with another full volume published. I have watched this journal grow from an idea to a sustainable, reputable journal with readers and contributors from all over the world. It has grown from a small editorial group to a collection of peer reviewers, Evidence Summary writers, copyeditors, etc., that is eighty-four strong (and counting. I have wavered between wondering whether promoting evidence based librarianship is akin to flogging a dead horse to feeling secure in knowing that we are making a difference. Being involved with this journal has made me look at what I do in a different light and I now approach decisions and change with what I refer to as “structured flexibility”. Following the EBL framework is the structured part, and when it works, it works well. But we all know that there is not always an answer in the literature nor is there a guarantee that implemented evidence based change will work similarly in different environments. That’s where the flexibility comes in.Three years as Editor-in-Chief has been a challenging, enjoyable, time-consuming, and fascinating learning experience. It has provided me with numerous opportunities in terms of speaking engagements, workshop offerings, and valuable discussion and discourse. It has also provided me with research and project ideas that I have had to place on the back burner until a time when I have enough hours in the day. Recognizing that adding additional hours to the day is, well, impossible, I have decided to stepdown from my editorial role to pursue other activities. This was a bittersweet decision, but a necessary one. I am pleased to announce that Denise Koufogiannakis will be taking on the role of Editor-in-Chief for the next term. Denise, as many of you know, has also been involved with this journal since its inception and, after a brief period of reduced involvement, has eagerly stepped up to the plate. This journal would not be what it is today without

  17. Remedial Investigation Work Plan for Chestnut Ridge Operable Unit 1 (Chestnut Ridge Security Pits) at the Oak Ridge Y-12 Plant, Oak Ridge, Tennessee

    International Nuclear Information System (INIS)

    1994-03-01

    This document outlines the activities necessary to conduct a Remedial Investigation (RI) of the Chestnut Ridge Security Pits (CRSP) at the Oak Ridge Y-12 Plant. The CRSP, also designated Chestnut Ridge Operable Unit (OU) 1, is one of four OUs along Chestnut Ridge on the Oak Ridge Reservation (ORR). The purpose of the RI is to collect data to (1) evaluate the nature and extent of known and suspected contaminants, (2) support an Ecological Risk Assessment (ERA) and a Human Health Risk Assessment (HHRA), (3) support the feasibility study in the development and analysis of remedial alternatives, and (4) ultimately, develop a Record of Decision (ROD) for the site. This chapter summarizes the regulatory background of environmental investigation on the ORR and the approach currently being followed and provides an overview of the RI to be conducted at the CRSP. Subsequent chapters provide details on site history, sampling activities, procedures and methods, quality assurance (QA), health and safety, and waste management related to the RI

  18. Remedial Investigation Work Plan for Chestnut Ridge Operable Unit 1 (Chestnut Ridge Security Pits) at the Oak Ridge Y-12 Plant, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    1994-03-01

    This document outlines the activities necessary to conduct a Remedial Investigation (RI) of the Chestnut Ridge Security Pits (CRSP) at the Oak Ridge Y-12 Plant. The CRSP, also designated Chestnut Ridge Operable Unit (OU) 1, is one of four OUs along Chestnut Ridge on the Oak Ridge Reservation (ORR). The purpose of the RI is to collect data to (1) evaluate the nature and extent of known and suspected contaminants, (2) support an Ecological Risk Assessment (ERA) and a Human Health Risk Assessment (HHRA), (3) support the feasibility study in the development and analysis of remedial alternatives, and (4) ultimately, develop a Record of Decision (ROD) for the site. This chapter summarizes the regulatory background of environmental investigation on the ORR and the approach currently being followed and provides an overview of the RI to be conducted at the CRSP. Subsequent chapters provide details on site history, sampling activities, procedures and methods, quality assurance (QA), health and safety, and waste management related to the RI.

  19. Securing Retirement at a Young Age. Exploring the Intention to Buy Longevity Annuities through an Extended Version of the Theory of Planned Behavior

    Directory of Open Access Journals (Sweden)

    Costanza Nosi

    2017-06-01

    Full Text Available Since the early 90s, Italy has undergone radical changes in the regulations of the public pension system aimed at mending its main drawbacks and improving sustainability in the long run. The reforms were intended to recover the national economy through a significant reduction of benefits by increasing, particularly for younger people, individual responsibility for the accumulation of retirement wealth. Adopting an enhanced version of the Theory of Planned Behavior (TPB, which includes affective reactions, the present paper aims to understand the factors influencing the intention to enroll in a private pension plan through the purchase of longevity annuity coverage on the part of young adults. A purposive sample of 7480 Italian people aged 25–35 participated in the survey. Collected data were analyzed adopting an ordinal logistic regression (OLR model. The findings confirm the predictive power of the TPB in the financial field of longevity annuity buying, show that anticipated affective reactions increase the predictive power of the TPB model, and reveal that the influence of the investigated constructs varies alongside people’s willingness to purchase. The outcomes provide useful recommendations to the policy maker and private companies to favor the adoption of wide-spread desired behaviors among citizenships.

  20. Energy audit and energy security

    Directory of Open Access Journals (Sweden)

    Beata Agnieszka Kulessa

    2013-07-01

    Full Text Available In article, we present the issue of energy security. This article to answer the questions concerning the future of energy in Poland. These activities are directly related to energy security and the reduction of CO2 emissions. One element of this plan is the introduction in the EU energy certification of buildings. The energy certificates in Poland launched on 01.01.2009 and implements the objectives adopted by the European Union and contribute to energy security, increasing energy efficiency in construction and environmental protection.

  1. Moving mountains in Rio

    International Nuclear Information System (INIS)

    Runnalls, D.

    1992-01-01

    The June 1992 United Nations Conference on Environment and Development (UNCED) in Rio de Janeiro has been planned more as a discussion of environment and development, rather than sustainable development as suggested by the 1987 World Commission on Environment and Development (the Brundtland Commission). The Canadian agenda for UNCED is like that of most of the developed countries, and focuses mainly on climatic change, deforestation, loss of biodiversity in the tropics, and health of the oceans. The agenda of the developing countries is based on the knowledge that most of these global problems have been caused or aggravated by the industrialized countries. The developing countries fear that actions imposed to solve environmental problems will threaten their economic development. A key demand from the developing countries is a commitment by developed countries to reduce their greenhouse gas emissions, leaving space for the developing countries to increase their emissions as they develop. There is little or no pressure on governments in the developed world to come to such a comprehensive deal. For Canada, much remains to be done in setting national priorities, and many of the issues to be discussed at UNCED are under provincial jurisdiction

  2. Moving Sources Detection System

    International Nuclear Information System (INIS)

    Coulon, Romain; Kondrasovs, Vladimir; Boudergui, Karim; Normand, Stephane

    2013-06-01

    To monitor radioactivity passing through a pipe or in a given container such as a train or a truck, radiation detection systems are commonly employed. These detectors could be used in a network set along the source track to increase the overall detection efficiency. However detection methods are based on counting statistics analysis. The method usually implemented consists in trigging an alarm when an individual signal rises over a threshold initially estimated in regards to the natural background signal. The detection efficiency is then proportional to the number of detectors in use, due to the fact that each sensor is taken as a standalone sensor. A new approach is presented in this paper taking into account the temporal periodicity of the signals taken by all distributed sensors as a whole. This detection method is not based only on counting statistics but also on the temporal series analysis aspect. Therefore, a specific algorithm is then developed in our lab for this kind of applications and shows a significant improvement, especially in terms of detection efficiency and false alarms reduction. We also plan on extracting information from the source vector. This paper presents the theoretical approach and some preliminary results obtain in our laboratory. (authors)

  3. Radiation by moving charges

    Energy Technology Data Exchange (ETDEWEB)

    Geloni, Gianluca [European XFEL GmbH, Hamburg (Germany); Kocharyan, Vitali; Saldin, Evgeni [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2017-04-15

    It is generally accepted that in order to describe the dynamics of relativistic particles in the laboratory (lab) frame it is sufficient to take into account the relativistic dependence of the particle momenta on the velocity. This solution of the dynamics problem in the lab frame makes no reference to Lorentz transformations. For this reason they are not discussed in particle tracking calculations in accelerator and plasma physics. It is generally believed that the electrodynamics problem can be treated within the same ''single inertial frame'' description without reference to Lorentz transformations. In particular, in order to evaluate radiation fields arising from charged particles in motion we need to know their velocities and positions as a function of the lab frame time t. The relativistic motion of a particle in the lab frame is described by Newton's second law ''corrected'' for the relativistic dependence of momentum on velocity. It is assumed in all standard derivations that one can perform identification of the trajectories in the source part of the usual Maxwell's equations with the trajectories vector x(t) measured (or calculated by using the corrected Newton's second law) in the lab frame. This way of coupling fields and particles is considered since more than a century as the relativistically correct procedure.We argue that this procedure needs to be changed, and we demonstrate the following, completely counterintuitive statement: the results of conventional theory of radiation by relativistically moving charges are not consistent with the principle of relativity. In order to find the trajectory of a particle in the lab frame consistent with the usual Maxwell's equations, one needs to solve the dynamic equation inmanifestly covariant form by using the coordinate-independent proper time τ to parameterize the particle world-line in space-time. We show that there is a difference between &apos

  4. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  5. A Cryptographic Moving-Knife Cake-Cutting Protocol

    Directory of Open Access Journals (Sweden)

    Yoshifumi Manabe

    2012-02-01

    Full Text Available This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum.

  6. A Development Framework for Software Security in Nuclear Safety Systems: Integrating Secure Development and System Security Activities

    Energy Technology Data Exchange (ETDEWEB)

    Park, Jaekwan; Suh, Yongsuk [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-02-15

    The protection of nuclear safety software is essential in that a failure can result in significant economic loss and physical damage to the public. However, software security has often been ignored in nuclear safety software development. To enforce security considerations, nuclear regulator commission recently issued and revised the security regulations for nuclear computer-based systems. It is a great challenge for nuclear developers to comply with the security requirements. However, there is still no clear software development process regarding security activities. This paper proposes an integrated development process suitable for the secure development requirements and system security requirements described by various regulatory bodies. It provides a three-stage framework with eight security activities as the software development process. Detailed descriptions are useful for software developers and licensees to understand the regulatory requirements and to establish a detailed activity plan for software design and engineering.

  7. IAEA Nuclear Security Human Resource Development Program

    International Nuclear Information System (INIS)

    Braunegger-Guelich, A.

    2009-01-01

    The IAEA is at the forefront of international efforts to strengthen the world's nuclear security framework. The current Nuclear Security Plan for 2006-2009 was approved by the IAEA Board of Governors in September 2005. This Plan has three main points of focus: needs assessment, prevention, detection and response. Its overall objective is to achieve improved worldwide security of nuclear and other radioactive material in use, storage and transport, and of their associated facilities. This will be achieved, in particular, through the provision of guidelines and recommendations, human resource development, nuclear security advisory services and assistance for the implementation of the framework in States, upon request. The presentation provides an overview of the IAEA nuclear security human resource development program that is divided into two parts: training and education. Whereas the training program focuses on filling gaps between the actual performance of personnel working in the area of nuclear security and the required competencies and skills needed to meet the international requirements and recommendations described in UN and IAEA documents relating to nuclear security, the Educational Program in Nuclear Security aims at developing nuclear security experts and specialists, at fostering a nuclear security culture and at establishing in this way sustainable knowledge in this field within a State. The presentation also elaborates on the nuclear security computer based learning component and provides insights into the use of human resource development as a tool in achieving the IAEA's long term goal of improving sustainable nuclear security in States. (author)

  8. Corrective Action Investigation Plan for Corrective Action Unit 569: Area 3 Yucca Flat Atmospheric Test Sites Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews; Christy Sloop

    2012-02-01

    Corrective Action Unit (CAU) 569 is located in Area 3 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. Corrective Action Unit 569 comprises the nine numbered corrective action sites (CASs) and one newly identified site listed below: (1) 03-23-09, T-3 Contamination Area (hereafter referred to as Annie, Franklin, George, and Moth); (2) 03-23-10, T-3A Contamination Area (hereafter referred to as Harry and Hornet); (3) 03-23-11, T-3B Contamination Area (hereafter referred to as Fizeau); (4) 03-23-12, T-3S Contamination Area (hereafter referred to as Rio Arriba); (5) 03-23-13, T-3T Contamination Area (hereafter referred to as Catron); (6) 03-23-14, T-3V Contamination Area (hereafter referred to as Humboldt); (7) 03-23-15, S-3G Contamination Area (hereafter referred to as Coulomb-B); (8) 03-23-16, S-3H Contamination Area (hereafter referred to as Coulomb-A); (9) 03-23-21, Pike Contamination Area (hereafter referred to as Pike); and (10) Waste Consolidation Site 3A. Because CAU 569 is a complicated site containing many types of releases, it was agreed during the data quality objectives (DQO) process that these sites will be grouped. These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each study group. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the DQOs developed on September 26, 2011, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO

  9. Corrective Action Investigation Plan for Corrective Action Unit 568: Area 3 Plutonium Dispersion Sites Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick

    2014-01-01

    CAU 568 is a grouping of sites where there has been a suspected release of contamination associated with nuclear testing. This document describes the planned investigation of CAU 568, which comprises the following corrective action sites (CASs): • 03-23-17, S-3I Contamination Area • 03-23-19, T-3U Contamination Area • 03-23-20, Otero Contamination Area • 03-23-22, Platypus Contamination Area • 03-23-23, San Juan Contamination Area • 03-23-26, Shrew/Wolverine Contamination Area These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the investigation report.

  10. Corrective Action Decision Document/Corrective Action Plan for Corrective Action Unit 104: Area 7 Yucca Flat Atmospheric Test Sites Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2012-10-01

    CAU 104 comprises the following corrective action sites (CASs): • 07-23-03, Atmospheric Test Site T-7C • 07-23-04, Atmospheric Test Site T7-1 • 07-23-05, Atmospheric Test Site • 07-23-06, Atmospheric Test Site T7-5a • 07-23-07, Atmospheric Test Site - Dog (T-S) • 07-23-08, Atmospheric Test Site - Baker (T-S) • 07-23-09, Atmospheric Test Site - Charlie (T-S) • 07-23-10, Atmospheric Test Site - Dixie • 07-23-11, Atmospheric Test Site - Dixie • 07-23-12, Atmospheric Test Site - Charlie (Bus) • 07-23-13, Atmospheric Test Site - Baker (Buster) • 07-23-14, Atmospheric Test Site - Ruth • 07-23-15, Atmospheric Test Site T7-4 • 07-23-16, Atmospheric Test Site B7-b • 07-23-17, Atmospheric Test Site - Climax These 15 CASs include releases from 30 atmospheric tests conducted in the approximately 1 square mile of CAU 104. Because releases associated with the CASs included in this CAU overlap and are not separate and distinguishable, these CASs are addressed jointly at the CAU level. The purpose of this CADD/CAP is to evaluate potential corrective action alternatives (CAAs), provide the rationale for the selection of recommended CAAs, and provide the plan for implementation of the recommended CAA for CAU 104. Corrective action investigation (CAI) activities were performed from October 4, 2011, through May 3, 2012, as set forth in the CAU 104 Corrective Action Investigation Plan.

  11. Corrective Action Decision Document/Corrective Action Plan for Corrective Action Unit 573: Alpha Contaminated Sites Nevada National Security Site, Nevada, Revision 0

    International Nuclear Information System (INIS)

    Matthews, Patrick

    2016-01-01

    CAU 573 comprises the following corrective action sites (CASs): • 05-23-02, GMX Alpha Contaminated Area • 05-45-01, Atmospheric Test Site - Hamilton These two CASs include the release at the Hamilton weapons-related tower test and a series of 29 atmospheric experiments conducted at GMX. The two CASs are located in two distinctly separate areas within Area 5. To facilitate site investigation and data quality objective (DQO) decisions, all identified releases (i.e., CAS components) were organized into study groups. The reporting of investigation results and the evaluation of DQO decisions are at the release level. The corrective action alternatives (CAAs) were evaluated at the FFACO CAS level. The purpose of this CADD/CAP is to evaluate potential CAAs, provide the rationale for the selection of recommended CAAs, and provide the plan for implementation of the recommended CAA for CAU 573. Corrective action investigation (CAI) activities were performed from January 2015 through November 2015, as set forth in the CAU 573 Corrective Action Investigation Plan (CAIP). Analytes detected during the CAI were evaluated against appropriate final action levels (FALs) to identify the contaminants of concern. Assessment of the data generated from investigation activities conducted at CAU 573 revealed the following: • Radiological contamination within CAU 573 does not exceed the FALs (based on the Occasional Use Area exposure scenario). • Chemical contamination within CAU 573 does not exceed the FALs. • Potential source material - including lead plates, lead bricks, and lead-shielded cables was removed during the investigation and requires no additional corrective action.

  12. Corrective Action Decision Document/Corrective Action Plan for Corrective Action Unit 573: Alpha Contaminated Sites Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick [Nevada Site Office, Las Vegas, NV (United States)

    2016-02-01

    CAU 573 comprises the following corrective action sites (CASs): • 05-23-02, GMX Alpha Contaminated Area • 05-45-01, Atmospheric Test Site - Hamilton These two CASs include the release at the Hamilton weapons-related tower test and a series of 29 atmospheric experiments conducted at GMX. The two CASs are located in two distinctly separate areas within Area 5. To facilitate site investigation and data quality objective (DQO) decisions, all identified releases (i.e., CAS components) were organized into study groups. The reporting of investigation results and the evaluation of DQO decisions are at the release level. The corrective action alternatives (CAAs) were evaluated at the FFACO CAS level. The purpose of this CADD/CAP is to evaluate potential CAAs, provide the rationale for the selection of recommended CAAs, and provide the plan for implementation of the recommended CAA for CAU 573. Corrective action investigation (CAI) activities were performed from January 2015 through November 2015, as set forth in the CAU 573 Corrective Action Investigation Plan (CAIP). Analytes detected during the CAI were evaluated against appropriate final action levels (FALs) to identify the contaminants of concern. Assessment of the data generated from investigation activities conducted at CAU 573 revealed the following: • Radiological contamination within CAU 573 does not exceed the FALs (based on the Occasional Use Area exposure scenario). • Chemical contamination within CAU 573 does not exceed the FALs. • Potential source material—including lead plates, lead bricks, and lead-shielded cables—was removed during the investigation and requires no additional corrective action.

  13. [Aspirations of medical students: "planning for a secure career" - results of an online-survey among students at five medical schools in Germany].

    Science.gov (United States)

    Götz, K; Miksch, A; Hermann, K; Loh, A; Kiolbassa, K; Joos, S; Steinhäuser, J

    2011-02-01

    In times of shortage of doctors, expectations and interests of the future generation of doctors towards their career aspiration is of major importance. The aim of this study was to analyze expectations of medical students at the five medical schools in the State of Baden-Wuerttemberg (Germany) concerning their career choice and factors influencing it. Between January and February 2010, 1299 medical students (out of 12 062 medical students at the five medical schools) participated in an online-survey. In addition to sociodemographic items, career choice and aspects of planning reliability were raised. Three quarters of the students assign a medical profession for their future occupation. There is a dominance of internal medicine (n = 152), gynaecology (n = 127), paediatrics (n = 125), surgery (n = 115), anaesthesiology (n = 101), and family medicine (n = 88). The time point of decision varies between the different undergraduate years of medical school and specialty. Students at the beginning of their studies seem to be interested mostly in surgery. During medical school the interests towards internal medicine grows. Regarding planning dependability important aspects for medical students were to work in a job that has a future (61.2 % fully agree), to have a safe job (57.7 %), and to have a safe income (57.1 %). Less important seems to be to have good opportunity to earn money (29.6 %). Interest in a certain specialty changes markedly at during medical school. Factors such as economical guarantee, good future prospects and also the studies itself have an essential impact for students on choosing a specific career. Strategies to face physicians' shortage in different specialties need to be close to the needs and expectations of future physicians. This is not only valid for the undergraduate time period but also for the work circumstances of their future. © Georg Thieme Verlag KG Stuttgart · New York.

  14. IAEA Nuclear Security Programme Combating Nuclear Terrorism

    International Nuclear Information System (INIS)

    2010-01-01

    IAEA Plans of activities include, General Conference in September 2001 which reviewed activities relevant to preventing nuclear terrorism and proposed master plan. The Board of Governors approved new Nuclear Security Plan for the next four years. Three activity areas are; - needs assessment, analysis and coordination, prevention and detection and response.

  15. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  16. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  17. Securing Major Events

    International Nuclear Information System (INIS)

    Loeoef, Susanna

    2013-01-01

    When asked why the IAEA should provide nuclear security support to countries that organize large public events, Nuclear Security Officer Sophia Miaw answers quickly and without hesitation. ''Imagine any major public event such as the Olympics, a football championship, or an Expo. If a dirty bomb were to be exploded at a site where tens of thousands of people congregate, the radioactive contamination would worsen the effects of the bomb, increase the number of casualties, impede a rapid emergency response, and cause long term disruption in the vicinity,'' she said. Avoiding such nightmarish scenarios is the driving purpose behind the assistance the IAEA offers States that host major sporting or other public events. The support can range from a single training course to a comprehensive programme that includes threat assessment, training, loaned equipment and exercises. The type and scope of assistance depends on the host country's needs. ''We incorporate nuclear security measures into their security plan. We don't create anything new,'' Miaw said

  18. Security of Radioactive Waste

    International Nuclear Information System (INIS)

    Goldammer, W.

    2003-01-01

    Measures to achieve radioactive waste security are discussed. Categorization of waste in order to implement adequate and consistent security measures based on potential consequences is made. The measures include appropriate treatment/storage/disposal of waste to minimize the potential and consequences of malicious acts; management of waste only within an authorised, regulated, legal framework; management of the security of personnel and information; measures to minimize the acquisition of radioactive waste by those with malicious intent. The specific measures are: deter unauthorized access to the waste; detect any such attempt or any loss or theft of waste; delay unauthorized access; provide timely response to counter any attempt to gain unauthorised access; measures to minimize acts of sabotage; efforts to recover any lost or stolen waste; mitigation and emergency plans in case of release of radioactivity. An approach to develop guidance, starting with the categorisation of sources and identification of dangerous sources, is presented. Dosimetric criteria for internal and external irradiation are set. Different exposure scenarios are considered. Waste categories and security categories based on the IAEA INFCIRC/225/Rev.4 are presented

  19. IAEA Nuclear Security - Achievements 2002-2011

    International Nuclear Information System (INIS)

    2012-03-01

    The possibility that nuclear or other radioactive material could be used for malicious purposes is real. This calls for a collective commitment to the control of, and accountancy for, material, as well as to adequate levels of protection in order to prevent criminal or unauthorized access to the material or associated facilities. Sharing of knowledge and experience, coordination among States and collaboration with other international organizations, initiatives and industries supports an effective international nuclear security framework. In 2001, the Board of Governors tasked the IAEA with improving nuclear security worldwide. The report that follows provides an overview of accomplishments over the last decade and reflects the importance that States assign to keeping material in the right hands. The IAEA has established a comprehensive nuclear security programme, described first in the Nuclear Security Plan of 2002-2005 and subsequently in the second plan of 2006- 2009. Activities included developing internationally accepted nuclear security guidance, supporting international legal instruments, protecting material and facilities, securing transport and borders, detecting and interdicting illicit nuclear trafficking, strengthening human resource capacity and preparing response plans should a nuclear security event occur. The IAEA has begun the implementation of its third Nuclear Security Plan, to be completed at the end of 2013. This approach to nuclear security recognizes that an effective national nuclear security regime builds on a number of factors: the implementation of relevant international legal instruments; IAEA guidance and standards; information protection; physical protection; material accounting and control; detection of, and response to, trafficking in such material; national response plans and contingency measures. Implemented in a systematic manner, these building blocks make up a sustainable national nuclear security regime and contribute to global

  20. Homeland Security - Can It be Done?

    Science.gov (United States)

    2003-04-07

    and get past the shenanigans in Congress and implement homeland security strategies.ř The new DHS is scheduled to move 22 federal agencies and...uniform laws to license and regulate certain financial services, since terrorists exploit such services. The strategy also takes care with definitions...initiative from organizations interested in the security of sensitive information, such as financial services, healthcare, and government. 47Joseph R. Barnes

  1. Avoid Disaster: Use Firewalls for Inter-Intranet Security.

    Science.gov (United States)

    Charnetski, J. R.

    1998-01-01

    Discusses the use of firewalls for library intranets, highlighting the move from mainframes to PCs, security issues and firewall architecture, and operating systems. Provides a glossary of basic networking terms and a bibliography of suggested reading. (PEN)

  2. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong

    2017-11-09

    We present a general framework and method for detection of an object in a video based on apparent motion. The object moves relative to background motion at some unknown time in the video, and the goal is to detect and segment the object as soon it moves in an online manner. Due to unreliability of motion between frames, more than two frames are needed to reliably detect the object. Our method is designed to detect the object(s) with minimum delay, i.e., frames after the object moves, constraining the false alarms. Experiments on a new extensive dataset for moving object detection show that our method achieves less delay for all false alarm constraints than existing state-of-the-art.

  3. Imaging of Moving Ground Vehicles

    National Research Council Canada - National Science Library

    Rihaczek, A

    1996-01-01

    ... requires that use be made of the complex image. The yaw/pitch/roll/bounce/flex motion of a moving ground vehicle demands that different motion compensations be applied to different parts of the vehicle...

  4. Nordic Seniors on the Move

    DEFF Research Database (Denmark)

    ”I believe that all people need to move about. Actually, some have difficulties in doing so. They stay in their home neighbourhoods where they’ve grown up and feel safe. I can understand that, but my wife and I, we didn’t want that. We are more open to new ideas.” This anthology is about seniors...... on the move. In seven chapters, Nordic researchers from various disciplines, by means of ethnographic methods, attempt to comprehend the phenomenon of Nordic seniors who move to leisure areas in their own or in other countries. The number of people involved in this kind of migratory movement has grown...... above gives voice to one of these seniors, stressing the necessity of moving. The anthology contributes to the international body of literature about later life migration, specifically representing experiences made by Nordic seniors. As shown here, mobility and migration in later life have implications...

  5. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong

    2017-01-08

    We present a general framework and method for detection of an object in a video based on apparent motion. The object moves relative to background motion at some unknown time in the video, and the goal is to detect and segment the object as soon it moves in an online manner. Due to unreliability of motion between frames, more than two frames are needed to reliably detect the object. Our method is designed to detect the object(s) with minimum delay, i.e., frames after the object moves, constraining the false alarms. Experiments on a new extensive dataset for moving object detection show that our method achieves less delay for all false alarm constraints than existing state-of-the-art.

  6. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong; Sundaramoorthi, Ganesh

    2017-01-01

    We present a general framework and method for detection of an object in a video based on apparent motion. The object moves relative to background motion at some unknown time in the video, and the goal is to detect and segment the object as soon it moves in an online manner. Due to unreliability of motion between frames, more than two frames are needed to reliably detect the object. Our method is designed to detect the object(s) with minimum delay, i.e., frames after the object moves, constraining the false alarms. Experiments on a new extensive dataset for moving object detection show that our method achieves less delay for all false alarm constraints than existing state-of-the-art.

  7. Corrective Action Investigation Plan for Corrective Action Unit 366: Area 11 Plutonium Valley Dispersion Sites, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2011-09-01

    Corrective Action Unit 366 comprises the six corrective action sites (CASs) listed below: (1) 11-08-01, Contaminated Waste Dump No.1; (2) 11-08-02, Contaminated Waste Dump No.2; (3) 11-23-01, Radioactively Contaminated Area A; (4) 11-23-02, Radioactively Contaminated Area B; (5) 11-23-03, Radioactively Contaminated Area C; and (6) 11-23-04, Radioactively Contaminated Area D. These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the data quality objectives (DQOs) developed July 6, 2011, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 366. The presence and nature of contamination at CAU 366 will be evaluated based on information collected from a field investigation. Radiological contamination will be evaluated based on a comparison of the total effective dose (TED) at sample locations to the dose-based final action level (FAL). The TED will be calculated by summing the estimates of internal and external dose. Results from the analysis of soil samples collected from sample plots will be used to calculate internal radiological dose. Thermoluminescent dosimeters placed at each sample location will be used to measure external radiological dose. Based on historical documentation of the releases

  8. Corrective Action Investigation Plan for Corrective Action Unit 104: Area 7 Yucca Flat Atmospheric Test Sites, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2011-08-01

    CAU 104 comprises the 15 CASs listed below: (1) 07-23-03, Atmospheric Test Site T-7C; (2) 07-23-04, Atmospheric Test Site T7-1; (3) 07-23-05, Atmospheric Test Site; (4) 07-23-06, Atmospheric Test Site T7-5a; (5) 07-23-07, Atmospheric Test Site - Dog (T-S); (6) 07-23-08, Atmospheric Test Site - Baker (T-S); (7) 07-23-09, Atmospheric Test Site - Charlie (T-S); (8) 07-23-10, Atmospheric Test Site - Dixie; (9) 07-23-11, Atmospheric Test Site - Dixie; (10) 07-23-12, Atmospheric Test Site - Charlie (Bus); (11) 07-23-13, Atmospheric Test Site - Baker (Buster); (12) 07-23-14, Atmospheric Test Site - Ruth; (13) 07-23-15, Atmospheric Test Site T7-4; (14) 07-23-16, Atmospheric Test Site B7-b; (15) 07-23-17, Atmospheric Test Site - Climax These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the data quality objectives (DQOs) developed on April 28, 2011, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 104. The releases at CAU 104 consist of surface-deposited radionuclides from 30 atmospheric nuclear tests. The presence and nature of contamination at CAU 104 will be evaluated based on information collected from a field investigation. Radiological contamination will be evaluated based on a comparison

  9. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  10. Autowaves in moving excitable media

    Directory of Open Access Journals (Sweden)

    V.A.Davydov

    2004-01-01

    Full Text Available Within the framework of kinematic theory of autowaves we suggest a method for analytic description of stationary autowave structures appearing at the boundary between the moving and fixed excitable media. The front breakdown phenomenon is predicted for such structures. Autowave refraction and, particulary, one-side "total reflection" at the boundary is considered. The obtained analytical results are confirmed by computer simulations. Prospects of the proposed method for further studies of autowave dynamics in the moving excitable media are discussed.

  11. Infinite games with uncertain moves

    Directory of Open Access Journals (Sweden)

    Nicholas Asher

    2013-03-01

    Full Text Available We study infinite two-player games where one of the players is unsure about the set of moves available to the other player. In particular, the set of moves of the other player is a strict superset of what she assumes it to be. We explore what happens to sets in various levels of the Borel hierarchy under such a situation. We show that the sets at every alternate level of the hierarchy jump to the next higher level.

  12. Corrective Action Decision Document/Corrective Action Plan for Corrective Action Unit 98: Frenchman Flat, Nevada National Security Site, Nevada, Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Irene Farnham and Sam Marutzky

    2011-07-01

    This CADD/CAP follows the Corrective Action Investigation (CAI) stage, which results in development of a set of contaminant boundary forecasts produced from groundwater flow and contaminant transport modeling of the Frenchman Flat CAU. The Frenchman Flat CAU is located in the southeastern portion of the NNSS and comprises 10 underground nuclear tests. The tests were conducted between 1965 and 1971 and resulted in the release of radionuclides in the subsurface in the vicinity of the test cavities. Two important aspects of the corrective action process are presented within this CADD/CAP. The CADD portion describes the results of the Frenchman Flat CAU data-collection and modeling activities completed during the CAI stage. The corrective action objectives and the actions recommended to meet the objectives are also described. The CAP portion describes the corrective action implementation plan. The CAP begins with the presentation of CAU regulatory boundary objectives and initial use restriction boundaries that are identified and negotiated by NNSA/NSO and the Nevada Division of Environmental Protection (NDEP). The CAP also presents the model evaluation process designed to build confidence that the flow and contaminant transport modeling results can be used for the regulatory decisions required for CAU closure. The first two stages of the strategy have been completed for the Frenchman Flat CAU. A value of information analysis and a CAIP were developed during the CAIP stage. During the CAI stage, a CAIP addendum was developed, and the activities proposed in the CAIP and addendum were completed. These activities included hydrogeologic investigation of the underground testing areas, aquifer testing, isotopic and geochemistry-based investigations, and integrated geophysical investigations. After these investigations, a groundwater flow and contaminant transport model was developed to forecast contaminant boundaries that enclose areas potentially exceeding the Safe Drinking

  13. Corrective Action Plan for Corrective Action Unit 568: Area 3 Plutonium Dispersion Sites Nevada National Security Site, Nevada, Revision 0 with ROTC 1

    International Nuclear Information System (INIS)

    Matthews, Patrick; Burmeister, Mark

    2016-01-01

    The purpose of this CAP is to provide the plan for implementation of the recommended corrective action alternatives (CAAs) for CAU 568. Site characterization activities were performed in 2014, and the results are presented in Appendix A of the CAU 568 CADD. The CAAs were recommended in the CADD. The scope of work required to implement the recommended CAAs of closure in place and clean closure at 11 of the 14 CASs includes the following: The installation of physical barriers over the nine safety experiment ground zeroes to cover contamination at CASs 03-23-20 (Otero), 03-23-23 (San Juan and Pascal-C), 03-23-31 (Pascal-B, Luna, Colfax), 03-23-32 (Pascal-A), 03-23-33 (Valencia), and 03-23-34 (Chipmunk); the characterization and removal of three soil and debris piles at CAS 03-08-04, and one HCA soil pile at CAS 03-23-30; the removal of three steel well head covers (PSM) from CASs 03-23-20 (Otero), 03-23-31 (Luna), and 03-23-33 (Valencia); the removal of soil and lead PSM from two locations at CAS 03-26-04; Implementation of FFACO use restrictions at nine safety experiment ground zeroes at CASs 03-23-20, 03-23-23, 03-23-31, 03-23-32, 03-23-33, and 03-23-34; the steel well head cover at CAS 03-23-23; the areas meeting HCA conditions at CASs 03-23-19 and 03-23-31; and the Boomer crater area at CAS 03-45-01. The FFACO use restriction boundaries will be presented in the CAU 568 closure report.

  14. Corrective Action Plan for Corrective Action Unit 568: Area 3 Plutonium Dispersion Sites Nevada National Security Site, Nevada, Revision 0 with ROTC 1

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick [Navarro Nevada Environmental Services, NV (United States); Burmeister, Mark [Navarro Nevada Environmental Services, NV (United States)

    2016-05-01

    The purpose of this CAP is to provide the plan for implementation of the recommended corrective action alternatives (CAAs) for CAU 568. Site characterization activities were performed in 2014, and the results are presented in Appendix A of the CAU 568 CADD. The CAAs were recommended in the CADD. The scope of work required to implement the recommended CAAs of closure in place and clean closure at 11 of the 14 CASs includes the following: The installation of physical barriers over the nine safety experiment ground zeroes to cover contamination at CASs 03-23-20 (Otero), 03-23-23 (San Juan and Pascal-C), 03-23-31 (Pascal-B, Luna, Colfax), 03-23-32 (Pascal-A), 03-23-33 (Valencia), and 03-23-34 (Chipmunk); the characterization and removal of three soil and debris piles at CAS 03-08-04, and one HCA soil pile at CAS 03-23-30; the removal of three steel well head covers (PSM) from CASs 03-23-20 (Otero), 03-23-31 (Luna), and 03-23-33 (Valencia); the removal of soil and lead PSM from two locations at CAS 03-26-04; Implementation of FFACO use restrictions at nine safety experiment ground zeroes at CASs 03-23-20, 03-23-23, 03-23-31, 03-23-32, 03-23-33, and 03-23-34; the steel well head cover at CAS 03-23-23; the areas meeting HCA conditions at CASs 03-23-19 and 03-23-31; and the Boomer crater area at CAS 03-45-01. The FFACO use restriction boundaries will be presented in the CAU 568 closure report.

  15. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  16. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  17. 75 FR 64389 - Proposed Recommendation to the Social Security Administration for Occupational Information System...

    Science.gov (United States)

    2010-10-19

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2010-0066] Proposed Recommendation to the Social Security Administration for Occupational Information System (OIS) Development Planning; Request for Comment...) to provide independent advice and recommendations on plans and activities to create an occupational...

  18. Security Force Assistance: Building Foreign Security Forces and Joint Doctrine for the Future of U.S. Regional Security

    National Research Council Canada - National Science Library

    Sullivan, Michael D

    2008-01-01

    .... From training the Nicaraguan National Guard to the most recent efforts in Iraq, the U.S. Military has repeatedly shown a need for a coherent and comprehensive plan to develop foreign security forces. U.S...

  19. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  20. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  1. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  2. Strategy to Enhance International Supply Chain Security

    National Research Council Canada - National Science Library

    2007-01-01

    .... at 1901, 1903, October 13, 2006) which require the development of a strategic plan to enhance the security of the international supply chain, including protocols for the expeditious resumption of the flow of trade following...

  3. Command and Control for Homeland Security

    National Research Council Canada - National Science Library

    Greene, Marjorie

    2007-01-01

    ... Security June 2006, NIMS Revision Version 2 March 2007, NWDC Domestic Disaster Relief Operations Planning, 15 May 2006, AFRL-Supported Studies on Large- Scale Coordination, A Sociotechnical Systems...

  4. Security and Office Administration Coordinator | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Under the supervision of the Manager, Local Operations (MLO), the Security and ... Sees to the continuous updating and relevance of the Business Continuity Plan ... BCP to local management (Manager and Regional Director) and to the Head ...

  5. FY 2014 - Stockpile and Stewardship and Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2013-06-01

    This Department of Energy’s (DOE) National Nuclear Security Administration (NNSA) Fiscal Year Stockpile Stewardship and Management Plan (SSMP) is a key planning document for the nuclear security enterprise.

  6. Moving event and moving participant in aspectual conceptions

    Directory of Open Access Journals (Sweden)

    Izutsu Katsunobu

    2016-06-01

    Full Text Available This study advances an analysis of the event conception of aspectual forms in four East Asian languages: Ainu, Japanese, Korean, and Ryukyuan. As earlier studies point out, event conceptions can be divided into two major types: the moving-event type and the moving-participant type, respectively. All aspectual forms in Ainu and Korean, and most forms in Japanese and Ryukyuan are based on that type of event conception. Moving-participant oriented Ainu and movingevent oriented Japanese occupy two extremes, between which Korean and Ryukyuan stand. Notwithstanding the geographical relationships among the four languages, Ryukyuan is closer to Ainu than to Korean, whereas Korean is closer to Ainu than to Japanese.

  7. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  8. Privacy and security in teleradiology

    International Nuclear Information System (INIS)

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  9. Privacy and security in teleradiology

    Energy Technology Data Exchange (ETDEWEB)

    Ruotsalainen, Pekka [National Institute for Health and Welfare, Helsinki (Finland)], E-mail: pekka.ruotsalainen@THL.fi

    2010-01-15

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  10. Environmental security and sustainable development

    International Nuclear Information System (INIS)

    Kok, M.T.J.

    1996-01-01

    Environmental security has become an important problem area for the social sciences and is becoming a key concept in long-term environmental policy and global environmental change issues. In taking Environmental Security on board, the International Human Dimensions Programme (IHDP) intends to stimulate research on approaches to solve global environmental issues, responses to climate change, food and water security, extreme weather events, etc. Both the Netherlands and Canadian HDP committee have placed environmental security and sustainable development on their national agendas. However, a research agenda for the role of social sciences in environmental security and societal impacts of global change has not been sufficiently elaborated yet, except for economic research on the impacts of climate change. This was the main reason for holding the title workshop. The aims of the workshop were: (1) to define environmental security as a research theme; (2) to explore the research agenda on environmental security for the social sciences; and (3) to establish and reinforce (inter)national research networks in this field. Two papers served as input for the participants of the workshop. First, in the Scoping Report Global Environmental Change and Human Security a brief overview is given of research conducted so far, as well as a working plan for the recently formed ad hoc Working Group on Environmental Security and Global Environmental Change. Secondly, the preliminary results of a programming study on Environmental Security and the societal impacts of climate change are presented. Special attention was given to the involvement of policymakers in the workshop. figs., tabs., 3 appendices, refs

  11. Privacy and security in teleradiology.

    Science.gov (United States)

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper. Copyright (c) 2009 Elsevier Ireland Ltd. All rights reserved.

  12. Data Privacy and Security in Higher Education

    Science.gov (United States)

    Williams, Tracy

    2003-01-01

    As institutions review and strengthen their plans to secure confidential data, what proactive role does the human resource professional play as a strategic partner? Why are employees a critical part of the solution? And how are they educated regarding their responsibilities with data security? Datatel's HR product manager shares some…

  13. 7 CFR 764.355 - Security requirements.

    Science.gov (United States)

    2010-01-01

    ... through the use of marketing contracts, hedging, options, or other revenue protection mechanisms, and includes a marketing plan or similar risk management practice; (3) The applicant has had positive net cash... applicant has pledged as security for the loan all available personal and business security, except as...

  14. [Security aspects on the Internet].

    Science.gov (United States)

    Seibel, R M; Kocher, K; Landsberg, P

    2000-04-01

    Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet.

  15. A Research Agenda for Security Engineering

    Directory of Open Access Journals (Sweden)

    Rich Goyette

    2013-08-01

    Full Text Available Despite nearly 30 years of research and application, the practice of information system security engineering has not yet begun to exhibit the traits of a rigorous scientific discipline. As cyberadversaries have become more mature, sophisticated, and disciplined in their tradecraft, the science of security engineering has not kept pace. The evidence of the erosion of our digital security – upon which society is increasingly dependent – appears in the news almost daily. In this article, we outline a research agenda designed to begin addressing this deficit and to move information system security engineering toward a mature engineering discipline. Our experience suggests that there are two key areas in which this movement should begin. First, a threat model that is actionable from the perspectives of risk management and security engineering should be developed. Second, a practical and relevant security-measurement framework should be developed to adequately inform security-engineering and risk-management processes. Advances in these areas will particularly benefit business/government risk assessors as well as security engineers performing security design work, leading to more accurate, meaningful, and quantitative risk analyses and more consistent and coherent security design decisions. Threat modelling and security measurement are challenging activities to get right – especially when they need to be applied in a general context. However, these are decisive starting points because they constitute the foundation of a scientific security-engineering practice. Addressing these challenges will require stronger and more coherent integration between the sub-disciplines of risk assessment and security engineering, including new tools to facilitate that integration. More generally, changes will be required in the way security engineering is both taught and practiced to take into account the holistic approach necessary from a mature, scientific

  16. Security and privacy issues of personal health.

    Science.gov (United States)

    Blobel, Bernd; Pharow, Peter

    2007-01-01

    While health systems in developed countries and increasingly also in developing countries are moving from organisation-centred to person-centred health service delivery, the supporting communication and information technology is faced with new risks regarding security and privacy of stakeholders involved. The comprehensively distributed environment puts special burden on guaranteeing communication security services, but even more on guaranteeing application security services dealing with privilege management, access control and audit regarding social implication and connected sensitivity of personal information recorded, processed, communicated and stored in an even internationally distributed environment.

  17. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  18. Barriers Preventing Food Security in Israel, 2050

    OpenAIRE

    Yoav Gal

    2013-01-01

    The article highlights the benefits of adopting the practice of long-term planning with the aim of helping decision makers and politicians to include scenario thinking in the process of determining food security in Israel, 2050. This study addresses the question of food security, a step that is in contrast with agricultural planning considerations of the past that have mainly focused on maximizing profits or relied on a closed mathematical model. Two teams of experts identified production lim...

  19. Barriers preventing food security in Israel, 2050:

    OpenAIRE

    Gal, Yoav; Hadas, Efrat

    2014-01-01

    The article highlights the benefits of adopting the practice of long-term planning with the aim of helping decision makers and politicians to include scenario thinking in the process of determining food security in Israel, 2050. This study addresses the question of food security, a step that is in contrast with agricultural planning considerations of the past that have mainly focused on maximizing profits or relied on a closed mathematical model. Two teams of experts identified production lim...

  20. CLOUD COMPUTING SECURITY ISSUES

    Directory of Open Access Journals (Sweden)

    Florin OGIGAU-NEAMTIU

    2012-01-01

    Full Text Available The term “cloud computing” has been in the spotlights of IT specialists the last years because of its potential to transform this industry. The promised benefits have determined companies to invest great sums of money in researching and developing this domain and great steps have been made towards implementing this technology. Managers have traditionally viewed IT as difficult and expensive and the promise of cloud computing leads many to think that IT will now be easy and cheap. The reality is that cloud computing has simplified some technical aspects of building computer systems, but the myriad challenges facing IT environment still remain. Organizations which consider adopting cloud based services must also understand the many major problems of information policy, including issues of privacy, security, reliability, access, and regulation. The goal of this article is to identify the main security issues and to draw the attention of both decision makers and users to the potential risks of moving data into “the cloud”.

  1. Electronic security device

    Science.gov (United States)

    Eschbach, Eugene A.; LeBlanc, Edward J.; Griffin, Jeffrey W.

    1992-01-01

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  2. Electronic security device

    International Nuclear Information System (INIS)

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-01-01

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs

  3. Compatibility of safety and security

    International Nuclear Information System (INIS)

    Jalouneix, J.

    2013-01-01

    Nuclear safety means the achievement of proper operating conditions, prevention of accidents or mitigation of accident consequences, resulting in protection of workers, the public and the environment from undue radiation hazards while nuclear security means the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material. Nuclear safety and nuclear security present large similarities in their aim as in their methods and are mutually complementary in the field of protection with regard to the risk of sabotage. However they show specific attributes in certain areas which leads to differences in their implementation. For instance security culture must integrate deterrence and confidentiality while safety culture implies transparency and open dialogue. Two important design principles apply identically for safety and security: the graded approach and the defense in depth. There are also strong similarities in operating provisions: -) a same need to check the availability of the equipment, -) a same need to treat the experience feedback, or -) a same need to update the basic rules. There are also strong similarities in emergency management, for instance the elaboration of emergency plans and the performance of periodic exercises. Activities related to safety of security of an installation must be managed by a quality management system. For all types of nuclear activities and facilities, a well shared safety culture and security culture is the guarantee of a safe and secure operation. The slides of the presentation have been added at the end of the paper

  4. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  5. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong

    2017-05-14

    This thesis presents a general framework and method for detection of an object in a video based on apparent motion. The object moves, at some unknown time, differently than the “background” motion, which can be induced from camera motion. The goal of proposed method is to detect and segment the object as soon it moves in an online manner. Since motion estimation can be unreliable between frames, more than two frames are needed to reliably detect the object. Observing more frames before declaring a detection may lead to a more accurate detection and segmentation, since more motion may be observed leading to a stronger motion cue. However, this leads to greater delay. The proposed method is designed to detect the object(s) with minimum delay, i.e., frames after the object moves, constraining the false alarms, defined as declarations of detection before the object moves or incorrect or inaccurate segmentation at the detection time. Experiments on a new extensive dataset for moving object detection show that our method achieves less delay for all false alarm constraints than existing state-of-the-art.

  6. Computing proton dose to irregularly moving targets

    International Nuclear Information System (INIS)

    Phillips, Justin; Gueorguiev, Gueorgui; Grassberger, Clemens; Dowdell, Stephen; Paganetti, Harald; Sharp, Gregory C; Shackleford, James A

    2014-01-01

    Purpose: While four-dimensional computed tomography (4DCT) and deformable registration can be used to assess the dose delivered to regularly moving targets, there are few methods available for irregularly moving targets. 4DCT captures an idealized waveform, but human respiration during treatment is characterized by gradual baseline shifts and other deviations from a periodic signal. This paper describes a method for computing the dose delivered to irregularly moving targets based on 1D or 3D waveforms captured at the time of delivery. Methods: The procedure uses CT or 4DCT images for dose calculation, and 1D or 3D respiratory waveforms of the target position at time of delivery. Dose volumes are converted from their Cartesian geometry into a beam-specific radiological depth space, parameterized in 2D by the beam aperture, and longitudinally by the radiological depth. In this new frame of reference, the proton doses are translated according to the motion found in the 1D or 3D trajectory. These translated dose volumes are weighted and summed, then transformed back into Cartesian space, yielding an estimate of the dose that includes the effect of the measured breathing motion. The method was validated using a synthetic lung phantom and a single representative patient CT. Simulated 4DCT was generated for the phantom with 2 cm peak-to-peak motion. Results: A passively-scattered proton treatment plan was generated using 6 mm and 5 mm smearing for the phantom and patient plans, respectively. The method was tested without motion, and with two simulated breathing signals: a 2 cm amplitude sinusoid, and a 2 cm amplitude sinusoid with 3 cm linear drift in the phantom. The tumor positions were equally weighted for the patient calculation. Motion-corrected dose was computed based on the mid-ventilation CT image in the phantom and the peak exhale position in the patient. Gamma evaluation was 97.8% without motion, 95.7% for 2 cm sinusoidal motion, 95.7% with 3 cm drift in

  7. Security for small computer systems a practical guide for users

    CERN Document Server

    Saddington, Tricia

    1988-01-01

    Security for Small Computer Systems: A Practical Guide for Users is a guidebook for security concerns for small computers. The book provides security advice for the end-users of small computers in different aspects of computing security. Chapter 1 discusses the security and threats, and Chapter 2 covers the physical aspect of computer security. The text also talks about the protection of data, and then deals with the defenses against fraud. Survival planning and risk assessment are also encompassed. The last chapter tackles security management from an organizational perspective. The bo

  8. Review on Cyber Security Programs for NPP Application

    Energy Technology Data Exchange (ETDEWEB)

    Oh, Eung Se [KEPRI, Daejeon (Korea, Republic of)

    2010-10-15

    Increased history records of cyber security (CS) attacks and concerns for computers and networks technical mishaps pull out cyber security to open places. In spite of secrete nature of security, transparent and shared knowledge of many security features are more required at modern plant floors. Korea Institute of Nuclear Safety (KINS), US Government and Nuclear Regulatory Commission (NRC) requested to develop cyber security plans and enforce their implementing to the NPPs. [KINS; CFR; RG 5.71] This paper reviews various cyber security guidelines and suggests an applicable cyber security program development models during the life cycle of NPP's Instrumentation and Control (I and C) systems

  9. Review on Cyber Security Programs for NPP Application

    International Nuclear Information System (INIS)

    Oh, Eung Se

    2010-01-01

    Increased history records of cyber security (CS) attacks and concerns for computers and networks technical mishaps pull out cyber security to open places. In spite of secrete nature of security, transparent and shared knowledge of many security features are more required at modern plant floors. Korea Institute of Nuclear Safety (KINS), US Government and Nuclear Regulatory Commission (NRC) requested to develop cyber security plans and enforce their implementing to the NPPs. [KINS] [CFR] [RG 5.71] This paper reviews various cyber security guidelines and suggests an applicable cyber security program development models during the life cycle of NPP's Instrumentation and Control (I and C) systems

  10. A DRM Security Architecture for Home Networks

    NARCIS (Netherlands)

    Popescu, B.C.; Crispo, B.; Kamperman, F.L.A.J.; Tanenbaum, A.S.; Kiayias, A.; Yung, M.

    2004-01-01

    This paper describes a security architecture allowing digital rights management in home networks consisting of consumer electronic devices. The idea is to allow devices to establish dynamic groups, so called "Authorized Domains", where legally acquired copyrighted content can seamlessly move from

  11. Engineering security agreements against external insider threat

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; van Cleeff, A.; van Eck, Pascal; Wieringa, Roelf J.

    2013-01-01

    Companies are increasingly engaging in complex inter-organisational networks of business and trading part- ners, service and managed security providers to run their operations. Therefore, it is now common to outsource critical business processes and to completely move IT resources to the custody of

  12. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  13. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  14. Moving Horizon Estimation and Control

    DEFF Research Database (Denmark)

    Jørgensen, John Bagterp

    successful and applied methodology beyond PID-control for control of industrial processes. The main contribution of this thesis is introduction and definition of the extended linear quadratic optimal control problem for solution of numerical problems arising in moving horizon estimation and control...... problems. Chapter 1 motivates moving horizon estimation and control as a paradigm for control of industrial processes. It introduces the extended linear quadratic control problem and discusses its central role in moving horizon estimation and control. Introduction, application and efficient solution....... It provides an algorithm for computation of the maximal output admissible set for linear model predictive control. Appendix D provides results concerning linear regression. Appendix E discuss prediction error methods for identification of linear models tailored for model predictive control....

  15. Automatic Moving Object Segmentation for Freely Moving Cameras

    Directory of Open Access Journals (Sweden)

    Yanli Wan

    2014-01-01

    Full Text Available This paper proposes a new moving object segmentation algorithm for freely moving cameras which is very common for the outdoor surveillance system, the car build-in surveillance system, and the robot navigation system. A two-layer based affine transformation model optimization method is proposed for camera compensation purpose, where the outer layer iteration is used to filter the non-background feature points, and the inner layer iteration is used to estimate a refined affine model based on the RANSAC method. Then the feature points are classified into foreground and background according to the detected motion information. A geodesic based graph cut algorithm is then employed to extract the moving foreground based on the classified features. Unlike the existing global optimization or the long term feature point tracking based method, our algorithm only performs on two successive frames to segment the moving foreground, which makes it suitable for the online video processing applications. The experiment results demonstrate the effectiveness of our algorithm in both of the high accuracy and the fast speed.

  16. Information Security - A Growing Challenge for Online Business

    OpenAIRE

    Gabriela GHEORGHE; Ioana LUPASC

    2017-01-01

    In present, the cyber attack move to a global scale, also the online business cyber threats have the effect of impeding and even huge losses. Security issues currently facing online commerce, online payment systems require finding solutions to improve the security solutions offered by the providers of Business Information solution.

  17. 75 FR 8489 - Security Zone; Freeport Channel Entrance, Freeport, TX

    Science.gov (United States)

    2010-02-25

    ... environmental risk to health or risk to safety that may disproportionately affect children. Indian Tribal... Captain of the Port, Houston-Galveston deems enhanced security measures necessary on a case-by-case basis... vessels. The moving security zone may commence at any point after certain vessels bound for the Port of...

  18. Information Security - A Growing Challenge for Online Business

    Directory of Open Access Journals (Sweden)

    Gabriela GHEORGHE

    2017-06-01

    Full Text Available In present, the cyber attack move to a global scale, also the online business cyber threats have the effect of impeding and even huge losses. Security issues currently facing online commerce, online payment systems require finding solutions to improve the security solutions offered by the providers of Business Information solution.

  19. Security with nuclear weapons

    International Nuclear Information System (INIS)

    Karp, R.C.

    1991-01-01

    Recent improvements in East-West relations and the process of dramatic political change in Europe may result in unprecedented opportunities to reduce the global arsenal of nuclear weapons. Despite these welcome developments, the prospects for effectively controlling the spread of nuclear capability in the Third World have remained much less encouraging. The possibility of large reductions in nuclear weapons poses fundamental questions about their purpose. Why have some states chosen to acquire nuclear weapons? How and why have these decisions been maintained over time? Why have some states elected to approach, but not cross, the nuclear threshold? This book examines the commonalities and differences in political approaches to nuclear weapons both within and between three groups of states: nuclear, non-nuclear and threshold. The chapters explore the evolution of thinking about nuclear weapons and the role these weapons play in national security planning, and question the official security rationales offered by the nuclear weapon states for the maintenance of nuclear capabilities. For the non-nuclear weapon states, the book presents an analysis of alternative ways of assuring security and foreign policy effectiveness. For the threshold states, it examines the regional contexts within which these states maintain their threshold status. This book transcends traditional East-West approaches to analysis of nuclear issues by giving equal prominence to the issues of nuclear proliferation and non-nuclearism. The book also provides a comprehensive analysis of how current approaches to nuclear weapons have evolved both within and among the groups of countries under study

  20. Using the safety/security interface to the security manager's advantage

    International Nuclear Information System (INIS)

    Stapleton, B.W.

    1993-01-01

    Two aspects of the safety/security interface are discussed: (1) the personal safety of nuclear security officers; and (2) how the security manager can effectively deal with the safety/security interface in solving today's requirements yet supporting the overall mission of the facility. The basis of this presentation is the result of interviews, document analyses, and observations. The conclusion is that proper planning and communication between the players involved in the security/safety interface can benefit the two programs and help achieve overall system integration, ultimately contributing to the bottom line. This is especially important in today's cost conscious environment

  1. Security and health research databases: the stakeholders and questions to be addressed.

    Science.gov (United States)

    Stewart, Sara

    2006-01-01

    Health research database security issues abound. Issues include subject confidentiality, data ownership, data integrity and data accessibility. There are also various stakeholders in database security. Each of these stakeholders has a different set of concerns and responsibilities when dealing with security issues. There is an obvious need for training in security issues, so that these issues may be addressed and health research will move on without added obstacles based on misunderstanding security methods and technologies.

  2. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  3. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  4. Carlson Wagonlit Travel is moving

    CERN Multimedia

    2013-01-01

    The renovation of the Main Building continues!   Because of this, Carlson Wagonlit Travel will move from building 62 to building 510 on 4 October and the agency will be closed in the afternoon. An emergency service will be organised for official travels only. Phone: 022 799 75 73 & 022 799 75 78 / e-mail: cern@carlsonwagonlit.ch

  5. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong

    2017-01-01

    This thesis presents a general framework and method for detection of an object in a video based on apparent motion. The object moves, at some unknown time, differently than the “background” motion, which can be induced from camera motion. The goal

  6. Congestion and residential moving behaviour

    DEFF Research Database (Denmark)

    Larsen, Morten Marott; Pilegaard, Ninette; Van Ommeren, Jos

    2008-01-01

    to congestion. We focus on the equilibrium in which some workers currently living in one region accept jobs in the other, with a fraction of them choosing to commute from their current residence to the new job in the other region and the remainder choosing to move to the region in which the new job is located...

  7. Moving ring reactor 'Karin-1'

    International Nuclear Information System (INIS)

    1983-12-01

    The conceptual design of a moving ring reactor ''Karin-1'' has been carried out to advance fusion system design, to clarify the research and development problems, and to decide their priority. In order to attain these objectives, a D-T reactor with tritium breeding blanket is designed, a commercial reactor with net power output of 500 MWe is designed, the compatibility of plasma physics with fusion engineering is demonstrated, and some other guideline is indicated. A moving ring reactor is composed mainly of three parts. In the first formation section, a plasma ring is formed and heated up to ignition temperature. The plasma ring of compact torus is transported from the formation section through the next burning section to generate fusion power. Then the plasma ring moves into the last recovery section, and the energy and particles of the plasma ring are recovered. The outline of a moving ring reactor ''Karin-1'' is described. As a candidate material for the first wall, SiC was adopted to reduce the MHD effect and to minimize the interaction with neutrons and charged particles. The thin metal lining was applied to the SiC surface to solve the problem of the compatibility with lithium blanket. Plasma physics, the engineering aspect and the items of research and development are described. (Kako, I.)

  8. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong; Sundaramoorthi, Ganesh

    2017-01-01

    We present a general framework and method for detection of an object in a video based on apparent motion. The object moves relative to background motion at some unknown time in the video, and the goal is to detect and segment the object as soon

  9. Security-by-design handbook.

    Energy Technology Data Exchange (ETDEWEB)

    Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

    2013-01-01

    This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

  10. Perimeter security for Minnesota correctional facilities

    Energy Technology Data Exchange (ETDEWEB)

    Crist, D. [Minnesota Department of Corrections, St. Paul, MN (United States); Spencer, D.D. [Sandia National Labs., Albuquerque, NM (United States)

    1996-12-31

    For the past few years, the Minnesota Department of Corrections, assisted by Sandia National Laboratories, has developed a set of standards for perimeter security at medium, close, and maximum custody correctional facilities in the state. During this process, the threat to perimeter security was examined and concepts about correctional perimeter security were developed. This presentation and paper will review the outcomes of this effort, some of the lessons learned, and the concepts developed during this process and in the course of working with architects, engineers and construction firms as the state upgraded perimeter security at some facilities and planned new construction at other facilities.

  11. Internet plan and planning

    Directory of Open Access Journals (Sweden)

    Kahriman Emina

    2008-01-01

    Full Text Available Paper discuss specific features of internet plan as well as planning as management process in general in the contemporary environment. No need to stress out that marketing plan and marketing planning is core activity in approaching to market. At the same time, there are a lot specific c request in preparing marketing plan comparing to business planning due to marketing plan is an essential part. The importance of internet plan and planning rely on specific features of the internet network but as a part of general corporate as well as marketing strategy.

  12. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  13. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  14. 48 CFR 606.302-6 - National security.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information, regardless...

  15. Nuclear Security on the Frontline

    International Nuclear Information System (INIS)

    Dahlstrom, Danielle

    2013-01-01

    Port Klang, on the Straits of Malacca outside Kuala Lumpur, the twelfth largest port in the world, handles over 18000 containers daily. Bustling around the clock, Port Klang is strategically located at a crossroads of trade routes in South East Asia and is a major trans- shipment hub for cargo moving from sea to land and air. Cargo of all types passes through Port Klang. All of these goods are carefully monitored by the national authorities to detect radioactive signatures. The diversity of products causes daily challenges for nuclear security. False alarms for radioactivity can be triggered by commonly traded goods, including building materials like sandstone, and cement, food stuffs like bananas and coffee, and household items like TVs and smoke detectors. However, similar cargo can also contain nuclear and other radioactive material that may be illegally trafficked through ports, which are a prime transport pathway used by smugglers to move such materials around the world

  16. Nuclear Security on the Frontline

    International Nuclear Information System (INIS)

    Dahlstrom, Danielle

    2013-01-01

    Port Klang, on the Straits of Malacca outside Kuala Lumpur, the twelfth largest port in the world, handles over 18000 containers daily. Bustling around the clock, Port Klang is strategically located at a crossroads of trade routes in South East Asia and is a major trans- shipment hub for cargo moving from sea to land and air. Cargo of all types passes through Port Klang. All of these goods are carefully monitored by the national authorities to detect radioactive signatures. The diversity of products causes daily challenges for nuclear security. False alarms for radioactivity can be triggered by commonly traded goods, including building materials like sandstone, and cement, food stuffs like bananas and coffee, and household items like TVs and smoke detectors. However, similar cargo can also contain nuclear and other radioactive material that may be illegally trafficked through ports, which are a prime transport pathway used by smugglers to move such materials around the world. (author)

  17. Incorporating security into the transportation planning process.

    Science.gov (United States)

    2009-03-01

    The transportation system is an important network established to ensure the mobility of people and goods between destinations. In addition, it also serves a vital role in responding to disasters, and therefore deserves special attention when those di...

  18. Homeland Security Planning for Urban Area Schools

    Science.gov (United States)

    2008-03-01

    as these have already been used successfully in school attacks such as those used in the Columbine massacre . Aum Shinrikyo, now known as Aleph, 36...terrorist siege. Equally disturbing was the school massacre in "Netiv Meir," an elementary school in Ma’a lot, Israel, on May 15, 1974, the twenty-sixth...Immediate Consumer The immediate consumer will be School District 207, which is comprised of three large high schools with a combined student enrollment

  19. Planning Combat Outposts to Maximize Population Security

    Science.gov (United States)

    2010-06-01

    Abraham Maslow defined incremental layers of needs that require fulfillment and that can explain people’s motivations in life [12]. The needs at a lower...Hildebrant I ,e Certified by: The Charles Stark Draper Laboratory, Inc. Technical Supervisor Stephen C. Graves Professor, Abraham J. Siegel...22 Figure 2-4: Maslow Hierarchy of Needs ................................................................................. 27 Figure 3-1

  20. Soil Security Assessment of Tasmania

    Science.gov (United States)

    Field, Damien; Kidd, Darren; McBratney, Alex

    2017-04-01

    The concept of soil security aligns well with the aspirational and marketing policies of the Tasmanian Government, where increased agricultural expansion through new irrigation schemes and multiple-use State managed production forests co-exists beside pristine World Heritage conservation land, a major drawcard of the economically important tourism industry . Regarding the Sustainable Development Gaols (SDG's) this could be seen as a exemplar of the emerging tool for quantification of spatial soil security to effectively protect our soil resource in terms of food (SDG 2.4, 3.9) and water security (SDG 6.4, 6.6), biodiversity maintenance and safeguarding fragile ecosystems (SDG 15.3, 15.9). The recent development and application of Digital Soil Mapping and Assessment capacities in Tasmania to stimulate agricultural production and better target appropriate soil resources has formed the foundational systems that can enable the first efforts in quantifying and mapping Tasmanian Soil Security, in particular the five Soil Security dimensions (Capability, Condition, Capital, Codification and Connectivity). However, to provide a measure of overall soil security, it was necessary to separately assess the State's three major soil uses; Agriculture, Conservation and Forestry. These products will provide an indication of where different activities are sustainable or at risk, where more soil data is needed, and provide a tool to better plan for a State requiring optimal food and fibre production, without depleting its natural soil resources and impacting on the fragile ecosystems supporting environmental benefits and the tourism industry.