WorldWideScience

Sample records for security program csp

  1. WTO Compliance Status of the Conservation Security Program (CSP) and the Conservation Reserve Program (CRP)

    National Research Council Canada - National Science Library

    Schnepf, Randy

    2007-01-01

    .... This report is not a legal opinion, but describes both the CSP and CRP programs, the WTO Annex II provisions that govern compliance, and the potential issues involved in evaluating the compliance status of the two programs. This report will be updated as events warrant.

  2. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    International Nuclear Information System (INIS)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon

    2016-01-01

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  3. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  4. PyCSP - controlled concurrency

    DEFF Research Database (Denmark)

    Vinter, Brian; Friborg, Rune Møllegaard; Bjørndalen, John Markus

    2010-01-01

    Producing readable and correct programs while at the same time taking advantage of multi-core architectures is a challenge. PyCSP is an implementation of Communicating Sequential Processes algebra (CSP) for the Python programming language, that take advantage of CSP's formal and verifiable approach...... to controlling concurrency and the readability of Python source code. We describe PyCSP, demonstrate it through examples and demonstrate how PyCSP compares to Pthreads in a master-worker benchmark....

  5. PyCSP - controlled concurrency

    DEFF Research Database (Denmark)

    Friborg, Rune Møllegaard; Vinter, Brian; Bjørndalen, John Markus

    Producing readable and correct programs while at the same time taking advantage of multi-core architectures is a challenge. PyCSP is an implementation of Communicating Sequential Processes algebra (CSP) for the Python programming language, taking advantage of CSP’s formal and verifiable approach...... to controlling concurrency and the readability of Python source code. We describe PyCSP, demonstrate it through examples and demonstrate how PyCSP compares to Pthreads using a benchmark....

  6. PyCSP - Communicating Sequential Processes for Python

    DEFF Research Database (Denmark)

    Vinter, Brian; Bjørndalen, John Markus; Anshus, Otto Johan

    CSP presently supports the core CSP abstractions. We introduce the PyCSP library, its implementation, a few performance benchmarks, and show example code using PyCSP. An early prototype of PyCSP has been used in this year's Extreme Multiprogramming Class at the CS department, university of Copenhagen......The Python programming language is effective for rapidly specifying programs and experimenting with them. It is increasingly being used in computational sciences, and in teaching computer science. CSP is effective for describing concurrency. It has become especially relevant with the emergence...... of commodity multi-core architectures. We are interested in exploring how a combination of Python and CSP can benefit both the computational sciences and the hands-on teaching of distributed and parallel computing in computer science. To make this possible, we have developed PyCSP, a CSP library for Python. Py...

  7. CSP for Executable Scientific Workflows

    DEFF Research Database (Denmark)

    Friborg, Rune Møllegaard

    and can usually benefit performance-wise from both multiprocessing, cluster and grid environments. PyCSP is an implementation of Communicating Sequential Processes (CSP) for the Python programming language and takes advantage of CSP's formal and verifiable approach to controlling concurrency...... on multi-processing and cluster computing using PyCSP. Additionally, McStas is demonstrated to utilise grid computing resources using PyCSP. Finally, this thesis presents a new dynamic channel model, which has not yet been implemented for PyCSP. The dynamic channel is able to change the internal...... synchronisation mechanisms on-the-fly, depending on the location and number of channel-ends connected. Thus it may start out as a simple local pipe and evolve into a distributed channel spanning multiple nodes. This channel is a necessary next step for PyCSP to allow for complete freedom in executing CSP...

  8. CSP Design Model and Tool Support

    NARCIS (Netherlands)

    Volkerink, H.J.; Volkerink, H.J.; Hilderink, G.H.; Broenink, Johannes F.; Vervoort, Wiek; Welch, P.H.; Bakkers, André

    The CSP paradigm is known as a powerful concept for designing and analysing the architectural and behavioural parts of concurrent software. Although the theory of CSP is useful for mathematicians, the programming language occam has been derived from CSP that is useful for any engineering practice.

  9. Designing Animation Facilities for gCSP

    NARCIS (Netherlands)

    van der Steen, T.T.J.; Groothuis, M.A.; Broenink, Johannes F.

    To improve feedback on how concurrent CSP-based programs run, the graphical CSP design tool has been extended with animation facilities. The state of processes, constructs, and channel ends are indicated with colours both in the gCSP diagrams and in the composition tree (hierarchical tree showing

  10. Bounded Delay Timing Analysis of a Class of CSP Programs

    DEFF Research Database (Denmark)

    Hulgaard, Henrik; Burns, Steven M.

    1997-01-01

    We describe an algebraic technique for performing timing analysis of a class of asynchronous circuits described as CSP programs (including Martin's probe operator) with the restrictions that there is no OR-causality and that guard selection is either completely free or mutually exclusive...

  11. Both the caspase CSP-1 and a caspase-independent pathway promote programmed cell death in parallel to the canonical pathway for apoptosis in Caenorhabditis elegans.

    Directory of Open Access Journals (Sweden)

    Daniel P Denning

    Full Text Available Caspases are cysteine proteases that can drive apoptosis in metazoans and have critical functions in the elimination of cells during development, the maintenance of tissue homeostasis, and responses to cellular damage. Although a growing body of research suggests that programmed cell death can occur in the absence of caspases, mammalian studies of caspase-independent apoptosis are confounded by the existence of at least seven caspase homologs that can function redundantly to promote cell death. Caspase-independent programmed cell death is also thought to occur in the invertebrate nematode Caenorhabditis elegans. The C. elegans genome contains four caspase genes (ced-3, csp-1, csp-2, and csp-3, of which only ced-3 has been demonstrated to promote apoptosis. Here, we show that CSP-1 is a pro-apoptotic caspase that promotes programmed cell death in a subset of cells fated to die during C. elegans embryogenesis. csp-1 is expressed robustly in late pachytene nuclei of the germline and is required maternally for its role in embryonic programmed cell deaths. Unlike CED-3, CSP-1 is not regulated by the APAF-1 homolog CED-4 or the BCL-2 homolog CED-9, revealing that csp-1 functions independently of the canonical genetic pathway for apoptosis. Previously we demonstrated that embryos lacking all four caspases can eliminate cells through an extrusion mechanism and that these cells are apoptotic. Extruded cells differ from cells that normally undergo programmed cell death not only by being extruded but also by not being engulfed by neighboring cells. In this study, we identify in csp-3; csp-1; csp-2 ced-3 quadruple mutants apoptotic cell corpses that fully resemble wild-type cell corpses: these caspase-deficient cell corpses are morphologically apoptotic, are not extruded, and are internalized by engulfing cells. We conclude that both caspase-dependent and caspase-independent pathways promote apoptotic programmed cell death and the phagocytosis of cell

  12. Hybrid concentrated solar power (CSP)–biomass plants in a semiarid region: A strategy for CSP deployment in Brazil

    International Nuclear Information System (INIS)

    Soria, Rafael; Portugal-Pereira, Joana; Szklo, Alexandre; Milani, Rodrigo; Schaeffer, Roberto

    2015-01-01

    The production of electricity using concentrated solar power (CSP) technology is not yet possible in Brazil due to the technology’s high capital costs and the lack of a local industry. However, this study introduces a low-cost approach to CSP in Brazil by describing and simulating the operation of hybrid CSP plants that use sustainably managed biomass in Brazil’s semiarid northeast. Biomass hybridisation of a CSP plant with a solar multiple (SM) of 1.2 and a biomass fill fraction (BFF) of 30% can generate electricity at 110 USD/MWh. The high direct normal irradiation (DNI) and the availability of local low-cost biomass in Brazil’s semiarid northeast suggest the possibility of developing a CSP industry capable of supplying low-cost components under a national program framework, with the co-benefits of local job and income generation. For example, the deployment of 10 CSP plants of 30 MWe each would generate 760 direct and indirect jobs during the 24 months of plant construction and approximately 2100 annual jobs associated with the operation and maintenance (O&M) of the generating units. These 10 new units would generate additional local income on the order of USD 57 million. - Highlights: • CSP plant with supplementary biomass hybridisation is a strategic option for Brazil. • DNI and biomass availability in Brazil's semiarid can foster local CSP industry. • LCOE of CSP would cost 11 cent USD/kWh becoming competitive at solar auctions. • Co-benefits of local job and income generation due to CSP in Brazil are high.

  13. 75 FR 13740 - Office of Innovation and Improvement; Overview Information; Charter Schools Program (CSP) Grants...

    Science.gov (United States)

    2010-03-23

    ... DEPARTMENT OF EDUCATION Office of Innovation and Improvement; Overview Information; Charter Schools Program (CSP) Grants for National Leadership Activities; Notice Inviting Applications for New... of public schools have been identified for improvement, corrective action, or restructuring under...

  14. 75 FR 39220 - Charter Schools Program (CSP) Grants for Replication and Expansion of High-Quality Charter Schools

    Science.gov (United States)

    2010-07-08

    ... DEPARTMENT OF EDUCATION Charter Schools Program (CSP) Grants for Replication and Expansion of High-Quality Charter Schools AGENCY: Office of Innovation and Improvement, Department of Education. ACTION... notice inviting applications for new awards for FY 2010 for the Charter Schools Program Grants for...

  15. A Precision Photometric Comparison between SDSS-II and CSP Type Ia Supernova Data

    DEFF Research Database (Denmark)

    Mosher, J.; Sako, M.; Corlies, L.

    2012-01-01

    Consistency between Carnegie Supernova Project (CSP) and SDSS-II Supernova Survey ugri measurements has been evaluated by comparing Sloan Digital Sky Survey (SDSS) and CSP photometry for nine spectroscopically confirmed Type Ia supernova observed contemporaneously by both programs. The CSP data...

  16. Selective C(sp2)-C(sp) bond cleavage: the nitrogenation of alkynes to amides.

    Science.gov (United States)

    Qin, Chong; Feng, Peng; Ou, Yang; Shen, Tao; Wang, Teng; Jiao, Ning

    2013-07-22

    Breakthrough: A novel catalyzed direct highly selective C(sp2)-C(sp) bond functionalization of alkynes to amides has been developed. Nitrogenation is achieved by the highly selective C(sp2)-C(sp) bond cleavage of aryl-substituted alkynes. The oxidant-free and mild conditions and wide substrate scope make this method very practical. Copyright © 2013 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  17. The techno-economic optimization of a 100MWe CSP-desalination plant in Arandis, Namibia

    Science.gov (United States)

    Dall, Ernest P.; Hoffmann, Jaap E.

    2017-06-01

    Energy is a key factor responsible for a country's economic growth and prosperity. It is closely related to the main global challenges namely: poverty mitigation, global environmental change and food and water security [1.]. Concentrating solar power (CSP) is steadily gaining more market acceptance as the cost of electricity from CSP power plants progressively declines. The cogeneration of electricity and water is an attractive prospect for future CSP developments as the simultaneous production of power and potable water can have positive economic implications towards increasing the feasibility of CSP plant developments [2.]. The highest concentrations of direct normal irradiation are located relatively close to Western coastal and Middle-Eastern North-African regions. It is for this reason worthwhile investigating the possibility of CSP-desalination (CSP+D) plants as a future sustainable method for providing both electricity and water with significantly reduced carbon emissions and potential cost reductions. This study investigates the techno-economic feasibility of integrating a low-temperature thermal desalination plant to serve as the condenser as opposed to a conventional dry-cooled CSP plant in Arandis, Namibia. It outlines the possible benefits of the integration CSP+D in terms of overall cost of water and electricity. The high capital costs of thermal desalination heat exchangers as well as the pumping of seawater far inland is the most significant barrier in making this approach competitive against more conventional desalination methods such as reverse osmosis. The compromise between the lowest levelized cost of electricity and water depends on the sizing and the top brine temperature of the desalination plant.

  18. gCSP occam Code Generation for RMoX

    NARCIS (Netherlands)

    Groothuis, M.A.; Liet, Geert K.; Broenink, Johannes F.; Roebbers, H.W.; Sunter, J.P.E.; Welch, P.H.; Wood, D.C.

    2005-01-01

    gCSP is a graphical tool for creating and editing CSP diagrams. gCSP is used in our labs to generate the embedded software framework for our control systems. As a further extension to our gCSP tool, an occam code generator has been constructed. Generating occam from CSP diagrams gives opportunities

  19. Durability of coconut shell powder (CSP) concrete

    Science.gov (United States)

    Leman, A. S.; Shahidan, S.; Senin, M. S.; Shamsuddin, S. M.; Anak Guntor, N. A.; Zuki, S. S. Mohd; Khalid, F. S.; Azhar, A. T. S.; Razak, N. H. S.

    2017-11-01

    The rising cost of construction in developing countries like Malaysia has led concrete experts to explore alternative materials such as coconut shells which are renewable and possess high potential to be used as construction material. Coconut shell powder in varying percentages of1%, 3% and 5% was used as filler material in concrete grade 30 and evaluated after a curing period of 7 days and 28days respectively. Compressive strength, water absorption and carbonation tests were conducted to evaluate the strength and durability of CSP concrete in comparison with normal concrete. The test results revealed that 1%, 3% and 5% of CSP concrete achieved a compressive strength of 47.65 MPa, 45.6 MPa and 40.55% respectively. The rate of water absorption of CSP concrete was recorded as 3.21%, 2.47%, and 2.73% for 1%, 3% and 5% of CSP concrete respectively. Although CSP contained a carbon composition of 47%, the carbonation test showed that CSP no signs of carbon were detected inside the concrete. To conclude, CSP offers great prospects as it demonstrated relatively high durability as a construction material.

  20. Value as a parameter to consider in operational strategies for CSP plants

    Science.gov (United States)

    de Meyer, Oelof; Dinter, Frank; Govender, Saneshan

    2017-06-01

    This paper introduced a value parameter to consider when analyzing operational strategies for CSP plants. The electric system in South Africa, used as case study, is severely constrained with an influx of renewables in the early phase of deployment. The energy demand curve for the system is analyzed showing the total wind and solar photovoltaic contributions for winter and summer. Due to the intermittent nature and meteorological operating conditions of wind and solar photovoltaic plants, the value of CSP plants within the electric system is introduced. Analyzing CSP plants based on the value parameter alone will remain only a philosophical view. Currently there is no quantifiable measure to translate the philosophical view or subjective value and it solely remains the position of the stakeholder. By introducing three other parameters, Cost, Plant and System to a holistic representation of the Operating Strategies of generation plants, the Value parameter can be translated into a quantifiable measure. Utilizing the country's current procurement program as case study, CSP operating under the various PPA within the Bid Windows are analyzed. The Value Cost Plant System diagram developed is used to quantify the value parameter. This paper concluded that no value is obtained from CSP plants operating under the Bid Window 1 & 2 Power Purchase Agreement. However, by recognizing the dispatchability potential of CSP plants in Bid Window 3 & 3.5, the value of CSP in the electric system can be quantified utilizing Value Added Relationship VCPS-diagram. Similarly ancillary services to the system were analyzed. One of the relationships that have not yet been explored within the industry is an interdependent relationship. It was emphasized that the cost and value structure is shared between the plant and system. Although this relationship is functional when the plant and system belongs to the same entity, additional value is achieved by marginalizing the cost structure. A

  1. Next Generation Solar Collectors for CSP

    Energy Technology Data Exchange (ETDEWEB)

    Molnar, Attila [3M Company, St. Paul, MN (United States); Charles, Ruth [3M Company, St. Paul, MN (United States)

    2014-07-31

    The intent of “Next Generation Solar Collectors for CSP” program was to develop key technology elements for collectors in Phase 1 (Budget Period 1), design these elements in Phase 2 (Budget Period 2) and to deploy and test the final collector in Phase 3 (Budget Period 3). 3M and DOE mutually agreed to terminate the program at the end of Budget Period 1, primarily due to timeline issues. However, significant advancements were achieved in developing a next generation reflective material and panel that has the potential to significantly improve the efficiency of CSP systems.

  2. PV integration into a CSP plant

    Science.gov (United States)

    Carvajal, Javier López; Barea, Jose M.; Barragan, Jose; Ortega, Carlos

    2017-06-01

    This paper describes a preliminary techno-economic analysis of the integration of a PV plant into an optimized Parabolic Trough Plant in order to reduce the online consumptions and thus, increase the net electricity injected into the grid. The idea is to assess the feasibility of such project and see what configuration would be the optimal. An extra effort has been made in terms of modelling as the analysis has to be done to the integrated CSP + PV plant instead of analyzing them independently. Two different technologies have been considered for the PV plant, fix and one-axis tracking. Additionally three different scenarios have been considered for the CSP plant auxiliary consumptions as they are essential for determining the optimal PV plant (the higher the auxiliary consumption the higher the optimal PV plant). As could be expected, the results for all cases with PV show an improvement in terms of electricity generation and also in terms of LCOE with respect to the CSP plant. Such improvement is slightly higher with tracking technology for this specific study. Although this exercise has been done to an already designed CSP plant (so only the PV plant had to be optimized), the methodology could be applied for the optimization of an integrated CSP + PV plant during the design phase.

  3. General introduction CSP Technologies and grid management

    OpenAIRE

    Hoffschmidt, Bernhard

    2017-01-01

    Der Vortrag gibt einen Überblick über alle relevanten CSP Technologien und beschreibt die besondere Charakteristik der Stromproduktion sowie die aktuelle und mittelfristige Markt- und Kostensituation. Für eine weitere Kostenreduktion wird der Vorteil eines PV-CSP Hybrid Kraftwerks beschrieben.

  4. A PRECISION PHOTOMETRIC COMPARISON BETWEEN SDSS-II AND CSP TYPE Ia SUPERNOVA DATA

    International Nuclear Information System (INIS)

    Mosher, J.; Sako, M.; Corlies, L.; Folatelli, G.; Frieman, J.; Kessler, R.; Holtzman, J.; Jha, S. W.; Marriner, J.; Phillips, M. M.; Morrell, N.; Stritzinger, M.; Schneider, D. P.

    2012-01-01

    Consistency between Carnegie Supernova Project (CSP) and SDSS-II Supernova Survey ugri measurements has been evaluated by comparing Sloan Digital Sky Survey (SDSS) and CSP photometry for nine spectroscopically confirmed Type Ia supernova observed contemporaneously by both programs. The CSP data were transformed into the SDSS photometric system. Sources of systematic uncertainty have been identified, quantified, and shown to be at or below the 0.023 mag level in all bands. When all photometry for a given band is combined, we find average magnitude differences of equal to or less than 0.011 mag in ugri, with rms scatter ranging from 0.043 to 0.077 mag. The u-band agreement is promising, with the caveat that only four of the nine supernovae are well observed in u and these four exhibit an 0.038 mag supernova-to-supernova scatter in this filter.

  5. Concentrated solar power (CSP innovation analysis in South Africa

    Directory of Open Access Journals (Sweden)

    Craig, Toyosi Onalapo

    2017-08-01

    Full Text Available South Africa aims to generate 42 per cent of its electricity from renewable energy technology sources by 2030. Concentrating solar power (CSP is one of the major renewable energy technologies that have been prioritised by South Africa, given the abundant solar resources available in the region. Seven CSP plants have been, or are being, built; three of them are already connected to the national grid. However, the impacts of this technology on South African research, development, and innovation have not been investigated to date. This paper thus analyses the CSP technologies in South Africa in terms of the existing technology adoption models and diffusion strategies, used by government and its agencies, to improve the development and deployment of these technologies. It is found that CSP has been treated generally like other renewable energy technologies through the Renewable Energy Independent Power Producer Procurement Programme (REIPPPP, although a tariff plan for CSP plants of the future has been made. No specific technology diffusion or adoption model for CSP was found; so this paper explores how it can be developed.

  6. Value generation of future CSP projects in North Africa

    International Nuclear Information System (INIS)

    Kost, Christoph; Engelken, Maximilian; Schlegl, Thomas

    2012-01-01

    This paper discusses the value generation potential for local and international industry in different development scenarios of the concentrating solar power (CSP) market in North Africa until 2030. It analyzes the economic impact resulting from the participation of North African and European companies during construction and operation of CSP plants. The assessment is based on a self-developed solar technologies market development model (STMD) that includes economic and technical requirements and constraints for the creation of a local CSP market. In-depth interviews with industry stakeholders provide specific input, validate the calculations and complement the quantitative model results and conclusions. Long-term potential for locally generated revenues from CSP plant construction are modeled and lead to a share of local revenues of up to 60%. Potential market size of solar power plants in North Africa could reach total revenues of 120 Billion euros and thus demand for components and services contribute to national gross domestic products significantly. Recommendations are given for regional industry cooperation and policy actions for the support of local and international CSP industry in North Africa in order to improve the investment environment and growth of renewable energies in the region. - Highlights: ►New economic model to evaluate value generation of CSP take-off in North Africa. ►CSP components are assessed regarding their potentials to be produced locally. ►Potential for locally generated revenues of CSP plants: 60% of total value. ►Socio-economic impacts of RE projects become more relevant to investment decisions.

  7. Accelerated thermal and mechanical testing of CSP assemblies

    Science.gov (United States)

    Ghaffarian, R.

    2000-01-01

    Chip Scale Packages (CSP) are now widely used for many electronic applications including portable and telecommunication products. A test vehicle (TV-1) with eleven package types and pitches was built and tested by the JPL MicrotypeBGA Consortium during 1997 to 1999. Lessons learned by the team were published as a guidelines document for industry use. The finer pitch CSP packages which recently became available were indluded in the next test vehicle of the JPL CSP Consortium.

  8. Machine-Checkable Timed CSP

    Science.gov (United States)

    Goethel, Thomas; Glesner, Sabine

    2009-01-01

    The correctness of safety-critical embedded software is crucial, whereas non-functional properties like deadlock-freedom and real-time constraints are particularly important. The real-time calculus Timed Communicating Sequential Processes (CSP) is capable of expressing such properties and can therefore be used to verify embedded software. In this paper, we present our formalization of Timed CSP in the Isabelle/HOL theorem prover, which we have formulated as an operational coalgebraic semantics together with bisimulation equivalences and coalgebraic invariants. Furthermore, we apply these techniques in an abstract specification with real-time constraints, which is the basis for current work in which we verify the components of a simple real-time operating system deployed on a satellite.

  9. Subject-based feature extraction by using fisher WPD-CSP in brain-computer interfaces.

    Science.gov (United States)

    Yang, Banghua; Li, Huarong; Wang, Qian; Zhang, Yunyuan

    2016-06-01

    Feature extraction of electroencephalogram (EEG) plays a vital role in brain-computer interfaces (BCIs). In recent years, common spatial pattern (CSP) has been proven to be an effective feature extraction method. However, the traditional CSP has disadvantages of requiring a lot of input channels and the lack of frequency information. In order to remedy the defects of CSP, wavelet packet decomposition (WPD) and CSP are combined to extract effective features. But WPD-CSP method considers less about extracting specific features that are fitted for the specific subject. So a subject-based feature extraction method using fisher WPD-CSP is proposed in this paper. The idea of proposed method is to adapt fisher WPD-CSP to each subject separately. It mainly includes the following six steps: (1) original EEG signals from all channels are decomposed into a series of sub-bands using WPD; (2) average power values of obtained sub-bands are computed; (3) the specified sub-bands with larger values of fisher distance according to average power are selected for that particular subject; (4) each selected sub-band is reconstructed to be regarded as a new EEG channel; (5) all new EEG channels are used as input of the CSP and a six-dimensional feature vector is obtained by the CSP. The subject-based feature extraction model is so formed; (6) the probabilistic neural network (PNN) is used as the classifier and the classification accuracy is obtained. Data from six subjects are processed by the subject-based fisher WPD-CSP, the non-subject-based fisher WPD-CSP and WPD-CSP, respectively. Compared with non-subject-based fisher WPD-CSP and WPD-CSP, the results show that the proposed method yields better performance (sensitivity: 88.7±0.9%, and specificity: 91±1%) and the classification accuracy from subject-based fisher WPD-CSP is increased by 6-12% and 14%, respectively. The proposed subject-based fisher WPD-CSP method can not only remedy disadvantages of CSP by WPD but also discriminate

  10. Addressing forecast uncertainty impact on CSP annual performance

    Science.gov (United States)

    Ferretti, Fabio; Hogendijk, Christopher; Aga, Vipluv; Ehrsam, Andreas

    2017-06-01

    This work analyzes the impact of weather forecast uncertainty on the annual performance of a Concentrated Solar Power (CSP) plant. Forecast time series has been produced by a commercial forecast provider using the technique of hindcasting for the full year 2011 in hourly resolution for Ouarzazate, Morocco. Impact of forecast uncertainty has been measured on three case studies, representing typical tariff schemes observed in recent CSP projects plus a spot market price scenario. The analysis has been carried out using an annual performance model and a standard dispatch optimization algorithm based on dynamic programming. The dispatch optimizer has been demonstrated to be a key requisite to maximize the annual revenues depending on the price scenario, harvesting the maximum potential out of the CSP plant. Forecasting uncertainty affects the revenue enhancement outcome of a dispatch optimizer depending on the error level and the price function. Results show that forecasting accuracy of direct solar irradiance (DNI) is important to make best use of an optimized dispatch but also that a higher number of calculation updates can partially compensate this uncertainty. Improvement in revenues can be significant depending on the price profile and the optimal operation strategy. Pathways to achieve better performance are presented by having more updates both by repeatedly generating new optimized trajectories but also more often updating weather forecasts. This study shows the importance of working on DNI weather forecasting for revenue enhancement as well as selecting weather services that can provide multiple updates a day and probabilistic forecast information.

  11. Coping with Security in Programming

    OpenAIRE

    Frank Schindler

    2006-01-01

    This article deals with importance of security issues in computer programming.Secure software can only be designed with security as a primary goal. To achieve that wewould have to redesign our computer systems with security in our mind including entirecomputer environment, e.g. hardware, programming languages and, of course, operatingsystems. In software development process the quality of resulting computer code should bethe most important aspect during the whole program development process. ...

  12. Assessing the future of a CSP industry in Morocco

    International Nuclear Information System (INIS)

    Mahia, Ramon; Arce, Rafael de; Medina, Eva

    2014-01-01

    This article presents the results of a survey on the feasibility of, and difficulties in, establishing a locally CSP manufacturing industry in Morocco. First, the survey explores which specific components of the CSP production chain could be manufactured in Morocco today and which would require moderate or significant changes being made in that country over the next decade. This paper contributes to demonstrating the potential for a CSP manufacturing industry in Morocco at the present time, ideal business models and current restrictions. Second, on the one hand this survey provides insight into the entrepreneurial, policy- and market-related barriers hampering the development of this industry and, on the other, the relative advantages offered by Morocco for the development of a CSP sector. Complementing the empirical findings on foreign direct investment determinants, this exercise stresses the key relevance of the economic context not only in terms of size, stability and predictability of the market, but also in regard to the critical importance of institutional and policy-related issues such as stability and public policy commitment. The results show that prior experience of firms in developing areas is a crucial issue in the accurate assessment of the risks and benefits associated with FDI decisions. - Highlights: • A CSP industry in Morocco is viable under certain adjustments in the next decade. • Policy related barriers are more critical than entrepreneurial or market obstacles. • It urges to provide a legislative and administrative support for CSP initiatives. • The volume of installed CSP capacity in the region doesn't reach a critical level. • Some foreign investors might have a negative miss perception of Moroccan reality

  13. Properties of concrete containing coconut shell powder (CSP) as a filler

    Science.gov (United States)

    Leman, A. S.; Shahidan, S.; Nasir, A. J.; Senin, M. S.; Zuki, S. S. Mohd; Ibrahim, M. H. Wan; Deraman, R.; Khalid, F. S.; Azhar, A. T. S.

    2017-11-01

    Coconut shellsare a type of agricultural waste which can be converted into useful material. Therefore,this study was conducted to investigate the properties of concrete which uses coconut shell powder (CSP) filler material and to define the optimum percentage of CSP which can be used asfiller material in concrete. Comparisons have been made between normal concrete mixes andconcrete containing CSP. In this study, CSP was added into concrete mixes invaryingpercentages (0%, 2%, 4%, 6%, 8% and 10%). The coconut shell was grounded into afine powder before use. Experimental tests which have been conducted in this study include theslump test, compressive test and splitting tensile strength test. CSP have the potential to be used as a concrete filler and thus the findings of this study may be applied to the construction industry. The use of CSP as a filler in concrete can help make the earth a more sustainable and greener place to live in.

  14. Embodied energy and emergy analyses of a concentrating solar power (CSP) system

    International Nuclear Information System (INIS)

    Zhang Meimei; Wang Zhifeng; Xu Chao; Jiang Hui

    2012-01-01

    Although concentrating solar power (CSP) technology has been projected as one of the most promising candidates to replace conventional power plants burning fossil fuels, the potential advantages and disadvantages of the CSP technology have not been thoroughly evaluated. To better understand the performance of the CSP technology, this paper presents an ecological accounting framework based on embodied energy and emergy analyses methods. The analyses are performed for the 1.5 MW Dahan solar tower power plant in Beijing, China and different evaluation indices used in the embodied energy and emergy analyses are employed to evaluate the plant performance. Our analysis of the CSP plant are compared with six Italian power plants with different energy sources and an American PV plant, which demonstrates the CSP is the superior technology. - Highlights: ► Embodied energy and emergy analyses are employed to evaluate the first solar tower power plant in China. ► Different evaluation indices are quantitatively analyzed to show the advantages of CSP technology. ► This analysis provides insights for making energy policy and investment decisions about CSP technology.

  15. 6 CFR 27.235 - Alternative security program.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Alternative security program. 27.235 Section 27.235 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.235 Alternative security program. (a) Covered...

  16. Classifying regularized sensor covariance matrices: An alternative to CSP

    NARCIS (Netherlands)

    Roijendijk, L.M.M.; Gielen, C.C.A.M.; Farquhar, J.D.R.

    2016-01-01

    Common spatial patterns ( CSP) is a commonly used technique for classifying imagined movement type brain-computer interface ( BCI) datasets. It has been very successful with many extensions and improvements on the basic technique. However, a drawback of CSP is that the signal processing pipeline

  17. Classifying regularised sensor covariance matrices: An alternative to CSP

    NARCIS (Netherlands)

    Roijendijk, L.M.M.; Gielen, C.C.A.M.; Farquhar, J.D.R.

    2016-01-01

    Common spatial patterns (CSP) is a commonly used technique for classifying imagined movement type brain computer interface (BCI) datasets. It has been very successful with many extensions and improvements on the basic technique. However, a drawback of CSP is that the signal processing pipeline

  18. 77 FR 76078 - Biweekly Notice; Applications and Amendments to Facility Operating Licenses and Combined Licenses...

    Science.gov (United States)

    2012-12-26

    ... amendment revised the scope of Cyber Security Plan (CSP) Implementation Schedule Milestone 6 and paragraph 2... technical cyber security controls only. The operational and management controls, as described in Nuclear... the cyber security program (Milestone 8). Thus, all CSP activities would be fully implemented by the...

  19. Constraint satisfaction problems CSP formalisms and techniques

    CERN Document Server

    Ghedira, Khaled

    2013-01-01

    A Constraint Satisfaction Problem (CSP) consists of a set of variables, a domain of values for each variable and a set of constraints. The objective is to assign a value for each variable such that all constraints are satisfied. CSPs continue to receive increased attention because of both their high complexity and their omnipresence in academic, industrial and even real-life problems. This is why they are the subject of intense research in both artificial intelligence and operations research. This book introduces the classic CSP and details several extensions/improvements of both formalisms a

  20. Feasibility Study on HYSOL CSP

    DEFF Research Database (Denmark)

    Nielsen, Lars Henrik; Skytte, Klaus; Pérez, Cristian Hernán Cabrera

    2016-01-01

    Concentrating Solar Power (CSP) plants utilize thermal conversion of direct solar irradiation. A trough or tower configuration focuses solar radiation and heats up oil or molten salt that subsequently in high temperature heat exchangers generate steam for power generation. High temperature molten...... salt can be stored and the stored heat can thus increase the load factor and the usability for a CSP plant, e.g. to cover evening peak demand. In the HYSOL concept (HYbrid SOLar) such configuration is extended further to include a gas turbine fuelled by upgraded biogas or natural gas. The optimised...... integrated HYSOL concept, therefore, becomes a fully dispatchable (offering firm power) and fully renewable energy source (RES) based power supply alternative, offering CO2-free electricity in regions with sufficient solar resources. The economic feasibility of HYSOL configurations is addressed in this paper...

  1. The value of dispatchability of CSP plants in the electricity systems of Morocco and Algeria

    International Nuclear Information System (INIS)

    Brand, Bernhard; Boudghene Stambouli, Amine; Zejli, Driss

    2012-01-01

    This paper examines the effects of an increased integration of concentrated solar power (CSP) into the conventional electricity systems of Morocco and Algeria. A cost-minimizing linear optimization tool was used to calculate the best CSP plant configuration for Morocco's coal-dominated power system as well as for Algeria, where flexible gas-fired power plants prevail. The results demonstrate that in both North African countries, storage-based CSP plants offer significant economic advantages over non-storage, low-dispatchable CSP configurations. However, in a generalized renewable integration scenario, where CSP has to compete with other renewable generation technologies, like wind or photovoltaic (PV) power, it was found that the cost advantages of dispatchability only justify CSP investments when a relatively high renewable penetration is targeted in the electricity mix. - Highlights: ► Market model to optimize CSP plant configuration in North African power systems. ► Value of storage-based CSP plants compared to non-dispatchable configurations: 28–55 €/MWh. ► Assessment of Morocco's and Algeria's renewable electricity targets until 2030. ► CSP becomes more competitive with intermittent technologies when high RES-E quota are targeted.

  2. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  3. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  4. A CSP-Based Agent Modeling Framework for the Cougaar Agent-Based Architecture

    Science.gov (United States)

    Gracanin, Denis; Singh, H. Lally; Eltoweissy, Mohamed; Hinchey, Michael G.; Bohner, Shawn A.

    2005-01-01

    Cognitive Agent Architecture (Cougaar) is a Java-based architecture for large-scale distributed agent-based applications. A Cougaar agent is an autonomous software entity with behaviors that represent a real-world entity (e.g., a business process). A Cougaar-based Model Driven Architecture approach, currently under development, uses a description of system's functionality (requirements) to automatically implement the system in Cougaar. The Communicating Sequential Processes (CSP) formalism is used for the formal validation of the generated system. Two main agent components, a blackboard and a plugin, are modeled as CSP processes. A set of channels represents communications between the blackboard and individual plugins. The blackboard is represented as a CSP process that communicates with every agent in the collection. The developed CSP-based Cougaar modeling framework provides a starting point for a more complete formal verification of the automatically generated Cougaar code. Currently it is used to verify the behavior of an individual agent in terms of CSP properties and to analyze the corresponding Cougaar society.

  5. Building an intelligence-led security program

    CERN Document Server

    Liska, Allan

    2014-01-01

    As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented inte

  6. 32 CFR 2400.45 - Information Security Program Review.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Information Security Program Review. 2400.45... SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45 Information Security Program Review. (a) The Director, OSTP, shall require an annual formal review of the OSTP...

  7. The security analyzer: A security analyzer program written in Prolog

    International Nuclear Information System (INIS)

    Zimmerman, B.D.; Densley, P.J.

    1986-09-01

    The Security Analyzer is a software tool capable of analyzing the effectiveness of a facility's security system. It is written in the Prolog logic programming computer language, using entity-relationship data modeling techniques. The program performs the following functions: (1) provides descriptive, locational and operational status information about intrusion detectors and assessment devices (i.e., ''sensors'' and ''cameras'') upon request; (2) provides for storage and retrieval of maintenance history information for various components of the security system (including intrusion detectors), and allows for changing that information as desired; (3) provides a ''search'' mode, wherein all paths are found from any specified physical location to another specified location which satisfy user chosen ''intruder detection'' probability and elapsed time criteria (i.e., the program finds the ''weakest paths'' from a security point of view). The first two of these functions can be provided fairly easily with a conventional database program; the third function could be provided using Fortran or some similar language, though with substantial difficulty. In the Security Analyzer program, all these functions are provided in a simple and straight-forward manner. This simplicity is possible because the program is written in the symbolic (as opposed to numeric) processing language Prolog, and because the knowledge base is structured according to entity-relationship modeling principles. Also, the use of Prolog and the entity-relationship modeling technique allows the capabilities of the Security analyzer program, both for knowledge base interrogation and for searching-type operations, to be easily expanded in ways that would be very difficult for a numeric and more algorithmically deterministic language such as Fortran to duplicate. 4 refs

  8. Sandia capabilities for the measurement, characterization, and analysis of heliostats for CSP.

    Energy Technology Data Exchange (ETDEWEB)

    Andraka, Charles E.; Christian, Joshua Mark; Ghanbari, Cheryl M.; Gill, David Dennis; Ho, Clifford Kuofei; Kolb, William J.; Moss, Timothy A.; Smith, Edward J.; Yellowhair, Julius

    2013-07-01

    The Concentrating Solar Technologies Organization at Sandia National Laboratories has a long history of performing important research, development, and testing that has enabled the Concentrating Solar Power Industry to deploy full-scale power plants. Sandia continues to pursue innovative CSP concepts with the goal of reducing the cost of CSP while improving efficiency and performance. In this pursuit, Sandia has developed many tools for the analysis of CSP performance. The following capabilities document highlights Sandias extensive experience in the design, construction, and utilization of large-scale testing facilities for CSP and the tools that Sandia has created for the full characterization of heliostats. Sandia has extensive experience in using these tools to evaluate the performance of novel heliostat designs.

  9. Takaful Operators’ Corporate Social Performance (CSP: An Industry Perspective

    Directory of Open Access Journals (Sweden)

    Muhamat Amirul Afif

    2017-01-01

    Full Text Available Takaful operators which are part of Islamic financial institutions (IFIs derive their fundamental principles from shariah. These religious based institutions are expected to fulfill the two important roles in their business operations: commercially profitable and socially responsible. Nevertheless, their societal role is rarely measured and discussed. Therefore, this study appraised the societal role of takaful operators by assessing the components which have been proposed under the corporate social performance (CSP theme for IFIs. This study has arranged structured interview sessions with the Chief Investment Officers and Heads of Investment of each of the eleven takaful operators in Malaysia. The Delphi-style technique was adopted when developing the interview questions. The questions were developed in the form of a five-point Likert scale, addressing specific issues on CSP of takaful operators. In addition, information on takaful operators’ CSR activities, zakat and tax payment were gathered from the companies’ websites and annual report of takaful operators. The study concludes that takaful operators in Malaysia have achieved their societal role through two channels: CSP programmes financed from companies’ profits and fulfillment of CSP as a result of business-community agenda. This study covers every takaful operator in Malaysia and the results reflect industry opinion.

  10. Low cost anti-soiling coatings for CSP collector mirrors and heliostats

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Barton Barton [ORNL; Polyzos, Georgios [ORNL; Schaeffer, Daniel A [ORNL; Lee, Dominic F [ORNL; Datskos, Panos G [ORNL

    2014-01-01

    Most concentrating solar power (CSP) facilities in the USA are located in the desert southwest of the country where land and sunshine are abundant. But one of the significant maintenance problems and cost associated with operating CSP facilities in this region is the accumulation of dust, sand and other pollutants on the collector mirrors and heliostats. In this paper we describe the development of low cost, easy to apply anti-soiling coatings based on superhydrophobic (SH) functionalized nano silica materials and polymer binders that posses the key requirements necessary to inhibit particulate deposition on and sticking to CSP mirror surfaces, and thereby significantly reducing mirror cleaning costs and facility downtime.

  11. Rhodium(III)-Catalyzed Amidation of Unactivated C(sp(3) )-H Bonds.

    Science.gov (United States)

    Wang, He; Tang, Guodong; Li, Xingwei

    2015-10-26

    Nitrogenation by direct functionalization of C-H bonds represents an important strategy for constructing C-N bonds. Rhodium(III)-catalyzed direct amidation of unactivated C(sp(3) )-H bonds is rare, especially under mild reaction conditions. Herein, a broad scope of C(sp(3) )-H bonds are amidated under rhodium catalysis in high efficiency using 3-substituted 1,4,2-dioxazol-5-ones as the amide source. The protocol broadens the scope of rhodium(III)-catalyzed C(sp(3) )-H activation chemistry, and is applicable to the late-stage functionalization of natural products. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  12. Comparing carbon capture and storage (CCS) with concentrating solar power (CSP): Potentials, costs, risks, and barriers

    International Nuclear Information System (INIS)

    Lilliestam, Johan; Bielicki, Jeffrey M.; Patt, Anthony G.

    2012-01-01

    Coal power coupled with Carbon [Dioxide] Capture and Storage (CCS), and Concentrating Solar Power (CSP) technologies are often included in the portfolio of climate change mitigation options intended to decarbonize electricity systems. Both of these technologies can provide baseload electricity, are in early stages of maturity, and have benefits, costs, and obstacles. We compare and contrast CCS applied to coal-fired power plants with CSP. At present, both technologies are more expensive than existing electricity-generating options, but costs should decrease with large-scale deployment, especially in the case of CSP. For CCS, technological challenges still remain, storage risks must be clarified, and regulatory and legal uncertainties remain. For CSP, current challenges include electricity transmission and business models for a rapid and extensive expansion of high-voltage transmission lines. The need for international cooperation may impede CSP expansion in Europe. Highlights: ► Both technologies could provide low-carbon base load power. ► Both technologies require new networks, for either CO 2 or power transmission. ► CSP is closer to being a viable technology ready for pervasive diffusion. ► The costs associated with market saturation would be lower for CSP. ► The regulatory changes required for CSP diffusion are somewhat greater than for CCS.

  13. Control oriented concentrating solar power (CSP) plant model and its applications

    Science.gov (United States)

    Luo, Qi

    Solar receivers in concentrating solar thermal power plants (CSP) undergo over 10,000 start-ups and shutdowns, and over 25,000 rapid rate of change in temperature on receivers due to cloud transients resulting in performance degradation and material fatigue in their expected lifetime of over 30 years. The research proposes to develop a three-level controller that uses multi-input-multi-output (MIMO) control technology to minimize the effect of these disturbances, improve plant performance, and extend plant life. The controller can be readily installed on any vendor supplied state-of-the-art control hardware. We propose a three-level controller architecture using multi-input-multi-output (MIMO) control for CSP plants that can be implemented on existing plants to improve performance, reliability, and extend the life of the plant. This architecture optimizes the performance on multiple time scalesreactive level (regulation to temperature set points), tactical level (adaptation of temperature set points), and strategic level (trading off fatigue life due to thermal cycling and current production). This controller unique to CSP plants operating at temperatures greater than 550 °C, will make CSPs competitive with conventional power plants and contribute significantly towards the Sunshot goal of 0.06/kWh(e), while responding with agility to both market dynamics and changes in solar irradiance such as due to passing clouds. Moreover, our development of control software with performance guarantees will avoid early stage failures and permit smooth grid integration of the CSP power plants. The proposed controller can be implemented with existing control hardware infrastructure with little or no additional equipment. In the thesis, we demonstrate a dynamics model of CSP, of which different components are modelled with different time scales. We also show a real time control strategy of CSP control oriented model in steady state. Furthermore, we shown different controllers

  14. Secure kNN Computation and Integrity Assurance of Data Outsourcing in the Cloud

    Directory of Open Access Journals (Sweden)

    Jun Hong

    2017-01-01

    Full Text Available As cloud computing has been popularized massively and rapidly, individuals and enterprises prefer outsourcing their databases to the cloud service provider (CSP to save the expenditure for managing and maintaining the data. The outsourced databases are hosted, and query services are offered to clients by the CSP, whereas the CSP is not fully trusted. Consequently, the security shall be violated by multiple factors. Data privacy and query integrity are perceived as two major factors obstructing enterprises from outsourcing their databases. A novel scheme is proposed in this paper to effectuate k-nearest neighbors (kNN query and kNN query authentication on an encrypted outsourced spatial database. An asymmetric scalar-product-preserving encryption scheme is elucidated, in which data points and query points are encrypted with diverse encryption keys, and the CSP can determine the distance relation between encrypted data points and query points. Furthermore, the similarity search tree is extended to build a novel verifiable SS-tree that supports efficient kNN query and kNN query verification. It is indicated from the security analysis and experiment results that our scheme not only maintains the confidentiality of outsourced confidential data and query points but also has a lower kNN query processing and verification overhead than the MR-tree.

  15. CSP: A Multifaceted Hybrid Architecture for Space Computing

    Science.gov (United States)

    Rudolph, Dylan; Wilson, Christopher; Stewart, Jacob; Gauvin, Patrick; George, Alan; Lam, Herman; Crum, Gary Alex; Wirthlin, Mike; Wilson, Alex; Stoddard, Aaron

    2014-01-01

    Research on the CHREC Space Processor (CSP) takes a multifaceted hybrid approach to embedded space computing. Working closely with the NASA Goddard SpaceCube team, researchers at the National Science Foundation (NSF) Center for High-Performance Reconfigurable Computing (CHREC) at the University of Florida and Brigham Young University are developing hybrid space computers that feature an innovative combination of three technologies: commercial-off-the-shelf (COTS) devices, radiation-hardened (RadHard) devices, and fault-tolerant computing. Modern COTS processors provide the utmost in performance and energy-efficiency but are susceptible to ionizing radiation in space, whereas RadHard processors are virtually immune to this radiation but are more expensive, larger, less energy-efficient, and generations behind in speed and functionality. By featuring COTS devices to perform the critical data processing, supported by simpler RadHard devices that monitor and manage the COTS devices, and augmented with novel uses of fault-tolerant hardware, software, information, and networking within and between COTS devices, the resulting system can maximize performance and reliability while minimizing energy consumption and cost. NASA Goddard has adopted the CSP concept and technology with plans underway to feature flight-ready CSP boards on two upcoming space missions.

  16. CSPBuilder - CSP based Scientific Workflow Modelling

    DEFF Research Database (Denmark)

    Friborg, Rune Møllegaard; Vinter, Brian

    2008-01-01

    This paper introduces a framework for building CSP based applications, targeted for clusters and next generation CPU designs. CPUs are produced with several cores today and every future CPU generation will feature increasingly more cores, resulting in a requirement for concurrency that has not pr...

  17. Secure Execution of Distributed Session Programs

    Directory of Open Access Journals (Sweden)

    Nuno Alves

    2011-10-01

    Full Text Available The development of the SJ Framework for session-based distributed programming is part of recent and ongoing research into integrating session types and practical, real-world programming languages. SJ programs featuring session types (protocols are statically checked by the SJ compiler to verify the key property of communication safety, meaning that parties engaged in a session only communicate messages, including higher-order communications via session delegation, that are compatible with the message types expected by the recipient. This paper presents current work on security aspects of the SJ Framework. Firstly, we discuss our implementation experience from improving the SJ Runtime platform with security measures to protect and augment communication safety at runtime. We implement a transport component for secure session execution that uses a modified TLS connection with authentication based on the Secure Remote Password (SRP protocol. The key technical point is the delicate treatment of secure session delegation to counter a previous vulnerability. We find that the modular design of the SJ Runtime, based on the notion of an Abstract Transport for session communication, supports rapid extension to utilise additional transports whilst separating this concern from the application-level session programming task. In the second part of this abstract, we formally prove the target security properties by modelling the extended SJ delegation protocols in the pi-calculus.

  18. 12 CFR 568.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... opening and closing for business and for the safekeeping of all currency, negotiable securities, and... law enforcement officers; (iv) The cost of the security devices; (v) Other security measures in effect... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Security program. 568.3 Section 568.3 Banks and...

  19. 12 CFR 326.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... for opening and closing for business and for the safekeeping of all currency, negotiable securities... enforcement officers; (iv) The cost of the security devices; (v) Other security measures in effect at the... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Security program. 326.3 Section 326.3 Banks and...

  20. A General Catalyst for Site-Selective C(sp(3))-H Bond Amination of Activated Secondary over Tertiary Alkyl C(sp(3))-H Bonds.

    Science.gov (United States)

    Scamp, Ryan J; Jirak, James G; Dolan, Nicholas S; Guzei, Ilia A; Schomaker, Jennifer M

    2016-06-17

    The discovery of transition metal complexes capable of promoting general, catalyst-controlled and selective carbon-hydrogen (C-H) bond amination of activated secondary C-H bonds over tertiary alkyl C(sp(3))-H bonds is challenging, as substrate control often dominates when reactive nitrene intermediates are involved. In this letter, we report the design of a new silver complex, [(Py5Me2)AgOTf]2, that displays general and good-to-excellent selectivity for nitrene insertion into propargylic, benzylic, and allylic C-H bonds over tertiary alkyl C(sp(3))-H bonds.

  1. CSP electricity cost evolution and grid parities based on the IEA roadmaps

    International Nuclear Information System (INIS)

    Hernández-Moro, J.; Martínez-Duart, J.M.

    2012-01-01

    The main object of this paper consists in the development of a mathematical closed-form expression for the evaluation, in the period 2010–2050, of the levelized costs of energy (LCOE) of concentrating solar power (CSP) electricity. For this purpose, the LCOE is calculated using a life-cycle cost method, based on the net present value, the discounted cash flow technique and the technology learning curve approach. By this procedure, the LCOE corresponding to CSP electricity is calculated as a function of ten independent variables. Among these parameters, special attention has been put on the evaluation of the available solar resource, the analysis of the IEA predicted values for the cumulative installed capacity, the initial (2010) cost of the system, the discount and learning rates, etc. One significant contribution of our work is that the predicted evolution of the LCOEs strongly depend, not only on the particular values of the cumulative installed capacity function in the targeted years, but mainly on the specific curved time-paths which are followed by this function. The results obtained in this work are shown both graphically and numerically. Finally, the implications that the results could have in energy planning policies and grid parity calculations are discussed. - Highlights: ► A mathematical closed expression has been developed for calculating the evolution of CSP electricity costs. ► Our technique for the prediction of CSP electricity costs and grid parities is based on IEA Roadmaps. ► The time-table (2010–2050) of cumulative installed CSP capacity is key to electricity cost predictions. ► CSP grid parities can occur within next decade for sites with proper solar resources.

  2. On purpose simulation model for molten salt CSP parabolic trough

    Science.gov (United States)

    Caranese, Carlo; Matino, Francesca; Maccari, Augusto

    2017-06-01

    The utilization of computer codes and simulation software is one of the fundamental aspects for the development of any kind of technology and, in particular, in CSP sector for researchers, energy institutions, EPC and others stakeholders. In that extent, several models for the simulation of CSP plant have been developed with different main objectives (dynamic simulation, productivity analysis, techno economic optimization, etc.), each of which has shown its own validity and suitability. Some of those models have been designed to study several plant configurations taking into account different CSP plant technologies (Parabolic trough, Linear Fresnel, Solar Tower or Dish) and different settings for the heat transfer fluid, the thermal storage systems and for the overall plant operating logic. Due to a lack of direct experience of Molten Salt Parabolic Trough (MSPT) commercial plant operation, most of the simulation tools do not foresee a suitable management of the thermal energy storage logic and of the solar field freeze protection system, but follow standard schemes. ASSALT, Ase Software for SALT csp plants, has been developed to improve MSPT plant's simulations, by exploiting the most correct operational strategies in order to provide more accurate technical and economical results. In particular, ASSALT applies MSPT specific control logics for the electric energy production and delivery strategy as well as the operation modes of the Solar Field in off-normal sunshine condition. With this approach, the estimated plant efficiency is increased and the electricity consumptions required for the plant operation and management is drastically reduced. Here we present a first comparative study on a real case 55 MWe Molten Salt Parabolic Trough CSP plant placed in the Tibetan highlands, using ASSALT and SAM (System Advisor Model), which is a commercially available simulation tool.

  3. Implementing an Information Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Glantz, Clifford S.; Lenaeus, Joseph D.; Landine, Guy P.; O' Neil, Lori Ross; Leitch, Rosalyn; Johnson, Christopher; Lewis, John G.; Rodger, Robert M.

    2017-11-01

    The threats to information security have dramatically increased with the proliferation of information systems and the internet. Chemical, biological, radiological, nuclear, and explosives (CBRNe) facilities need to address these threats in order to protect themselves from the loss of intellectual property, theft of valuable or hazardous materials, and sabotage. Project 19 of the European Union CBRN Risk Mitigation Centres of Excellence Initiative is designed to help CBRN security managers, information technology/cybersecurity managers, and other decision-makers deal with these threats through the application of cost-effective information security programs. Project 19 has developed three guidance documents that are publically available to cover information security best practices, planning for an information security management system, and implementing security controls for information security.

  4. 76 FR 10262 - Information Security Program

    Science.gov (United States)

    2011-02-24

    ... FEDERAL MARITIME COMMISSION 46 CFR Part 503 [Docket No. 11-01] RIN 3072-AC40 Information Security... (FMC or Commission) amends its regulations relating to its Information Security Program to reflect the changes implemented by Executive Order 13526--Classified National Security Information--that took effect...

  5. Energy loss function for biological material: poly(CSP)

    International Nuclear Information System (INIS)

    Fung, A.Y.C.; Zaider, M.

    1994-01-01

    In this paper calculated cross sections are presented for the interaction of electrons with poly(CSP), a single-stranded chain that contains one cytosine sugar phosphate unit in the elementary cell. To model a single strand of helical DNA (e.g. the base stacking), the Watson-Crick model for the geometry of poly(CSP) has been used. The use, for computational simplicity, of a single, rather than a double stranded polynucleotide may be justified on the basis of previous calculations indicating that -to a good approximation - the electronic structure (other than excitation states) of complementary base pairs may be described as a superposition of the corresponding structures of the individual components. (Author)

  6. Photoredox Generated Radicals in Csp2-Csp3 Bond Construction

    Science.gov (United States)

    Primer, David Neal

    The routine application of Csp3-hybridized nucleophiles in cross-coupling has been an ongoing pursuit in the agrochemical, pharmaceutical, and materials science industries for over 40 years. Unfortunately, despite numerous attempts to circumvent the problems associated with alkyl nucleophiles, application of these reagents in transition metal-catalyzed C-C bond-forming reactions has remained largely restricted. In recent years, many chemists have noted the lack of reliable, turnkey reactions that exist for the installation of Csp3-hybridized centers--reactions that would be useful for delivering molecules with enhanced three-dimensional topology and altered chemical properties. As such, a general method for alkyl nucleophile activation in cross-coupling would offer access to a host of compounds inaccessible by other means. From a mechanistic standpoint, the continued failure of alkylmetallics is inherent to the high energy intermediates associated with a traditional transmetalation. To overcome this problem, we have pioneered an alternate, single-electron pathway involving 1) initial oxidation of an alkylmetallic reagent, 2) oxidative alkyl radical capture at a metal center, and 3) subsequent reduction of the metal center to return its initial oxidation state. This series of steps constitutes a formal transmetalation that avoids the energy-demanding steps that plague a traditional anionic approach. Under this enabling paradigm, a host of alkyl precursors (alkyl-trifluoroborates and -silicates) have been generally used in cross-coupling for the first time. In summary, the synergistic use of an Ir photoredox catalyst and a Ni cross-coupling catalyst to mediate the cross-coupling of (hetero)aryl bromides with diverse alkyl radical precursors will be discussed. Methods for coupling various trifluoroborate classes (alpha-alkoxy, alpha-trifluoromethyl, secondary and tertiary alkyl) will be covered, focusing on their complementarity to traditional protocols. Finally, a

  7. 7 CFR 772.7 - Leasing minor program loan security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Leasing minor program loan security. 772.7 Section 772..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.7 Leasing minor program loan security. (a) Eligibility. The Agency may consent to the borrower leasing all or a portion of security...

  8. IAEA Nuclear Security Human Resource Development Program

    International Nuclear Information System (INIS)

    Braunegger-Guelich, A.

    2009-01-01

    The IAEA is at the forefront of international efforts to strengthen the world's nuclear security framework. The current Nuclear Security Plan for 2006-2009 was approved by the IAEA Board of Governors in September 2005. This Plan has three main points of focus: needs assessment, prevention, detection and response. Its overall objective is to achieve improved worldwide security of nuclear and other radioactive material in use, storage and transport, and of their associated facilities. This will be achieved, in particular, through the provision of guidelines and recommendations, human resource development, nuclear security advisory services and assistance for the implementation of the framework in States, upon request. The presentation provides an overview of the IAEA nuclear security human resource development program that is divided into two parts: training and education. Whereas the training program focuses on filling gaps between the actual performance of personnel working in the area of nuclear security and the required competencies and skills needed to meet the international requirements and recommendations described in UN and IAEA documents relating to nuclear security, the Educational Program in Nuclear Security aims at developing nuclear security experts and specialists, at fostering a nuclear security culture and at establishing in this way sustainable knowledge in this field within a State. The presentation also elaborates on the nuclear security computer based learning component and provides insights into the use of human resource development as a tool in achieving the IAEA's long term goal of improving sustainable nuclear security in States. (author)

  9. A VAR2CSA:CSP conjugate capable of inducing dual specificity antibody responses

    DEFF Research Database (Denmark)

    Matondo, Sungwa; Thrane, Susan; Janitzek, Christoph Mikkel

    2017-01-01

    Catcher peptide. The covalent interaction between SpyTag/SpyCatcher enables the formation of DBL1x-DBL2x-ID2a:CSP conjugate vaccine. Immunogenicity and quality of antibody responses induced by the conjugate vaccine, as well as a control CSP-SpyCatcher vaccine, was tested in BALB/c mice.  Results: Serum samples...... obtained from mice immunized with the conjugate vaccine were able to recognize both untagged DBL1x-DBL2x-ID2a as well as CSP antigen. Moreover, the geometric mean anti-CSP antibody titer was 1.9-fold higher in serum (at day 35 and 55 post-first immunization) from mice immunized with the conjugate vaccine......, as compared to mice receiving the control vaccine.  Conclusion: The data obtained in this study serves as proof-of-concept for the simultaneous induction of antibodies directed against individual antigen components in a dual stage anti-malaria vaccine....

  10. BF3·Et2O-promoted cleavage of the Csp-Csp2 bond of 2-propynolphenols/anilines: route to C2-alkenylated benzoxazoles and benzimidazoles.

    Science.gov (United States)

    Song, Xian-Rong; Qiu, Yi-Feng; Song, Bo; Hao, Xin-Hua; Han, Ya-Ping; Gao, Pin; Liu, Xue-Yuan; Liang, Yong-Min

    2015-02-20

    A novel BF3·Et2O-promoted tandem reaction of easily prepared 2-propynolphenols/anilines and trimethylsilyl azide is developed to give C2-alkenylated benzoxazoles and benzimidazoles in moderate to good yields. Most reactions could be accomplished in 30 min at room temperature. This tandem process involves a Csp-Csp2 bond cleavage and a C-N bond formation. Moreover, both tertiary and secondary propargylic alcohols with diverse functional groups were tolerated under the mild conditions.

  11. Biotype Characterization, Developmental Profiling, Insecticide Response and Binding Property of Bemisia tabaci Chemosensory Proteins: Role of CSP in Insect Defense.

    Directory of Open Access Journals (Sweden)

    Guoxia Liu

    Full Text Available Chemosensory proteins (CSPs are believed to play a key role in the chemosensory process in insects. Sequencing genomic DNA and RNA encoding CSP1, CSP2 and CSP3 in the sweet potato whitefly Bemisia tabaci showed strong variation between B and Q biotypes. Analyzing CSP-RNA levels showed not only biotype, but also age and developmental stage-specific expression. Interestingly, applying neonicotinoid thiamethoxam insecticide using twenty-five different dose/time treatments in B and Q young adults showed that Bemisia CSP1, CSP2 and CSP3 were also differentially regulated over insecticide exposure. In our study one of the adult-specific gene (CSP1 was shown to be significantly up-regulated by the insecticide in Q, the most highly resistant form of B. tabaci. Correlatively, competitive binding assays using tryptophan fluorescence spectroscopy and molecular docking demonstrated that CSP1 protein preferentially bound to linoleic acid, while CSP2 and CSP3 proteins rather associated to another completely different type of chemical, i.e. α-pentyl-cinnamaldehyde (jasminaldehyde. This might indicate that some CSPs in whiteflies are crucial to facilitate the transport of fatty acids thus regulating some metabolic pathways of the insect immune response, while some others are tuned to much more volatile chemicals known not only for their pleasant odor scent, but also for their potent toxic insecticide activity.

  12. Secure Dynamic Program Repartitioning

    DEFF Research Database (Denmark)

    Hansen, Rene Rydhoff; Probst, Christian

    2005-01-01

    Secure program partitioning has been introduced as a language-based technique to allow the distribution of data and computation across mutualy untrusted hosts, while at the same time guaranteeing the protection of confidential data. Programs that have been annotated with security types......, but the partitioning compiler becomes a part of the network and can recompile applications, thus alowing hosts to enter or leave the framework. We contend that this setting is superior to static partitioning, since it allows redistribution of data and computations. This is especialy beneficial if the new host alows...... data and computations to better fulfil the trust requirements of the users. Erasure Policies ensure that the original host of the redistributed data or computation does not store the data any longer....

  13. The Office of Safeguards and Security Nonproliferation Support Program

    International Nuclear Information System (INIS)

    Desmond, W.J.

    1996-01-01

    The Nonproliferation Support Program was established in the Department of Energy, Office of Safeguards and Security on october 1, 1995. its mission includes providing assistance to Departmental efforts for improved international material protection, control and accounting programs by coordinating and leveraging domestic safeguards and security policy, practice and experience into the international arena. A major objective of the program is to balance US national security requirements with global support of the nonproliferation objectives. This paper describes the organization of the Office of Safeguards and Security and the Nonproliferation Support Program role and responsibility, and presents some of the current areas of program emphasis and activity

  14. The DOE safeguards and security technology development program

    International Nuclear Information System (INIS)

    Cherry, R.C.; Wheelock, A.J.

    1991-01-01

    This paper reports that strategic planning for safeguards and security within the Department of Energy emphasizes the contributions of advanced technologies to the achievement of Departmental protection program goals. The Safeguards and Security Technology Development Program provides state-of-the-art technologies, systems and technical services in support of the policies and programmatic requirements for the protection of Departmental assets. The Program encompasses research and development in physical security, nuclear material control and accountability, information security and personnel security, and the integration of these disciplines in advanced applications. Technology development tasks serve goals that range from the maintenance of an effective technology base to the development, testing and evaluation of applications to meet field needs. A variety of factors, from the evolving threat to reconfiguration of the DOE complex and the technical requirements of new facilities, are expected to influence safeguards and security technology requirements and development efforts. Implementation of the Program is based on the systematic identification, prioritization and alignment of technology development tasks and needs. Initiatives currently underway are aimed at enhancing technology development project management. Increased management attention is also being placed on efforts to promote the benefits of the Program through technology transfer and interagency liaison

  15. Sublethal doses of neonicotinoid imidacloprid can interact with honey bee chemosensory protein 1 (CSP1) and inhibit its function

    International Nuclear Information System (INIS)

    Li, Hongliang; Tan, Jing; Song, Xinmi; Wu, Fan; Tang, Mingzhu; Hua, Qiyun; Zheng, Huoqing; Hu, Fuliang

    2017-01-01

    As a frequently used neonicotinoid insecticide, imidacloprid can impair the chemoreceptive behavior of honey bees even at sublethal doses, while the physiochemical mechanism has not been further revealed. Here, multiple fluorescence spectra, thermodynamic method, and molecular docking were used to study the interaction and the functional inhibition of imidacloprid to the recombinant CSP1 protein in Asian honey bee, Apis cerana. The results showed that the fluorescence intensity (λ em  = 332 nm) of CSP1 could be significantly quenched by imidacloprid in a dynamic mode. During the quenching process, ΔH > 0, ΔS > 0, indicating that the acting forces of imidacloprid with CSP1 are mainly hydrophobic interactions. Synchronous fluorescence showed that the fluorescence of CSP1 was mainly derived from tryptophan, and the hydrophobicity of tryptophan decreased with the increase of imidacloprid concentration. Molecular docking predicted the optimal pose and the amino acid composition of the binding process. Circular dichroism (CD) spectra showed that imidacloprid reduced the α-helix of CSP1 and caused the extension of the CSP1 peptide chain. In addition, the binding of CSP1 to floral scent β-ionone was inhibited by nearly 50% of the apparent association constant (K A ) in the presence of 0.28–2.53 ng/bee of imidacloprid, and the inhibition rate of nearly 95% at 3.75 ng/bee of imidacloprid at sublethal dose level. This study initially revealed the molecular physiochemical mechanism that sublethal doses of neonicotinoid still interact and inhibit the physiological function of the honey bees' chemoreceptive system. - Highlights: • Sublethal doses of imidacloprid can directly interact with CSP1 in Apis cerana. • Sublethal imidacloprid can inhibit the function of CSP1 binding to semiochemicals. • The fluorescence intensity of CSP1 quenched by imidacloprid in a dynamic mode. • The binding between CSP1 and imidacloprid are driven by hydrophobic interactions.

  16. 49 CFR 1552.23 - Security awareness training programs.

    Science.gov (United States)

    2010-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  17. BdorCSP2 is important for antifeed and oviposition-deterring activities induced by Rhodojaponin-III against Bactrocera dorsalis.

    Directory of Open Access Journals (Sweden)

    Xin Yi

    Full Text Available Rhodojaponin-III is a nonvolatile botanical grayanoid diterpene compound, which has antifeedant and oviposition deterrence effects against many kinds of insects. However, the molecular mechanism of the chemoreception process remains unknown. In this study, the important role of BdorCSP2 in the recognition of Rhodojaponin-III was identified. The full length cDNA encoding BdorCSP2 was cloned from legs of Bactrocera dorsalis. The results of expression pattern revealed that BdorCSP2 was abundantly expressed in the legs of adult B. dorsalis. Moreover, the expression of BdorCSP2 could be up-regulated by Rhodojaponin-III. In order to gain comprehensive understanding of the recognition process, the binding affinity between BdorCSP2 and Rhodojaponin-III was measured by fluorescence binding assay. Silencing the expression of BdorCSP2 through the ingestion of dsRNA could weaken the effect of oviposition deterrence and antifeedant of Rhodojaponin-III. These results suggested that BdorCSP2 of B. dorsalis could be involved in chemoreception of Rhodojaponin-III and played a critical role in antifeedant and oviposition behaviors induced by Rhodojaponin-III.

  18. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Science.gov (United States)

    2010-03-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...

  19. Tårs 10000 m2 CSP + Flat Plate Solar Collector Plant - Cost-Performance Optimization of the Design

    DEFF Research Database (Denmark)

    Perers, Bengt; Furbo, Simon; Tian, Zhiyong

    2016-01-01

    , was established. The optimization showed that there was a synergy in combining CSP and FP collectors. Even though the present cost per m² of the CSP collectors is high, the total energy cost is minimized by installing a combination of collectors in such solar heating plant. It was also found that the CSP......A novel solar heating plant with Concentrating Solar Power (CSP) collectors and Flat Plate (FP) collectors has been put into operation in Tårs since July 2015. To investigate economic performance of the plant, a TRNSYS-Genopt model, including a solar collector field and thermal storage tank...

  20. Nuclear Security Education Program at the Pennsylvania State University

    International Nuclear Information System (INIS)

    Uenlue, Kenan; Jovanovic, Igor

    2015-01-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  1. Nuclear Security Education Program at the Pennsylvania State University

    Energy Technology Data Exchange (ETDEWEB)

    Uenlue, Kenan [The Pennsylvania State University, Radiation Science and Engineering Center, University Park, PA 16802-2304 (United States); The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States); Jovanovic, Igor [The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States)

    2015-07-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  2. SequenceL: Automated Parallel Algorithms Derived from CSP-NT Computational Laws

    Science.gov (United States)

    Cooke, Daniel; Rushton, Nelson

    2013-01-01

    With the introduction of new parallel architectures like the cell and multicore chips from IBM, Intel, AMD, and ARM, as well as the petascale processing available for highend computing, a larger number of programmers will need to write parallel codes. Adding the parallel control structure to the sequence, selection, and iterative control constructs increases the complexity of code development, which often results in increased development costs and decreased reliability. SequenceL is a high-level programming language that is, a programming language that is closer to a human s way of thinking than to a machine s. Historically, high-level languages have resulted in decreased development costs and increased reliability, at the expense of performance. In recent applications at JSC and in industry, SequenceL has demonstrated the usual advantages of high-level programming in terms of low cost and high reliability. SequenceL programs, however, have run at speeds typically comparable with, and in many cases faster than, their counterparts written in C and C++ when run on single-core processors. Moreover, SequenceL is able to generate parallel executables automatically for multicore hardware, gaining parallel speedups without any extra effort from the programmer beyond what is required to write the sequen tial/singlecore code. A SequenceL-to-C++ translator has been developed that automatically renders readable multithreaded C++ from a combination of a SequenceL program and sample data input. The SequenceL language is based on two fundamental computational laws, Consume-Simplify- Produce (CSP) and Normalize-Trans - pose (NT), which enable it to automate the creation of parallel algorithms from high-level code that has no annotations of parallelism whatsoever. In our anecdotal experience, SequenceL development has been in every case less costly than development of the same algorithm in sequential (that is, single-core, single process) C or C++, and an order of magnitude less

  3. 75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-07-09

    ... Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office..., announcement is made for a meeting of the National Industrial Security Program Policy Advisory Committee. The meeting will be held to discuss National Industrial Security Program policy matters. DATES: The meeting...

  4. A New Method to Extract CSP Gather of Topography for Scattered Wave Imaging

    Directory of Open Access Journals (Sweden)

    Zhao Pan

    2017-01-01

    Full Text Available The seismic method is one of the major geophysical tools to study the structure of the earth. The extraction of the common scatter point (CSP gather is a critical step to accomplish the seismic imaging with a scattered wave. Conventionally, the CSP gather is obtained with the assumption that the earth surface is horizontal. However, errors are introduced to the final imaging result if the seismic traces obtained at the rugged surface are processed using the conventional method. Hence, we propose the method of the extraction of the CSP gather for the seismic data collected at the rugged surface. The proposed method is validated by two numerical examples and expected to reduce the effect of the topography on the scattered wave imaging.

  5. Neuroprotective and Anti-Apoptotic Effects of CSP-1103 in Primary Cortical Neurons Exposed to Oxygen and Glucose Deprivation.

    Science.gov (United States)

    Porrini, Vanessa; Sarnico, Ilenia; Benarese, Marina; Branca, Caterina; Mota, Mariana; Lanzillotta, Annamaria; Bellucci, Arianna; Parrella, Edoardo; Faggi, Lara; Spano, Pierfranco; Imbimbo, Bruno Pietro; Pizzi, Marina

    2017-01-18

    CSP-1103 (formerly CHF5074) has been shown to reverse memory impairment and reduce amyloid plaque as well as inflammatory microglia activation in preclinical models of Alzheimer's disease. Moreover, it was found to improve cognition and reduce brain inflammation in patients with mild cognitive impairment. Recent evidence suggests that CSP-1103 acts through a single molecular target, the amyloid precursor protein intracellular domain (AICD), a transcriptional regulator implicated in inflammation and apoptosis. We here tested the possible anti-apoptotic and neuroprotective activity of CSP-1103 in a cell-based model of post-ischemic injury, wherein the primary mouse cortical neurons were exposed to oxygen-glucose deprivation (OGD). When added after OGD, CSP-1103 prevented the apoptosis cascade by reducing cytochrome c release and caspase-3 activation and the secondary necrosis. Additionally, CSP-1103 limited earlier activation of p38 and nuclear factor κB (NF-κB) pathways. These results demonstrate that CSP-1103 is neuroprotective in a model of post-ischemic brain injury and provide further mechanistic insights as regards its ability to reduce apoptosis and potential production of pro-inflammatory cytokines. In conclusion, these findings suggest a potential use of CSP-1103 for the treatment of brain ischemia.

  6. Economic opportunities resulting from a global deployment of concentrated solar power (CSP) technologies-The example of German technology providers

    International Nuclear Information System (INIS)

    Vallentin, Daniel; Viebahn, Peter

    2010-01-01

    Several energy scenario studies consider concentrated solar power (CSP) plants as an important technology option to reduce the world's CO 2 emissions to a level required for not letting the global average temperature exceed a threshold of 2-2.4 o C. A global ramp up of CSP technologies offers great economic opportunities for technology providers as CSP technologies include highly specialised components. This paper analyses possible value creation effects resulting from a global deployment of CSP until 2050 as projected in scenarios of the International Energy Agency (IEA) and Greenpeace International. The analysis focuses on the economic opportunities of German technology providers since companies such as Schott Solar, Flabeg or Solar Millennium are among the leading suppliers of CSP technologies on the global market.

  7. Three Unique Implementations of Processes for PyCSP

    DEFF Research Database (Denmark)

    Friborg, Rune Møllegaard; Bjørndalen, John Markus; Vinter, Brian

    2009-01-01

    In this work we motivate and describe three unique implementations of processes for PyCSP: process, thread and greenlet based. The overall purpose is to demonstrate the feasibility of Communicating Sequential Processes as a framework for different application types and target platforms. The result...

  8. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-02-07

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting. To discuss National Industrial Security Program policy...

  9. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-11-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  10. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-05-13

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  11. 75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office..., announcement is made for the following committee meeting, to discuss National Industrial Security Program...

  12. Assessing the potential role of concentrated solar power (CSP) for the northeast power system of Brazil using a detailed power system model

    International Nuclear Information System (INIS)

    Fichter, Tobias; Soria, Rafael; Szklo, Alexandre; Schaeffer, Roberto; Lucena, Andre F.P.

    2017-01-01

    One of the technologies that stand out as an alternative to provide additional flexibility to power systems with large penetration of variable renewable energy (VRE), especially for regions with high direct normal irradiation (DNI), is concentrated solar power (CSP) plants coupled to thermal energy storage (TES) and back-up (BUS) systems. Brazil can develop this technology domestically, especially in its Northeast region, where most of VRE capacity is being deployed and where lies most of the CSP potential of the country. This work applies the Capacity Expansion Model REMix-CEM, which allows considering dispatch constraints of thermal power plants in long-term capacity expansion optimization. REMix-CEM calculates the optimal CSP plant configuration and its dispatch strategy from a central planning perspective. Results showed that the hybridization of CSP plants with jurema-preta biomass (CSP-BIO) becomes a least-cost option for Brazil by 2040. CSP-BIO contributes to the Northeast power system by regularizing the energy imbalance that results from the large-scale VRE expansion along with conventional inflexible power plants. CSP-BIO plants are able to increase frequency response and operational reserve services and can provide the required additional flexibility that the Northeast power system of Brazil will require into the future. - Highlights: • Concentrating solar power (CSP) plants provide flexibility to power systems. • CSP configuration is optimized endogenously during capacity expansion optimization. • CSP hybridized with biomass supports grid-integration of variable renewable energy. • CSP become the least-cost option for the Northeast power system of Brazil by 2040.

  13. 75 FR 1566 - National Industrial Security Program Directive No. 1

    Science.gov (United States)

    2010-01-12

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office 32 CFR Part 2004 [NARA-09-0005] RIN 3095-AB34 National Industrial Security Program Directive No. 1 AGENCY... the National Industrial Security Program Directive No. 1. This correction assigns a Federal Docket...

  14. Ligand-Promoted C(sp(3) )-H Olefination en Route to Multi-functionalized Pyrazoles.

    Science.gov (United States)

    Yang, Weibo; Ye, Shengqing; Schmidt, Yvonne; Stamos, Dean; Yu, Jin-Quan

    2016-05-17

    A Pd-catalyzed/N-heterocycle-directed C(sp(3) )-H olefination has been developed. The monoprotected amino acid ligand (MPAA) is found to significantly promote Pd-catalyzed C(sp(3) )-H olefination for the first time. Cu(OAc)2 instead of Ag(+) salts are used as the terminal oxidant. This reaction provides a useful method for the synthesis of alkylated pyrazoles. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  15. Department of Energy security program needs effective information systems

    International Nuclear Information System (INIS)

    1991-10-01

    Although security is an important, nearly billion-dollar-a-year function in the Department of Energy (DOE), key information systems that hold important data about security weaknesses and incidents have limited analytical capabilities and contain unreliable information. The resultant difficulty in identifying patterns and trends reduces managers' ability to ensure the effectiveness of the security program. Resources are also wasted because DOE has deployed incompatible systems that are unable to electronically share or transfer data, often forcing employees to manually re-enter data that are already stored in computers elsewhere. Finally, continuing data problems with other important security information systems, such as those used to track security clearances and classified documents, indicate that information system deficiencies are extensive. A major reason for these problems is that DOE has not done a comprehensive, strategic assessment of its information and information technology needs of the security program. DOE's efforts are fragmented because it has not assigned to any organization the leadership responsibility to determine security information needs and to plan and manage security information resources Department-wide. This paper reports that a number of changes are needed to correct these problems and take advantage of information technology to help strengthen the security program

  16. Initial review and analysis of the direct environmental impacts of CSP in the northern Cape, South Africa

    Science.gov (United States)

    Rudman, Justine; Gauché, Paul; Esler, Karen J.

    2016-05-01

    The Integrated Resource Plan (IRP) of 2010 and the IRP Update provide the most recent guidance to the electricity generation future of South Africa (SA) and both plans include an increased proportion of renewable energy generation capacity. Given that SA has abundant renewable energy resource potential, this inclusion is welcome. Only 600 MW of the capacity allocated to concentrating solar power (CSP) has been committed to projects in the Northern Cape and represents roughly a fifth of the capacity that has been included in the IRP. Although CSP is particularly new in the electricity generation system of the country, the abundant solar resources of the region with annual DNI values of above 2900 kWh/m2 across the arid Savannah and Nama-Karoo biomes offer a promising future for the development of CSP in South Africa. These areas have largely been left untouched by technological development activities and thus renewable energy projects present a variety of possible direct and indirect environmental, social and economic impacts. Environmental Impact Assessments do focus on local impacts, but given that ecological processes often extend to regional- and landscape scales, understanding this scaled context is important to the alignment of development- and conservation priorities. Given the capacities allocated to CSP for the future of SA's electricity generation system, impacts on land, air, water and biodiversity which are associated with CSP are expected to increase in distribution and the understanding thereof deems valuable already from this early point in CSP's future in SA. We provide a review of direct impacts of CSP on the natural environment and an overview of the anticipated specific significance thereof in the Northern Cape.

  17. The cost of integration of parabolic trough CSP plants in isolated Mediterranean power systems

    International Nuclear Information System (INIS)

    Poullikkas, Andreas; Hadjipaschalis, Ioannis; Kourtis, George

    2010-01-01

    In this work, a technical and economic analysis concerning the integration of parabolic trough concentrated solar power (CSP) technologies, with or without thermal storage capability, in an existing typical small isolated Mediterranean power generation system, in the absence of a feed-in tariff scheme, is carried out. In addition to the business as usual (BAU) scenario, five more scenarios are examined in the analysis in order to assess the electricity unit cost with the penetration of parabolic trough CSP plants of 50 MWe or 100 MWe, with or without thermal storage capability. Based on the input data and assumptions made, the simulations indicated that the scenario with the utilization of a single parabolic trough CSP plant (either 50 MWe or 100 MWe and with or without thermal storage capability) in combination with BAU will effect an insignificant change in the electricity unit cost of the generation system compared to the BAU scenario. In addition, a sensitivity analysis on natural gas price, showed that increasing fuel prices and the existence of thermal storage capability in the CSP plant make this scenario marginally more economically attractive compared to the BAU scenario. (author)

  18. Hardware support for CSP on a Java chip multiprocessor

    DEFF Research Database (Denmark)

    Gruian, Flavius; Schoeberl, Martin

    2013-01-01

    Due to memory bandwidth limitations, chip multiprocessors (CMPs) adopting the convenient shared memory model for their main memory architecture scale poorly. On-chip core-to-core communication is a solution to this problem, that can lead to further performance increase for a number of multithreaded...... applications. Programmatically, the Communicating Sequential Processes (CSPs) paradigm provides a sound computational model for such an architecture with message based communication. In this paper we explore hardware support for CSP in the context of an embedded Java CMP. The hardware support for CSP are on......-chip communication channels, implemented by a ring-based network-on-chip (NoC), to reduce the memory bandwidth pressure on the shared memory.The presented solution is scalable and also specific for our limited resources and real-time predictability requirements. CMP architectures of three to eight processors were...

  19. Applying the National Industrial Security Program (NISP) in the laboratory environment

    International Nuclear Information System (INIS)

    Bruckner, D.G.

    1995-01-01

    With continuing changes in the world safeguards and security environment the effectiveness of many laboratory operations depends on correctly assessing the risk to its programs and developing protection technologies, research and concepts of operations being employed by the scientific community. This paper explores the opportunities afforded by the National Industrial Security Program (NISP) to uniformly and simply protect Laboratory security assets, sensitive and classified information and matter, during all aspects of a laboratory program. The developments in information systems, program security, physical security and access controls suggest an industrial security approach. This paper's overall objective is to indicate that the Laboratory environment is particularly well suited to take advantage being pursued by NISP and the performance objectives of the new DOE orders

  20. Measurements of mirror soiling at a candidate CSP site

    CSIR Research Space (South Africa)

    Griffith, DJ

    2013-09-01

    Full Text Available Loss of mirror reflectivity due to soiling at Concentrated Solar Power (CSP) plants is a significant consideration for design and operation of the plant. Increasingly, a bankable case for establishment of a new plant will include an evaluation...

  1. Analyses of the use of natural gas in solar power plants (CSP) hybridization in the Sao Francisco Basin (BA); Analise do uso de gas natural na hibridizacao de plantas termosolares (CSP) na Bacia do Sao Francisco (BA)

    Energy Technology Data Exchange (ETDEWEB)

    Malagueta, Diego Cunha; Penafiel, Rafael Andres Soria; Szklo, Alexandre Salem; Dutra, Ricardo M.; Schaeffer, Roberto [Coordenacao dos Programas de Pos-Graduacao de Engenharia (COPPE/UFRJ), RJ (Brazil)

    2012-07-01

    This study assessed the feasibility of Concentrated Solar Power plants (CSP) in Northeast, Brazil. It focused on parabolic trough solar power plants, which is the most mature CSP technology; and evaluated plants rated at 100 MWe, dry cooling systems (due to the low water availability in Northeast), and with and without hybridization based on natural gas (degree of hybridization varying from 25 to 75%). Hence, the capacity factor of the simulated plants hovered between 23 and 98%, according to the degree of hybridization and the choice of the thermodynamic cycle of the natural gas fueled thermal system: Rankine or combined cycle. The CSP plants were simulated at Bom Jesus da Lapa, in the semi-arid region of Bahia. Given the prospects for natural gas resources in the Sao Francisco Basin, different scenarios for the gas prices were tested. Moreover, two scenarios were tested for the cost of the CSP plants, one based on the current financial environment and the other based on incentive policies, such as fiscal incentives and loans. Findings show that while simple plants levelized costs (LCOE) hovered around 520 R$/MWh, for hybrid plants LCOE may reach 140 to 190 R$/MWh. Therefore, this study proposed incentive policies to promote the increasing investment in hybrid CSP plants. (author)

  2. Hardware-Assisted System for Program Execution Security of SOC

    Directory of Open Access Journals (Sweden)

    Wang Xiang

    2016-01-01

    Full Text Available With the rapid development of embedded systems, the systems’ security has become more and more important. Most embedded systems are at the risk of series of software attacks, such as buffer overflow attack, Trojan virus. In addition, with the rapid growth in the number of embedded systems and wide application, followed embedded hardware attacks are also increasing. This paper presents a new hardware assisted security mechanism to protect the program’s code and data, monitoring its normal execution. The mechanism mainly monitors three types of information: the start/end address of the program of basic blocks; the lightweight hash value in basic blocks and address of the next basic block. These parameters are extracted through additional tools running on PC. The information will be stored in the security module. During normal program execution, the security module is designed to compare the real-time state of program with the information in the security module. If abnormal, it will trigger the appropriate security response, suspend the program and jump to the specified location. The module has been tested and validated on the SOPC with OR1200 processor. The experimental analysis shows that the proposed mechanism can defence a wide range of common software and physical attacks with low performance penalties and minimal overheads.

  3. A flexible framework for secure and efficient program obfuscation.

    Energy Technology Data Exchange (ETDEWEB)

    Solis, John Hector

    2013-03-01

    In this paper, we present a modular framework for constructing a secure and efficient program obfuscation scheme. Our approach, inspired by the obfuscation with respect to oracle machines model of [4], retains an interactive online protocol with an oracle, but relaxes the original computational and storage restrictions. We argue this is reasonable given the computational resources of modern personal devices. Furthermore, we relax the information-theoretic security requirement for computational security to utilize established cryptographic primitives. With this additional flexibility we are free to explore different cryptographic buildingblocks. Our approach combines authenticated encryption with private information retrieval to construct a secure program obfuscation framework. We give a formal specification of our framework, based on desired functionality and security properties, and provide an example instantiation. In particular, we implement AES in Galois/Counter Mode for authenticated encryption and the Gentry-Ramzan [13]constant communication-rate private information retrieval scheme. We present our implementation results and show that non-trivial sized programs can be realized, but scalability is quickly limited by computational overhead. Finally, we include a discussion on security considerations when instantiating specific modules.

  4. Global Security Program Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    Bretzke, John C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-03-25

    The Global Security Directorate mission is to protect against proliferant and unconventional nuclear threats –regardless of origin - and emerging new threats. This mission is accomplished as the Los Alamos National Laboratory staff completes projects for our numerous sponsors. The purpose of this Program Management Plan is to establish and clearly describe the GS program management requirements including instructions that are essential for the successful management of projects in accordance with our sponsor requirements. The detailed information provided in this document applies to all LANL staff and their subcontractors that are performing GS portfolio work. GS management is committed to a culture that ensures effective planning, execution, and achievement of measurable results in accordance with the GS mission. Outcomes of such a culture result in better communication, delegated authority, accountability, and increased emphasis on safely and securely achieving GS objectives.

  5. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-06-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-13-0030] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  6. 78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-2014-001] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  7. Security Transition Program Office 1994 fiscal year work plan WBS 6.11

    International Nuclear Information System (INIS)

    Brogdon, R.C. Jr.

    1993-10-01

    The Security Transition Program Office (STPO) will change the Hanford Safeguards and Security Protection Program from one that supported the national defense program to one that supports environmental restoration and waste management. A Successful Safeguards and Security Protection Program transition will have an industrial security foundation supplemented to protect material interests and information resources. The transition will change the current approaches to protection philosophy to ones that will provide the Hanford Site with the following: consolidation, reduction, and elimination of safeguards and security interests and targets; greater open Site access; maximum application of technology and automation; interpretation of security policies and procedures in light of the Hanford Site's environmental mission; coexistence with other emergency services; streamlined operations; and protection of employees and the public from health, safety, fire, security, and safeguards risks. This report describes the 1994 program objectives, the technical base, schedule baseline, cost, funding, manpower, and the 1993 program workscope

  8. 78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-02-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  9. 77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-10-17

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  10. 78 FR 59706 - Secure Supply Chain Pilot Program; Correction

    Science.gov (United States)

    2013-09-27

    ...] Secure Supply Chain Pilot Program; Correction AGENCY: Food and Drug Administration, HHS. ACTION: Notice... Federal Register of August 20, 2013 (78 FR 51192). The document announced the start of the Secure Supply Chain Pilot Program (SSCPP). The document was published with an incorrect email address for the SSCPP...

  11. Modelling of a Coil Steam Generator for CSP applications

    DEFF Research Database (Denmark)

    Pelagotti, Leonardo; Sørensen, Kim; Condra, Thomas Joseph

    2014-01-01

    The project investigates a new design for a CSP plant steam generation system, the Coil Steam Generator (CSG). This system allows faster start-ups and therefore higher daily energy production from the Sun. An analytical thermodynamic simulation model of the evaporator and a mechanical analysis...

  12. Use of computer programs to evaluate effectiveness of security systems

    International Nuclear Information System (INIS)

    Harris, L. Jr.; Goldman, L.A.; Mc Daniel, T.L.

    1987-01-01

    Thirty or more computer programs for security vulnerability analysis were developed from 1975 through 1980. Most of these programs are intended for evaluating security system effectiveness against outsider threats, but at least six programs are primarily oriented to insider threats. Some strengths and weaknesses of these programs are described. Six of these programs, four for outsider threats and two for insider threats, have been revised and adapted for use with IBM personal computers. The vulnerability analysis process is discussed with emphasis on data collection. The difference between design data and operational data is described. For performance-type operational data, such as detection probabilities and barrier delay times, the difference between unstressed and stressed performance data is discussed. Stressed performance data correspond to situations where an adversary attempts to weaken a security system by mitigating certain security measures. Suggestions are made on the combined use of manual analysis and computer analysis

  13. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false National Industrial Security Program Operating... Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program...

  14. Review on Cyber Security Programs for NPP Application

    Energy Technology Data Exchange (ETDEWEB)

    Oh, Eung Se [KEPRI, Daejeon (Korea, Republic of)

    2010-10-15

    Increased history records of cyber security (CS) attacks and concerns for computers and networks technical mishaps pull out cyber security to open places. In spite of secrete nature of security, transparent and shared knowledge of many security features are more required at modern plant floors. Korea Institute of Nuclear Safety (KINS), US Government and Nuclear Regulatory Commission (NRC) requested to develop cyber security plans and enforce their implementing to the NPPs. [KINS; CFR; RG 5.71] This paper reviews various cyber security guidelines and suggests an applicable cyber security program development models during the life cycle of NPP's Instrumentation and Control (I and C) systems

  15. Review on Cyber Security Programs for NPP Application

    International Nuclear Information System (INIS)

    Oh, Eung Se

    2010-01-01

    Increased history records of cyber security (CS) attacks and concerns for computers and networks technical mishaps pull out cyber security to open places. In spite of secrete nature of security, transparent and shared knowledge of many security features are more required at modern plant floors. Korea Institute of Nuclear Safety (KINS), US Government and Nuclear Regulatory Commission (NRC) requested to develop cyber security plans and enforce their implementing to the NPPs. [KINS] [CFR] [RG 5.71] This paper reviews various cyber security guidelines and suggests an applicable cyber security program development models during the life cycle of NPP's Instrumentation and Control (I and C) systems

  16. Purification of cold-shock-like proteins from Stigmatella aurantiaca - molecular cloning and characterization of the cspA gene.

    Science.gov (United States)

    Stamm, I; Leclerque, A; Plaga, W

    1999-09-01

    Prominent low-molecular-weight proteins were isolated from vegetative cells of the myxobacterium Stigmatella aurantiaca and were found to be members of the cold-shock protein family. A first gene of this family (cspA) was cloned and sequenced. It encodes a protein of 68 amino acid residues that displays up to 71% sequence identity with other bacterial cold-shock(-like) proteins. A cysteine residue within the RNP-2 motif is a peculiarity of Stigmatella CspA. A cspA::(Deltatrp-lacZ) fusion gene construct was introduced into Stigmatella by electroporation, a method that has not been used previously for this strain. Analysis of the resultant transformants revealed that cspA transcription occurs at high levels during vegetative growth at 20 and 32 degrees C, and during fruiting body formation.

  17. TGGs for Transforming UML to CSP

    DEFF Research Database (Denmark)

    Greenyer, Joel; Kindler, Ekkart; Rieke, Jan

    Contest. The second transformation problem, a transformation from UML activity diagrams to CSP processes, i.e. a transformation between two models, is a typical application for Triple Graph Grammars (TGGs). We present our contributed solution, presenting the TGG rules and the implementation of our TGG...... interpreter. Moreover, we point out the advantages of our soulution as well as some restrictions of the current implementation. This paper will only briefly state the transformation problem and focus on our TGG approach and the discussion of the rules....

  18. No nation is home alone: understanding the international dimension of homeland security through global transportation security programs

    OpenAIRE

    Tarpey, Dominique

    2016-01-01

    Approved for public release; distribution is unlimited Terrorist actors focus on the global transportation system to introduce threats and target attacks. As the lead department for securing the transportation system into the United States, the Department of Homeland Security (DHS) works both domestically and internationally to implement programs and foreign assistance activities to secure the global transportation network. This thesis examines DHS’ international role by analyzing programs...

  19. An interplay among FIS, H-NS and guanosine tetraphosphate modulates transcription of the Escherichia coli cspA gene under physiological growth conditions

    Directory of Open Access Journals (Sweden)

    Anna eBrandi

    2016-05-01

    Full Text Available CspA, the most characterized member of the csp gene family of Escherichia coli, is highly expressed not only in response to cold stress, but also during the early phase of growth at 37°C. Here, we investigate at molecular level the antagonistic role played by the nucleoid proteins FIS and H-NS in the regulation of cspA expression under non-stress conditions. By means of both probing experiments and immunological detection, we demonstrate in vitro the existence of binding sites for these proteins on the cspA regulatory region, in which FIS and H-NS bind simultaneously to form composite DNA-protein complexes. While the in vitro promoter activity of cspA is stimulated by FIS and repressed by H-NS, a compensatory effect is observed when both proteins are added in the transcription assay. Consistently with these findings, inactivation of fis and hns genes reversely affect the in vivo amount of cspA mRNA. In addition, by means of strains expressing a high level of the alarmone guanosine tetraphosphate ((pppGpp and in vitro transcription assays, we show that the cspA promoter is sensitive to (pppGpp inhibition. The (pppGpp-mediated expression of fis and hns genes is also analyzed, thus clarifying some aspects of the regulatory loop governing cspA transcription.

  20. Concentrating Solar Power: Best Practices Handbook for the Collection and Use of Solar Resource Data (CSP)

    Energy Technology Data Exchange (ETDEWEB)

    Stoffel, T.; Renne, D.; Myers, D.; Wilcox, S.; Sengupta, M.; George, R.; Turchi, C.

    2010-09-01

    As the world looks for low-carbon sources of energy, solar power stands out as the most abundant energy resource. Harnessing this energy is the challenge for this century. Photovoltaics and concentrating solar power (CSP) are two primary forms of electricity generation using sunlight. These use different technologies, collect different fractions of the solar resource, and have different siting and production capabilities. Although PV systems are most often deployed as distributed generation sources, CSP systems favor large, centrally located systems. Accordingly, large CSP systems require a substantial investment, sometimes exceeding $1 billion in construction costs. Before such a project is undertaken, the best possible information about the quality and reliability of the fuel source must be made available. That is, project developers need to have reliable data about the solar resource available at specific locations to predict the daily and annual performance of a proposed CSP plant. Without these data, no financial analysis is possible. This handbook presents detailed information about solar resource data and the resulting data products needed for each stage of the project.

  1. Security Measures in Automated Assessment System for Programming Courses

    Directory of Open Access Journals (Sweden)

    Jana Šťastná

    2015-12-01

    Full Text Available A desirable characteristic of programming code assessment is to provide the learner the most appropriate information regarding the code functionality as well as a chance to improve. This can be hardly achieved in case the number of learners is high (500 or more. In this paper we address the problem of risky code testing and availability of an assessment platform Arena, dealing with potential security risks when providing an automated assessment for a large set of source code. Looking at students’ programs as if they were potentially malicious inspired us to investigate separated execution environments, used by security experts for secure software analysis. The results also show that availability issues of our assessment platform can be conveniently resolved with task queues. A special attention is paid to Docker, a virtual container ensuring no risky code can affect the assessment system security. The assessment platform Arena enables to regularly, effectively and securely assess students' source code in various programming courses. In addition to that it is a motivating factor and helps students to engage in the educational process.

  2. A CSP plant combined with biomass CHP using ORC-technology in Bronderslev Denmark

    DEFF Research Database (Denmark)

    Perers, Bengt; Furbo, Simon; Yuan, Guofeng

    2017-01-01

    A new CSP plant combined with biomass CHP, using ORC technology, will be built and taken into operation in Bronderslev, Denmark during spring 2017. The price for Biomass is expected to increase with more and more use of this very limited energy source and then CSP will be cost effective in the long...... run, also in the Danish climate. Oil is used as heat transfer fluid instead of steam giving several advantages in this application for district heating at high latitudes. Total efficiencies and costs, competitive to PV plants. are expected....

  3. Chromobacterium Csp_P reduces malaria and dengue infection in vector mosquitoes and has entomopathogenic and in vitro anti-pathogen activities.

    Science.gov (United States)

    Ramirez, Jose Luis; Short, Sarah M; Bahia, Ana C; Saraiva, Raul G; Dong, Yuemei; Kang, Seokyoung; Tripathi, Abhai; Mlambo, Godfree; Dimopoulos, George

    2014-10-01

    Plasmodium and dengue virus, the causative agents of the two most devastating vector-borne diseases, malaria and dengue, are transmitted by the two most important mosquito vectors, Anopheles gambiae and Aedes aegypti, respectively. Insect-bacteria associations have been shown to influence vector competence for human pathogens through multi-faceted actions that include the elicitation of the insect immune system, pathogen sequestration by microbes, and bacteria-produced anti-pathogenic factors. These influences make the mosquito microbiota highly interesting from a disease control perspective. Here we present a bacterium of the genus Chromobacterium (Csp_P), which was isolated from the midgut of field-caught Aedes aegypti. Csp_P can effectively colonize the mosquito midgut when introduced through an artificial nectar meal, and it also inhibits the growth of other members of the midgut microbiota. Csp_P colonization of the midgut tissue activates mosquito immune responses, and Csp_P exposure dramatically reduces the survival of both the larval and adult stages. Ingestion of Csp_P by the mosquito significantly reduces its susceptibility to Plasmodium falciparum and dengue virus infection, thereby compromising the mosquito's vector competence. This bacterium also exerts in vitro anti-Plasmodium and anti-dengue activities, which appear to be mediated through Csp_P -produced stable bioactive factors with transmission-blocking and therapeutic potential. The anti-pathogen and entomopathogenic properties of Csp_P render it a potential candidate for the development of malaria and dengue control strategies.

  4. Intramolecular apical metal-H-Csp3 interaction in molybdenum and silver complexes.

    Science.gov (United States)

    Ciclosi, Marco; Lloret, Julio; Estevan, Francisco; Sanaú, Mercedes; Pérez-Prieto, Julia

    2009-07-14

    The reaction of HTIMP3 (HTIMP3=tris[1-diphenylphosphino)-3-methyl-1H-indol-2-yl]methane) with AgBF4 and Mo(CO)3(NCCH3)3 leads to Ag(HTIMP3)BF4 and Mo(CO)3(HTIMP3), respectively. The metal centre is coordinated to the three phosphorus atoms of the HTIMP3 ligand, which adopts a facial coordination mode, placing a H-Csp3 hydrogen atom at the apical position close to the metal centre. The solid-state structure of Mo(CO)3(HTIMP3) has been determined by X-ray crystallography, and the data have been used as input parameters for obtaining the optimised geometry of the complex using the B3PW91 functional. The silver structure has been modelled from the X-ray parameters of the molybdenum structure. In addition, theoretical calculations on the H-Csp3 downfield shift upon metal coordination has also been performed. They reproduce the experimental H-Csp3 chemical shifts well and supports that proton deshielding is mainly due to the presence of the metal, since the hydrogen is already located in the cone created by the aromatic-phosphino arms in the free ligand.

  5. Analysis of Methodologies for Identifying Exclusion Zones for Concentrating Solar Power (CSP); Analisis de Metodologias de Identificacion de Zonas de Exclusion para Estudios de Potencial de Energia Electrica Termosolar (CSP)

    Energy Technology Data Exchange (ETDEWEB)

    Dominguez, P.; Ramirez, L.; Navarro, A. A.; Polo, J.; Zarza, E.

    2013-07-01

    The aim of this study is the proposal of a valid and unique methodology to any territory of the potential for solar power generation, reducing subjectivity and enabling comparison of results from the examination of several existing methodologies for CSP, particularly those developed by the Institute for diversification and saving of Energy (IDAE), Greenpeace, National renewable energy laboratory (NREL) and the German Aerospace Center (DLR). Subsequently, we apply and compare the results obtained with those already installed CSP plants, giving an idea of the suitability of each methodology to locate plants in areas considered suitable. (Author)

  6. Primary fibroblasts from CSP? mutation carriers recapitulate hallmarks of the adult onset neuronal ceroid lipofuscinosis

    OpenAIRE

    Benitez, Bruno A.; Sands, Mark S.

    2017-01-01

    Mutations in the co- chaperone protein, CSP?, cause an autosomal dominant, adult-neuronal ceroid lipofuscinosis (AD-ANCL). The current understanding of CSP? function exclusively at the synapse fails to explain the autophagy-lysosome pathway (ALP) dysfunction in cells from AD-ANCL patients. Here, we demonstrate unexpectedly that primary dermal fibroblasts from pre-symptomatic mutation carriers recapitulate in vitro features found in the brains of AD-ANCL patients including auto-fluorescent sto...

  7. Sublethal doses of neonicotinoid imidacloprid can interact with honey bee chemosensory protein 1 (CSP1) and inhibit its function.

    Science.gov (United States)

    Li, Hongliang; Tan, Jing; Song, Xinmi; Wu, Fan; Tang, Mingzhu; Hua, Qiyun; Zheng, Huoqing; Hu, Fuliang

    2017-04-29

    As a frequently used neonicotinoid insecticide, imidacloprid can impair the chemoreceptive behavior of honey bees even at sublethal doses, while the physiochemical mechanism has not been further revealed. Here, multiple fluorescence spectra, thermodynamic method, and molecular docking were used to study the interaction and the functional inhibition of imidacloprid to the recombinant CSP1 protein in Asian honey bee, Apis cerana. The results showed that the fluorescence intensity (λ em  = 332 nm) of CSP1 could be significantly quenched by imidacloprid in a dynamic mode. During the quenching process, ΔH > 0, ΔS > 0, indicating that the acting forces of imidacloprid with CSP1 are mainly hydrophobic interactions. Synchronous fluorescence showed that the fluorescence of CSP1 was mainly derived from tryptophan, and the hydrophobicity of tryptophan decreased with the increase of imidacloprid concentration. Molecular docking predicted the optimal pose and the amino acid composition of the binding process. Circular dichroism (CD) spectra showed that imidacloprid reduced the α-helix of CSP1 and caused the extension of the CSP1 peptide chain. In addition, the binding of CSP1 to floral scent β-ionone was inhibited by nearly 50% of the apparent association constant (K A ) in the presence of 0.28-2.53 ng/bee of imidacloprid, and the inhibition rate of nearly 95% at 3.75 ng/bee of imidacloprid at sublethal dose level. This study initially revealed the molecular physiochemical mechanism that sublethal doses of neonicotinoid still interact and inhibit the physiological function of the honey bees' chemoreceptive system. Copyright © 2017 Elsevier Inc. All rights reserved.

  8. Evaluation of a Secure Laptop-Based Testing Program in an Undergraduate Nursing Program: Students' Perspective.

    Science.gov (United States)

    Tao, Jinyuan; Gunter, Glenda; Tsai, Ming-Hsiu; Lim, Dan

    2016-01-01

    Recently, the many robust learning management systems, and the availability of affordable laptops, have made secure laptop-based testing a reality on many campuses. The undergraduate nursing program at the authors' university began to implement a secure laptop-based testing program in 2009, which allowed students to use their newly purchased laptops to take quizzes and tests securely in classrooms. After nearly 5 years' secure laptop-based testing program implementation, a formative evaluation, using a mixed method that has both descriptive and correlational data elements, was conducted to seek constructive feedback from students to improve the program. Evaluation data show that, overall, students (n = 166) believed the secure laptop-based testing program helps them get hands-on experience of taking examinations on the computer and gets them prepared for their computerized NCLEX-RN. Students, however, had a lot of concerns about laptop glitches and campus wireless network glitches they experienced during testing. At the same time, NCLEX-RN first-time passing rate data were analyzed using the χ2 test, and revealed no significant association between the two testing methods (paper-and-pencil testing and the secure laptop-based testing) and students' first-time NCLEX-RN passing rate. Based on the odds ratio, however, the odds of students passing NCLEX-RN the first time was 1.37 times higher if they were taught with the secure laptop-based testing method than if taught with the traditional paper-and-pencil testing method in nursing school. It was recommended to the institution that better quality of laptops needs to be provided to future students, measures needed to be taken to further stabilize the campus wireless Internet network, and there was a need to reevaluate the Laptop Initiative Program.

  9. Aspects with Program Analysis for Security Policies

    DEFF Research Database (Denmark)

    Yang, Fan

    Enforcing security policies to IT systems, especially for a mobile distributed system, is challenging. As society becomes more IT-savvy, our expectations about security and privacy evolve. This is usually followed by changes in regulation in the form of standards and legislation. In many cases......, small modification of the security requirement might lead to substantial changes in a number of modules within a large mobile distributed system. Indeed, security is a crosscutting concern which can spread to many business modules within a system, and is difficult to be integrated in a modular way....... This dissertation explores the principles of adding challenging security policies to existing systems with great flexibility and modularity. The policies concerned cover both classical access control and explicit information flow policies. We built our solution by combining aspect-oriented programming techniques...

  10. LANL Safeguards and Security Assurance Program. Revision 6

    International Nuclear Information System (INIS)

    1995-01-01

    The Safeguards and Security (S and S) Assurance Program provides a continuous quality improvement approach to ensure effective, compliant S and S program implementation throughout the Los Alamos National Laboratory. Any issues identified through the various internal and external assessments are documented, tracked and closed using the Safeguards and Security Issue Management Program. The Laboratory utilizes an integrated S and S systems approach to protect US Department of Energy (DOE) interests from theft or diversion of special nuclear material (SNM), sabotage, espionage, loss or theft of classified/controlled matter or government property, and other hostile acts that may cause unacceptable impacts on national security, health and safety of employees and the public, and the environment. This document explains the basis, scope, and conduct of the S and S process to include: self-assessments, issue management, risk assessment, and root cause analysis. It also provides a discussion of S and S topical areas, roles and responsibilities, process flow charts, minimum requirements, methodology, terms, and forms

  11. Audit program for physical security systems at nuclear power plants

    International Nuclear Information System (INIS)

    Minichino, C.

    1982-01-01

    Licensees of nuclear power plants conduct audits of their physical security systems to meet the requirements of 10 CFR 73, Physical Protection of Plants and Materials. Section 73.55, Requirements for physical Protection of Licensed Activities in Nuclear Power Reactors Against Radiological Sabotage, requires that the security programs be reviewed at least every 12 months, that the audit be conducted by individuals independent of both security management and security supervision, and that the audit program review all aspects of the physical security system: hardware, personnel, and operational and maintenance procedures. This report contains information for the Nuclear Regulatory Commission (NRC) and for the licensees of nuclear power reactors who carry out these comprehensive audits. Guidance on the overall management of the audit function includes organizational structure and issues concerning the auditors who perform the review: qualifications, independence, due professional care, and standards. Guidance in the audit program includes purpose and scope of the audit, planning, techniques, post-audit procedures, reporting, and follow-up

  12. Supporting secure programming in web applications through interactive static analysis.

    Science.gov (United States)

    Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill

    2014-07-01

    Many security incidents are caused by software developers' failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases.

  13. Creation of security engineering programs by the Southwest Surety Institute

    Science.gov (United States)

    Romero, Van D.; Rogers, Bradley; Winfree, Tim; Walsh, Dan; Garcia, Mary Lynn

    1998-12-01

    The Southwest Surety Institute includes Arizona State University (ASU), Louisiana State University (LSU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL). The universities currently offer a full spectrum of post-secondary programs in security system design and evaluation, including an undergraduate minor, a graduate program, and continuing education programs. The programs are based on the methodology developed at Sandia National Laboratories over the past 25 years to protect critical nuclear assets. The programs combine basic concepts and principles from business, criminal justice, and technology to create an integrated performance-based approach to security system design and analysis. Existing university capabilities in criminal justice (NMSU), explosives testing and technology (NM Tech and LSU), and engineering technology (ASU) are leveraged to provide unique science-based programs that will emphasize the use of performance measures and computer analysis tools to prove the effectiveness of proposed systems in the design phase. Facility managers may then balance increased protection against the cost of implementation and risk mitigation, thereby enabling effective business decisions. Applications expected to benefit from these programs include corrections, law enforcement, counter-terrorism, critical infrastructure protection, financial and medical care fraud, industrial security, and border security.

  14. Ensuring Secure Non-interference of Programs by Game Semantics

    DEFF Research Database (Denmark)

    Dimovski, Aleksandar

    Non-interference is a security property which states that improper information leakages due to direct and indirect flows have not occurred through executing programs. In this paper we investigate a game semantics based formulation of non-interference that allows to perform a security analysis...... of closed and open procedural programs. We show that such formulation is amenable to automated verification techniques. The practicality of this method is illustrated by several examples, which also emphasize its advantage compared to known operational methods for reasoning about open programs....

  15. Physical security technology base programs for physical security

    International Nuclear Information System (INIS)

    Jacobs, J.

    1986-01-01

    Sandia National Laboratories is the US Department of Energy's lead laboratory for physical security research and development (R and D). In support of this mission, Sandia has maintained for several years an R and D program in each of the following technology areas: Intrusion Detection, Entry Control, CCTV Assessment, Access Delay, Alarm Display, and Guard Equipment and Training. The purpose of the technology base programs is to maintain cognizance of the capabilities of the commercial market, identify improvements and transfer technology to industry and facilities. The output of these programs supports the development of new equipment and advanced system concepts, demonstrations of proof-of-principles and system implementation. This paper will review the status of current developments and discuss trends in new technologies which are being explored for future applications, i.e., artificial intelligence, expert systems, robotics, and more automated systems

  16. Phenomenological Studies on Sodium for CSP Applications: A Safety Review

    Energy Technology Data Exchange (ETDEWEB)

    Armijo, Kenneth Miguel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Concentrating Solar Technologies Dept.; Andraka, Charles E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Concentrating Solar Technologies Dept.

    2016-09-01

    Sodium as a heat transfer fluid (HTF) can achieve temperatures above 700°C to improve power cycle performance for reducing large infrastructure costs of high-temperature systems. Current concentrating solar power (CSP) sensible HTF’s (e.g. air, salts) have poor thermal conductivity, and thus low heat transfer capabilities, requiring a large receiver. The high thermal conductivity of sodium has demonstrated high heat transfer rates on dish and towers systems, which allow a reduction in receiver area by a factor of two to four, reducing re-radiation and convection losses and cost by a similar factor. Sodium produces saturated vapor at pressures suitable for transport starting at 600°C and reaches one atmosphere at 870°C, providing a wide range of suitable latent operating conditions that match proposed high temperature, isothermal input power cycles. This advantage could increase the receiver and system efficiency while lowering the cost of CSP tower systems. Although there are a number of desirable thermal performance advantages associated with sodium, its propensity to rapidly oxidize presents safety challenges. This investigation presents a literature review that captures historical operations/handling lessons for advanced sodium systems, and the current state-of-knowledge related to sodium combustion behavior. Technical and operational solutions addressing sodium safety and applications in CSP will be discussed, including unique safety hazards and advantages using latent sodium. Operation and maintenance experience from the nuclear industry with sensible and latent systems will also be discussed in the context of safety challenges and risk mitigation solutions.

  17. The Moroccan solar plan. A comparative analysis of CSP and PV utilization until 2020

    International Nuclear Information System (INIS)

    Richts, Christoph

    2012-01-01

    The present master thesis conducts technical and economic simulations of large-scale Photovoltaic (PV) and Concentrated Solar Power (CSP) plants for the Moroccan Solar Plan. It provides a database of performance indicators such as energy yields, capacity factors, typical efficiencies and losses of technical components, LCOE, and difference costs (DC: LCOE minus avoided costs of the conventional power system) for fixed tilted, 1-axis horizontal, 1-axis vertical and 2-axis tracking PV and CSP with no, 6, 12 and 18 full load hours of thermal storage. HelioClim irradiation data of 2005 for the sites in Ouarzazate, Ain Ben Mathar, Boujdour, Laayoune and Tarfaya is used ranging between 1,927 - 2,428 kWh/m 2 /y (DNI) and 1,968 - 2,154 kWh/m 2 /y (GHI). In the base scenario minimum LCOE are 9.6 - 5.4 EURct/kWh for PV (2012 - 2020) varying between 0.90 - 1.55 EURct/kWh among sites and technologies. CSP reaches 12.8 - 9.2 EURct/kWh and a bandwidth of 2.3 - 1.6 EURct/kWh. Average DC are lowest for horizontal 1-axis tracking (0.4 and -7.7 EURct/kWh for plants built in 2012 and 2020 respectively) and CSP with 6 hours of storage (1.3 and -3.5 EURct/kWh). PV is cheaper for all sites and technologies due to higher learning curves and less initial investment, but cannot contribute to coverage of the daily evening peak in Morocco. Four different MSP-scenarios with 2000 MW of solar energy require total investments of 3.7 - 7.5 billion EUR and yield 7.9% - 12.8% of the electricity demand in 2020 (given a growth 7%/y) depending on the ratio of PV and CSP utilization. The average LCOE are 8.3 - 11.7 EURct/kWh and the total discounted DC (10%/y) are -254 - 391 million EUR. Thus, solar energy is partly less expensive than a business-as-usual scenario. An extensive sensitivity analysis for WACC and price escalation of conventional energy shows that for only PV and only CSP scenarios in 55 and 22 out of 72 cases the DC are negative - although no environmental costs for conventional

  18. User Interface Program for secure electronic tags

    International Nuclear Information System (INIS)

    Cai, Y.; Koehl, E.R.; Carlson, R.D.; Raptis, A.C.

    1995-05-01

    This report summarizes and documents the efforts of Argonne National Laboratory (ANL) in developing a secure tag communication user interface program comprising a tag monitor and a communication tool. This program can perform the same functions as the software that was developed at the Lawrence Livermore National Laboratory (LLNL), but it is enhanced with a user-friendly screen. It represents the first step in updating the TRANSCOM Tracking System (TRANSCOM) by incorporating a tag communication screen menu into the main menu of the TRANSCOM user program. A working version of TRANSCOM, enhanced with ANL secure-tag graphics, will strongly support the Department of Energy Warhead Dismantlement/Special Nuclear Materials Control initiatives. It will allow commercial satellite tracking of the movements and operational activities of treaty-limited items and transportation vehicles throughout Europe and the former USSR, as well as the continental US

  19. South African CSP projects under the REIPPP programme - Requirements, challenges and opportunities

    Science.gov (United States)

    Relancio, Javier; Cuellar, Alberto; Walker, Gregg; Ettmayr, Chris

    2016-05-01

    Thus far seven Concentrated Solar Power (CSP) projects have been awarded under the Renewable Energy Independent Power Producer Procurement Programme (REIPPPP), totalling 600MW: one project is in operation, four under construction and two on their way to financial close. This provides an excellent opportunity for analysis of key features of the projects that have contributed to or detracted from the programme's success. The paper draws from Mott MacDonald's involvement as Technical Advisor on the seven CSP projects that have been successful under the REIPPPP to date as well as other global CSP developments. It presents how various programme requirements have affected the implementation of projects, such as the technical requirements, time of day tariff structure, economic development requirements and the renewable energy grid code. The increasingly competitive tariffs offered have encouraged developers to investigate efficiency maximising project configurations and cost saving mechanisms, as well as featuring state of the art technology in their proposals. The paper assesses the role of the project participants (developers, lenders and government) with regards to these innovative technologies and solutions. In our paper we discuss the status of projects and the SA market, analysing the main challenges and opportunities that in turn have influenced various aspects such as technology choice, operational regimes and supply chain arrangements.

  20. Antenna-predominant and male-biased CSP19 of Sesamia inferens is able to bind the female sex pheromones and host plant volatiles.

    Science.gov (United States)

    Zhang, Ya-Nan; Ye, Zhan-Feng; Yang, Ke; Dong, Shuang-Lin

    2014-02-25

    Insect chemosensory proteins (CSPs) are proposed to capture and transport hydrophobic chemicals across the sensillum lymph to olfactory receptors (ORs), but this has not been clarified in moths. In this study, we built on our previously reported segment sequence work and cloned the full length CSP19 gene (SinfCSP19) from the antennae of Sesamia inferens by using rapid amplification of cDNA ends. Quantitative real time-PCR (qPCR) assays indicated that the gene was expressed in a unique profile, i.e. predominant in antennae and significantly higher in male than in female. To explore the function, recombinant SinfCSP19 was expressed in Escherichia coli cells and purified by Ni-ion affinity chromatography. Binding affinities of the recombinant SinfCSP19 with 39 plant volatiles, 3 sex pheromone components and 10 pheromone analogs were measured using fluorescent competitive binding assays. The results showed that 6 plant volatiles displayed high binding affinities to SinfCSP19 (Ki = 2.12-8.75 μM), and more interesting, the 3 sex pheromone components and analogs showed even higher binding to SinfCSP19 (Ki = 0.49-1.78 μM). Those results suggest that SinfCSP19 plays a role in reception of female sex pheromones of S. inferens and host plant volatiles. Copyright © 2013 Elsevier B.V. All rights reserved.

  1. Guidelines for development of NASA (National Aeronautics and Space Administration) computer security training programs

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.

  2. Reduced host cell invasiveness and oxidative stress tolerance in double and triple csp gene family deletion mutants of Listeria monocytogenes.

    Science.gov (United States)

    Loepfe, Chantal; Raimann, Eveline; Stephan, Roger; Tasara, Taurai

    2010-07-01

    The cold shock protein (Csp) family comprises small, highly conserved proteins that bind nucleic acids to modulate various bacterial gene expressions. In addition to cold adaptation functions, this group of proteins is thought to facilitate various cellular processes to promote normal growth and stress adaptation responses. Three proteins making up the Listeria monocytogenes Csp family (CspA, CspB, and CspD) promote both cold and osmotic stress adaptation functions in this bacterium. The contribution of these three Csps in the host cell invasion processes of L. monocytogenes was investigated based on human Caco-2 and murine macrophage in vitro cell infection models. The DeltacspB, DeltacspD, DeltacspAB, DeltacspAD, DeltacspBD, and DeltacspABD strains were all significantly impaired in Caco-2 cell invasion compared with the wild-type strain, whereas in the murine macrophage infection assay only, the double (DeltacspBD) and triple (DeltacspABD) csp mutants were also significantly impaired in cell invasion compared with the wild-type strain. The DeltacspBD and DeltacspABD mutants displayed the most severely impaired invasion phenotypes. The invasion ability of these two mutant strains was also further analyzed using cold-stress-exposed organisms. In both cell infection models a significant reduction in invasiveness was observed after cold stress exposure of Listeria organisms. The negative impact of cold stress on subsequent cell invasion ability was, however, more severe in cold-sensitive csp mutants (DeltacspBD and DeltacspABD) compared with the wild type. The impaired macrophage invasion and intracellular growth of DeltacspBD and DeltacspABD also led us to examine oxidative stress resistance capacity in these two mutant strains. Both strains also displayed higher oxidative stress sensitivity relative to the wild-type strain. Our data indicate that besides cold and osmotic stress adaptation roles, Csp family proteins also promote efficient host cell invasion and

  3. 5 CFR 930.301 - Information systems security awareness training program.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Information systems security awareness... (MISCELLANEOUS) Information Security Responsibilities for Employees who Manage or Use Federal Information Systems § 930.301 Information systems security awareness training program. Each Executive Agency must develop a...

  4. Supporting secure programming in web applications through interactive static analysis

    Science.gov (United States)

    Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill

    2013-01-01

    Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases. PMID:25685513

  5. Supporting secure programming in web applications through interactive static analysis

    Directory of Open Access Journals (Sweden)

    Jun Zhu

    2014-07-01

    Full Text Available Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases.

  6. "Business Continuity and Information Security Maintenance" Masters’ Training Program

    OpenAIRE

    Miloslavskaya , Natalia; Senatorov , Mikhail; Tolstoy , Alexandr; Zapechnikov , Sergei

    2013-01-01

    Part 1: WISE 8; International audience; The experience of preparing for the "Business Continuity and Information Security Maintenance" (BC&ISM) Masters’ program implementation and realization at the "Information Security of Banking Systems" Department of the National Research Nuclear University MEPhI (NRNU MEPhI, Moscow, Russia) is presented. Justification of the educational direction choice for BC&ISM professionals is given. The model of IS Master being trained on this program is described. ...

  7. AnalysisThe Availability of Using Concentrated Solar Power (CSP as Electricity Source in Al-Hilla City

    Directory of Open Access Journals (Sweden)

    Wisam Shamkhi Jaber

    2017-03-01

    Full Text Available The needing of using clean energy increases every year because of the negative impact of emissions from electricity power plant and to reduce the costs of generating power by using natural energies like solar, wind, and other sources. The availability of using solar energy as source of producing electricity in Al-Hilla city by using Concentrating Solar Power (CSP was investigated in this research. The major parameters in this study were the city position, and the annually amount of solar received, also, number of charts related to solar parameters for the management of CSP were derived and showed in this research. The using of CSP as electricity power can be important solution to force the problem of high cost of electricity power fuel needed and the lack of power produced because of increasing of power consumed specially in summer season.

  8. Hygiene and Industrial Security Program: General aspects

    International Nuclear Information System (INIS)

    1988-01-01

    This Venezuelan standard establishes the aspects that must be included in the elaboration and monitoring of an Hygiene and Industrial Security Program (Prevention of Accidents and Occupational Diseases Program). It is applicable to any type of exploitation company, or any kind of task (in nature or importance) where people work, no matter the number workers [es

  9. Middle East and North Africa Region Assessment of the Local Manufacturing Potential for Concentrated Solar Power (CSP) Projects

    Energy Technology Data Exchange (ETDEWEB)

    Gazzo, A.; Gousseland, P.; Verdier, J. [Ernst and Young et Associes, Neuilly-Sur-Seine (France); Kost, C.; Morin, G.; Engelken, M.; Schrof, J.; Nitz, P.; Selt, J.; Platzer, W. [Fraunhofer Institute for Solar Energy Systems ISE, Freiburg (Germany); Ragwitz, M.; Boie, I.; Hauptstock, D.; Eichhammer, W. [Fraunhofer Institute for Systems and Innovation Research ISI, Karlsruhe (Germany)

    2011-01-15

    The MENA CSP (Middle East and North Africa - Concentrated Solar Power) plan is an ambitious scheme with an appeal to anyone concerned about climate change and convinced by the need for clean, renewable power. But what does it really mean for the average citizen of say Morocco or Tunisia? The World Bank sees potential for significant job and wealth creation in solar energy producing countries. If the CSP market grows rapidly over the next few years, equipment manufacturing will be essential to supply this new sector. This study proposes roadmaps and an action plan to help develop the potential of locally manufactured CSP components in the existing industry and for new market entrants.

  10. 77 FR 34411 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-06-11

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION National Industrial Security Program Policy Advisory... CFR 101-6, announcement is made for the following committee meeting. To discuss National Industrial Security Program policy matters. DATES: This meeting will be held on Wednesday, July 11, 2012 from 10:00 a...

  11. Department of Defense: Observations on the National Industrial Security Program

    National Research Council Canada - National Science Library

    Barr, Ann C; Denomme, Thomas J; Booth, Brandon; Krump, John; Sloan, Karen; Slodkowski, Lillian; Sterling, Suzanne

    2008-01-01

    .... In terms of facility oversight, DSS maintained files on contractor facilities security programs and their security violations, but it did not analyze this information to determine, for example...

  12. The Moroccan solar plan. A comparative analysis of CSP and PV utilization until 2020

    Energy Technology Data Exchange (ETDEWEB)

    Richts, Christoph

    2012-02-15

    The present master thesis conducts technical and economic simulations of large-scale Photovoltaic (PV) and Concentrated Solar Power (CSP) plants for the Moroccan Solar Plan. It provides a database of performance indicators such as energy yields, capacity factors, typical efficiencies and losses of technical components, LCOE, and difference costs (DC: LCOE minus avoided costs of the conventional power system) for fixed tilted, 1-axis horizontal, 1-axis vertical and 2-axis tracking PV and CSP with no, 6, 12 and 18 full load hours of thermal storage. HelioClim irradiation data of 2005 for the sites in Ouarzazate, Ain Ben Mathar, Boujdour, Laayoune and Tarfaya is used ranging between 1,927 - 2,428 kWh/m{sup 2}/y (DNI) and 1,968 - 2,154 kWh/m{sup 2}/y (GHI). In the base scenario minimum LCOE are 9.6 - 5.4 EURct/kWh for PV (2012 - 2020) varying between 0.90 - 1.55 EURct/kWh among sites and technologies. CSP reaches 12.8 - 9.2 EURct/kWh and a bandwidth of 2.3 - 1.6 EURct/kWh. Average DC are lowest for horizontal 1-axis tracking (0.4 and -7.7 EURct/kWh for plants built in 2012 and 2020 respectively) and CSP with 6 hours of storage (1.3 and -3.5 EURct/kWh). PV is cheaper for all sites and technologies due to higher learning curves and less initial investment, but cannot contribute to coverage of the daily evening peak in Morocco. Four different MSP-scenarios with 2000 MW of solar energy require total investments of 3.7 - 7.5 billion EUR and yield 7.9% - 12.8% of the electricity demand in 2020 (given a growth 7%/y) depending on the ratio of PV and CSP utilization. The average LCOE are 8.3 - 11.7 EURct/kWh and the total discounted DC (10%/y) are -254 - 391 million EUR. Thus, solar energy is partly less expensive than a business-as-usual scenario. An extensive sensitivity analysis for WACC and price escalation of conventional energy shows that for only PV and only CSP scenarios in 55 and 22 out of 72 cases the DC are negative - although no environmental costs for conventional

  13. Synthesis and characterization in monkey of [{sup 11}C]SP203 as a radioligand for imaging brain metabotropic glutamate 5 receptors

    Energy Technology Data Exchange (ETDEWEB)

    Simeon, Fabrice G.; Liow, Jeih-San; Zhang, Yi; Hong, Jinsoo; Gladding, Robert L.; Zoghbi, Sami S.; Innis, Robert B.; Pike, Victor W. [National Institutes of Health, Molecular Imaging Branch, National Institute of Mental Health, Bethesda, MD (United States)

    2012-12-15

    [{sup 18}F]SP203 (3-fluoro-5-(2-(2-([{sup 18}F]fluoromethyl)-thiazol-4-yl)ethynyl)benzonitrile) is an effective high-affinity and selective radioligand for imaging metabotropic 5 receptors (mGluR5) in human brain with PET. To provide a radioligand that may be used for more than one scanning session in the same subject in a single day, we set out to label SP203 with shorter-lived {sup 11}C (t{sub 1/2} = 20.4 min) and to characterize its behavior as a radioligand with PET in the monkey. Iodo and bromo precursors were obtained by cross-coupling 2-fluoromethyl-4-((trimethylsilyl)ethynyl)-1,3-thiazole with 3,5-diiodofluorobenzene and 3,5-dibromofluorobenzene, respectively. Treatment of either precursor with [{sup 11}C]cyanide ion rapidly gave [{sup 11}C]SP203, which was purified with high-performance liquid chromatography. PET was used to measure the uptake of radioactivity in brain regions after injecting [{sup 11}C]SP203 intravenously into rhesus monkeys at baseline and under conditions in which mGluR5 were blocked with 3-[(2-methyl-1,3-thiazol-4-yl)ethynyl]pyridine (MTEP). The emergence of radiometabolites in monkey blood in vitro and in vivo was assessed with radio-HPLC. The stability of [{sup 11}C]SP203 in human blood in vitro was also measured. The iodo precursor gave [{sup 11}C]SP203 in higher radiochemical yield (>98 %) than the bromo precursor (20-52 %). After intravenous administration of [{sup 11}C]SP203 into three rhesus monkeys, radioactivity peaked early in brain (average 12.5 min) with a regional distribution in rank order of expected mGluR5 density. Peak uptake was followed by a steady decline. No radioactivity accumulated in the skull. In monkeys pretreated with MTEP before [{sup 11}C]SP203 administration, radioactivity uptake in brain was again high but then declined more rapidly than in the baseline scan to a common low level. [{sup 11}C]SP203 was unstable in monkey blood in vitro and in vivo, and gave predominantly less lipophilic radiometabolites

  14. I and C security program for nuclear facilities: implementation guide - TAFICS/IG/2

    International Nuclear Information System (INIS)

    2016-04-01

    This is the second in a series of documents being developed by TAFICS for protecting computer-based I and C systems of Indian nuclear facilities from cyber attacks. The document provides guidance to nuclear facility management to establish, implement and maintain a robust I and C security program - consisting of security plan and a set of security controls. In order to provide a firm basis for the security program, the document also identifies the fundamental security principles and foundational security requirements related to computer-based I and C systems of nuclear facilities. It is recommended that all applicable Indian nuclear facilities should implement the security program - with required adaptation - so as to provide the necessary assurance that the I and C systems are adequately protected against cyber attacks. (author)

  15. A Method to Assess Flux Hazards at CSP Plants to Reduce Avian Mortality

    Energy Technology Data Exchange (ETDEWEB)

    Ho, Clifford K.; Wendelin, Timothy; Horstman, Luke; Yellowhair, Julius

    2017-06-27

    A method to evaluate avian flux hazards at concentrating solar power plants (CSP) has been developed. A heat-transfer model has been coupled to simulations of the irradiance in the airspace above a CSP plant to determine the feather temperature along prescribed bird flight paths. Probabilistic modeling results show that the irradiance and assumed feather properties (thickness, absorptance, heat capacity) have the most significant impact on the simulated feather temperature, which can increase rapidly (hundreds of degrees Celsius in seconds) depending on the parameter values. The avian flux hazard model is being combined with a plant performance model to identify alternative heliostat standby aiming strategies that minimize both avian flux hazards and negative impacts on plant performance.

  16. NNSA Program Develops the Next Generation of Nuclear Security Experts

    Energy Technology Data Exchange (ETDEWEB)

    Brim, Cornelia P.; Disney, Maren V.

    2015-09-02

    NNSA is fostering the next generation of nuclear security experts is through its successful NNSA Graduate Fellowship Program (NGFP). NGFP offers its Fellows an exceptional career development opportunity through hands-on experience supporting NNSA mission areas across policy and technology disciplines. The one-year assignments give tomorrow’s leaders in global nuclear security and nonproliferation unparalleled exposure through assignments to Program Offices across NNSA.

  17. A Quantitative Study on the Relationship of Information Security Policy Awareness, Enforcement, and Maintenance to Information Security Program Effectiveness

    Science.gov (United States)

    Francois, Michael T.

    2016-01-01

    Today's organizations rely heavily on information technology to conduct their daily activities. Therefore, their information security systems are an area of heightened security concern. As a result, organizations implement information security programs to address and mitigate that concern. However, even with the emphasis on information security,…

  18. Cationic osteogenic peptide P15-CSP coatings promote 3-D osteogenesis in poly(epsilon-caprolactone) scaffolds of distinct pore size.

    Science.gov (United States)

    Li, Xian; Ghavidel Mehr, Nima; Guzmán-Morales, Jessica; Favis, Basil D; De Crescenzo, Gregory; Yakandawala, Nandadeva; Hoemann, Caroline D

    2017-08-01

    P15-CSP is a biomimetic cationic fusion peptide that stimulates osteogenesis and inhibits bacterial biofilm formation when coated on 2-D surfaces. This study tested the hypothesis that P15-CSP coatings enhance 3-D osteogenesis in a porous but otherwise hydrophobic poly-(ɛ-caprolactone) (PCL) scaffold. Scaffolds of 84 µm and 141 µm average pore size were coated or not with Layer-by-Layer polyelectrolytes followed by P15-CSP, seeded with adult primary human mesenchymal stem cells (MSCs), and cultured 10 days in proliferation medium, then 21 days in osteogenic medium. Atomic analyses showed that P15-CSP was successfully captured by LbL. After 2 days of culture, MSCs adhered and spread more on P15-CSP coated pores than PCL-only. At day 10, all constructs contained nonmineralized tissue. At day 31, all constructs became enveloped in a "skin" of tissue that, like 2-D cultures, underwent sporadic mineralization in areas of high cell density that extended into some 141 µm edge pores. By quantitative histomorphometry, 2.5-fold more tissue and biomineral accumulated in edge pores versus inner pores. P15-CSP specifically promoted tissue-scaffold integration, fourfold higher overall biomineralization, and more mineral deposits in the outer 84 µm and inner 141 µm pores than PCL-only (p pore surfaces with 3-D topography. Biomineralization deeper than 150 µm from the scaffold edge was optimally attained with the larger 141 µm peptide-coated pores. © 2017 Wiley Periodicals, Inc. J Biomed Mater Res Part A: 105A: 2171-2181, 2017. © 2017 Wiley Periodicals, Inc.

  19. Analysis of regulation and economic incentives of the hybrid CSP HYSOL

    DEFF Research Database (Denmark)

    Baldini, Mattia; Pérez, Cristian Hernán Cabrera

    2016-01-01

    The European HYSOL project, developed over the last three years in the solar thermal plant Manchasol (Ciudad Real, Spain), has been successfully completed, demonstrating that hybridisation of CSP with other energy sources (renewable and fossil) ensures power supply to the power grid in a stable...

  20. Deadlock Detection Based on Automatic Code Generation from Graphical CSP Models

    NARCIS (Netherlands)

    Jovanovic, D.S.; Liet, Geert K.; Broenink, Johannes F.; Karelse, F.

    2004-01-01

    The paper describes a way of using standard formal analysis tools for checking deadlock freedom in graphical models for CSP descriptions of concurrent systems. The models capture specification of a possible concurrent implementation of a system to be realized. Building the graphical models and

  1. Nuclear regulation. NRC's security clearance program can be strengthened

    International Nuclear Information System (INIS)

    Fultz, Keith O.; Kruslicky, Mary Ann; Bagnulo, John E.

    1988-12-01

    Because of the national security implications of its programs, the Nuclear Regulatory Commission (NRC) investigates the background of its employees and consultants as well as others to ensure that they are reliable and trustworthy. If the investigation indicates that an employee will not endanger national security, NRC grants a security clearance that allows access to classified information, material, and facilities. NRC also requires periodic checks for some clearance holders to ensure their continued clearance eligibility. The Chairman, Subcommittee on Environment, Energy, and Natural Resources, House Committee on Government Operations, asked GAO to review NRC's personnel security clearance program and assess the procedures that NRC uses to ensure that those who operate nuclear power plants do not pose a threat to the public. The Atomic Energy Act of 1954 requires NRC to conduct background investigations of its employees and consultants as well as others who have access to classified information, material, or facilities. To do this, NRC established a personnel security clearance program. Under NRC policies, a security clearance is granted after the Office of Personnel Management (OPM) or the Federal Bureau of Investigation checks the background of those applying for an NRC clearance. NRC also periodically reassesses the integrity of those holding the highest level clearance. NRC employees, consultants, contractors, and licensees as well as other federal employees hold approximately 10,600 NRC clearances. NRC does not grant clearances to commercial nuclear utility employees unless they require access to classified information or special nuclear material. However, the utilities have voluntarily established screening programs to ensure that their employees do not pose a threat to nuclear plants. NRC faces a dilemma when it hires new employees. Although its policy calls for new hires to be cleared before they start work, the security clearance process takes so long

  2. Design and prototyping of real-time systems using CSP and CML

    DEFF Research Database (Denmark)

    Rischel, Hans; Sun, Hong Yan

    1997-01-01

    A procedure for systematic design of event based systems is introduced by means of the Production Cell case study. The design is documented by CSP style processes, which allow both verification using formal techniques and also validation of a rapid prototype in the functional language CML...

  3. Enantioselective carbenoid insertion into C(sp3–H bonds

    Directory of Open Access Journals (Sweden)

    J. V. Santiago

    2016-05-01

    Full Text Available The enantioselective carbenoid insertion into C(sp3–H bonds is an important tool for the synthesis of complex molecules due to the high control of enantioselectivity in the formation of stereogenic centers. This paper presents a brief review of the early issues, related mechanistic studies and recent applications on this chemistry area.

  4. Case Study: Creation of a Degree Program in Computer Security. White Paper.

    Science.gov (United States)

    Belon, Barbara; Wright, Marie

    This paper reports on research into the field of computer security, and undergraduate degrees offered in that field. Research described in the paper reveals only one computer security program at the associate's degree level in the entire country. That program, at Texas State Technical College in Waco, is a 71-credit-hour program leading to an…

  5. Report: EPA’s National Security Information Program Could Be Improved

    Science.gov (United States)

    Report #12-P-0543, June 18, 2012. Under its classified NSI program, EPA has assigned responsibilities and provided guidance, training, and oversight. EPA program offices provide secure equipment and space, following NSI program specifications.

  6. Platinum-Catalyzed, Terminal-Selective C(sp(3))-H Oxidation of Aliphatic Amines.

    Science.gov (United States)

    Lee, Melissa; Sanford, Melanie S

    2015-10-14

    This Communication describes the terminal-selective, Pt-catalyzed C(sp(3))-H oxidation of aliphatic amines without the requirement for directing groups. CuCl2 is employed as a stoichiometric oxidant, and the reactions proceed in high yield at Pt loadings as low as 1 mol%. These transformations are conducted in the presence of sulfuric acid, which reacts with the amine substrates in situ to form ammonium salts. We propose that protonation of the amine serves at least three important roles: (i) it renders the substrates soluble in the aqueous reaction medium; (ii) it limits binding of the amine nitrogen to Pt or Cu; and (iii) it electronically deactivates the C-H bonds proximal to the nitrogen center. We demonstrate that this strategy is effective for the terminal-selective C(sp(3))-H oxidation of a variety of primary, secondary, and tertiary amines.

  7. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-03-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... discuss National [[Page 12624

  8. 33 CFR 101.125 - Approved Alternative Security Programs.

    Science.gov (United States)

    2010-07-01

    ... 106 of this subchapter, as applicable: (a) American Gaming Association Alternative Security Program..., and Towboats and Barges, dated September 24, 2003. (c) Passenger Vessel Association Industry Standards...

  9. Mise en Scene: Conversion of Scenarios to CSP Traces for the Requirements-to-Design-to-Code Project

    Science.gov (United States)

    Carter. John D.; Gardner, William B.; Rash, James L.; Hinchey, Michael G.

    2007-01-01

    The "Requirements-to-Design-to-Code" (R2D2C) project at NASA's Goddard Space Flight Center is based on deriving a formal specification expressed in Communicating Sequential Processes (CSP) notation from system requirements supplied in the form of CSP traces. The traces, in turn, are to be extracted from scenarios, a user-friendly medium often used to describe the required behavior of computer systems under development. This work, called Mise en Scene, defines a new scenario medium (Scenario Notation Language, SNL) suitable for control-dominated systems, coupled with a two-stage process for automatic translation of scenarios to a new trace medium (Trace Notation Language, TNL) that encompasses CSP traces. Mise en Scene is offered as an initial solution to the problem of the scenarios-to-traces "D2" phase of R2D2C. A survey of the "scenario" concept and some case studies are also provided.

  10. Initial Investigation into the Potential of CSP Industrial Process Heat for the Southwest United States

    Energy Technology Data Exchange (ETDEWEB)

    Kurup, Parthiv [National Renewable Energy Lab. (NREL), Golden, CO (United States); Turchi, Craig [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2015-11-01

    After significant interest in the 1970s, but relatively few deployments, the use of solar technologies for thermal applications, including enhanced oil recovery (EOR), desalination, and industrial process heat (IPH), is again receiving global interest. In particular, the European Union (EU) has been a leader in the use, development, deployment, and tracking of Solar Industrial Process Heat (SIPH) plants. The objective of this study is to ascertain U.S. market potential of IPH for concentrating collector technologies that have been developed and promoted through the U.S. Department of Energy's Concentrating Solar Power (CSP) Program. For this study, the solar-thermal collector technologies of interest are parabolic trough collectors (PTCs) and linear Fresnel (LF) systems.

  11. The Climate Services Partnership (CSP): Working Together to Improve Climate Services Worldwide

    Science.gov (United States)

    Zebiak, S.; Brasseur, G.; Members of the CSP Coordinating Group

    2012-04-01

    Throughout the world, climate services are required to address urgent needs for climate-informed decision-making, policy and planning. These needs were explored in detail at the first International Conference on Climate Services (ICCS), held in New York in October 2011. After lengthy discussions of needs and capabilities, the conference culminated in the creation of the Climate Services Partnership (CSP). The CSP is an informal interdisciplinary network of climate information users, providers, donors and researchers interested in improving the provision and development of climate services worldwide. Members of the Climate Services Partnership work together to share knowledge, accelerate learning, develop new capacities, and establish good practices. These collaborative efforts will inform and support the evolution and implementation of the Global Framework for Climate Services. The Climate Services Partnership focuses its efforts on three levels. These include: 1. encouraging and sustaining connections between climate information providers, users, donors, and researchers 2. gathering, synthesizing and disseminating current knowledge on climate services by way of an online knowledge management platform 3. generating new knowledge on critical topics in climate service development and provision, through the creation of focused working groups on specific topics To date, the Climate Services Partnership has made progress on all three fronts. Connections have been fostered through outreach at major international conferences and professional societies. The CSP also maintains a website and a monthly newsletter, which serves as a resource for those interested in climate services. The second International Conference on Climate Services (ICCS2) will be held in Berlin in September. The CSP has also created a knowledge capture system that gathers and disseminates a wide range of information related to the development and provision of climate services. This includes an online

  12. Nuclear security. DOE actions to improve the personnel clearance program

    International Nuclear Information System (INIS)

    Fultz, Keith O.; Bannerman, Carl J.; Daniel, Beverly A.

    1988-11-01

    The status of the Department of Energy's (DOE) implementation of recommendations in our two reports on DOE's personnel security clearance program was determined. The recommendations were aimed at improving the timeliness, accuracy, and efficiency of personnel security clearance decisions. Specifically, the objective was to determine and report on steps DOE is taking to implement these recommendations. In summary, it was found that DOE has either initiated action or is studying ways to address all the recommendations, but none of the recommendations have been completely implemented. The effectiveness of the DOE actions will depend, in part, on the adequacy of its internal control system for overseeing and evaluating program operations. DOE's personnel security clearance program is intended to provide reasonable assurance that personnel with access to classified information and materials are trustworthy. The Department requests that the Office of Personnel Management or the Federal Bureau of Investigation collect personal data on each person who requires such access to do his or her job. Based on these background investigations, DOE officials authorize individuals whose personal histories indicate that they are trustworthy to have access to classified information, secured facilities, and controlled materials as needed to perform their jobs. DOE has five types of these authorizations or personnel security clearances and must update information on personnel holding each type at 5-year intervals to confirm their continuing reliability. The five types are based on the types of security interests to which the person needs access, e.g., persons needing nuclear weapons-related data must have a Q clearance, and persons with a top secret clearance can have access to national security data classified as top secret

  13. Ethanol steam reforming heated up by molten salt CSP : reactor assessment

    NARCIS (Netherlands)

    Falco, de M.; Gallucci, F.

    2010-01-01

    In this paper hydrogen production via reforming of ethanol has been studied in a novel hybrid plant consisting in a ethanol reformer and a concentrating solar power (CSP) plant using molten salt as heat carrier fluid. The heat needed for the reforming of ethanol has been supplied to the system by

  14. Ethanol steam reforming heated up by molten salt CSP: Reactor assessment

    NARCIS (Netherlands)

    De Falco, Marcello; Gallucci, F.

    2010-01-01

    In this paper hydrogen production via reforming of ethanol has been studied in a novel hybrid plant consisting in a ethanol reformer and a concentrating solar power (CSP) plant using molten salt as heat carrier fluid. The heat needed for the reforming of ethanol has been supplied to the system by

  15. Building effective cybersecurity programs a security manager's handbook

    CERN Document Server

    Schreider, Tari

    2017-01-01

    You know by now that your company could not survive without the Internet. Not in today's market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program? Tari Schreider, in Building Effective Cybersecurity Programs: A Security Manager's Handbook, lays out the step-by-step roadmap to follow as you build or enhance your cybersecurity program.

  16. 75 FR 82037 - National Protection and Programs Directorate; President's National Security Telecommunications...

    Science.gov (United States)

    2010-12-29

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0050] National Protection and Programs Directorate; President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC...

  17. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    International Nuclear Information System (INIS)

    Madden, Michael S.

    2010-01-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  18. Evaluation Report on The Department's Unclassified Cyber Security Program - 2009

    International Nuclear Information System (INIS)

    Anon

    2009-01-01

    Industry experts report that security challenges and threats are continually evolving as malicious activity has become more web-based and attackers are able to rapidly adapt their attack methods. In addition, the number of data breaches continues to rise. In an effort to mitigate and address threats and protect valuable information, the Department of Energy anticipated spending about $275 million in Fiscal Year (FY) 2009 to implement cyber security measures necessary to protect its information technology resources. These systems and data are designed to support the Department's mission and business lines of energy security, nuclear security, scientific discovery and innovation, and environmental responsibility. The Federal Information Security Management Act of 2002 (FISMA) provides direction to agencies on the management and oversight of information security risks, including design and implementation of controls to protect Federal information and systems. As required by FISMA, the Office of Inspector General conducts an annual independent evaluation to determine whether the Department's unclassified cyber security program adequately protects its information systems and data. This memorandum and the attached report present the results of our evaluation for FY 2009. The Department continued to make incremental improvements in its unclassified cyber security program. Our evaluation disclosed that most sites had taken action to address weaknesses previously identified in our FY 2008 evaluation report. They improved certification and accreditation of systems; strengthened configuration management of networks and systems; performed independent assessments; and, developed and/or refined certain policies and procedures. In addition, the Department instituted a centralized incident response organization designed to eliminate duplicative efforts throughout the Department. As we have noted in previous reports, the Department continued to maintain strong network perimeter

  19. A Domain-Specific Programming Language for Secure Multiparty Computation

    DEFF Research Database (Denmark)

    Nielsen, Janus Dam; Schwartzbach, Michael Ignatieff

    2007-01-01

    We present a domain-specific programming language for Secure Multiparty Computation (SMC). Information is a resource of vital importance and considerable economic value to individuals, public administration, and private companies. This means that the confidentiality of information is crucial...... on secret values and results are only revealed according to specific protocols. We identify the key linguistic concepts of SMC and bridge the gap between high-level security requirements and low-level cryptographic operations constituting an SMC platform, thus improving the efficiency and security of SMC...

  20. Gene expression programming for power system static security ...

    African Journals Online (AJOL)

    user

    Keywords: static security, gene expression programming, probabilistic neural network ... Hence digital computers are usually installed in operations control centers to gather ...... power system protection, and applications of AI in power systems.

  1. Homeland Security Education: Managerial versus Nonmanagerial Market Perspectives of an Academic Program

    Science.gov (United States)

    Doss, Daniel; Henley, Russ; McElreath, David; Lackey, Hilliard; Jones, Don; Gokaraju, Balakrishna; Sumrall, William

    2016-01-01

    The authors discuss the findings of a market study that preceded the offering of an academic program in homeland security. The university disseminated a mail survey to gain data for analysis of variance testing of several hypotheses regarding market perceptions of the intended homeland security program offering. Stratification involved segregating…

  2. 76 FR 34732 - Privacy Act of 1974; Department of Homeland Security/National Protection and Programs Directorate...

    Science.gov (United States)

    2011-06-14

    ... 1974; Department of Homeland Security/National Protection and Programs Directorate--002 Chemical... Homeland Security/National Protection and Programs Directorate--002 Chemical Facility Anti-Terrorism.... 552a, the Department of Homeland Security (DHS)/National Protection and Programs Directorate (NPPD...

  3. The National Security Education Program and Its Service Requirement: An Exploratory Study of What Areas of Government and for What Duration National Security Education Program Recipients Have Worked

    Science.gov (United States)

    Comp, David J.

    2013-01-01

    The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…

  4. Villacidro solar demo plant: Integration of small-scale CSP and biogas power plants in an industrial microgrid

    Science.gov (United States)

    Camerada, M.; Cau, G.; Cocco, D.; Damiano, A.; Demontis, V.; Melis, T.; Musio, M.

    2016-05-01

    The integration of small scale concentrating solar power (CSP) in an industrial district, in order to develop a microgrid fully supplied by renewable energy sources, is presented in this paper. The plant aims to assess in real operating conditions, the performance, the effectiveness and the reliability of small-scale concentrating solar power technologies in the field of distributed generation. In particular, the potentiality of small scale CSP with thermal storage to supply dispatchable electricity to an industrial microgrid will be investigated. The microgrid will be realized in the municipal waste treatment plant of the Industrial Consortium of Villacidro, in southern Sardinia (Italy), which already includes a biogas power plant. In order to achieve the microgrid instantaneous energy balance, the analysis of the time evolution of the waste treatment plant demand and of the generation in the existing power systems has been carried out. This has allowed the design of a suitable CSP plant with thermal storage and an electrochemical storage system for supporting the proposed microgrid. At the aim of obtaining the expected energy autonomy, a specific Energy Management Strategy, which takes into account the different dynamic performances and characteristics of the demand and the generation, has been designed. In this paper, the configuration of the proposed small scale concentrating solar power (CSP) and of its thermal energy storage, based on thermocline principle, is initially described. Finally, a simulation study of the entire power system, imposing scheduled profiles based on weather forecasts, is presented.

  5. Construction safety program for the National Ignition Facility

    International Nuclear Information System (INIS)

    Cerruti, S.J.

    1997-01-01

    The Construction Safety Program (CSP) for NIF sets forth the responsibilities, guidelines, rules, policies and regulations for all workers involved in the construction, special equipment installation, acceptance testing, and initial activation and operation of NIF at LLNL during the construction period of NIF. During this period, all workers are required to implement measures to create a universal awareness which promotes safe practice at the work site, and which will achieve NIF's management objectives in preventing accidents and illnesses. Construction safety for NIF is predicated on everyone performing their jobs in a manner which prevents job-related disabling injuries and illnesses. The CSP outlines the minimum environment, safety, and health (ES ampersand H) standards, LLNL policies and the Construction Industry Institute (CII) Zero Injury Techniques requirements that all workers at the NIF construction site shall adhere to during the construction period of NIF. It identifies the safety requirements which the NIF organizational Elements, construction contractors and construction subcontractors must include in their safety plans for the construction period of NIF, and presents safety protocols and guidelines which workers shall follow to assure a safe and healthful work environment. The CSP also identifies the ES ampersand H responsibilities of LLNL employees, non-LLNL employees, construction contractors, construction subcontractors, and various levels of management within the NIF Program at LLNL. In addition, the CSP contains the responsibilities and functions of ES ampersand H support organizations and administrative groups, and describes their interactions with the NIF Program

  6. Construction safety program for the National Ignition Facility

    Energy Technology Data Exchange (ETDEWEB)

    Cerruti, S.J.

    1997-01-01

    The Construction Safety Program (CSP) for NIF sets forth the responsibilities, guidelines, rules, policies and regulations for all workers involved in the construction, special equipment installation, acceptance testing, and initial activation and operation of NIF at LLNL during the construction period of NIF. During this period, all workers are required to implement measures to create a universal awareness which promotes safe practice at the work site, and which will achieve NIF`s management objectives in preventing accidents and illnesses. Construction safety for NIF is predicated on everyone performing their jobs in a manner which prevents job-related disabling injuries and illnesses. The CSP outlines the minimum environment, safety, and health (ES&H) standards, LLNL policies and the Construction Industry Institute (CII) Zero Injury Techniques requirements that all workers at the NIF construction site shall adhere to during the construction period of NIF. It identifies the safety requirements which the NIF organizational Elements, construction contractors and construction subcontractors must include in their safety plans for the construction period of NIF, and presents safety protocols and guidelines which workers shall follow to assure a safe and healthful work environment. The CSP also identifies the ES&H responsibilities of LLNL employees, non-LLNL employees, construction contractors, construction subcontractors, and various levels of management within the NIF Program at LLNL. In addition, the CSP contains the responsibilities and functions of ES&H support organizations and administrative groups, and describes their interactions with the NIF Program.

  7. GEOTHERMAL / SOLAR HYBRID DESIGNS: USE OF GEOTHERMAL ENERGY FOR CSP FEEDWATER HEATING

    Energy Technology Data Exchange (ETDEWEB)

    Craig Turchi; Guangdong Zhu; Michael Wagner; Tom Williams; Dan Wendt

    2014-10-01

    This paper examines a hybrid geothermal / solar thermal plant design that uses geothermal energy to provide feedwater heating in a conventional steam-Rankine power cycle deployed by a concentrating solar power (CSP) plant. The geothermal energy represents slightly over 10% of the total thermal input to the hybrid plant. The geothermal energy allows power output from the hybrid plant to increase by about 8% relative to a stand-alone CSP plant with the same solar-thermal input. Geothermal energy is converted to electricity at an efficiency of 1.7 to 2.5 times greater than would occur in a stand-alone, binary-cycle geothermal plant using the same geothermal resource. While the design exhibits a clear advantage during hybrid plant operation, the annual advantage of the hybrid versus two stand-alone power plants depends on the total annual operating hours of the hybrid plant. The annual results in this draft paper are preliminary, and further results are expected prior to submission of a final paper.

  8. 78 FR 31955 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2013-05-28

    ... 1974; Department of Homeland Security National Protection and Programs Directorate--001 Arrival and... of records titled Department of Homeland Security/National Protection and Programs Directorate--001... of 1974, 5 U.S.C. 552a, the Department of Homeland Security (DHS) National Protection and Programs...

  9. Establishing cyber security programs for I and C systems at nuclear facilities

    International Nuclear Information System (INIS)

    Waedt, Karl

    2012-01-01

    In recent years, across the international nuclear community, cyber security issues have quickly gained significant attention from safety authorities and plant designers alike. This increased attention was accelerated by news of the Stuxnet virus, which impaired control systems at Iranian nuclear facilities in 2010, but is also fueled by regular news about cyber security breaches of data systems at large business corporations. This paper discusses key aspects of establishing a cyber security program for Instrumentation and Control (I and C) systems at a nuclear facility, and identifies inherent aspects of nuclear power plant (NPP) design, that differentiate the needs of such a cyber security program from those of typical corporate data systems. (orig.)

  10. Establishing cyber security programs for I and C systems at nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Waedt, Karl [AREVA NP GmbH (Germany)

    2012-11-01

    In recent years, across the international nuclear community, cyber security issues have quickly gained significant attention from safety authorities and plant designers alike. This increased attention was accelerated by news of the Stuxnet virus, which impaired control systems at Iranian nuclear facilities in 2010, but is also fueled by regular news about cyber security breaches of data systems at large business corporations. This paper discusses key aspects of establishing a cyber security program for Instrumentation and Control (I and C) systems at a nuclear facility, and identifies inherent aspects of nuclear power plant (NPP) design, that differentiate the needs of such a cyber security program from those of typical corporate data systems. (orig.)

  11. Resources available for applying metrics in security and safety programming.

    Science.gov (United States)

    Luizzo, Anthony

    2016-01-01

    Incorporating metrics into security surveys has been championed as a better way of substantiating program-related effectiveness and expenditures. Although security surveys have been aroundfor well over 40 years, rarely, if ever, have metric-related strategies been part of the equation, the author says. In this article, he cites several published articles and research findings available to security professionals and their surveyors that may give them the expertise and confidence they need to make use of this valuable tool.

  12. 15 CFR 2008.16 - Security education program.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Security education program. 2008.16 Section 2008.16 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF THE UNITED STATES TRADE...

  13. How the Office of Safeguards and Security Technology development program facilitates safeguarding and securing the DOE complex

    International Nuclear Information System (INIS)

    Smoot, W.

    1995-01-01

    The technology development program's (TDP's) mission is to provide technologies or methodologies that address safeguards and security requirements throughout the U.S. DOE complex as well as to meet headquarters' policy needs. This includes developing state-of-the-art technologies or modifying existing technologies in physical security, material control and accountability, information security, and integrated safeguards systems. The TDP has an annual process during which it solicits user requirements from the field. These requirements are analyzed by DOE headquarters and laboratory personnel for technical merit. The requirements are then prioritized at headquarters, and the highest priorities are incorporated into our budget. Although this user-needs process occurs formally once a year, user requirements are accepted at any time. The status of funded technologies is communicated through briefings, programs reviews, and various documents that are available to all interested parties. Participants in several interagency groups allows our program to benefit from what others are doing and to prevent duplications of efforts throughout the federal community. Many technologies are transferred to private industry

  14. Co-generation and innovative heat storage systems in small-medium CSP plants for distributed energy production

    Science.gov (United States)

    Giaconia, Alberto; Montagnino, Fabio; Paredes, Filippo; Donato, Filippo; Caputo, Giampaolo; Mazzei, Domenico

    2017-06-01

    CSP technologies can be applied for distributed energy production, on small-medium plants (on the 1 MW scale), to satisfy the needs of local communities, buildings and districts. In this perspective, reliable, low-cost, and flexible small/medium multi-generative CSP plants should be developed. Four pilot plants have been built in four Mediterranean countries (Cyprus, Egypt, Jordan, and Italy) to demonstrate the approach. In this paper, the plant built in Italy is presented, with specific innovations applied in the linear Fresnel collector design and the Thermal Energy Storage (TES) system, based on a single the use of molten salts but specifically tailored for small scale plants.

  15. Platinum-Catalyzed Terminal-Selective C(sp3)–H Oxidation of Aliphatic Amines

    Science.gov (United States)

    Lee, Melissa; Sanford, Melanie S.

    2016-01-01

    This paper describes the terminal-selective Pt-catalyzed C(sp3)–H oxidation of aliphatic amines without the requirement for directing groups. CuCl2 is employed as a stoichiometric oxidant, and the reactions proceed in high yield at Pt loadings as low as 1 mol %. These transformations are conducted in the presence of sulfuric acid, which reacts with the amine substrates in situ to form ammonium salts. We propose that protonation of the amine serves at least three important roles: (i) it renders the substrates soluble in the aqueous reaction medium; (ii) it limits binding of the amine nitrogen to Pt or Cu; and (ii) it electronically deactivates the C–H bonds proximal to the nitrogen center. We demonstrate that this strategy is effective for the terminal-selective C(sp3)–H oxidation of a variety of primary, secondary and tertiary amines. PMID:26439251

  16. Climate schools plus: An online, combined student and parent, universal drug prevention program

    Directory of Open Access Journals (Sweden)

    Louise K. Thornton

    2018-06-01

    Full Text Available Early initiation of substance use significantly increases one's risk of developing substance use dependence and mental disorders later in life. To interrupt this trajectory, effective prevention during the adolescent period is critical. Parents play a key role in preventing substance use and related harms among adolescents and parenting interventions have been identified as critical components of effective prevention programs. Despite this, there is currently no substance use prevention program targeting both students and parents that adopts online delivery to overcome barriers to implementation and sustainability. The Climate Schools Plus (CSP program was developed to meet this need. CSP is an online substance use prevention program for students and parents, based on the effective Climate Schools prevention program for students. This paper describes the development of the parent component of CSP including a literature review and results of a large scoping survey of parents of Australian high school students (n = 242. This paper also includes results of beta-testing of the developed program with relevant experts (n = 10, and parents of Australian high school students (n = 15. The CSP parent component consists of 1 a webinar which introduces shared rule ranking, 2 online modules and 3 summaries of student lessons. The parent program targets evidence-based modifiable factors associated with a delay in the onset of adolescent substance use and/or lower levels of adolescent substance use in the future; namely, rule-setting, monitoring, and modelling. To date, this is the first combined parent-student substance use prevention program to adopt an online delivery method. Keywords: Development, Prevention, Adolescent, Alcohol, Parent

  17. 48 CFR 2804.470 - Contractor Personnel Security Program.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Contractor Personnel Security Program. 2804.470 Section 2804.470 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE General ADMINISTRATIVE MATTERS Safeguarding Classified Information Within Industry 2804.470 Contractor...

  18. Effectiveness of the Civil Aviation Security Program.

    Science.gov (United States)

    1978-03-31

    Passenger Screening Results 12. Scope of Civil Aviation Security Program 13. Basic Policies 14. Explosives Detection Dog Teams 15. Explosives Detection... policies guiding the program recognize airline responsibilities for the safety of passengers, baggage and cargo in their care as well as for the...U *i * (U U Los -7 .cn cf) 1-4 ~~LL _m e- Hf LMU 0- u,-C -oL -ccJLL LII -~ LLIOL 0 _ CL. LLJ cr-L LCnIJ C ~ ~ CnCD C. ) &j 2ic- nc r JL AJ -L JC C.- L

  19. The Potential of Coconut Shell Powder (CSP) and Coconut Shell Activated Carbon (CSAC) Composites as Electromagnetic Interference (EMI) Absorbing Material

    International Nuclear Information System (INIS)

    Siti Nurbazilah Abdul Jabal; Seok, Y.B.; Hoon, W.F.

    2016-01-01

    Agriculture waste is potentially useful as an alternative material to absorb and attenuate electromagnetic interference (EMI). This research highlights the use of coconut shell powder (CSP) and coconut shell activated carbon (CSAC) as raw materials with epoxy resin and amine hardener composite to absorb microwave signals over frequency of 1 - 8 GHz. In order to investigate the suitability of these raw materials as EMI absorbing material, carbon composition of the raw materials is determined through CHNS Elemental Analysis. The surface morphology of the raw materials in term of porosity is investigated by using TM3000 Scanning Electron Microscope (SEM). The complex permittivity of the composites is determined by using high temperature dielectric probe in conjunction with Network Analyzer. From the result, the Carbon% of CSP and CSAC is 46.70 % and 84.28 % respectively. In term of surface morphology, the surface porosity of CSP and CSAC is in the range of 2 μm and 1 μm respectively. For the dielectric properties, the dielectric constant and the dielectric loss factor for CSP and CSAC is 4.5767 and 64.8307 and 1.2144 and 13.8296 respectively. The materials more potentially useful as substitute materials for electromagnetic interference (EMI) absorbing are discussed. (author)

  20. Iridium complexes containing mesoionic C donors: selective C(sp3)-H versus C(sp2)-H bond activation, reactivity towards acids and bases, and catalytic oxidation of silanes and water.

    Science.gov (United States)

    Petronilho, Ana; Woods, James A; Mueller-Bunz, Helge; Bernhard, Stefan; Albrecht, Martin

    2014-11-24

    Metalation of a C2-methylated pyridylimidazolium salt with [IrCp*Cl2]2 affords either an ylidic complex, resulting from C(sp(3))-H bond activation of the C2-bound CH3 group if the metalation is performed in the presence of a base, such as AgO2 or Na2CO3, or a mesoionic complex via cyclometalation and thermally induced heterocyclic C(sp(2))-H bond activation, if the reaction is performed in the absence of a base. Similar cyclometalation and complex formation via C(sp(2))-H bond activation is observed when the heterocyclic ligand precursor consists of the analogous pyridyltriazolium salt, that is, when the metal bonding at the C2 position is blocked by a nitrogen rather than a methyl substituent. Despite the strongly mesoionic character of both the imidazolylidene and the triazolylidene, the former reacts rapidly with D(+) and undergoes isotope exchange at the heterocyclic C5 position, whereas the triazolylidene ligand is stable and only undergoes H/D exchange under basic conditions, where the imidazolylidene is essentially unreactive. The high stability of the Ir-C bond in aqueous solution over a broad pH range was exploited in catalytic water oxidation and silane oxidation. The catalytic hydrosilylation of ketones proceeds with turnover frequencies as high as 6,000 h(-1) with both the imidazolylidene and the triazolylidene system, whereas water oxidation is enhanced by the stronger donor properties of the imidazol-4-ylidene ligands and is more than three times faster than with the triazolylidene analogue. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  1. 75 FR 31609 - Conservation Stewardship Program

    Science.gov (United States)

    2010-06-03

    ... producers who are members of the protected groups have participated in NRCS conservation programs at parity..., color, national origin, gender, sex, or disability status. Therefore, the CSP rule portends no adverse...

  2. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    Energy Technology Data Exchange (ETDEWEB)

    Crawford,C.; de Boer,G.; De Castro, K; Landers, Ph.D., J; Rogers, E

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." This paper will describe some of the key elements of a comprehensive, sustainable nuclear security culture enhancement program and how implementation can mitigate the insider threat.

  3. Nevada National Security Site Radiation Protection Program

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2013-04-30

    Title 10 Code of Federal Regulations (CFR) Part 835, “Occupational Radiation Protection,” establishes radiation protection standards, limits, and program requirements for protecting individuals from ionizing radiation resulting from the conduct of U.S. Department of Energy (DOE) activities. 10 CFR 835.101(a) mandates that DOE activities be conducted in compliance with a documented Radiation Protection Program (RPP) as approved by DOE. This document promulgates the RPP for the Nevada National Security Site (NNSS), related (on-site or off-site) U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) operations, and environmental restoration off-site projects. This RPP section consists of general statements that are applicable to the NNSS as a whole. The RPP also includes a series of appendices which provide supporting detail for the associated NNSS Tennant Organizations (TOs). Appendix H, “Compliance Demonstration Table,” contains a cross-walk for the implementation of 10 CFR 835 requirements. This RPP does not contain any exemptions from the established 10 CFR 835 requirements. The RSPC and TOs are fully compliant with 10 CFR 835 and no additional funding is required in order to meet RPP commitments. No new programs or activities are needed to meet 10 CFR 835 requirements and there are no anticipated impacts to programs or activities that are not included in the RPP. There are no known constraints to implementing the RPP. No guides or technical standards are adopted in this RPP as a means to meet the requirements of 10 CFR 835.

  4. Thermal energy storage for CSP (Concentrating Solar Power)

    Science.gov (United States)

    Py, Xavier; Sadiki, Najim; Olives, Régis; Goetz, Vincent; Falcoz, Quentin

    2017-07-01

    The major advantage of concentrating solar power before photovoltaic is the possibility to store thermal energy at large scale allowing dispatchability. Then, only CSP solar power plants including thermal storage can be operated 24 h/day using exclusively the solar resource. Nevertheless, due to a too low availability in mined nitrate salts, the actual mature technology of the two tanks molten salts cannot be applied to achieve the expected international share in the power production for 2050. Then alternative storage materials are under studies such as natural rocks and recycled ceramics made from industrial wastes. The present paper is a review of those alternative approaches.

  5. Thermal energy storage for CSP (Concentrating Solar Power

    Directory of Open Access Journals (Sweden)

    Py Xavier

    2017-01-01

    Full Text Available The major advantage of concentrating solar power before photovoltaic is the possibility to store thermal energy at large scale allowing dispatchability. Then, only CSP solar power plants including thermal storage can be operated 24 h/day using exclusively the solar resource. Nevertheless, due to a too low availability in mined nitrate salts, the actual mature technology of the two tanks molten salts cannot be applied to achieve the expected international share in the power production for 2050. Then alternative storage materials are under studies such as natural rocks and recycled ceramics made from industrial wastes. The present paper is a review of those alternative approaches.

  6. A Case Study on Cyber-security Program for the Programmable Logic Controller of Modern NPPs

    International Nuclear Information System (INIS)

    Song, S. H.; Lee, M. S.; Kim, T. H.; Park, C. H.; Park, S. P.; Kim, H. S.

    2014-01-01

    As instrumentation and control (I and C) systems for modern Nuclear Power Plants (NPPs) have been digitalized to cope with their growing complexity, the cyber-security has become an important issue. To protect the I and C systems adequately from cyber threats, such as Stuxnet that attacked Iran's nuclear facilities, regulations of many countries require a cyber-security program covering all the life cycle phases of the system development, from the concept to the retirement. This paper presents a case study of cyber-security program that has been performed during the development of the programmable logic controller (PLC) for modern NPPs of Korea. In the case study, a cyber-security plan, including technical, management, and operational controls, was established through a security risk assessment. Cyber-security activities, such as development of security functions and periodic inspections, were conducted according to the plan: the security functions were applied to the PLC as the technical controls, and periodic inspections and audits were held to check the security of the development environment, as the management and operational controls. A final penetration test was conducted to inspect all the security problems that had been issued during the development. The case study has shown that the systematic cyber-security program detected and removed the vulnerabilities of the target system, which could not be found otherwise, enhancing the cyber-security of the system

  7. A Case Study on Cyber-security Program for the Programmable Logic Controller of Modern NPPs

    Energy Technology Data Exchange (ETDEWEB)

    Song, S. H. [Korea University, Seoul (Korea, Republic of); Lee, M. S.; Kim, T. H. [Formal Work Inc., Seoul (Korea, Republic of); Park, C. H. [LINE Corp., Tokyo (Japan); Park, S. P. [Ahnlab Inc., Seoul (Korea, Republic of); Kim, H. S. [Sejong University, Seoul (Korea, Republic of)

    2014-08-15

    As instrumentation and control (I and C) systems for modern Nuclear Power Plants (NPPs) have been digitalized to cope with their growing complexity, the cyber-security has become an important issue. To protect the I and C systems adequately from cyber threats, such as Stuxnet that attacked Iran's nuclear facilities, regulations of many countries require a cyber-security program covering all the life cycle phases of the system development, from the concept to the retirement. This paper presents a case study of cyber-security program that has been performed during the development of the programmable logic controller (PLC) for modern NPPs of Korea. In the case study, a cyber-security plan, including technical, management, and operational controls, was established through a security risk assessment. Cyber-security activities, such as development of security functions and periodic inspections, were conducted according to the plan: the security functions were applied to the PLC as the technical controls, and periodic inspections and audits were held to check the security of the development environment, as the management and operational controls. A final penetration test was conducted to inspect all the security problems that had been issued during the development. The case study has shown that the systematic cyber-security program detected and removed the vulnerabilities of the target system, which could not be found otherwise, enhancing the cyber-security of the system.

  8. DOD/COCOM Water Security Program Strategy Document

    Science.gov (United States)

    2011-04-22

    treatment and disposal. DOD/COCOM Water Security Program Strategy 22 18. Toxic Minerals In regions where there are naturally occurring unsafe...surface hydrologic observations using remote sensing to provide data on precipitation, radiation, temperature, soil moisture, groundwater, snowcover...habitat alteration and aquaculture . 13. Centers for Disease Control (CDC) Works with partners throughout the nation and the world to monitor health

  9. Rhodium(III)-Catalyzed Activation of C(sp3)-H Bonds and Subsequent Intermolecular Amidation at Room Temperature.

    Science.gov (United States)

    Huang, Xiaolei; Wang, Yan; Lan, Jingbo; You, Jingsong

    2015-08-03

    Disclosed herein is a Rh(III)-catalyzed chelation-assisted activation of unreactive C(sp3)-H bonds, thus enabling an intermolecular amidation to provide a practical and step-economic route to 2-(pyridin-2-yl)ethanamine derivatives. Substrates with other N-donor groups are also compatible with the amidation. This protocol proceeds at room temperature, has a relatively broad functional-group tolerance and high selectivity, and demonstrates the potential of rhodium(III) in the promotive functionalization of unreactive C(sp3)-H bonds. A rhodacycle having a SbF6(-) counterion was identified as a plausible intermediate. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  10. 44 CFR 8.3 - Senior FEMA official responsible for the information security program.

    Science.gov (United States)

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Senior FEMA official... Senior FEMA official responsible for the information security program. The Director of the Security Division, has been designated as the senior official to direct and administer the FEMA information security...

  11. Further structural insights into the binding of complement factor H by complement regulator-acquiring surface protein 1 (CspA) of Borrelia burgdorferi

    International Nuclear Information System (INIS)

    Caesar, Joseph J. E.; Wallich, Reinhard; Kraiczy, Peter; Zipfel, Peter F.; Lea, Susan M.

    2013-01-01

    B. burgdorferi binds complement factor H using a dimeric surface protein, CspA (BbCRASP-1). Presented here is a new structure of CspA that suggests that there is a degree of flexibility between subunits which may have implications for complement regulator binding. Borrelia burgdorferi has evolved many mechanisms of evading the different immune systems across its range of reservoir hosts, including the capture and presentation of host complement regulators factor H and factor H-like protein-1 (FHL-1). Acquisition is mediated by a family of complement regulator-acquiring surface proteins (CRASPs), of which the atomic structure of CspA (BbCRASP-1) is known and shows the formation of a homodimeric species which is required for binding. Mutagenesis studies have mapped a putative factor H binding site to a cleft between the two subunits. Presented here is a new atomic structure of CspA which shows a degree of flexibility between the subunits which may be critical for factor H scavenging by increasing access to the binding interface and allows the possibility that the assembly can clamp around the bound complement regulators

  12. The effectiveness of online gaming as part of a security awareness program

    CSIR Research Space (South Africa)

    Labuschagne, WA

    2014-07-01

    Full Text Available the human element whose actions can be considered as erratic and unpredictable thus posing a threat to the security of the organization. Security awareness programs aim to equip users of cyberspace with the necessary knowledge to identify and mitigate...

  13. What is Security? A perspective on achieving security

    Energy Technology Data Exchange (ETDEWEB)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  14. Report: Fiscal Year 2006 Federal Information Security Management Act Report Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #2006-S-00008, September 25, 2006. Although the Agency has made substantial progress to improve its security program, the OIG identified weaknesses in the Agency’s incident reporting practices.

  15. Selective C(sp3)−H aerobic oxidation enabled by decatungstate photocatalysis in flow

    NARCIS (Netherlands)

    Laudadio, G.; Govaerts, S.; Wang, Y.; Ravelli, D.; Koolman, H.; Fagnoni, M.; Djuric, S.; Noel, T.

    2018-01-01

    A mild and selective C(sp3)−H aerobic oxidation enabled by decatungstate photocatalysis has been developed. The reaction can be significantly improved in a microflow reactor enabling the safe use of oxygen and enhanced irradiation of the reaction mixture. Our method allows for the oxidation of both

  16. Report: Fiscal Year 2015 Federal Information Security Modernization Act Report: Status of CSB’s Information Security Program

    Science.gov (United States)

    Report #16-P-0086, January 27, 2016. The effectiveness of the CSB’s information security program is challenged by its lack of personal identity verification cards for logical access, complete system inventory.

  17. Report: EPA’s Information Security Program Is Established, but Improvements Are Needed to Strengthen Its Processes

    Science.gov (United States)

    Report #18-P-0031, October 30, 2017. Although the EPA has an effective information security program, management emphasis is needed to achieve a higher level of maturity for the agency’s information security program.

  18. Atropisomerism about aryl-Csp(3) bonds: the electronic and steric influence of ortho-substituents on conformational exchange in cannabidiol and linderatin derivatives.

    Science.gov (United States)

    Berber, Hatice; Lameiras, Pedro; Denhez, Clément; Antheaume, Cyril; Clayden, Jonathan

    2014-07-03

    Terpenylation reactions of substituted phenols were used to prepare cannabidiol and linderatin derivatives, and their structure and conformational behavior in solution were investigated by NMR and, for some representative examples, by DFT. VT-NMR spectra and DFT calculations were used to determine the activation energies of the conformational change arising from restricted rotation about the aryl-Csp(3) bond that lead to two unequally populated rotameric epimers. The NBO calculation was applied to explain the electronic stabilization of one conformer over another by donor-acceptor charge transfer interactions. Conformational control arises from a combination of stereoelectronic and steric effects between substituents in close contact with each other on the two rings of the endocyclic epoxide atropisomers. This study represents the first exploration of the stereoelectronic origins of atropisomerism around C(sp(2))-C(sp(3)) single bonds through theoretical calculations.

  19. Strong tobacco control program requirements and secure funding are not enough: lessons from Florida.

    Science.gov (United States)

    Kennedy, Allison; Sullivan, Sarah; Hendlin, Yogi; Barnes, Richard; Glantz, Stanton

    2012-05-01

    Florida's Tobacco Pilot Program (TPP; 1998-2003), with its edgy Truth media campaign, achieved unprecedented youth smoking reductions and became a model for tobacco control programming. In 2006, 3 years after the TPP was defunded, public health groups restored funding for tobacco control programming by convincing Florida voters to amend their constitution. Despite the new program's strong legal structure, Governor Charlie Crist's Department of Health implemented a low-impact program. Although they secured the program's strong structure and funding, Florida's nongovernmental public health organizations did not mobilize to demand a high-impact program. Implementation of Florida's Amendment 4 demonstrates that a strong programmatic structure and secure funding are insufficient to ensure a successful public health program, without external pressure from nongovernmental groups.

  20. INFORMATION SECURITY RISKS OPTIMIZATION IN CLOUDY SERVICES ON THE BASIS OF LINEAR PROGRAMMING

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2013-01-01

    Full Text Available The paper discusses theoretical aspects of secure cloud services creation for information processing of various confidentiality degrees. A new approach to the reasoning of information security composition in distributed computing structures is suggested, presenting the problem of risk assessment as an extreme problem of decisionmaking. Linear programming method application is proved to minimize the risk of information security for given performance security in compliance with the economic balance for the maintenance of security facilities and cost of services. An example is given to illustrate the obtained theoretical results.

  1. Optimizing the CSP Tower Air Brayton Cycle System to Meet the SunShot Objectives - Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Bryner, Elliott [Soutwest Research Inst., San Antonio, TX (United States); Brun, Klaus [Soutwest Research Inst., San Antonio, TX (United States); Coogan, Shane [Soutwest Research Inst., San Antonio, TX (United States); Cunningham, C. Seth [Soutwest Research Inst., San Antonio, TX (United States); Poerner, Nathan [Soutwest Research Inst., San Antonio, TX (United States)

    2016-02-26

    The objective of this project is to increase Concentrated Solar Power (CSP) tower air receiver and gas turbine temperature capabilities to 1,000ºC by the development of a novel gas turbine combustor, which can be integrated on a megawatt-scale gas turbine, such as the Solar Turbines Mercury 50™. No combustor technology currently available is compatible with the CSP application target inlet air temperature of 1,000°C. Autoignition and flashback at this temperature prevent the use of conventional lean pre-mix injectors that are currently employed to manage NOx emissions. Additional challenges are introduced by the variability of the high-temperature heat source provided by the field of solar collectors, the heliostat in CSP plants. For optimum energy generation from the power turbine, the turbine rotor inlet temperature (TRIT) should remain constant. As a result of changing heat load provided to the solar collector from the heliostat, the amount of energy input required from the combustion system must be adjusted to compensate. A novel multi-bank lean micro-mix injector has been designed and built to address the challenges of high-temperature combustion found in CSP applications. The multi-bank arrangement of the micro-mix injector selectively injects fuel to meet the heat addition requirements to maintain constant TRIT with changing solar load. To validate the design, operation, and performance of the multi-bank lean micro-mix injector, a novel combustion test facility has been designed and built at Southwest Research Institute® (SwRI®) in San Antonio, TX. This facility, located in the Turbomachinery Research Facility, provides in excess of two kilograms per second of compressed air at nearly eight bar pressure. A two-megawatt electric heater raises the inlet temperature to 800°C while a secondary gas-fired heater extends the operational temperature range of the facility to 1,000°C. A combustor test rig connected to the heater has been designed and built to

  2. On issues of constructing an exception handling mechanism for CSP-based process-oriented concurrent software

    NARCIS (Netherlands)

    Jovanovic, D.S.; Orlic, B.; Broenink, Johannes F.; Broenink, J.F.; Roebers, H.W.; Sunter, J.P.E.; Welch, P.H.; Wood, D.C.

    2005-01-01

    This paper discusses issues, possibilities and existing approaches for fitting an exception handling mechanism (EHM) in CSP-based process-oriented software architectures. After giving a survey on properties desired for a concurrent EHM, specific problems and a few principal ideas for including

  3. Safeguard and security issues for the U.S. Fissile Materials Disposition Program

    International Nuclear Information System (INIS)

    Jaeger, C.D.; Moya, R.W.; Duggan, R.A.

    1995-01-01

    The Department of Energy's Office of Materials Disposition (MD) is analyzing long-term storage and disposition options for fissile materials, preparing a Programmatic Environmental Impact Statement (PEIS), preparing for a Record of Decision (ROD) regarding this material, and conducting other related activities. A primary objective of this program is to support U.S. nonproliferation policy by reducing major security risks. Particular areas of concern are the acquisition of this material by unauthorized persons and preventing the reintroduction of the material for use in weapons. This paper presents some of the issues, definitions, and assumptions addressed by the Safeguards and Security Project Team in support of the Fissile Materials Disposition Program (FMDP). The discussion also includes some preliminary ideas regarding safeguards and security criteria that are applicable to the screening of disposition options

  4. Safeguards and security issues for the U.S. Fissile Materials Disposition Program

    International Nuclear Information System (INIS)

    Jaeger, C.D.; Moya, R.W.; Duggan, R.A.

    1995-01-01

    The Department of Energy's Office of Materials Disposition (MD) is analyzing long-term storage and disposition options for fissile materials, preparing a Programmatic Environmental Impact Statement (PEIS), preparing for a Record of Decision (ROD) regarding this material, and conducting other related activities. A primary objective of this program is to support US nonproliferation policy by reducing major security risks. Particular areas of concern are the acquisition of this material by unauthorized persons and preventing the reintroduction of the material for use in weapons. This paper presents some of the issues, definitions, and assumptions addressed by the Safeguards and Security Project Team in support of the Fissile Materials Disposition Program (FMDP). The discussion also includes some preliminary ideas regarding safeguards and security criteria that are applicable to the screening of disposition options

  5. Lemnos Interoperable Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Stewart, John [Tennessee Valley Authority, Knoxville, TN (United States); Halbgewachs, Ron [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Chavez, Adrian [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Smith, Rhett [Schweitzer Engineering Laboratories, Chattanooga, TN (United States); Teumim, David [Teumim Technical, Allentown, PA (United States)

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  6. Rhenium-catalyzed dehydrogenative olefination of C(sp(3))-H bonds with hypervalent iodine(III) reagents.

    Science.gov (United States)

    Gu, Haidong; Wang, Congyang

    2015-06-07

    A dehydrogenative olefination of C(sp(3))-H bonds is disclosed here, by merging rhenium catalysis with an alanine-derived hypervalent iodine(III) reagent. Thus, cyclic and acyclic ethers, toluene derivatives, cycloalkanes, and nitriles are all successfully alkenylated in a regio- and stereoselective manner.

  7. The Oil Security Metrics Model: A Tool for Evaluating the Prospective Oil Security Benefits of DOE's Energy Efficiency and Renewable Energy R&D Programs

    Energy Technology Data Exchange (ETDEWEB)

    Greene, David L [ORNL; Leiby, Paul Newsome [ORNL

    2006-05-01

    Energy technology R&D is a cornerstone of U.S. energy policy. Understanding the potential for energy technology R&D to solve the nation's energy problems is critical to formulating a successful R&D program. In light of this, the U.S. Congress requested the National Research Council (NRC) to undertake both retrospective and prospective assessments of the Department of Energy's (DOE's) Energy Efficiency and Fossil Energy Research programs (NRC, 2001; NRC, 2005). ("The Congress continued to express its interest in R&D benefits assessment by providing funds for the NRC to build on the retrospective methodology to develop a methodology for assessing prospective benefits." NRC, 2005, p. ES-2) In 2004, the NRC Committee on Prospective Benefits of DOE's Energy Efficiency and Fossil Energy R&D Programs published a report recommending a new framework and principles for prospective benefits assessment. The Committee explicitly deferred the issue of estimating security benefits to future work. Recognizing the need for a rigorous framework for assessing the energy security benefits of its R&D programs, the DOE's Office of Energy Efficiency and Renewable Energy (EERE) developed a framework and approach for defining energy security metrics for R&D programs to use in gauging the energy security benefits of their programs (Lee, 2005). This report describes methods for estimating the prospective oil security benefits of EERE's R&D programs that are consistent with the methodologies of the NRC (2005) Committee and that build on Lee's (2005) framework. Its objective is to define and implement a method that makes use of the NRC's typology of prospective benefits and methodological framework, satisfies the NRC's criteria for prospective benefits evaluation, and permits measurement of that portion of the prospective energy security benefits of EERE's R&D portfolio related to oil. While the Oil Security Metrics (OSM) methodology described

  8. Double mutation of cell wall proteins CspB and PBP1a increases secretion of the antibody Fab fragment from Corynebacterium glutamicum

    Science.gov (United States)

    2014-01-01

    Background Among other advantages, recombinant antibody-binding fragments (Fabs) hold great clinical and commercial potential, owing to their efficient tissue penetration compared to that of full-length IgGs. Although production of recombinant Fab using microbial expression systems has been reported, yields of active Fab have not been satisfactory. We recently developed the Corynebacterium glutamicum protein expression system (CORYNEX®) and demonstrated improved yield and purity for some applications, although the system has not been applied to Fab production. Results The Fab fragment of human anti-HER2 was successfully secreted by the CORYNEX® system using the conventional C. glutamicum strain YDK010, but the productivity was very low. To improve the secretion efficiency, we investigated the effects of deleting cell wall-related genes. Fab secretion was increased 5.2 times by deletion of pbp1a, encoding one of the penicillin-binding proteins (PBP1a), mediating cell wall peptidoglycan (PG) synthesis. However, this Δpbp1a mutation did not improve Fab secretion in the wild-type ATCC13869 strain. Because YDK010 carries a mutation in the cspB gene encoding a surface (S)-layer protein, we evaluated the effect of ΔcspB mutation on Fab secretion from ATCC13869. The Δpbp1a mutation showed a positive effect on Fab secretion only in combination with the ΔcspB mutation. The ΔcspBΔpbp1a double mutant showed much greater sensitivity to lysozyme than either single mutant or the wild-type strain, suggesting that these mutations reduced cell wall resistance to protein secretion. Conclusion There are at least two crucial permeability barriers to Fab secretion in the cell surface structure of C. glutamicum, the PG layer, and the S-layer. The ΔcspBΔpbp1a double mutant allows efficient Fab production using the CORYNEX® system. PMID:24731213

  9. The School Breakfast Program strengthens household food security among low-income households with elementary school children.

    Science.gov (United States)

    Bartfeld, Judith S; Ahn, Hong-Min

    2011-03-01

    The School Breakfast Program is an important component of the nutritional safety net and has been linked to positive changes in meal patterns and nutritional outcomes. By offering a breakfast, which for low-income children is available either at no cost or reduced price, the program also has the potential to increase household food security. This study examined the relationship between availability of the School Breakfast Program and household food security among low-income third-grade students by using data from the Early Childhood Longitudinal Survey-Kindergarten Cohort. The primary sample included 3010 students. Availability of school breakfast was assessed by surveys of school administrators. Food security was assessed by parents' reports by using the standard 18-item food security scale and considering 2 different food security thresholds. A probit model was estimated to measure the relationship between school breakfast availability and household food security while controlling for a range of other characteristics. Access to school breakfast reduced the risk of marginal food insecurity but not the risk of food insecurity at the standard threshold. That is, the program appeared beneficial in offsetting food-related concerns among at-risk families, although not necessarily in alleviating food insecurity once hardships had crossed the food insecurity threshold. Increasing the availability of school breakfast may be an effective strategy to maintain food security among low-income households with elementary school children.

  10. Food Security and Weight Status in Children: Interactions With Food Assistance Programs.

    Science.gov (United States)

    Nguyen, Binh T; Ford, Christopher N; Yaroch, Amy L; Shuval, Kerem; Drope, Jeffrey

    2017-02-01

    It is unclear whether Supplemental Nutrition Assistance Program (SNAP) or National School Lunch Program (NSLP) participation modifies the relationship between food insecurity and obesity in children. Data were included for 4,719 children aged 9-17 years who participated in the National Health and Nutrition Survey between 2003-2004 and 2011-2012. Linear regression was used to examine the relationship between household food security (full, marginal, low, and very low) and BMI percentile. Adjusted models were also stratified by SNAP and NSLP participation. There was no significant overall relationship between household food security and BMI percentile. In SNAP non-participants, there was no apparent overall relationship between BMI percentile and household food security. However, BMI percentile in children from households with low food security was significantly higher than that of children from fully food-secure households (risk difference [RD]=5.95, 95% CI=1.11, 10.80). Among SNAP participants, there was no significant relationship between household food security and BMI percentile. By NSLP participation category, there was a non-significant trend toward increasing BMI percentile with decreasing household food security in those reporting two or fewer (RD=1.75, 95% CI= -0.79, 4.29) and two to three (RD=1.07; 95% CI= -1.74, 3.89) lunches/week. There was no apparent relationship between household food security and BMI percentile in those reporting four or more lunches/week. Although the overall relationship between household food security and weight status in school-aged children was not statistically significant, there was some evidence that the relationship may differ by SNAP or NSLP participation, suggesting the need for more research. Copyright © 2016 American Journal of Preventive Medicine. Published by Elsevier Inc. All rights reserved.

  11. The role of CSP in the electricity system of South Africa - technical operation, grid constraints, market structure and economics

    Science.gov (United States)

    Kost, Christoph; Friebertshäuser, Chris; Hartmann, Niklas; Fluri, Thomas; Nitz, Peter

    2017-06-01

    This paper analyses the role of solar technologies (CSP and PV) and their interaction in the South African electricity system by using a fundamental electricity system modelling (ENTIGRIS-SouthAfrica). The model is used to analyse the South African long-term electricity generation portfolio mix, optimized site selection and required transmission capacities until the year 2050. Hereby especially the location and grid integration of solar technology (PV and CSP) and wind power plants is analysed. This analysis is carried out by using detailed resource assessment of both technologies. A cluster approach is presented to reduce complexity by integrating the data in an optimization model.

  12. Economic assessment and optimal operation of CSP systems with TES in California electricity markets

    Science.gov (United States)

    Dowling, Alexander W.; Dyreson, Ana; Miller, Franklin; Zavala, Victor M.

    2017-06-01

    The economics and performance of concentrated power (CSP) systems with thermal energy storage (TES) inherently depend on operating policies and the surrounding weather conditions and electricity markets. We present an integrated economic assessment framework to quantify the maximum possible revenues from simultaneous energy and ancillary services sales by CSP systems. The framework includes both discrete start-up/shutdown restrictions and detailed physical models. Analysis of coinci-dental historical market and meteorological data reveals provision of ancillary services increases market revenue 18% to 37% relative to energy-only participation. Surprisingly, only 53% to 62% of these revenues are available through sole participation in the day-ahead market, indicating significant opportunities at faster timescales. Motivated by water-usage concerns and permitting requirements, we also describe a new nighttime radiative-enhanced dry-cooling system with cold-side storage that consumes no water and offers higher effciencies than traditional air-cooled designs. Operation of this new system is complicated by the cold-side storage and inherent coupling between the cooling system and power plant, further motivating integrated economic analysis.

  13. DATA Act File B Object Class and Program Activity - Social Security

    Data.gov (United States)

    Social Security Administration — The DATA Act Information Model Schema Reporting Submission Specification File B. File B includes the agency object class and program activity detail obligation and...

  14. An Undergraduate Information Security Program: More than a Curriculum

    Science.gov (United States)

    Woodward, Belle; Imboden, Thomas; Martin, Nancy L.

    2013-01-01

    This paper describes the implementation of an information security program at a large Midwestern university. The initial work is briefly summarized and improvements that have occurred over time are described. Current activities and future plans are discussed. This paper offers insight and lessons learned for organizations that have or are…

  15. NNSA Laboratory Directed Research and Development Program 2008 Symposium--Focus on Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Kotta, P R; Sketchley, J A

    2008-08-20

    The Laboratory Directed Research and Development (LDRD) Program was authorized by Congress in 1991 to fund leading-edge research and development central to the national laboratories core missions. LDRD anticipates and engages in projects on the forefront of science and engineering at the Department of Energy (DOE) national laboratories, and has a long history of addressing pressing national security needs at the National Nuclear Security Administration (NNSA) laboratories. LDRD has been a scientific success story, where projects continue to win national recognition for excellence through prestigious awards, papers published and cited in peer-reviewed journals, mainstream media coverage, and patents granted. The LDRD Program is also a powerful means to attract and retain top researchers from around the world, to foster collaborations with other prominent scientific and technological institutions, and to leverage some of the world's most technologically advanced assets. This enables the LDRD Program to invest in high-risk and potentially high-payoff research that creates innovative technical solutions for some of our nation's most difficult challenges. Worldwide energy demand is growing at an alarming rate, as developing nations continue to expand their industrial and economic base on the back of limited global resources. The resulting international conflicts and environmental consequences pose serious challenges not only to this nation, but to the international community as well. The NNSA and its national security laboratories have been increasingly called upon to devote their scientific and technological capabilities to help address issues that are not limited solely to the historic nuclear weapons core mission, but are more expansive and encompass a spectrum of national security missions, including energy security. This year's symposium highlights some of the exciting areas of research in alternative fuels and technology, nuclear power, carbon

  16. An integrated approach to validation of safeguards and security program performance

    International Nuclear Information System (INIS)

    Altman, W.D.; Hunt, J.S.; Hockert, J.W.

    1988-01-01

    Department of Energy (DOE) requirements for safeguards and security programs are becoming increasingly performance oriented. Master Safeguards and Security Agreemtns specify performance levels for systems protecting DOE security interests. In order to measure and validate security system performance, Lawrence Livermore National Laboratory (LLNL) has developed cost effective validation tools and a comprehensive validation approach that synthesizes information gained from different activities such as force on force exercises, limited scope performance tests, equipment testing, vulnerability analyses, and computer modeling; into an overall assessment of the performance of the protection system. The analytic approach employs logic diagrams adapted from the fault and event trees used in probabilistic risk assessment. The synthesis of the results from the various validation activities is accomplished using a method developed by LLNL, based upon Bayes' theorem

  17. The Importance of the Brain Neuro-Programming Technologies in National and Regional Security

    Directory of Open Access Journals (Sweden)

    Vasyl H. Fatkhutdinov

    2018-02-01

    Full Text Available The authors’ understanding of neuro-programming is the result of the impact on the human brain of information and communication technology (including educational one, through which in the human brain the programs of manifestation in the ontogenesis of internal creative potentials are written. This article summarizes the history of the formation of key neuro-programming technologies of the human brain as well as proves that the changes in the society’s worldview are caused by the possibilities and quality of neuro-programming technologies that society uses. Having influence over worldview stereotypes and behaviour set by the society, neuro-programming technologies essentially ensure the national security of any state and the peaceful coexistence of states in the regions and on the planet as a whole. Using historical and philosophical methods, methods of conceptualization, systematization, modeling, etc., the authors have come to the conclusion that the modern world lies in a confrontation of security strategies, in which neuro-programming technologies play a key role.

  18. 49 CFR 659.25 - Annual review of system safety program plan and system security plan.

    Science.gov (United States)

    2010-10-01

    ... system security plan. 659.25 Section 659.25 Transportation Other Regulations Relating to Transportation... and system security plan. (a) The oversight agency shall require the rail transit agency to conduct an annual review of its system safety program plan and system security plan. (b) In the event the rail...

  19. The security analyzer, a security analyzer program written in Prolog

    International Nuclear Information System (INIS)

    Zimmerman, B.D.; Densley, P.J.; Carlson, R.L.

    1987-01-01

    A technique has been developed to characterize a nuclear facility and measure the strengths and weaknesses of the physical protection system. It utilizes the artificial intelligence capabilities available in the prolog programming language to probe a facility's defenses and find potential attack paths that meet designated search criteria. As sensors or barriers become inactive due to maintenance, failure, or inclement weather conditions, the protection system can rapidly be reanalyzed to discover weaknesses that would need to be strengthened by alternative means. Conversely, proposed upgrades and enhancements can be easily entered into the database and their effect measured against a variety of potential adversary attacks. Thus the security analyzer is a tool that aids the protection planner as well as the protection operations staff

  20. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  1. 75 FR 56858 - Improvements to the Supplemental Security Income Program-Heroes Earnings Assistance and Relief...

    Science.gov (United States)

    2010-09-17

    ... number, 1-800-772-1213, or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 416 [Docket No. SSA-2009-0017] RIN 0960-AH00 Improvements to the Supplemental Security Income Program--Heroes Earnings Assistance and Relief Tax Act of 2008...

  2. Draft genome of Kocuria polaris CMS 76or(T) isolated from cyanobacterial mats, McMurdo Dry Valley, Antarctica: an insight into CspA family of proteins from Kocuria polaris CMS 76or(T).

    Science.gov (United States)

    Gundlapally, Sathyanarayana Reddy; Ara, Srinivas; Sisinthy, Shivaji

    2015-10-01

    Kocuria polaris strain CMS 76or(T) is a gram-positive, orange-pigmented bacterium isolated from a cyanobacterial mat sample from a pond located in McMurdo Dry Valley, Antarctica. It is psychrotolerant, orange pigmented, hydrolyses starch and Tween 80 and reduces nitrate. We report the 3.78-Mb genome of K. polaris strain CMS 76or(T), containing 3416 coding sequences, including one each for 5S rRNA, 23S rRNA, 16S rRNA and 47 tRNA genes, and the G+C content of DNA is 72.8%. An investigation of Csp family of proteins from K. polaris strain CMS 76or(T) indicated that it contains three different proteins of CspA (peg.319, peg.2255 and 2832) and the length varied from 67 to 69 amino acids. The three different proteins contain all the signature amino acids and two RNA binding regions that are characteristic of CspA proteins. Further, the CspA from K. polaris strain CMS 76or(T) was different from CspA of four other species of the genus Kocuria, Cryobacterium roopkundense and E. coli indirectly suggesting the role of CspA of K. polaris strain CMS 76or(T) in psychrotolerant growth of the bacterium.

  3. Development on Guidance of Cyber Security Exercise for the Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyundoo [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber threats and attacks are increasing rapidly against infrastructure including energy and utilities industry over the world. Because of lack of human resource and incident response system to prevent or defend increased cyber threats, many governments and major national infrastructures perform cyber security exercises to improve capabilities of cyber security incident response. Accordingly there are exponential growth in the number of cyber security exercises over the past decade with the trend expecting to accelerate in the coming years. Even though there were many cyber security exercises in the Nuclear Facilities, this exercise was first which focused on mitigation and recovery of the system of the Nuclear Facility against cyber incident. So many insufficient items were deduced such as absence of a procedure for mitigation and recovery of cyber incident. These procedures should be developed and established through 3rd phase of Cyber Security Plan (CSP) and other technical complement actions under regulatory body’s guidance. Also developed and existed procedures should be regularly performed to make cyber incident response team and related people rapidly response against cyber incident through exercises or other training. The insufficient items come from the exercise should be reflected to developed and existed procedures by periods.

  4. Development on Guidance of Cyber Security Exercise for the Nuclear Facilities

    International Nuclear Information System (INIS)

    Kim, Hyundoo

    2016-01-01

    Cyber threats and attacks are increasing rapidly against infrastructure including energy and utilities industry over the world. Because of lack of human resource and incident response system to prevent or defend increased cyber threats, many governments and major national infrastructures perform cyber security exercises to improve capabilities of cyber security incident response. Accordingly there are exponential growth in the number of cyber security exercises over the past decade with the trend expecting to accelerate in the coming years. Even though there were many cyber security exercises in the Nuclear Facilities, this exercise was first which focused on mitigation and recovery of the system of the Nuclear Facility against cyber incident. So many insufficient items were deduced such as absence of a procedure for mitigation and recovery of cyber incident. These procedures should be developed and established through 3rd phase of Cyber Security Plan (CSP) and other technical complement actions under regulatory body’s guidance. Also developed and existed procedures should be regularly performed to make cyber incident response team and related people rapidly response against cyber incident through exercises or other training. The insufficient items come from the exercise should be reflected to developed and existed procedures by periods

  5. Socio-economic effects of a HYSOL CSP plant located in different countries: An input output analysis

    NARCIS (Netherlands)

    Corona, B.; López, A.; San Miguel, G.

    2016-01-01

    The aim of this paper is to estimate the socioeconomic effects associated with the production of electricity by a CSP plant with HYSOL configuration, using Input Output Analysis. These effects have been estimated in terms of production of Goods and Services (G&S), multiplier effect, value added,

  6. Training programs for the systems approach to nuclear security

    International Nuclear Information System (INIS)

    Ellis, D.

    2005-01-01

    Full text: In support of United States Government (USG) and International Atomic Energy Agency (IAEA) nuclear security programs, Sandia National Laboratories (SNL) has advocated and practiced a risk-based, systematic approach to nuclear security. The risk equation has been developed and implemented as the basis for a performance-based methodology for the design and evaluation of physical protection systems against a design basis threat (DBT) for theft and sabotage of nuclear and/or radiological materials. Integrated systems must include technology, people, and the man-machine interface. A critical aspect of the human element is training on the systems-approach for all the stakeholders in nuclear security. Current training courses and workshops have been very beneficial but are still rather limited in scope. SNL has developed two primary international classes - the international training course on the physical protection of nuclear facilities and materials, and the design basis threat methodology workshop. SNL is also completing the development of three new courses that will be offered and presented in the near term. They are vital area identification methodology focused on nuclear power plants to aid in their protection against radiological sabotage, insider threat analysis methodology and protection schemes, and security foundations for competent authority and facility operator stakeholders who are not security professionals. In the long term, we envision a comprehensive nuclear security curriculum that spans policy and technology, regulators and operators, introductory and expert levels, classroom and laboratory/field, and local and offsite training options. This training curriculum will be developed in concert with a nuclear security series of guidance documents that is expected to be forthcoming from the IAEA. It is important to note that while appropriate implementation of systems based on such training and documentation can improve the risk reduction, such a

  7. Radiological Threat Reduction (RTR) program: implementing physical security to protect large radioactive sources worldwide

    International Nuclear Information System (INIS)

    Lowe, Daniel L.

    2004-01-01

    The U.S. Department of Energy's Radiological Threat Reduction (RTR) Program strives to reduce the threat of a Radiological Dispersion Device (RDD) incident that could affect U.S. interests worldwide. Sandia National Laboratories supports the RTR program on many different levels. Sandia works directly with DOE to develop strategies, including the selection of countries to receive support and the identification of radioactive materials to be protected. Sandia also works with DOE in the development of guidelines and in training DOE project managers in physical protection principles. Other support to DOE includes performing rapid assessments and providing guidance for establishing foreign regulatory and knowledge infrastructure. Sandia works directly with foreign governments to establish cooperative agreements necessary to implement the RTR Program efforts to protect radioactive sources. Once necessary agreements are in place, Sandia works with in-country organizations to implement various security related initiatives, such as installing security systems and searching for (and securing) orphaned radioactive sources. The radioactive materials of interest to the RTR program include Cobalt 60, Cesium 137, Strontium 90, Iridium 192, Radium 226, Plutonium 238, Americium 241, Californium 252, and Others. Security systems are implemented using a standardized approach that provides consistency through out the RTR program efforts at Sandia. The approach incorporates a series of major tasks that overlap in order to provide continuity. The major task sequence is to: Establish in-country contacts - integrators, Obtain material characterizations, Perform site assessments and vulnerability assessments, Develop upgrade plans, Procure and install equipment, Conduct acceptance testing and performance testing, Develop procedures, and Conduct training. Other tasks are incorporated as appropriate and commonly include such as support of reconfiguring infrastructure, and developing security

  8. B Plant cleanout and stabilization program update

    International Nuclear Information System (INIS)

    Gehrke, J.W.

    1994-01-01

    The B Plant Cleanout and Stabilization Program Update FY1993 committed to an annual update document. The Cleanout and Stabilization Program (CSP) plan, Reference 1, remains as the best source of detailed discussion of CSP work and continues to be valid. The CSP presented a five year plan that left a number of plant systems operational to support WESF (Waste Encapsulation and Storage Facility) capsule storage. It is now apparent that the transition of B Plant to a long-term surveillance and maintenance mode (LTS and M) will be necessary to complete B Plant deactivation. To accomplish the LTS and M mode for B Plant, WESF will need to be physically isolated to allow stand alone operation for many years beyond the anticipated B Plant deactivation. B Plant has processed large quantities (> 100 megacuries) of cesium-137 and strontium-90. Residual radioactive contamination from this processing is in many forms and locations in B Plant. The plant design incorporates many features for radiological containment and confinement and systems to prevent the exposure of plant personnel and the public to excessive radiation. To minimize or reduce the radiological hazard wherever possible this program includes activities in four areas: Prevent Migration of Contamination; Stabilize Major Radioactive Source Terms; characterize Radioactive Source Terms; and Reduce Radiation Dose Rates. This document will describe work that is need to meet current goals and objectives and work that has changed, been completed, ore redirected. A systems engineering approach to defining this mission was initiated in FY1994 that will also be addressed in this document

  9. AspectKE*:Security Aspects with Program Analysis for Distributed Systems

    DEFF Research Database (Denmark)

    2010-01-01

    AspectKE* is the first distributed AOP language based on a tuple space system. It is designed to enforce security policies to applications containing untrusted processes. One of the key features is the high-level predicates that extract results of static program analysis. These predicates provide...

  10. 77 FR 32709 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Homeland Security...

    Science.gov (United States)

    2012-06-01

    ...; Computer Matching Program (SSA/ Department of Homeland Security (DHS))--Match Number 1010 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching program that... amended by the Computer Matching and Privacy Protection Act of 1988, as amended, and the regulations and...

  11. Safeguards and security research and development: Program status report, February-July 1981

    International Nuclear Information System (INIS)

    Henry, C.N.; Walton, R.B.

    1982-04-01

    This report, one of a series of biannual progress reports, describes the status of research and development in the Safeguards and Security Program at Los Alamos from February-July 1981. Most work covered here is sponsored by the Office of Safeguards and Security of the Department of Energy; however, project activities that are technically closely related to nuclear safeguards and security also are included where appropriate for conveying information useful to the nuclear community. The report comprises four major subject areas: Security Development and Support; Nuclear Materials Measurement and Engineering; Nuclear Facility Safeguards Support; and International Safeguards, Technology Transfer, and Training. Some technical topics included in the subject areas are computer and informational security, chemical and nondestructive analysis of nuclear materials, process modeling and analysis, nuclear materials accounting systems, evaluation of prototype measurement instrumentation and procedures in nuclear facilities, design and consultation for facilities, technical exchange, training courses, and international safeguards

  12. Safeguards and security research and development: Program status report, February-July 1981

    Energy Technology Data Exchange (ETDEWEB)

    Henry, C.N.; Walton, R.B. (comps.)

    1982-04-01

    This report, one of a series of biannual progress reports, describes the status of research and development in the Safeguards and Security Program at Los Alamos from February-July 1981. Most work covered here is sponsored by the Office of Safeguards and Security of the Department of Energy; however, project activities that are technically closely related to nuclear safeguards and security also are included where appropriate for conveying information useful to the nuclear community. The report comprises four major subject areas: Security Development and Support; Nuclear Materials Measurement and Engineering; Nuclear Facility Safeguards Support; and International Safeguards, Technology Transfer, and Training. Some technical topics included in the subject areas are computer and informational security, chemical and nondestructive analysis of nuclear materials, process modeling and analysis, nuclear materials accounting systems, evaluation of prototype measurement instrumentation and procedures in nuclear facilities, design and consultation for facilities, technical exchange, training courses, and international safeguards.

  13. Final Report on the Operation and Maintenance Improvement Program for Concentrating Solar Power Plants

    International Nuclear Information System (INIS)

    Cohen, Gilbert E.; Kearney, David W.; Kolb, Gregory J.

    1999-01-01

    This report describes the results of a six-year, $6.3 million project to reduce operation and maintenance (O ampersand M) costs at power plants employing concentrating solar power (CSP) technology. Sandia National Laboratories teamed with KJC Operating Company to implement the O ampersand M Improvement Program. O ampersand M technologies developed during the course of the program were demonstrated at the 150-MW Kramer Junction solar power park located in Boron, California. Improvements were made in the following areas: (a) efficiency of solar energy collection, (b) O ampersand M information management, (c) reliability of solar field flow loop hardware, (d) plant operating strategy, and (e) cost reduction associated with environmental issues. A 37% reduction in annual O ampersand M costs was achieved. Based on the lessons learned, an optimum solar- field O ampersand M plan for future CSP plants is presented. Parabolic trough solar technology is employed at Kramer Junction. However, many of the O ampersand M improvements described in the report are also applicable to CSP plants based on solar power tower or dish/engine concepts

  14. Final Report on the Operation and Maintenance Improvement Program for Concentrating Solar Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Cohen Gilbert E.; Kearney, David W.; Kolb, Gregory J.

    1999-06-01

    This report describes the results of a six-year, $6.3 million project to reduce operation and maintenance (O&M) costs at power plants employing concentrating solar power (CSP) technology. Sandia National Laboratories teamed with KJC Operating Company to implement the O&M Improvement Program. O&M technologies developed during the course of the program were demonstrated at the 150-MW Kramer Junction solar power park located in Boron, California. Improvements were made in the following areas: (a) efficiency of solar energy collection, (b) O&M information management, (c) reliability of solar field flow loop hardware, (d) plant operating strategy, and (e) cost reduction associated with environmental issues. A 37% reduction in annual O&M costs was achieved. Based on the lessons learned, an optimum solar- field O&M plan for future CSP plants is presented. Parabolic trough solar technology is employed at Kramer Junction. However, many of the O&M improvements described in the report are also applicable to CSP plants based on solar power tower or dish/engine concepts.

  15. DNA prime/Adenovirus boost malaria vaccine encoding P. falciparum CSP and AMA1 induces sterile protection associated with cell-mediated immunity.

    Directory of Open Access Journals (Sweden)

    Ilin Chuang

    Full Text Available BACKGROUND: Gene-based vaccination using prime/boost regimens protects animals and humans against malaria, inducing cell-mediated responses that in animal models target liver stage malaria parasites. We tested a DNA prime/adenovirus boost malaria vaccine in a Phase 1 clinical trial with controlled human malaria infection. METHODOLOGY/PRINCIPAL FINDINGS: The vaccine regimen was three monthly doses of two DNA plasmids (DNA followed four months later by a single boost with two non-replicating human serotype 5 adenovirus vectors (Ad. The constructs encoded genes expressing P. falciparum circumsporozoite protein (CSP and apical membrane antigen-1 (AMA1. The regimen was safe and well-tolerated, with mostly mild adverse events that occurred at the site of injection. Only one AE (diarrhea, possibly related to immunization, was severe (Grade 3, preventing daily activities. Four weeks after the Ad boost, 15 study subjects were challenged with P. falciparum sporozoites by mosquito bite, and four (27% were sterilely protected. Antibody responses by ELISA rose after Ad boost but were low (CSP geometric mean titer 210, range 44-817; AMA1 geometric mean micrograms/milliliter 11.9, range 1.5-102 and were not associated with protection. Ex vivo IFN-γ ELISpot responses after Ad boost were modest (CSP geometric mean spot forming cells/million peripheral blood mononuclear cells 86, range 13-408; AMA1 348, range 88-1270 and were highest in three protected subjects. ELISpot responses to AMA1 were significantly associated with protection (p = 0.019. Flow cytometry identified predominant IFN-γ mono-secreting CD8+ T cell responses in three protected subjects. No subjects with high pre-existing anti-Ad5 neutralizing antibodies were protected but the association was not statistically significant. SIGNIFICANCE: The DNA/Ad regimen provided the highest sterile immunity achieved against malaria following immunization with a gene-based subunit vaccine (27%. Protection

  16. 78 FR 35945 - Request for Comments on Security Training Programs for Surface Mode Employees

    Science.gov (United States)

    2013-06-14

    ... million for training projects. Similarly, under the Intercity Bus Security Grant Program (IBSGP), which... related to the security elements in Table 1, per employee? (Please indicate whether this includes travel... on the size and scope of the exercise, including the phases of an exercise, travel expenses for...

  17. WTO Compliance Status of the Conservation Security Program (CSP) and the Conservation Reserve Program (CRP)

    National Research Council Canada - National Science Library

    Schnepf, Randy

    2007-01-01

    ...) agreed to limit and reduce their most distortive domestic support subsidies. Several types of domestic subsidies were identified as causing minimal distortion to agricultural production and trade and were provided exemption from WTO disciplines...

  18. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  19. Construction safety program for the National Ignition Facility

    Energy Technology Data Exchange (ETDEWEB)

    Cerruti, S.J.

    1997-06-26

    The Construction Safety Program (CSP) for NIF sets forth the responsibilities, guidelines, rules, policies and regulations for all workers involved in the construction, special equipment installation, acceptance testing, and initial activation and operation of NIF at LLNL during the construction period of NIF.

  20. Construction safety program for the National Ignition Facility

    International Nuclear Information System (INIS)

    Cerruti, S.J.

    1997-01-01

    The Construction Safety Program (CSP) for NIF sets forth the responsibilities, guidelines, rules, policies and regulations for all workers involved in the construction, special equipment installation, acceptance testing, and initial activation and operation of NIF at LLNL during the construction period of NIF

  1. Building a National Security Program at a Small School: Identifying Opportunities and Overcoming Challenges

    Science.gov (United States)

    Grossman, Michael; Schortgen, Francis

    2016-01-01

    This article offers insights into the overall program development process and--institutional obstacles and constraints notwithstanding--successful introduction of a new national security program at a small liberal arts university at a time of growing institutional prioritization of science, technology, engineering, and mathematics (STEM) programs.…

  2. Solar Energy Technologies Program FY08 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2009-05-01

    These reports chronicle the research and development (R&D) results of the Solar Program for the fiscal year. In particular, the report describes R&D performed by the Program's national laboratories and its university and industry partners within PV R&D, Solar Thermal R&D, which encompasses solar water heating and concentrating solar power (CSP), and other subprograms.

  3. Extracting classification rules from an informatic security incidents repository by genetic programming

    Directory of Open Access Journals (Sweden)

    Carlos Javier Carvajal Montealegre

    2015-04-01

    Full Text Available This paper describes the data mining process to obtain classification rules over an information security incident data collection, explaining in detail the use of genetic programming as a mean to model the incidents behavior and representing such rules as decision trees. The described mining process includes several tasks, such as the GP (Genetic Programming approach evaluation, the individual's representation and the algorithm parameters tuning to upgrade the performance. The paper concludes with the result analysis and the description of the rules obtained, suggesting measures to avoid the occurrence of new informatics attacks. This paper is a part of the thesis work degree: Information Security Incident Analytics by Data Mining for Behavioral Modeling and Pattern Recognition (Carvajal, 2012.

  4. Development and implementation of a dynamic TES dispatch control component in a PV-CSP techno-economic performance modelling tool

    Science.gov (United States)

    Hansson, Linus; Guédez, Rafael; Larchet, Kevin; Laumert, Bjorn

    2017-06-01

    The dispatchability offered by thermal energy storage (TES) in concentrated solar power (CSP) and solar hybrid plants based on such technology presents the most important difference compared to power generation based only on photovoltaics (PV). This has also been one reason for recent hybridization efforts of the two technologies and the creation of Power Purchase Agreement (PPA) payment schemes based on offering higher payment multiples during daily hours of higher (peak or priority) demand. Recent studies involving plant-level thermal energy storage control strategies are however to a large extent based on pre-determined approaches, thereby not taking into account the actual dynamics of thermal energy storage system operation. In this study, the implementation of a dynamic dispatch strategy in the form of a TRNSYS controller for hybrid PV-CSP plants in the power-plant modelling tool DYESOPT is presented. In doing this it was attempted to gauge the benefits of incorporating a day-ahead approach to dispatch control compared to a fully pre-determined approach determining hourly dispatch only once prior to annual simulation. By implementing a dynamic strategy, it was found possible to enhance technical and economic performance for CSP-only plants designed for peaking operation and featuring low values of the solar multiple. This was achieved by enhancing dispatch control, primarily by taking storage levels at the beginning of every simulation day into account. The sequential prediction of the TES level could therefore be improved, notably for evaluated plants without integrated PV, for which the predicted storage levels deviated less than when PV was present in the design. While also featuring dispatch performance gains, optimal plant configurations for hybrid PV-CSP was found to present a trade-off in economic performance in the form of an increase in break-even electricity price when using the dynamic strategy which was offset to some extent by a reduction in

  5. Polymorphisms in Plasmodium vivax Circumsporozoite Protein (CSP) Influence Parasite Burden and Cytokine Balance in a Pre-Amazon Endemic Area from Brazil

    Science.gov (United States)

    Ribeiro, Bruno de Paulo; Cassiano, Gustavo Capatti; de Souza, Rodrigo Medeiros; Cysne, Dalila Nunes; Grisotto, Marcos Augusto Grigolin; de Azevedo dos Santos, Ana Paula Silva; Marinho, Cláudio Romero Farias; Machado, Ricardo Luiz Dantas; Nascimento, Flávia Raquel Fernandes

    2016-01-01

    Mechanisms involved in severe P. vivax malaria remain unclear. Parasite polymorphisms, parasite load and host cytokine profile may influence the course of infection. In this study, we investigated the influence of circumsporozoite protein (CSP) polymorphisms on parasite load and cytokine profile in patients with vivax malaria. A cross-sectional study was carried out in three cities: São Luís, Cedral and Buriticupu, Maranhão state, Brazil, areas of high prevalence of P. vivax. Interleukin (IL)-2, IL-4, IL-10, IL-6, IL-17, tumor necrosis factor alpha (TNF-α, interferon gamma (IFN-γ and transforming growth factor beta (TGF-β were quantified in blood plasma of patients and in supernatants from peripheral blood mononuclear cell (PBMC) cultures. Furthermore, the levels of cytokines and parasite load were correlated with VK210, VK247 and P. vivax-like CSP variants. Patients infected with P. vivax showed increased IL-10 and IL-6 levels, which correlated with the parasite load, however, in multiple comparisons, only IL-10 kept this association. A regulatory cytokine profile prevailed in plasma, while an inflammatory profile prevailed in PBMC culture supernatants and these patterns were related to CSP polymorphisms. VK247 infected patients showed higher parasitaemia and IL-6 concentrations, which were not associated to IL-10 anti-inflammatory effect. By contrast, in VK210 patients, these two cytokines showed a strong positive correlation and the parasite load was lower. Patients with the VK210 variant showed a regulatory cytokine profile in plasma, while those infected with the VK247 variant have a predominantly inflammatory cytokine profile and higher parasite loads, which altogether may result in more complications in infection. In conclusion, we propose that CSP polymorphisms is associated to the increase of non-regulated inflammatory immune responses, which in turn may be associated with the outcome of infection. PMID:26943639

  6. DoD Information Security Program and Protection of Sensitive Compartmented Information (SCI)

    Science.gov (United States)

    2016-04-21

    Sensitive Compartmented Information ( SCI ) References: See Enclosure 1 1. PURPOSE. In accordance with the authority in DoD Directive (DoDD...collateral, special access program, SCI , and controlled unclassified information (CUI) within an overarching DoD Information Security Program...use, and dissemination of SCI within the DoD pursuant to References (a), (c), and (e) and Executive Order 12333 (Reference (h)). 2

  7. Economic Security Environment and Implementation of Planning, Programming, Budgeting, Execution (PPBE) System in Georgia

    Science.gov (United States)

    2004-06-01

    Roy J. What Determines Economic Growth? Economic Review – Second Quarter 1993 [References: Barro (1991); Mankiw , Romer, and Well (1992); De Long...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release: distribution unlimited ECONOMIC SECURITY...DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE: Economic Security Environment and Implementation of Planning, Programming, Budgeting, Execution

  8. Cyber Security Testing and Training Programs for Industrial Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  9. Carboy Security Testing and Training Programs for Industrial Control Systems

    International Nuclear Information System (INIS)

    Noyes, Daniel

    2012-01-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These training vary from web-based cyber security training for control systems engineers to more advanced hands-on training that culminates with a Red Team/Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors

  10. Cyber Security Testing and Training Programs for Industrial Control Systems

    International Nuclear Information System (INIS)

    Noyes, Daniel

    2012-01-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  11. Carboy Security Testing and Training Programs for Industrial Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Noyes, Daniel [Idaho National Laboratory, Idaho (United States)

    2012-03-15

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These training vary from web-based cyber security training for control systems engineers to more advanced hands-on training that culminates with a Red Team/Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  12. 75 FR 5166 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration...

    Science.gov (United States)

    2010-02-01

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2009-0043] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration/Railroad Retirement Board (SSA/RRB))-- Match... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 Public Law (Pub. L.) 100-503...

  13. Seluge++: a secure over-the-air programming scheme in wireless sensor networks.

    Science.gov (United States)

    Doroodgar, Farzan; Abdur Razzaque, Mohammad; Isnin, Ismail Fauzi

    2014-03-11

    Over-the-air dissemination of code updates in wireless sensor networks have been researchers' point of interest in the last few years, and, more importantly, security challenges toward the remote propagation of code updating have occupied the majority of efforts in this context. Many security models have been proposed to establish a balance between the energy consumption and security strength, having their concentration on the constrained nature of wireless sensor network (WSN) nodes. For authentication purposes, most of them have used a Merkle hash tree to avoid using multiple public cryptography operations. These models mostly have assumed an environment in which security has to be at a standard level. Therefore, they have not investigated the tree structure for mission-critical situations in which security has to be at the maximum possible level (e.g., military applications, healthcare). Considering this, we investigate existing security models used in over-the-air dissemination of code updates for possible vulnerabilities, and then, we provide a set of countermeasures, correspondingly named Security Model Requirements. Based on the investigation, we concentrate on Seluge, one of the existing over-the-air programming schemes, and we propose an improved version of it, named Seluge++, which complies with the Security Model Requirements and replaces the use of the inefficient Merkle tree with a novel method. Analytical and simulation results show the improvements in Seluge++ compared to Seluge.

  14. Impact of the National Food Supplementary Program for Children on Household Food Security and Maternal Weight Status in Iran.

    Science.gov (United States)

    Ghodsi, Delaram; Omidvar, Nasrin; Eini-Zinab, Hassan; Rashidian, Arash; Raghfar, Hossein

    2016-01-01

    Food aid programs are strategies that aim to improve nutritional status and to tackle food insecurity. This study aimed to evaluate the effect of a National Food Supplementary Program for Children on households' food security. The study sample included 359 mothers of children aged 6-72 months under the coverage of the program in two provinces of Iran. Demographic and socioeconomic characteristics of the households and percentage of supplementary food items consumed by target child were assessed by a questionnaire and checklist. Data on household food security were collected by locally adapted Household Food Insecurity Access Scale at the baseline of the study and 6 months thereafter. At the baseline, only 4.7% of families were food secure, while 43.5% were severely food insecure, and these proportions were changed to 7.9% and 38%, respectively ( P security in the baseline and at the end of the study ( P > 0.05). Findings show that the food supplementary program for children can also improve the household food security status. Further research is needed to assess other factors that affect the effectiveness of this kind of programs.

  15. Security management internship program: a great recruiting tool for your company.

    Science.gov (United States)

    Yaross, Dan; Morris, Ronald J

    2013-01-01

    A well thought out and managed internship program is easily a "win-win" situation, according to the authors, who established such a program for the security department of their hospital. The program benefits not only the students with gaining practical experience of the business environment, but also the colleges/universities in coordinating internship opportunities for its students and business organizations in a number of ways including the possible identification of potential young career candidates to augment their current workforces. The article is based on the authors' presentation at the ASIS International Annual Seminar in September 2012.

  16. Leveraging Safety Programs to Improve and Support Security Programs

    Energy Technology Data Exchange (ETDEWEB)

    Leach, Janice [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Snell, Mark K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Pratt, R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sandoval, S. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-10-01

    There has been a long history of considering Safety, Security, and Safeguards (3S) as three functions of nuclear security design and operations that need to be properly and collectively integrated with operations. This paper specifically considers how safety programmes can be extended directly to benefit security as part of an integrated facility management programme. The discussion will draw on experiences implementing such a programme at Sandia National Laboratories’ Annular Research Reactor Facility. While the paper focuses on nuclear facilities, similar ideas could be used to support security programmes at other types of high-consequence facilities and transportation activities.

  17. Family conflict, emotional security, and child development: translating research findings into a prevention program for community families.

    Science.gov (United States)

    Cummings, E Mark; Schatz, Julie N

    2012-03-01

    The social problem posed by family conflict to the physical and psychological health and well-being of children, parents, and underlying family relationships is a cause for concern. Inter-parental and parent-child conflict are linked with children's behavioral, emotional, social, academic, and health problems, with children's risk particularly elevated in distressed marriages. Supported by the promise of brief psycho-educational programs (e.g., Halford et al. in Journal of Family Psychology 22:497-505, 2008; Sanders in Journal of Family Psychology 22:506-517, 2008), the present paper presents the development and evaluation of a prevention program for community families with children, concerned with family-wide conflict and relationships, and building on Emotional Security Theory (Davies and Cummings in Psychological Bulletin 116:387-411, 1994). This program uniquely focuses on translating research and theory in this area into brief, engaging programs for community families to improve conflict and emotional security for the sake of the children. Evaluation is based on multi-domain and multi-method assessments of family-wide and child outcomes in the context of a randomized control design. A series of studies are briefly described in the programmatic development of a prevention program for conflict and emotional security for community families, culminating in a program for family-wide conflict and emotional security for families with adolescents. With regard to this ongoing program, evidence is presented at the post-test for improvements in family-wide functioning, consideration of the relative benefits for different groups within the community, and preliminary support for the theoretical bases for program outcomes.

  18. Modelling of a cross flow evaporator for CSP application

    DEFF Research Database (Denmark)

    Sørensen, Kim; Franco, Alessandro; Pelagotti, Leonardo

    2016-01-01

    ) applications. Heat transfer and pressure drop prediction methods are an important tool for design and modelling of diabatic, two-phase, shell-side flow over a horizontal plain tubes bundle for a vertical up-flow evaporator. With the objective of developing a model for a specific type of cross flow evaporator...... the available correlations for the definition of two-phase flow heat transfer, void fraction and pressure drop in connection with the operation of steam generators, focuses attention on a comparison of the results obtained using several different models resulting by different combination of correlations......Heat exchangers consisting of bundles of horizontal plain tubes with boiling on the shell side are widely used in industrial and energy systems applications. A recent particular specific interest for the use of this special heat exchanger is in connection with Concentrated Solar Power (CSP...

  19. Security, Dignity, Caring Relationships, and Meaningful Work: Needs Motivating Participation in a Job-Training Program

    Science.gov (United States)

    Ayers, David F.; Miller-Dyce, Cherrel; Carlone, David

    2008-01-01

    Researchers asked 17 participants in a job-training program to describe their personal struggles following an economic restructuring. Examined through a critical theoretical lens, findings indicate that the learners enrolled in the program to reclaim security, dignity, meaningful work, and caring relationships. Program planners at community…

  20. Operations Security (OPSEC) Guide

    Science.gov (United States)

    2011-04-01

    Request for Proposal TAC Threat Analysis Center TECHINT Technical Intelligence TMAP Telecommunications Monitoring and Assessment Program TTP...communications security, use of secure telephones, and a robust Telecommunications Monitoring and Assessment Program ( TMAP ) prevents undetermined...and AFI 33-219, Telecommunications Monitoring and Assessment Program ( TMAP ), or Information Assurance (IA) or Communications Security (COMSEC

  1. A two-factor, stochastic programming model of Danish mortgage-backed securities

    DEFF Research Database (Denmark)

    Nielsen, Søren S.; Poulsen, Rolf

    2004-01-01

    -trivial, both in terms of deciding on an initial mortgage, and in terms of managing (rebalancing) it optimally.We propose a two-factor, arbitrage-free interest-rate model, calibrated to observable security prices, and implement on top of it a multi-stage, stochastic optimization program with the purpose...

  2. Electro-Kinetic Pumping with Slip Irreversibility in Heat Exchange of CSP-Powered Bio-Digester Assemblies

    OpenAIRE

    Ogedengbe, Emmanuel; Rosen, Marc

    2012-01-01

    Parametric studies of the effects of slip irreversibility in concentrating solar power (CSP)-powered bio-digester assemblies are investigated. Complexities regarding the identification of the appropriate electro-kinetic phenomena for certain electrolyte phases are reviewed. The application of exergy analysis to the design of energy conversion devices, like solar thermal collectors, for the required heat of formation in a downdraft waste food bio-digester, is discussed. Thermal management in t...

  3. 77 FR 43639 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-07-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0090] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Department of Veterans Affairs (VA.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503...

  4. 77 FR 54943 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-09-06

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0016] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Department of Veterans Affairs (VA.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503...

  5. Measuring the Effect of Supplemental Nutrition Assistance Program (SNAP) Participation on Food Security.

    OpenAIRE

    James Mabli; Jim Ohls; Lisa Dragoset; Laura Castner; Betsy Santos

    2013-01-01

    The Supplemental Nutrition Assistance Program (SNAP) provides food assistance to more than 47 million low-income Americans every month. It aims to reduce hunger by facilitating beneficiaries’ access to enough food for a healthy, active lifestyle, otherwise known as "food security." Our study conducted for the Food and Nutrition Service of the U.S. Department of Agriculture shows that SNAP participation is associated with improved food security. The study is the largest and most rigorous one...

  6. High performance and thermally stable tandem solar selective absorber coating for concentrated solar thermal power (CSP) application

    Science.gov (United States)

    Prasad, M. Shiva; Kumar, K. K. Phani; Atchuta, S. R.; Sobha, B.; Sakthivel, S.

    2018-05-01

    A novel tandem absorber system (Mn-Cu-Co-Ox-ZrO2/SiO2) developed on an austenitic stainless steel (SS-304) substrate to show an excellent optical performance (αsol: 0.96; ɛ: 0.23@500 °C). In order to achieve this durable tandem, we experimented with two antireflective layers such as ZrO2-SiO2 and nano SiO2 layer on top of Mn-Cu-Co-Ox-ZrO2 layer. We optimized the thickness of antireflective layers to get good tandem system in terms of solar absorptance and emittance. Field emission scanning electron microscopy (FESEM), UV-Vis-NIR and Fourier transform infrared spectroscopy (FTIR) were used to characterize the developed coatings. Finally, the Mn-Cu-Co-Ox-ZrO2/SiO2 exhibits high temperature resistance up to 800 °C, thus allow an increase in the operating temperature of CSP which may lead to high efficiency. We successfully developed a high temperature resistant tandem layer with easy manufacturability at low cost which is an attractive candidate for concentrated solar power generation (CSP).

  7. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  8. Secure Programming Cookbook for C and C++ Recipes for Cryptography, Authentication, Input Validation & More

    CERN Document Server

    Viega, John

    2009-01-01

    Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix® (including Linux®) and Windows® environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.

  9. Information Security Service Branding – beyond information security awareness

    Directory of Open Access Journals (Sweden)

    Rahul Rastogi

    2012-12-01

    Full Text Available End-users play a critical role in the effective implementation and running of an information security program in any organization. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls and the resultant behavior and actions of end-users. However, end-users often have negative perception of information security in the organization and exhibit non-compliance. In order to improve compliance levels, it is vital to improve the image of information security in the minds of end-users. This paper borrows the concepts of brands and branding from the domain of marketing to achieve this objective and applies these concepts to information security. The paper also describes a process for creating the information security service brand in the organization.

  10. Selective C(sp3 )-H Aerobic Oxidation Enabled by Decatungstate Photocatalysis in Flow.

    Science.gov (United States)

    Laudadio, Gabriele; Govaerts, Sebastian; Wang, Ying; Ravelli, Davide; Koolman, Hannes F; Fagnoni, Maurizio; Djuric, Stevan W; Noël, Timothy

    2018-04-03

    A mild and selective C(sp 3 )-H aerobic oxidation enabled by decatungstate photocatalysis has been developed. The reaction can be significantly improved in a microflow reactor enabling the safe use of oxygen and enhanced irradiation of the reaction mixture. Our method allows for the oxidation of both activated and unactivated C-H bonds (30 examples). The ability to selectively oxidize natural scaffolds, such as (-)-ambroxide, pregnenolone acetate, (+)-sclareolide, and artemisinin, exemplifies the utility of this new method. © 2018 The Authors. Published by Wiley-VCH Verlag GmbH & Co. KGaA.

  11. Canine Supply for Physical Security: An Analysis of the Royal Australian Air Force Military Working Dog Program

    Science.gov (United States)

    2016-03-01

    PHYSICAL SECURITY: AN ANALYSIS OF THE ROYAL AUSTRALIAN AIR FORCE MILITARY WORKING DOG PROGRAM by Mark W. Powell March 2016 Thesis...AN ANALYSIS OF THE ROYAL AUSTRALIAN AIR FORCE MILITARY WORKING DOG PROGRAM 5. FUNDING NUMBERS 6. AUTHOR(S) Mark W. Powell 7. PERFORMING...increased demand on its physical security elements. Its military working dog (MWD) workforce is required to meet an inventory of 204 by end of year 2023 as

  12. Security programs for Category I or II nuclear material or certain nuclear facilities. Regulatory guide G-274

    International Nuclear Information System (INIS)

    2003-03-01

    The purpose of this regulatory guide is to help applicants for a Canadian Nuclear Safety Commission (CNSC) licence in respect of Category I or II nuclear material - other than a licence to transport - , or a nuclear facility consisting of a nuclear reactor that may exceed 10 MW thermal power during normal operation, prepare and submit the security information to be included with the application, pursuant to the Nuclear Safety and Control Act (NSCA). Category I and II nuclear material are defined in Appendix B to this guide. This guide describes: the security information that should typically be included with the application for any licence referred to above; how the security information may be organized and presented in a separate document (hereinafter 'the security program description'), in order to assist CNSC review and processing of the application; and, the administrative procedures to be followed when preparing, submitting or revising the security program description. (author)

  13. Isolation and Characterization of Vaccine Candidate Genes Including CSP and MSP1 in Plasmodium yoelii.

    Science.gov (United States)

    Kim, Seon-Hee; Bae, Young-An; Seoh, Ju-Young; Yang, Hyun-Jong

    2017-06-01

    Malaria is an infectious disease affecting humans, which is transmitted by the bite of Anopheles mosquitoes harboring sporozoites of parasitic protozoans belonging to the genus Plasmodium . Despite past achievements to control the protozoan disease, malaria still remains a significant health threat up to now. In this study, we cloned and characterized the full-unit Plasmodium yoelii genes encoding merozoite surface protein 1 (MSP1), circumsporozoite protein (CSP), and Duffy-binding protein (DBP), each of which can be applied for investigations to obtain potent protective vaccines in the rodent malaria model, due to their specific expression patterns during the parasite life cycle. Recombinant fragments corresponding to the middle and C-terminal regions of PyMSP1 and PyCSP, respectively, displayed strong reactivity against P. yoelii -infected mice sera. Specific native antigens invoking strong humoral immune response during the primary and secondary infections of P. yoelii were also abundantly detected in experimental ICR mice. The low or negligible parasitemia observed in the secondary infected mice was likely to result from the neutralizing action of the protective antibodies. Identification of these antigenic proteins might provide the necessary information and means to characterize additional vaccine candidate antigens, selected solely on their ability to produce the protective antibodies.

  14. A review of Andasol 3 and perspective for parabolic trough CSP plants in South Africa

    Science.gov (United States)

    Dinter, Frank; Möller, Lucas

    2016-05-01

    Andasol 3 is a 50 MW parabolic trough concentrating solar power plant with thermal energy storage in Andalusia, southern Spain. Having started operating in 2011 as one of the first plants of its kind in Spain it has been followed by more than 50 in the country since. For the reason that CSP plants with storage have the potential to compete against fossil fuel fired plants much better than any other renewable energy source a long-term review of such a plant operating on a commercial scale is needed. With data at hand documenting Andasol 3's operation over the course of one year between July 2013 and June 2014 we intend to provide such a review. We calculated the plants overall efficiency, its capacity factor, the gross energy generation as well as auxiliary powers on a monthly basis to reflect upon its overall performance. It was also looked at the benefits caused by the thermal energy storage and especially how steadily and reliably the plant was able to operate. With basic background information about physical, geographical and meteorological aspects influencing the solar resource, its variation and a CSP plant's performance a qualitative estimation for a parabolic trough plant located in South Africa was made.

  15. Report: EPA Improved Its National Security Information Program, but Some Improvements Still Needed

    Science.gov (United States)

    Report #16-P-0196, June 2, 2016. The EPA will continue to improve its national security information program by completing information classification guides that can be used uniformly and consistently throughout the agency.

  16. Response of Vibrio cholerae to Low-Temperature Shifts: CspV Regulation of Type VI Secretion, Biofilm Formation, and Association with Zooplankton.

    Science.gov (United States)

    Townsley, Loni; Sison Mangus, Marilou P; Mehic, Sanjin; Yildiz, Fitnat H

    2016-07-15

    The ability to sense and adapt to temperature fluctuation is critical to the aquatic survival, transmission, and infectivity of Vibrio cholerae, the causative agent of the disease cholera. Little information is available on the physiological changes that occur when V. cholerae experiences temperature shifts. The genome-wide transcriptional profile of V. cholerae upon a shift in human body temperature (37°C) to lower temperatures, 15°C and 25°C, which mimic those found in the aquatic environment, was determined. Differentially expressed genes included those involved in the cold shock response, biofilm formation, type VI secretion, and virulence. Analysis of a mutant lacking the cold shock gene cspV, which was upregulated >50-fold upon a low-temperature shift, revealed that it regulates genes involved in biofilm formation and type VI secretion. CspV controls biofilm formation through modulation of the second messenger cyclic diguanylate and regulates type VI-mediated interspecies killing in a temperature-dependent manner. Furthermore, a strain lacking cspV had significant defects for attachment and type VI-mediated killing on the surface of the aquatic crustacean Daphnia magna Collectively, these studies reveal that cspV is a major regulator of the temperature downshift response and plays an important role in controlling cellular processes crucial to the infectious cycle of V. cholerae Little is known about how human pathogens respond and adapt to ever-changing parameters of natural habitats outside the human host and how environmental adaptation alters dissemination. Vibrio cholerae, the causative agent of the severe diarrheal disease cholera, experiences fluctuations in temperature in its natural aquatic habitats and during the infection process. Furthermore, temperature is a critical environmental signal governing the occurrence of V. cholerae and cholera outbreaks. In this study, we showed that V. cholerae reprograms its transcriptome in response to

  17. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices)

    National Research Council Canada - National Science Library

    Ganger, Gregory R

    2007-01-01

    This report summarizes the results of the work on the AFOSR's Critical Infrastructure Protection Program project, entitled Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security...

  18. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  19. Foreign research reactor uranium supply program: The Y-12 national security complex process

    International Nuclear Information System (INIS)

    Nelson, T.; Eddy, B.G.

    2010-01-01

    The Foreign Research Reactor (FRR) Uranium Supply Program at the Y-12 National Security Complex supports the nonproliferation objectives of the HEU Disposition Program, the Reduced Enrichment Research and Test Reactors (RERTR) Program, and the United States FRR Spent Nuclear Fuel (SNF) Acceptance Program. The Y-12 National Nuclear Security Administration (NNSA) Y-12 Site Office maintains the prime contracts with foreign governments for the supply of Low-Enriched Uranium (LEU) for their research reactors. The LEU is produced by down blending Highly Enriched Uranium (HEU) that has been declared surplus to the U.S. national defense needs. The down blending and sale of the LEU supports the Surplus HEU Disposition Program Record of Decision to make the HEU non-weapons usable and to recover the economic value of the uranium to the extent feasible. This program supports the important U.S. government and nuclear nonproliferation commitment to serve as a reliable and cost-effective uranium supplier for those foreign research reactors that are converting or have converted to LEU fuel under the guidance of the NNSA RERTR Program. In conjunction with the FRR SNF Acceptance Program which supports the global nonproliferation efforts to disposition U.S.-origin HEU, the Y-12 FRR Uranium Supply Program can provide the LEU for the replacement fuel fabrication. In addition to feedstock for fuel fabrication, Y-12 supplies LEU for target fabrication for medical isotope production. The Y-12 process uses supply forecasting tools, production improvements and efficient delivery preparations to successfully support the global research reactor community

  20. Measurement of ex vivo ELISpot interferon-gamma recall responses to Plasmodium falciparum AMA1 and CSP in Ghanaian adults with natural exposure to malaria.

    Science.gov (United States)

    Ganeshan, Harini; Kusi, Kwadwo A; Anum, Dorothy; Hollingdale, Michael R; Peters, Bjoern; Kim, Yohan; Tetteh, John K A; Ofori, Michael F; Gyan, Ben A; Koram, Kwadwo A; Huang, Jun; Belmonte, Maria; Banania, Jo Glenna; Dodoo, Daniel; Villasante, Eileen; Sedegah, Martha

    2016-02-01

    Malaria eradication requires a concerted approach involving all available control tools, and an effective vaccine would complement these efforts. An effective malaria vaccine should be able to induce protective immune responses in a genetically diverse population. Identification of immunodominant T cell epitopes will assist in determining if candidate vaccines will be immunogenic in malaria-endemic areas. This study therefore investigated whether class I-restricted T cell epitopes of two leading malaria vaccine antigens, Plasmodium falciparum circumsporozoite protein (CSP) and apical membrane antigen-1 (AMA1), could recall T cell interferon-γ responses from naturally exposed subjects using ex vivo ELISpot assays. Thirty-five subjects aged between 24 and 43 years were recruited from a malaria-endemic urban community of Ghana in 2011, and their peripheral blood mononuclear cells (PBMCs) were tested in ELISpot IFN-γ assays against overlapping 15mer peptide pools spanning the entire CSP and AMA1 antigens, and 9-10mer peptide epitope mixtures that included previously identified and/or predicted human leukocyte antigen (HLA) class 1-restricted epitopes from same two antigens. For CSP, 26 % of subjects responded to at least one of the nine 15mer peptide pools whilst 17 % responded to at least one of the five 9-10mer HLA-restricted epitope mixtures. For AMA1, 63 % of subjects responded to at least one of the 12 AMA1 15mer peptide pools and 51 % responded to at least one of the six 9-10mer HLA-restricted epitope mixtures. Following analysis of data from the two sets of peptide pools, along with bioinformatics predictions of class I-restricted epitopes and the HLA supertypes expressed by a subset of study subjects, peptide pools that may contain epitopes recognized by multiple HLA supertypes were identified. Collectively, these results suggest that natural transmission elicits ELISpot IFN-γ activities to class 1-restricted epitopes that are largely HLA-promiscuous. These

  1. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  2. Global agenda, local health: including concepts of health security in preparedness programs at the jurisdictional level.

    Science.gov (United States)

    Eby, Chas

    2014-01-01

    The Global Health Security Agenda's objectives contain components that could help health departments address emerging public health challenges that threaten the population. As part of the agenda, partner countries with advanced public health systems will support the development of infrastructure in stakeholder health departments. To facilitate this process and augment local programs, state and local health departments may want to include concepts of health security in their public health preparedness offices in order to simultaneously build capacity. Health security programs developed by public health departments should complete projects that are closely aligned with the objectives outlined in the global agenda and that facilitate the completion of current preparedness grant requirements. This article identifies objectives and proposes tactical local projects that run parallel to the 9 primary objectives of the Global Health Security Agenda. Executing concurrent projects at the international and local levels in preparedness offices will accelerate the completion of these objectives and help prevent disease epidemics, detect health threats, and respond to public health emergencies. Additionally, future funding tied or related to health security may become more accessible to state and local health departments that have achieved these objectives.

  3. Recent advances in C(sp3–H bond functionalization via metal–carbene insertions

    Directory of Open Access Journals (Sweden)

    Bo Wang

    2016-04-01

    Full Text Available The recent development of intermolecular C–H insertion in the application of C(sp3–H bond functionalizations, especially for light alkanes, is reviewed. The challenging problem of regioselectivity in C–H bond insertions has been tackled by the use of sterically bulky metal catalysts, such as metal porphyrins and silver(I complexes. In some cases, high regioselectivity and enantioselectivity have been achieved in the C–H bond insertion of small alkanes. This review highlights the most recent accomplishments in this field.

  4. The first 50 years: A review of the Department of Energy domestic safeguards and security program

    Energy Technology Data Exchange (ETDEWEB)

    Desmond, W.J.; Zack, N.R.; Tape, J.W.

    1997-12-01

    World War II not only brought the United States rapidly into the nuclear age, but it also brought a new term, {open_quotes}safeguards.{close_quotes} By that time, physical security was an already established activity that dealt with the protection of possessions such as property, vehicles, and other valuables. A secret nuclear project under a stadium at the University of Chicago would add a new dimension to physical security. Similarly, a community known only by its post office box at a location 27 miles from Santa Fe, New Mexico (PO Box 1663) would initiate new programs to protect information and technology while their programs changed the science and warfare around the world. The Manhattan Project and what was to become the Los Alamos Scientific Laboratory (now Los Alamos National Laboratory) would extend the applications of physical security and, soon to be implemented, safeguards to produce important technical advances for the protection, accounting, control, and nonproliferation of fissile nuclear materials. Security for nuclear materials and weapons information began as a foremost consideration with the start of the nuclear programs in the early 1940s. In the 1960s, the Atoms for Peace Program promoted the peaceful use of nuclear energy and made the US a supplier of nuclear materials and peaceful-use nuclear technology to other states. This program also changed the focus on nuclear materials from that of worldwide control to inspection by an independent agency, the proposed International Atomic Energy Agency. At this same time the nuclear weapons states increased from three to five. Other nations worked to obtain a nuclear weapons capability, resulting in increasing concerns about nuclear proliferation.

  5. A cross-cultural, long-term outcome evaluation of the ISTAR Comprehensive Stuttering Program across Dutch and Canadian adults who stutter.

    NARCIS (Netherlands)

    Langevin, M.; Huinck, W.J.; Kully, D.; Peters, H.F.M.; Lomheim, H.; Tellers, M.

    2006-01-01

    There is a need to evaluate the effectiveness of stuttering treatment programs delivered in domestic and international contexts and to determine if treatment delivered internationally is culturally sensitive. Evaluation of the effectiveness of the ISTAR Comprehensive Stuttering Program (CSP) within

  6. An investigation into multi-dimensional prediction models to estimate the pose error of a quadcopter in a CSP plant setting

    Science.gov (United States)

    Lock, Jacobus C.; Smit, Willie J.; Treurnicht, Johann

    2016-05-01

    The Solar Thermal Energy Research Group (STERG) is investigating ways to make heliostats cheaper to reduce the total cost of a concentrating solar power (CSP) plant. One avenue of research is to use unmanned aerial vehicles (UAVs) to automate and assist with the heliostat calibration process. To do this, the pose estimation error of each UAV must be determined and integrated into a calibration procedure. A computer vision (CV) system is used to measure the pose of a quadcopter UAV. However, this CV system contains considerable measurement errors. Since this is a high-dimensional problem, a sophisticated prediction model must be used to estimate the measurement error of the CV system for any given pose measurement vector. This paper attempts to train and validate such a model with the aim of using it to determine the pose error of a quadcopter in a CSP plant setting.

  7. National programs for the development and development of the culture of Security in the nuclear activities in Cuba

    International Nuclear Information System (INIS)

    Ferro Fernandez, R.; Guillen Campos, A.; Arnau Fernandez, A.

    2003-01-01

    From their appearance, as a result of the investigations of the accident in the Nuclear Power station of Chernobyl, the term Culture of Security has been considered a key element to achieve a elevated level of security in the nuclear facilities, becoming a basic principle of security, grateful internationally. The Organ Cuban Regulator understood from very early the importance of to promote and to develop attitudes and characteristic in the organizations and the personnel linked to the nuclear sector that you/they reflected a high culture of security, for to propitiate a bigger involvement of all in the topics of security and in that way to contribute significantly to the prevention of accidents in the nuclear facilities. Although the Program Nuclear Cuban suffered serious reductions in the decade of the years 90, the Organ Regulator has continuous working in this address, assimilating all the international experience for its application in their strategies of development of the culture of security in the nuclear activities that today they are executed in the country. The present work picks up the Cuban experience in the conformation of a National Program for the development and development of the Culture of Security

  8. From Charity to Security: The Emergence of the National School Lunch Program

    Science.gov (United States)

    Rutledge, Jennifer Geist

    2015-01-01

    This paper explores the historical formation of the National School Lunch Program (NSLP) in the United States and argues that programme emergence depended on the ability of policy entrepreneurs to link the economic concerns of agricultural production with the ideational concern of national security. Using a historical institutionalist framework…

  9. Benefits of production extension and shifting with thermal storage for a 1MW CSP-ORC plant in Morocco

    Science.gov (United States)

    Bennouna, El Ghali; Mimet, Abdelaziz; Frej, Hicham

    2016-05-01

    The importance of thermal storage for commercial CSP (concentrated Solar Power) plants has now become obvious, this regardless of the solar technology used and the power cycle. The availability of a storage system to a plant operator brings a lot of possibilities for production management, cash flow optimization and grid stabilizing. In particular, and depending on plant location and local grid strategy, thermal storage can contribute, when wisely used, to control production and adapt it to the demand and / or power unbalances and varying prices. Storage systems design, sizing and configuration are proper to each power plant, hence systems that are now widely installed within large commercial solar plants are not necessarily suited for small scale decentralized production, and will not have the same effects. In this paper the benefits of thermal storage are studied for a 1MWe CSP plant with an ORC (Organic Rankine Cycle), this plant has many specific features which call for a detail analysis about the appropriate storage design and optimum operating strategies for decentralized solutions.

  10. Capacity building program: Framework of Standards to secure and facilitate Global Trade

    Energy Technology Data Exchange (ETDEWEB)

    Koech, H K [Program Manager CBP/DHS Office Number 363-6109 Cell Number 0722-774-912, Office Location: Ground Floor U.S. Embassy Nairobi (Kenya)

    2010-07-01

    Effective implementation of capacity building program in Kenya will result in maximum protection against terrorist activity/counter terrorism worldwide due to countries meeting the requirements of the program via safety and security measures at land borders, seaports, and airports. It will also result in enforcement of illegal trade pertaining to terrorist financing, money laundering, trade fraud, strategic cases including weapons of mass destruction, child pornography, intellectual property rights, document fraud, alien smuggling, drug smuggling, and general smuggling. It will also facilitate legitimate commerce.

  11. Capacity building program: Framework of Standards to secure and facilitate Global Trade

    International Nuclear Information System (INIS)

    Koech, H.K.

    2010-01-01

    Effective implementation of capacity building program in Kenya will result in maximum protection against terrorist activity/counter terrorism worldwide due to countries meeting the requirements of the program via safety and security measures at land borders, seaports, and airports. It will also result in enforcement of illegal trade pertaining to terrorist financing, money laundering, trade fraud, strategic cases including weapons of mass destruction, child pornography, intellectual property rights, document fraud, alien smuggling, drug smuggling, and general smuggling. It will also facilitate legitimate commerce.

  12. Novel Techniques for Secure Use of Public Cloud Computing Resources

    Science.gov (United States)

    2015-09-17

    present a query (e.g., SQL or NoSQL ) to the CSP and the CSP will return the subset of valid data that matches the query parameters. Create The client...connected to the database and storage services provided by Amazon. DynamoDB is a NoSQL database, and this is the primary destination for items inserted

  13. Clean power from deserts. The DESERTEC concept for energy, water and climate security

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2009-07-01

    The main challenge for the future is to reclaim energy from renewable and clean sources in environmentally compatible ways. Here the deserts of the earth can play a key role. They receive about 700 times more energy from the sun than humankind consumes by burning fossil fuels, day by day. Deserts are the places with the best solar radiation conditions and with the least possible impact of collector deployment onto the biosphere on earth. In deserts, clean power can be produced by solar thermal power plants (CSP) in a truly sustainable way and at any volume of conceivable demand. Power can be transmitted with low losses by high voltage direct current (HVDC) lines to more than 90% of the world's population. This gives the deserts a new role: Together with the many other forms of accessible renewable energy the newly utilized desert would enable us to replace fossil fuels and thus end the ongoing destruction of our natural living conditions. To put this into practice, countries with deserts, countries with high energy demand and countries with technology competence must cooperate. This is an opportunity for the Mediterranean riparian regions of Europe, the Middle East and North Africa (EUMENA) to form a community for energy, water and climate security. With the political will, EUMENA countries could now launch 'EUMENA-DESERTEC' Program, to bring humankind back into balance with its environment, by putting deserts and technology into service for energy, water and climate security. This would be an important step towards creating a truly sustainable civilization.

  14. 12 CFR 21.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... shall have, at a minimum, the following security devices: (1) A means of protecting cash or other liquid assets, such as a vault, safe, or other secure space; (2) A lighting system for illuminating, during the...

  15. Building and implementing a security certification and accreditation program official (ISC)2 guide to the CAPCM CBK

    CERN Document Server

    Howard, Patrick D

    2004-01-01

    Building and Implementing a Security Certification and Accreditation Program: Official (ISC)2 Guide to the CAP CBK demonstrates the practicality and effectiveness of certification and accreditation (C&A) as a risk management methodology for IT systems in both public and private organizations. It provides security professionals with an overview of C&A components, enabling them to document the status of the security controls of their IT systems, and learn how to secure systems via standard, repeatable processes.  This book consists of four main sections. It begins with a description of what it

  16. 7 CFR 772.6 - Subordination of security.

    Science.gov (United States)

    2010-01-01

    ... AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.6 Subordination of security. (a) Eligibility. The Agency shall grant a subordination of Minor Program loan security when the transaction will... still be adequately secured after the subordination, or the value of the loan security will be increased...

  17. Sowing the Seeds of Strategic Success Across West Africa: Propagating the State Partnership Program to Shape the Security Environment

    Science.gov (United States)

    2017-06-09

    region’s continued growth in economics , population, influence, and the correlating 17 increase in risks to stability from radicalization and...environment and stem the tide of regional instability . The National Guard’s State Partnership Program is a security cooperation tool that Geographic... instability . The National Guard’s State Partnership Program is a security cooperation tool that Geographic Combatant Commanders can leverage to enhance the

  18. Source Security Program in the Philippines: a lost source search experience

    International Nuclear Information System (INIS)

    Romallosa, Kristine M.; Salabit, Maria T.; Caseria, Estrella; Valdezco, Eulinia

    2008-01-01

    The Philippine Nuclear Research Institute (PNRI), the national agency in the licensing and regulations of radioactive materials in the country, is strengthening its capabilities in the security of radioactive sources. Part of this program is the PNRI's participation in the Regional Security of Radioactive Sources (RSRS) Project of the Australian Nuclear Science and Technology Organization (ANSTO). The project has provided equipment and methods training, assistance in the development of PNRI's own training program and support for actual orphan source search activities. On May 2007, a source search for the two lost Cs-137 level gauges of a steel manufacturing company was conducted by the PNRI and ANSTO. The source search are the: a) Development of instrument and source search training for the team, the National Training Workshop on Orphan Source Searches which was organized and conducted as a result of train-the-trainors fellowship under the RSRS project; and b) Planning and implementation of the lost source search activity. The conduct of the actual search on warehouses, product yard, canals, dust storage, steel making building, scrap yards and nearby junk shops of the steel plant took one week. The week-long search did not find the lost sources. However, naturally occurring radioactive materials identified to be Thorium, were found on sands, bricks and sack piles that are stored and/or generally present in the warehouses, yard and steel making building. The search activity had therefore cleared the facility of the lost source and its corresponding hazards. The NORM found present in the plant's premises on the other hand brought the attention of the management of the needed measures to ensure safety of the staff from possible hazards of these materials. Currently, the course syllabus that was developed is continuously enhanced to accommodate the training needs of the PNRI staff particularly for the emergency response and preparedness. This component of the source

  19. 6 CFR 7.10 - Authority of the Chief Security Officer, Office of Security.

    Science.gov (United States)

    2010-01-01

    ...) Direct and administer DHS implementation and compliance with the National Industrial Security Program in... 6 Domestic Security 1 2010-01-01 2010-01-01 false Authority of the Chief Security Officer, Office of Security. 7.10 Section 7.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE...

  20. Carbon Dioxide-Mediated C(sp3)-H Arylation of Amine Substrates.

    Science.gov (United States)

    Kapoor, Mohit; Liu, Daniel; Young, Michael C

    2018-05-25

    Elaborating amines via C-H functionalization has been an important area of research over the past decade but has generally relied on an added directing group or sterically hindered amine approach. Since free-amine-directed C(sp 3 )-H activation is still primarily limited to cyclization reactions and to improve the sustainability and reaction scope of amine-based C-H activation, we present a strategy using CO 2 in the form of dry ice that facilitates intermolecular C-H arylation. This methodology has been used to enable an operationally simple procedure whereby 1° and 2° aliphatic amines can be arylated selectively at their γ-C-H positions. In addition to potentially serving as a directing group, CO 2 has also been demonstrated to curtail the oxidation of sensitive amine substrates.

  1. Nuclear security education and training at Naif Arab University for Security Sciences

    International Nuclear Information System (INIS)

    Amjad Fataftah

    2009-01-01

    Naif Arab University for Security Sciences (NAUSS) was established in 1978 as an Arab institution specialized in security sciences to fulfill the needs of the Arab law enforcement agencies for an academic institution that promotes research in security sciences, offers graduate education programs and conduct short-term training courses, which should contribute to the prevention and control of crimes in the Arab world. NAUSS and the IAEA organized the first workshop on nuclear security on November, 2006, which aimed to explore and improve the nuclear security culture awareness through the definitions of the nuclear security main pillars, Prevention, Detection and Response. In addition, NAUSS and IAEA organized a very important training course on April, 2008 on combating nuclear terrorism titled P rotection against nuclear terrorism: Protection of radioactive sources . In the past two years, IAEA has put tremendous efforts to develop an education program in nuclear security, which may lead into Master's degree in nuclear security, where NAUSS helped in this project through the participation in the IAEA organized consultancy and technical meetings for the development of this program along with many other academic, security and law enfacement experts and lawyers from many different institution in the world. NAUSS and IAEA drafted a work plan for the next coming two years which should lead into the gradual implementation of these educational programs at NAUSS. NAUSS also continues to participate in several local conferences and symposiums related to the peaceful application of nuclear power in the gulf region, and the need for a human resources development programs to fulfill the scientific and security needs which will arise from building nuclear power plants. NAUSS participated in the International Symposium on the Peaceful Application of Nuclear Technology in the GCC countries, organized by King Abdulaziz University in the city of Jeddah, Saudi Arabia. Also NAUSS

  2. Synthesis of benzimidazoles by PIDA-promoted direct C(sp2)-H imidation of N-arylamidines.

    Science.gov (United States)

    Huang, Jinbo; He, Yimiao; Wang, Yong; Zhu, Qiang

    2012-10-29

    A metal-free synthesis of diversified benzimidazoles from N-arylamidines through a phenyliodine(III) diacetate (PIDA) promoted intramolecular direct C(sp(2))-H imidation has been developed. The reaction proceeds smoothly at 0 °C or ambient temperature to provide the desired products in good to excellent yields. The synthesis of 2-alkyl- or 2-alkyl-fused benzimidazoles, which are generally inaccessible by similar Pd- or Cu-catalyzed approaches, can also be achieved. Copyright © 2012 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  3. Physical protection educational program - information security aspects

    International Nuclear Information System (INIS)

    Tolstoy, A.

    2002-01-01

    Full text: Conceptual approaches for designing an expert training program on object physical protection taking into account information security aspects are examined. A special educational course does not only address the immediate needs for an educational support but also ensures that new professionals include new concepts and knowledge in their practice and encourages current practitioners towards such practice. Features of the modern physical protection systems (PPS) and classification of information circulating at them are pointed out. The requirements to the PPS information protection subsystem are discussed. During the PPS expert training on information security (IS) aspects they should receive certain knowledge, on the basis of which they could competently define and carry out the PPS IS policy for a certain object. Thus, it is important to consider minimally necessary volume of knowledge taught to the PPS experts for independent and competent implementation of the above listed tasks. For the graduate PPS IS expert training it is also necessary to examine the normative and legal acts devoted to IS as a whole and the PPS IS in particular. It is caused by necessity of conformity of methods and information protection tools implemented on a certain object to the federal and departmental IS requirements. The departmental normative IS requirements define an orientation of the PPS expert training. By curriculum development it is necessary to precisely determine for whom the PPS experts are taught. The curriculum should reflect common features of the PPS functioning of the certain object type, i.e. it should be adapted to a certain customer of the experts. The specified features were taken into account by development of an educational course 'Information security of the nuclear facility physical protection systems', taught at the Moscow Engineering Physics Institute (State University) according to the Russian-American educational program 'Master in Physical

  4. The role of optics in secure credentials

    Science.gov (United States)

    Lichtenstein, Terri L.

    2006-02-01

    The global need for secure ID credentials has grown rapidly over the last few years. This is evident both in government and commercial sectors. Governmental programs include national ID card programs, permanent resident cards for noncitizens, biometric visas or border crossing cards, foreign worker ID programs and secure vehicle registration programs. The commercial need for secure credentials includes secure banking and financial services, security and access control systems and digital healthcare record cards. All of these programs necessitate the use of multiple tamper and counterfeit resistant features for credential authentication and cardholder verification. It is generally accepted that a secure credential should include a combination of overt, covert and forensic security features. The LaserCard optical memory card is a proven example of a secure credential that uses a variety of optical features to enhance its counterfeit resistance and reliability. This paper will review those features and how they interact to create a better credential.

  5. Thermal stability of multilayered Pt-Al2O3 nanocoatings for high temperature CSP systems

    CSIR Research Space (South Africa)

    Nuru, ZY

    2015-10-01

    Full Text Available B), 115-120 Thermal stability of multilayered Pt-Al2O3 nanocoatings for high temperature CSP systems Z.Y. Nuru a, b, *, L. Kotsedi a, b, C.J. Arendse c, D. Motaung d, B. Mwakikunga d, K. Roro d, e, M. Maaza a, b a UNESCO-UNISA Africa Chair... Pretoria, South Africa e R&D Core-Energy, Council for Scientific and Industrial Research, P O Box 395, 0001 Pretoria, South Africa Abstract This contribution reports on the effect of thermal annealing on sputtered Pt–Al(sub2)O(sub3) multilayered...

  6. The Department of Energy's safeguards and security technology development program

    International Nuclear Information System (INIS)

    Smith, G.D.; Pocratsky, C.A.

    1995-01-01

    The US DOE has had a program that develops technologies to protect sensitive nuclear weapons facilities for more than thirty years. The mission of the program is overwhelmingly diverse, as it must be to protect an array of assets such as nuclear weapons, special nuclear material in various forms, components of nuclear weapons, and classified nuclear weapons design information. Considering that the nuclear weapons complex consists of dozens of facilities that are scattered all over the US, the technology development mission is very challenging. Complicating matters further is the ever uncertain future of the DOE. Some examples of dramatic Departmental mission changes that directly impact their security technology development program are given. A few development efforts are highlighted as examples of efforts currently being sponsored. They are: automated sensor testing devices to help reduce the requirement for personnel to enter vaults containing highly radioactive nuclear materials; a vehicle inspection portal to screen vehicles for hidden passengers, nuclear material, explosives, and other contraband; non-lead and short-range ammunition as an environmentally safe alternative to lead ammunition; a complex-wide visitor access control system to allow all DOE employees to travel to all sites with a commonly recognized credential; automated nuclear material monitoring technologies to provide assurance that material in storage has not been tampered with; laser radar as a potential solution to early warning deficiencies throughout the Department; performance testing standards for many security products to include an automated and consistent standard for assessing the quality of video; low temperature pyrotechnic smoke as a possible adversary delay mechanism; modular vaults to provide temporary protection for nuclear material during D and D activities, and a protection approach for restricted passage areas such as the volume above a tiled ceiling or within a crawl space

  7. LCOE reduction potential of parabolic trough and solar tower CSP technology until 2025

    Science.gov (United States)

    Dieckmann, Simon; Dersch, Jürgen; Giuliano, Stefano; Puppe, Michael; Lüpfert, Eckhard; Hennecke, Klaus; Pitz-Paal, Robert; Taylor, Michael; Ralon, Pablo

    2017-06-01

    Concentrating Solar Power (CSP), with an installed capacity of 4.9 GW by 2015, is a young technology compared to other renewable power generation technologies. A limited number of plants and installed capacity in a small challenging market environment make reliable and transparent cost data for CSP difficult to obtain. The International Renewable Energy Agency (IRENA) and the DLR German Aerospace Center gathered and evaluated available cost data from various sources for this publication in order to yield transparent, reliable and up-to-date cost data for a set of reference parabolic trough and solar tower plants in the year 2015 [1]. Each component of the power plant is analyzed for future technical innovations and cost reduction potential based on current R&D activities, ongoing commercial developments and growth in market scale. The derived levelized cost of electricity (LCOE) for 2015 and 2025 are finally contrasted with published power purchase agreements (PPA) of the NOOR II+III power plants in Morocco. At 7.5% weighted average cost of capital (WACC) and 25 years economic life time, the levelized costs of electricity for plants with 7.5 (trough) respectively 9 (tower) full-load hours thermal storage capacity decrease from 14-15 -ct/kWh today to 9-10 -ct/kWh by 2025 for both technologies at direct normal irradiation of 2500 kWh/(m².a). The capacity factor increases from 41.1% to 44.6% for troughs and from 45.5% to 49.0% for towers. Financing conditions are a major cost driver and offer potential for further cost reduction with the maturity of the technology and low interest rates (6-7 - ct/kWh for 2% WACC at 2500 kWh/(m2.a) in 2025).

  8. Automata learning algorithms and processes for providing more complete systems requirements specification by scenario generation, CSP-based syntax-oriented model construction, and R2D2C system requirements transformation

    Science.gov (United States)

    Hinchey, Michael G. (Inventor); Margaria, Tiziana (Inventor); Rash, James L. (Inventor); Rouff, Christopher A. (Inventor); Steffen, Bernard (Inventor)

    2010-01-01

    Systems, methods and apparatus are provided through which in some embodiments, automata learning algorithms and techniques are implemented to generate a more complete set of scenarios for requirements based programming. More specifically, a CSP-based, syntax-oriented model construction, which requires the support of a theorem prover, is complemented by model extrapolation, via automata learning. This may support the systematic completion of the requirements, the nature of the requirement being partial, which provides focus on the most prominent scenarios. This may generalize requirement skeletons by extrapolation and may indicate by way of automatically generated traces where the requirement specification is too loose and additional information is required.

  9. TRANSPETRO gas security of supply program; Programa de confiabilidade de suprimento de gas natural da TRANSPETRO

    Energy Technology Data Exchange (ETDEWEB)

    Faertes, Denise [PETROBRAS Transporte S.A. (TRANSPETRO), Rio de Janeiro, RJ (Brazil)

    2005-07-01

    The purpose of this paper is to present the Gas Security of Supply Program that is being implemented at TRANSPETRO since 2002. It includes the application of the state of the art techniques and models related to reliability engineering. The main objective of the program is to evaluate and optimize overall gas network performance and to provide gas to different consumers (industrial, residential, thermo-plants and vehicles) in compliance with stated reliability levels. Heavy fines will be applied to PETROBRAS in case of occurrence of shortfalls. We hope that this paper can contribute to a wider discussion about this subject of performance indicators involving security of supply, safety and environment preservation. (author)

  10. Augmenting Space Technology Program Management with Secure Cloud & Mobile Services

    Science.gov (United States)

    Hodson, Robert F.; Munk, Christopher; Helble, Adelle; Press, Martin T.; George, Cory; Johnson, David

    2017-01-01

    The National Aeronautics and Space Administration (NASA) Game Changing Development (GCD) program manages technology projects across all NASA centers and reports to NASA headquarters regularly on progress. Program stakeholders expect an up-to-date, accurate status and often have questions about the program's portfolio that requires a timely response. Historically, reporting, data collection, and analysis were done with manual processes that were inefficient and prone to error. To address these issues, GCD set out to develop a new business automation solution. In doing this, the program wanted to leverage the latest information technology platforms and decided to utilize traditional systems along with new cloud-based web services and gaming technology for a novel and interactive user environment. The team also set out to develop a mobile solution for anytime information access. This paper discusses a solution to these challenging goals and how the GCD team succeeded in developing and deploying such a system. The architecture and approach taken has proven to be effective and robust and can serve as a model for others looking to develop secure interactive mobile business solutions for government or enterprise business automation.

  11. 14 CFR 1203.201 - Information security objectives.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Information security objectives. 1203.201 Section 1203.201 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.201 Information security objectives. The objectives of...

  12. Development programs of cutting-edge technologies for measurement and detection of nuclear material for safeguards and security

    International Nuclear Information System (INIS)

    Seya, Michio; Wakabayashi, Shuji; Naoi, Yosuke; Ohkubo, Michiaki; Senzaki, Masao

    2011-01-01

    The Integrated Support Center for Nuclear Nonproliferation and Nuclear Security ('ISCN', hereafter) of Japan Atomic Energy Agency (JAEA) has development programs of cutting-edge technologies for measurement and detection of nuclear materials for nuclear safeguards and security, under the sponsorship of Japanese government (MEXT: Ministry of Education, Culture, Sports, Science and Technology). ISCN started development programs of the following technologies this year. (1) NRF (Nuclear Resonance Fluorescence) NDA technology using laser Compton scattering (LCS) gamma-rays, (2) Alternative to 3 He neutron detection technology using inorganic solid scintillator. ISCN is also going to conduct a demonstration test of a spent fuel Pu-NDA system that is to be developed by LANL (Los Alamos National Laboratory) using very sophisticated neutron measurement technologies, under JAEA/USDOE cooperation agreement. This presentation shows the above programs of ISCN. (author)

  13. Human resource development program for nuclear safety and security in Tokyo Institute of Technology

    International Nuclear Information System (INIS)

    Han, Chi Young; Sagara, Hiroshi; Nagasaka, Hideo

    2014-01-01

    The Academy for Global Nuclear Safety and Security Agent was established at Tokyo Institute of Technology in 2011, to develop global nuclear human resources in the field of 3S (Safety, Security, and Safeguards) as a Program for Leading Graduate Schools supported by MEXT (Ministry of Education, Culture, Sports, Science and Technology). New courses of nuclear safety and security were developed in addition to the existing nuclear engineering program; 1) Environmental Dynamics of Radioactive Nuclides; Numerical simulation of the environmental dispersion of radioactive materials released from hypothetical nuclear accidents and evaluation of the public exposure are performed, by using a computer-based emergency response system, to have students predict the environmental dispersion of radionuclides and radiological consequence by nuclear accidents. 2) Measurement of Environmental Radiation; Students acquire hands-on experiences measuring environmental radiation contamination caused by the nuclear accident in Fukushima with multiple types of radiation detectors. Environmental samples are collected and analyzed for isotope identification and its spatial distribution. 3) Simulation of Severe Nuclear Accidents; The evaluation results of Fukushima accident progression are discussed as well as typical sever accidents that threaten the integrity of reactor vessel. Students simulate BWR (Boiling Water Cooled Reactor) transients, design basis accidents, and severe accidents by using simulators. 4) Nuclear Security Training; Design of physical protection systems, its fundamental physics, and regulatory frameworks are covered and students gain the practical experiences by use of intrusion detection systems at JAEA (Japan Atomic Energy Agency), and by numerical simulation of hydro-dynamics of structure material and nuclear material criticality at the university. (author)

  14. Execution of a participatory supportive return to work program within the Dutch social security sector: a qualitative evaluation of stakeholders' perceptions.

    Science.gov (United States)

    Lammerts, Lieke; Schaafsma, Frederieke G; van Mechelen, Willem; Anema, Johannes R

    2016-04-14

    A process evaluation of a participatory supportive return to work program, aimed at workers without a (permanent) employment contract who are sick-listed due to a common mental disorder, revealed that this program was executed less successfully than similar programs evaluated in earlier studies. The program consisted of a participatory approach, integrated care and direct placement in competitive employment. Aim of this study was to get a better understanding of the execution of the program by evaluating stakeholders' perceptions. In the absence of an employer, the program was applied by the Dutch Social Security Agency, in collaboration with vocational rehabilitation agencies. Together with the sick-listed workers, these were the main stakeholders. Our research questions involved stakeholders' perceptions of the function(s) of the program, and their perceptions of barriers and facilitators for a successful execution of the program within the Dutch social security sector. Semi-structured interviews were held with five sick-listed workers, eight professionals of the Social Security Agency, and two case managers of vocational rehabilitation agencies. Interview topics were related to experiences with different components of the program. Selection of respondents was based on purposive sampling and continued until data saturation was reached. Content analysis was applied to identify patterns in the data. Two researchers developed a coding system, based on predefined topics and themes emerging from the data. Although perceived functions of some components of the program were as intended, all stakeholders stressed that the program often had not resulted in return to work. Perceived barriers for a successful execution were related to a poor collaboration between the Dutch Social Security Agency, vocational rehabilitation agencies and healthcare providers, the type of experienced (health) problems, time constraints, and limited job opportunities. For future implementation

  15. 10 CFR 605.18 - National security.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...

  16. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  17. Computers, business, and security the new role for security

    CERN Document Server

    Schweitzer, James A

    1987-01-01

    Computers, Business, and Security: The New Role for Security addresses the professional security manager's responsibility to protect all business resources, with operating environments and high technology in mind. This book discusses the technological aspects of the total security programs.Organized into three parts encompassing 10 chapters, this book begins with an overview of how the developing information age is affecting business management, operations, and organization. This text then examines a number of vulnerabilities that arise in the process of using business computing and communicat

  18. Paddy farmer households’ participation and food security level in special effort program in Seputih Raman sub-district of Central Lampung Regency

    Science.gov (United States)

    Rangga, K. K.; Syarief, Y. A.

    2018-03-01

    The objectives of this study are to study the participation of paddy farmers in the Special Effort program to increase paddy production, to study the level of household food security of paddy farmers, and to analyze the correlation between farmer participation and food security level of paddy farmers. The location was chosen purposively in Seputih Raman sub-district. The data were collected from December 2016 to February 2017. The population of this study was paddy farmers who participating in Special Effort program. The hypothesis was tested by using Spearman’s Rank correlation test. Farmer household’s food security was measured objectively based on the share of household’s food expenditure and subjectively based on the opinion, views, and attitudes or farmers’ opinions on food availability, food distribution, and household food consumption. This research showed that farmers’ participation in Special Effort program in Seputih Raman Sub Ditrict, Central Lampung Regency belonged to medium classification, household food security either objectively or subjectively was in food resistant condition of medium classification, and there was significant correlation between farmers’ participation and food security level of paddy farmer household.

  19. From Wireless Sensor Networks to Wireless Body Area Networks: Formal Modeling and Verification on Security Using PAT

    Directory of Open Access Journals (Sweden)

    Tieming Chen

    2016-01-01

    Full Text Available Model checking has successfully been applied on verification of security protocols, but the modeling process is always tedious and proficient knowledge of formal method is also needed although the final verification could be automatic depending on specific tools. At the same time, due to the appearance of novel kind of networks, such as wireless sensor networks (WSN and wireless body area networks (WBAN, formal modeling and verification for these domain-specific systems are quite challenging. In this paper, a specific and novel formal modeling and verification method is proposed and implemented using an expandable tool called PAT to do WSN-specific security verification. At first, an abstract modeling data structure for CSP#, which is built in PAT, is developed to support the node mobility related specification for modeling location-based node activity. Then, the traditional Dolev-Yao model is redefined to facilitate modeling of location-specific attack behaviors on security mechanism. A throughout formal verification application on a location-based security protocol in WSN is described in detail to show the usability and effectiveness of the proposed methodology. Furthermore, also a novel location-based authentication security protocol in WBAN can be successfully modeled and verified directly using our method, which is, to the best of our knowledge, the first effort on employing model checking for automatic analysis of authentication protocol for WBAN.

  20. Handbook of space security policies, applications and programs

    CERN Document Server

    Hays, Peter; Robinson, Jana; Moura, Denis; Giannopapa, Christina

    2015-01-01

    Space Security involves the use of space (in particular communication, navigation, earth observation, and electronic intelligence satellites) for military and security purposes on earth and also the maintenance of space (in particular the earth orbits) as safe and secure areas for conducting peaceful activities. The two aspects can be summarized as "space for security on earth" and “the safeguarding of space for peaceful endeavors.” The Handbook will provide a sophisticated, cutting-edge resource on the space security policy portfolio and the associated assets, assisting fellow members of the global space community and other interested policy-making and academic audiences in keeping abreast of the current and future directions of this vital dimension of international space policy. The debate on coordinated space security measures, including relevant 'Transparency and Confidence-Building Measures,' remains at a relatively early stage of development. The book offers a comprehensive description of the variou...

  1. Effective vulnerability assessments for physical security devices, systems, and programs

    International Nuclear Information System (INIS)

    Johnston, R.G.; Garcia, A.R.E.

    2002-01-01

    Full text: The efficacy of devices, systems, and programs used for physical security depend critically on having periodic and effective vulnerability assessments. Effective vulnerability assessments, in turn, require certain conditions and attributes. These include: a proper understanding of their purpose; not confusing vulnerability assessments with other kinds of metrics, analyses, tests, and security exercises; the view that vulnerabilities are inevitable, and that finding them is good news (since they can then be mitigated), not bad news; rejection of findings of no vulnerabilities; avoidance of mere 'compliance mode' rubber stamping; the use of the proper outside, independent, imaginative personnel; psychologically predisposed to finding and demonstrating problems; the absence of conflicts of interest; no unrealistic constraints on the possible attack tools, procedures, personnel, or strategies; efforts to not just find and demonstrate vulnerabilities, but also to suggest possible countermeasures; proper context; input and buy-in from ALL facility security personnel, especially low-level personnel; emphasis on the simplest, most relevant attacks first; no underestimation of potential adversaries; consideration of fault analysis attacks; awareness of Rohrbach's Maxim and Shannon's Maxim. In addition to these factors, we will cover some of the complex issues and problems associated with the design of vulnerability assessments. There will also be suggestions on how to conduct effective vulnerability assessments on a severely limited budget. We will conclude with a discussion of both conventional and unconventional ways of reporting results. (author)

  2. CAL3JHH: a Java program to calculate the vicinal coupling constants (3J H,H) of organic molecules.

    Science.gov (United States)

    Aguirre-Valderrama, Alonso; Dobado, José A

    2008-12-01

    Here, we present a free web-accessible application, developed in the JAVA programming language for the calculation of vicinal coupling constant (3J(H,H)) of organic molecules with the H-Csp3-Csp3-H fragment. This JAVA applet is oriented to assist chemists in structural and conformational analyses, allowing the user to calculate the averaged 3J(H,H) values among conformers, according to its Boltzmann populations. Thus, the CAL3JHH program uses the Haasnoot-Leeuw-Altona equation, and, by reading the molecule geometry from a protein data bank (PDB) file format or from multiple pdb files, automatically detects all the coupled hydrogens, evaluating the data needed for this equation. Moreover, a "Graphical viewer" menu allows the display of the results on the 3D molecule structure, as well as the plotting of the Newman projection for the couplings.

  3. Personal computer security: part 1. Firewalls, antivirus software, and Internet security suites.

    Science.gov (United States)

    Caruso, Ronald D

    2003-01-01

    Personal computer (PC) security in the era of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) involves two interrelated elements: safeguarding the basic computer system itself and protecting the information it contains and transmits, including personal files. HIPAA regulations have toughened the requirements for securing patient information, requiring every radiologist with such data to take further precautions. Security starts with physically securing the computer. Account passwords and a password-protected screen saver should also be set up. A modern antivirus program can easily be installed and configured. File scanning and updating of virus definitions are simple processes that can largely be automated and should be performed at least weekly. A software firewall is also essential for protection from outside intrusion, and an inexpensive hardware firewall can provide yet another layer of protection. An Internet security suite yields additional safety. Regular updating of the security features of installed programs is important. Obtaining a moderate degree of PC safety and security is somewhat inconvenient but is necessary and well worth the effort. Copyright RSNA, 2003

  4. Security auditing: a prescription for keeping protection programs healthy.

    Science.gov (United States)

    Luizzo, Anthony

    2010-01-01

    The different aspects of security auditing and the role of the security auditor is explained in detail by the author in this primer for security professionals with specific advice on what should be included in a security audit report.

  5. Pro PHP Security From Application Security Principles to the Implementation of XSS Defenses

    CERN Document Server

    Snyder, Chris; Southwell, Michael

    2010-01-01

    PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also dive into recent developments like mobile security, the impact of Javascript, and the advantages of recent PHP hardening efforts. Pro PHP Security, Second Edition will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. Beginners in secure programming will find a l

  6. Center for Coastline Security Technology, Year-2

    Science.gov (United States)

    2007-05-01

    cinematic film industry . For the port security application there are several research issues being addressed under this program, specifically...being the cinematic film industry . For the port security application there are several research issues being addressed under this program...the primary customers being the film industry . For the port security application there are several research issues being addressed under this program

  7. Using the safety/security interface to the security manager's advantage

    International Nuclear Information System (INIS)

    Stapleton, B.W.

    1993-01-01

    Two aspects of the safety/security interface are discussed: (1) the personal safety of nuclear security officers; and (2) how the security manager can effectively deal with the safety/security interface in solving today's requirements yet supporting the overall mission of the facility. The basis of this presentation is the result of interviews, document analyses, and observations. The conclusion is that proper planning and communication between the players involved in the security/safety interface can benefit the two programs and help achieve overall system integration, ultimately contributing to the bottom line. This is especially important in today's cost conscious environment

  8. IgG2 antibodies against a clinical grade Plasmodium falciparum CSP vaccine antigen associate with protection against transgenic sporozoite challenge in mice.

    Directory of Open Access Journals (Sweden)

    Robert Schwenk

    Full Text Available The availability of a highly purified and well characterized circumsporozoite protein (CSP is essential to improve upon the partial success of recombinant CSP-based malaria vaccine candidates. Soluble, near full-length, Plasmodium falciparum CSP vaccine antigen (CS/D was produced in E. coli under bio-production conditions that comply with current Good Manufacturing Practices (cGMP. A mouse immunogenicity study was conducted using a stable oil-in-water emulsion (SE of CS/D in combination with the Toll-Like Receptor 4 (TLR4 agonist Glucopyranosyl Lipid A (GLA/SE, or one of two TLR7/8 agonists: R848 (un-conjugated or 3M-051 (covalently conjugated. Compared to Alum and SE, GLA/SE induced higher CS/D specific antibody response in Balb/c mice. Subclass analysis showed higher IgG2:IgG1 ratio of GLA/SE induced antibodies as compared to Alum and SE. TLR synergy was not observed when soluble R848 was mixed with GLA/SE. Antibody response of 3M051 formulations in Balb/c was similar to GLA/SE, except for the higher IgG2:IgG1 ratio and a trend towards higher T cell responses in 3M051 containing groups. However, no synergistic enhancement of antibody and T cell response was evident when 3M051 conjugate was mixed with GLA/SE. In C57Bl/6 mice, CS/D adjuvanted with 3M051/SE or GLA/SE induced higher CSP repeat specific titers compared to SE. While, 3M051 induced antibodies had high IgG2c:IgG1 ratio, GLA/SE promoted high levels of both IgG1 and IgG2c. GLA/SE also induced more potent T-cell responses compared to SE in two independent C57/BL6 vaccination studies, suggesting a balanced and productive T(H1/T(H2 response. GLA and 3M-051 similarly enhanced the protective efficacy of CS/D against challenge with a transgenic P. berghei parasite and most importantly, high levels of cytophilic IgG2 antibodies were associated with protection in this model. Our data indicated that the cGMP-grade, soluble CS/D antigen combined with the TLR4-containing adjuvant GLA/SE warrants

  9. 78 FR 48076 - Facility Security Clearance and Safeguarding of National Security Information and Restricted Data

    Science.gov (United States)

    2013-08-07

    ...-2011-0268] RIN 3150-AJ07 Facility Security Clearance and Safeguarding of National Security Information..., Classified National Security Information. The rule would allow licensees flexibility in determining the means... licensee security education and training programs and enhances the protection of classified information...

  10. How to implement security controls for an information security program at CBRN facilities

    International Nuclear Information System (INIS)

    Lenaeus, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.; Glantz, Clifford S.; Landine, Guy P.; Bryant, Janet L.; Lewis, John; Mathers, Gemma; Rodger, Robert; Johnson, Christopher

    2015-01-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  11. How to implement security controls for an information security program at CBRN facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lenaeus, Joseph D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); O' Neil, Lori Ross [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Leitch, Rosalyn M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Glantz, Clifford S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Landine, Guy P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Bryant, Janet L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lewis, John [National Nuclear Lab., Workington (United Kingdom); Mathers, Gemma [National Nuclear Lab., Workington (United Kingdom); Rodger, Robert [National Nuclear Lab., Workington (United Kingdom); Johnson, Christopher [National Nuclear Lab., Workington (United Kingdom)

    2015-12-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  12. PREFACE: International conference on Computer Simulation in Physics and beyond (CSP2015)

    Science.gov (United States)

    2016-02-01

    The International conference on Computer Simulations in Physics and beyond (CSP2015) was held from 6-10 September 2015 at the campus of the Moscow Institute for Electronics and Mathematics (MIEM), National Research University Higher School of Economics, Moscow. Computer simulations are in increasingly popular tool for scientific research, supplementing experimental and analytical research. The main goal of the conference is contributing to the development of methods and algorithms which take into account trends in hardware development, which may help with intensive research. The conference also allowed senior scientists and students to have the opportunity to speak each other and exchange ideas and views on the developments in the area of high-performance computing in science. We would like to take this opportunity to thank our sponsors: the Russian Foundation for Basic Research, Federal Agency of Scientific Organizations, and Higher School of Economics.

  13. Synergies between Communicable and Noncommunicable Disease Programs to Enhance Global Health Security.

    Science.gov (United States)

    Kostova, Deliana; Husain, Muhammad J; Sugerman, David; Hong, Yuling; Saraiya, Mona; Keltz, Jennifer; Asma, Samira

    2017-12-01

    Noncommunicable diseases are the leading cause of death and disability worldwide. Initiatives that advance the prevention and control of noncommunicable diseases support the goals of global health security in several ways. First, in addressing health needs that typically require long-term care, these programs can strengthen health delivery and health monitoring systems, which can serve as necessary platforms for emergency preparedness in low-resource environments. Second, by improving population health, the programs might help to reduce susceptibility to infectious outbreaks. Finally, in aiming to reduce the economic burden associated with premature illness and death from noncommunicable diseases, these initiatives contribute to the objectives of international development, thereby helping to improve overall country capacity for emergency response.

  14. Nuclear security. Improving correction of security deficiencies at DOE's weapons facilities

    International Nuclear Information System (INIS)

    Wells, James E.; Cannon, Doris E.; Fenzel, William F.; Lightner, Kenneth E. Jr.; Curtis, Lois J.; DuBois, Julia A.; Brown, Gail W.; Trujillo, Charles S.; Tumler, Pamela K.

    1992-11-01

    The US nuclear weapons research, development, and production are conducted at 10 DOE nuclear weapons facilities by contractors under the guidance and oversight of 9 DOE field offices. Because these facilities house special nuclear materials used in making nuclear weapons and nuclear weapons components, DOE administers a security program to protect (1) against theft, sabotage, espionage, terrorism, or other risks to national security and (2) the safety and health of DOE employees and the public. DOE spends almost $1 billion a year on this security program. DOE administers the security program through periodic inspections that evaluate and monitor the effectiveness of facilities' safeguards and security. Security inspections identify deficiencies, instances of noncompliance with safeguards and security requirements or poor performance of the systems being evaluated, that must be corrected to maintain adequate security. The contractors and DOE share responsibility for correcting deficiencies. Contractors, in correcting deficiencies, must comply with several DOE orders. The contractors' performances were not adequate in conducting four of the eight procedures considered necessary in meeting DOE's deficiency correction requirements. For 19 of the 20 deficiency cases we reviewed, contractors could not demonstrate that they had conducted three critical deficiency analyses (root cause, risk assessment, and cost-benefit) required by DOE. Additionally, the contractors did not always adequately verify that corrective actions taken were appropriate, effective, and complete. The contractors performed the remaining four procedures (reviewing deficiencies for duplication, entering deficiencies into a data base, tracking the status of deficiencies, and preparing and implementing a corrective action plan) adequately in all 20 cases. DOE's oversight of the corrective action process could be improved in three areas. The computerized systems used to track the status of security

  15. Complementary Strategies for Directed C(sp3 )-H Functionalization: A Comparison of Transition-Metal-Catalyzed Activation, Hydrogen Atom Transfer, and Carbene/Nitrene Transfer.

    Science.gov (United States)

    Chu, John C K; Rovis, Tomislav

    2018-01-02

    The functionalization of C(sp 3 )-H bonds streamlines chemical synthesis by allowing the use of simple molecules and providing novel synthetic disconnections. Intensive recent efforts in the development of new reactions based on C-H functionalization have led to its wider adoption across a range of research areas. This Review discusses the strengths and weaknesses of three main approaches: transition-metal-catalyzed C-H activation, 1,n-hydrogen atom transfer, and transition-metal-catalyzed carbene/nitrene transfer, for the directed functionalization of unactivated C(sp 3 )-H bonds. For each strategy, the scope, the reactivity of different C-H bonds, the position of the reacting C-H bonds relative to the directing group, and stereochemical outcomes are illustrated with examples in the literature. The aim of this Review is to provide guidance for the use of C-H functionalization reactions and inspire future research in this area. © 2018 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  16. 32 CFR 154.61 - Security education.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...

  17. Annual training manual for security training: Protective force

    Energy Technology Data Exchange (ETDEWEB)

    1990-10-01

    Westinghouse is committed to high quality training relevant to the need of the Protective Forces at the Waste Isolation Pilot Plant (WIPP). The training programs at WIPP are designed to qualify Security personnel to perform WIPP security missions in a professional and responsible manner. The program consists of basic as well as sustainment training, as further described in this plan. This plan documents the WIPP Security training program for security personnel for calendar year 1990. The programs detailed in this plan are designed to adequately train persons to ensure the uninterrupted continuity of Department of Energy (DOE)/Westinghouse operations. The Security Training Program consists of four basic elements. These elements are (1) basic level training; (2) on-the-job training; (3) refresher training; and (4) in-service training.

  18. Impact of Security Awareness Programs on End-User Security Behavior: A Quantitative Study of Federal Workers

    Science.gov (United States)

    Smith, Gwendolynn T.

    2012-01-01

    The increasing dependence on technology presented more vulnerability to security breaches of information and the need to assess security awareness levels in federal organizations, as well as other organizations. Increased headlines of security breaches of federal employees' security actions prompted this study. The research study reviewed the…

  19. Lessons learned from the scaling-up of a weekly multimicronutrient supplementation program in the integrated food security program (PISA).

    Science.gov (United States)

    Lechtig, Aarón; Gross, Rainer; Vivanco, Oscar Aquino; Gross, Ursula; López de Romaña, Daniel

    2006-01-01

    Weekly multimicronutrient supplementation was initiated as an appropriate intervention to protect poor urban populations from anemia. To identify the lessons learned from the Integrated Food Security Program (Programa Integrado de Seguridad Alimentaria [PISA]) weekly multimicronutrient supplementation program implemented in poor urban populations of Chiclayo, Peru. Data were collected from a 12-week program in which multimicronutrient supplements were provided weekly to women and adolescent girls 12 through 44 years of age and children under 5 years of age. A baseline survey was first conducted. Within the weekly multimicronutrient supplementation program, information was collected on supplement distribution, compliance, biological effectiveness, and cost. Supplementation, fortification, and dietary strategies can be integrated synergistically within a micronutrient intervention program. To ensure high cost-effectiveness of a weekly multimicronutrient supplementation program, the following conditions need to be met: the program should be implemented twice a year for 4 months; the program should be simultaneously implemented at the household (micro), community (meso), and national (macro) levels; there should be governmental participation from health and other sectors; and there should be community and private sector participation. Weekly multimicronutrient supplementation programs are cost effective options in urban areas with populations at low risk of energy deficiency and high risk of micronutrient deficiencies.

  20. Development of security engineering curricula at US universities

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, M.L.

    1998-08-01

    The Southwest Surety Institute was formed in June 1996 by Arizona State University (ASU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL) to provide educational programs in Security Engineering, and to conduct research and development in security technologies. This is the first science-based program of its kind in the US, focused on educating Security Engineers to help government and industry address their security needs. Each member brings a unique educational capability to the Institute. NM Tech has a formidable explosives testing and evaluation facility. ASU is developing a Masters program in Security Engineering at their School of Technology located on a new campus in Mesa, Arizona. NMSU provides a Security Technology minor, merging programs in Criminal Justice and Engineering Technology. The Sandia National Laboratories security system design and evaluation process forms the basis for the Security Engineering curricula. In an effort to leverage the special capabilities of each university, distance education will be used to share courses among Institute members and eventually with other sites across the country.

  1. 75 FR 8096 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-023...

    Science.gov (United States)

    2010-02-23

    ... response to workplace violence, analyzes data as needed, and provides training. Additionally, DHS is... 1974; Department of Homeland Security Transportation Security Administration--023 Workplace Violence... Security Administration--023 Workplace Violence Prevention Program System of Records.'' This system will...

  2. Auditing Organizational Security

    Science.gov (United States)

    2017-01-01

    Organi- zation for Standardiza- tion ( ISO ): ISO 27000 : Information Systems Se- curity Management. A robust program of internal auditing of a...improvement is the basis and underpinning of the ISO . All processes must be considered ongoing and never at an “end state.” Top management develops a...security management system, including security policies and security objectives, plus threats and risks. Orga- nizations already working with ISO 9000

  3. An Attribute-Based Access Control with Efficient and Secure Attribute Revocation for Cloud Data Sharing Service

    Institute of Scientific and Technical Information of China (English)

    Nyamsuren Vaanchig; Wei Chen; Zhi-Guang Qin

    2017-01-01

    Nowadays, there is the tendency to outsource data to cloud storage servers for data sharing purposes. In fact, this makes access control for the outsourced data a challenging issue. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution for this challenge. It gives the data owner (DO) direct control on access policy and enforces the access policy cryptographically. However, the practical application of CP-ABE in the data sharing service also has its own inherent challenge with regard to attribute revocation. To address this challenge, we proposed an attribute-revocable CP-ABE scheme by taking advantages of the over-encryption mechanism and CP-ABE scheme and by considering the semi-trusted cloud service provider (CSP) that participates in decryption processes to issue decryption tokens for authorized users. We further presented the security and performance analysis in order to assess the effectiveness of the scheme. As compared with the existing attribute-revocable CP-ABE schemes, our attribute-revocable scheme is reasonably efficient and more secure to enable attribute-based access control over the outsourced data in the cloud data sharing service.

  4. 6 CFR 27.215 - Security vulnerability assessments.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security vulnerability assessments. 27.215 Section 27.215 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.215 Security vulnerability...

  5. Social Security Programs Throughout the World: Africa, 2015

    Data.gov (United States)

    Social Security Administration — This report, which is part of a four-volume series, provides a cross-national comparison of the social security systems in 48 countries in Africa. It summarizes the...

  6. Gene expression programming for power system static security ...

    African Journals Online (AJOL)

    user

    fuzzy logic, artificial neural networks and expert systems have been explored for static security assessment problems (Bansal et ..... MATLAB version 7.6 neural network toolbox was ..... Vision 2020 Dynamic Security Assessment in Real time.

  7. Web security a whitehat perspective

    CERN Document Server

    Wu, Hanqing

    2015-01-01

    MY VIEW OF THE SECURITY WORLDView of the IT Security WorldBrief History of Web SecurityBrief History of Chinese HackersDevelopment Process of Hacking TechniquesRise of Web SecurityBlack Hat, White HatBack to Nature: The Essence of Secret SecuritySuperstition: There Is No Silver BulletSecurity Is an Ongoing ProcessSecurity ElementsHow to Implement Safety AssessmentAsset ClassificationThreat AnalysisRisk AnalysisDesign of Security ProgramsArt of War of White HatPrinciples of Secure by DefaultBlacklist, WhitelistPrinciple of Least PrivilegePrinciple of Defense in DepthPrinciples of Data and Code

  8. A stochastic security approach to energy and spinning reserve scheduling considering demand response program

    International Nuclear Information System (INIS)

    Partovi, Farzad; Nikzad, Mehdi; Mozafari, Babak; Ranjbar, Ali Mohamad

    2011-01-01

    In this paper a new algorithm for allocating energy and determining the optimum amount of network active power reserve capacity and the share of generating units and demand side contribution in providing reserve capacity requirements for day-ahead market is presented. In the proposed method, the optimum amount of reserve requirement is determined based on network security set by operator. In this regard, Expected Load Not Supplied (ELNS) is used to evaluate system security in each hour. The proposed method has been implemented over the IEEE 24-bus test system and the results are compared with a deterministic security approach, which considers certain and fixed amount of reserve capacity in each hour. This comparison is done from economic and technical points of view. The promising results show the effectiveness of the proposed model which is formulated as mixed integer linear programming (MILP) and solved by GAMS software. -- Highlights: → Determination of optimal spinning reserve capacity requirement in order to satisfy desired security level set by system operator based on stochastic approach. → Scheduling energy and spinning reserve markets simultaneously. → Comparing the stochastic approach with deterministic approach to determine the advantages and disadvantages of each. → Examine the effect of demand response participation in reserve market to provide spinning reserve.

  9. 77 FR 74913 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-12-18

    ...; Computer Matching Program (Social Security Administration (SSA)/Office of Personnel Management (OPM.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub... computer matching involving the Federal government could be performed and adding certain protections for...

  10. Automated Source Code Analysis to Identify and Remove Software Security Vulnerabilities: Case Studies on Java Programs

    OpenAIRE

    Natarajan Meghanathan

    2013-01-01

    The high-level contribution of this paper is to illustrate the development of generic solution strategies to remove software security vulnerabilities that could be identified using automated tools for source code analysis on software programs (developed in Java). We use the Source Code Analyzer and Audit Workbench automated tools, developed by HP Fortify Inc., for our testing purposes. We present case studies involving a file writer program embedded with features for password validation, and ...

  11. Global Security Contingency Fund: Summary and Issue Overview

    Science.gov (United States)

    2014-04-04

    Diplomacy and Development Review (QDDR), Washington, D.C., December 2010, p. 203; Gordon Adams and Rebecca Williams, A New Way Forward: Rebalancing ...Williams, A New Way Forward: Rebalancing Security Assistance Programs and (continued...) Global Security Contingency Fund: Summary and Issue Overview...a large security assistance portfolio . But others may point to the State Department’s creation of new programs under the Security Assistance

  12. 77 FR 61771 - Facility Security Officer Training Requirements

    Science.gov (United States)

    2012-10-11

    ... following: (1) Draft model FSO training course; (2) Computer-based training and distance learning; (3... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0908] Facility Security Officer... Security Officer training program, with the primary focus on developing the curriculum for such a program...

  13. Department of energy defense programs perspectives on safeguards, security, and classification

    International Nuclear Information System (INIS)

    Eyck, E.Q.T.

    1989-01-01

    This paper discusses why national and international safeguards and the protection of sensitive information are important to the United States and to other nations. It demonstrates that while the opposite consequence appears logical these functions will probably become even more important if the major powers agree on further arms reductions. Some of the steps taken by the U.S. Department of Energy to improve the effectiveness of its safeguards, security, and classification programs are reviewed. The valuable contributions in these areas since 1968 and 1976, respectively by the Technical Support Organization and the International Safeguards Project Offoce at Brookhaven are noted

  14. Evaluation of the awareness and effectiveness of IT security programs in a large publicly funded health care system.

    Science.gov (United States)

    Hepp, Shelanne L; Tarraf, Rima C; Birney, Arden; Arain, Mubashir Aslam

    2017-01-01

    Electronic health records are becoming increasingly common in the health care industry. Although information technology (IT) poses many benefits to improving health care and ease of access to information, there are also security and privacy risks. Educating health care providers is necessary to ensure proper use of health information systems and IT and reduce undesirable outcomes. This study evaluated employees' awareness and perceptions of the effectiveness of two IT educational training modules within a large publicly funded health care system in Canada. Semi-structured interviews and focus groups included a variety of professional roles within the organisation. Participants also completed a brief demographic data sheet. With the consent of participants, all interviews and focus groups were audio recorded. Thematic analysis and descriptive statistics were used to evaluate the effectiveness of the IT security training modules. Five main themes emerged: (i) awareness of the IT training modules, (ii) the content of modules, (iii) staff perceptions about differences between IT security and privacy issues, (iv) common breaches of IT security and privacy, and (v) challenges and barriers to completing the training program. Overall, nonclinical staff were more likely to be aware of the training modules than were clinical staff. We found e-learning was a feasible way to educate a large number of employees. However, health care providers required a module on IT security and privacy that was relatable and applicable to their specific roles. Strategies to improve staff education and mitigate against IT security and privacy risks are discussed. Future research should focus on integrating health IT competencies into the educational programs for health care professionals.

  15. 6 CFR 27.225 - Site security plans.

    Science.gov (United States)

    2010-01-01

    ... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.225 Site security plans. (a) The Site Security Plan must... chemical facility security. (b) Except as provided in § 27.235, a covered facility must complete the Site...

  16. Development of security engineering curricula at US universities

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, M.L.

    1998-06-01

    The Southwest Surety Institute was formed in 1996 to create unique, science-based educational programs in security engineering. The programs will integrate business, technology, and criminal justice elements to educate a new generation of security professionals. Graduates of the programs will better understand basic security system design and evaluation and contribute to strengthening of the body of knowledge in the area of security. A systematic approach incorporating people, procedures, and equipment will be taught that will emphasize basic security principles and establish the science of security engineering. The use of performance measures in the analysis of designed systems will enable effective decisions by an enterprise and provide the rationale for investment in security systems. Along with educational programs, Institute members will conduct original research and development built on existing relationships with sponsors from government and industry in areas such as counterterroism, microelectronics, banking, aviation, and sensor development. Additional information and updates on the Southwest Surety Institute are available via the Institute home page at www.emrtc.nmt.edu/ssi.

  17. Communications and Information: Strategic Automated Command Control System-Data Transmission Subsystem (SACCS-DTS) Network Security Program. Volume 2

    National Research Council Canada - National Science Library

    1997-01-01

    ...) Systems, and 33-2, Information Protection. This instruction prescribes the requirements, responsibilities and procedures for the security program for the Strategic Automated Command Control System-Data Transmission Subsystem (SACCS-DTS...

  18. Security improvements for rail movements of SNM

    International Nuclear Information System (INIS)

    Garcia, M.R.; Gronager, J.E.; Shemigon, N.N.

    1998-01-01

    The US Department of Energy (DOE) and the Russian Special Scientific and Production State Enterprise Eleron have teamed to lead a project to enhance the overall security of Russian Ministry of Atomic Energy (MINATOM) transportation of Special Nuclear Material (SNM) shipments. The effort is called the Railcar Transportation Security Project and is part of the overall DOE Material Protection, Control, and Accounting (MPC and A) program addressing the enhancement of nuclear material control, accounting, and physical protection for Russian SNM. The goal of this MPC and A project is to significantly increase the security of Russian MINATOM highly enriched SNM rail shipments. To accomplish this, the MPC and A Railcar Transportation Security program will provide an enhanced, yet cost effective, railcar transportation security system. The system incorporates a balance between the traditional detection, communications, delay, and response security elements to significantly improve the security of MINATOM SNM shipments. The strategy of this program is to use rapid upgrades to implement mature security technologies as quickly as possible. The rapid upgrades emphasize rapidly deployable delay elements, enhanced radio communications, and intrusion detection and surveillance. Upgraded railcars have begun operation during FY98. Subsequent upgrades will build upon the rapid upgrades and eventually be integrated into a final deployed system configuration. This paper provides an overview of the program, with a summary of performance of the deployed railcars

  19. Solving the Container Stowage Problem (CSP) using Particle Swarm Optimization (PSO)

    Science.gov (United States)

    Matsaini; Santosa, Budi

    2018-04-01

    Container Stowage Problem (CSP) is a problem of containers arrangement into ships by considering rules such as: total weight, weight of one stack, destination, equilibrium, and placement of containers on vessel. Container stowage problem is combinatorial problem and hard to solve with enumeration technique. It is an NP-Hard Problem. Therefore, to find a solution, metaheuristics is preferred. The objective of solving the problem is to minimize the amount of shifting such that the unloading time is minimized. Particle Swarm Optimization (PSO) is proposed to solve the problem. The implementation of PSO is combined with some steps which are stack position change rules, stack changes based on destination, and stack changes based on the weight type of the stacks (light, medium, and heavy). The proposed method was applied on five different cases. The results were compared to Bee Swarm Optimization (BSO) and heuristics method. PSO provided mean of 0.87% gap and time gap of 60 second. While BSO provided mean of 2,98% gap and 459,6 second to the heuristcs.

  20. 14 CFR 129.28 - Flightdeck security.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Flightdeck security. 129.28 Section 129.28... Flightdeck security. (a) After August 20, 2002, except for a newly manufactured airplane on a non-revenue...; or the operator must implement a security program approved by the Transportation Security...

  1. 7 CFR 3575.48 - Security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Security. 3575.48 Section 3575.48 Agriculture... GENERAL Community Programs Guaranteed Loans § 3575.48 Security. (a) Lender responsibility. The lender is responsible for obtaining and maintaining proper and adequate security to protect the interest of the lender...

  2. 32 CFR 728.44 - Members of security assistance training programs, foreign military sales, and their ITO...

    Science.gov (United States)

    2010-07-01

    ..., foreign military sales, and their ITO authorized dependents. 728.44 Section 728.44 National Defense... § 728.44 Members of security assistance training programs, foreign military sales, and their ITO... patient is an ITO authorized dependent), grade or rate, country of origin, diagnosis, type of elective...

  3. Improving food security and nutrition through research | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Informing policy through agriculture and food security research. Improving the uptake of agricultural and food security research into policy and practice is a central objective of IDRC's Agriculture and Food Security program. To maximize the impact of proven solutions, the program set out to inform and engage both Canadian ...

  4. Solar Thermoelectricity via Advanced Latent Heat Storage: A Cost-Effective Small-Scale CSP Application

    Energy Technology Data Exchange (ETDEWEB)

    Glatzmaier, Greg C.; Rea, J.; Olsen, Michele L.; Oshman, C.; Hardin, C.; Alleman, Jeff; Sharp, J.; Weigand, R.; Campo, D.; Hoeschele, G.; Parilla, Philip A.; Siegel, N. P.; Toberer, Eric S.; Ginley, David S.

    2017-06-27

    We are developing a novel concentrating solar electricity-generating technology that is both modular and dispatchable. Solar ThermoElectricity via Advanced Latent heat Storage (STEALS) uses concentrated solar flux to generate high-temperature thermal energy, which directly converts to electricity via thermoelectric generators (TEGs), stored within a phase-change material (PCM) for electricity generation at a later time, or both allowing for simultaneous charging of the PCM and electricity generation. STEALS has inherent features that drive its cost-competitive scale to be much smaller than current commercial concentrating solar power (CSP) plants. Most obvious is modularity of the solid-state TEG, which favors smaller scales in the kilowatt range as compared to CSP steam turbines, which are minimally 50 MWe for commercial power plants. Here, we present techno-economic and market analyses that show STEALS can be a cost-effective electricity-generating technology with particular appeal to small-scale microgrid applications. We evaluated levelized cost of energy (LCOE) for STEALS and for a comparable photovoltaic (PV) system with battery storage. For STEALS, we estimated capital costs and the LCOE as functions of the type of PCM including the use of recycled aluminum alloys, and evaluated the cost tradeoffs between plasma spray coatings and solution-based boron coatings that are applied to the wetted surfaces of the PCM subsystem. We developed a probabilistic cost model that accounts for uncertainties in the cost and performance inputs to the LCOE estimation. Our probabilistic model estimated LCOE for a 100-kWe STEALS system that had 5 hours of thermal storage and 8-10 hours of total daily power generation. For these cases, the solar multiple for the heliostat field varied between 1.12 and 1.5. We identified microgrids as a likely market for the STEALS system. We characterized microgrid markets in terms of nominal power, dispatchability, geographic location, and

  5. Solar thermoelectricity via advanced latent heat storage: A cost-effective small-scale CSP application

    Science.gov (United States)

    Glatzmaier, G. C.; Rea, J.; Olsen, M. L.; Oshman, C.; Hardin, C.; Alleman, J.; Sharp, J.; Weigand, R.; Campo, D.; Hoeschele, G.; Parilla, P. A.; Siegel, N. P.; Toberer, E. S.; Ginley, D. S.

    2017-06-01

    We are developing a novel concentrating solar electricity-generating technology that is both modular and dispatchable. Solar ThermoElectricity via Advanced Latent heat Storage (STEALS) uses concentrated solar flux to generate high-temperature thermal energy, which directly converts to electricity via thermoelectric generators (TEGs), stored within a phase-change material (PCM) for electricity generation at a later time, or both allowing for simultaneous charging of the PCM and electricity generation. STEALS has inherent features that drive its cost-competitive scale to be much smaller than current commercial concentrating solar power (CSP) plants. Most obvious is modularity of the solid-state TEG, which favors smaller scales in the kilowatt range as compared to CSP steam turbines, which are minimally 50 MWe for commercial power plants. Here, we present techno-economic and market analyses that show STEALS can be a cost-effective electricity-generating technology with particular appeal to small-scale microgrid applications. We evaluated levelized cost of energy (LCOE) for STEALS and for a comparable photovoltaic (PV) system with battery storage. For STEALS, we estimated capital costs and the LCOE as functions of the type of PCM including the use of recycled aluminum alloys, and evaluated the cost tradeoffs between plasma spray coatings and solution-based boron coatings that are applied to the wetted surfaces of the PCM subsystem. We developed a probabilistic cost model that accounts for uncertainties in the cost and performance inputs to the LCOE estimation. Our probabilistic model estimated LCOE for a 100-kWe STEALS system that had 5 hours of thermal storage and 8-10 hours of total daily power generation. For these cases, the solar multiple for the heliostat field varied between 1.12 and 1.5. We identified microgrids as a likely market for the STEALS system. We characterized microgrid markets in terms of nominal power, dispatchability, geographic location, and

  6. SU-E-T-192: Commissioning of a Commercial 3D Dose Calculation Program

    International Nuclear Information System (INIS)

    Langen, K; Guerrero, M; Xu, H; Zhou, J; Zhang, B; Chen, S; Killefer, M

    2015-01-01

    Purpose: To commission a commercial software package (CSP) that is used as secondary dose calculation check. The CSP uses an independent golden data beam model. However, some parameters can be modified to generate a customer specific model. Plan comparisons and point dose measurements were performed to test if and to what extent the beam model needed adjustment to optimize results. Methods: Beam parameter configurations were compared between the CSP and both TPS. Twelve phantom test plans ranging from simple to complex were generated in two treatment planning systems (TPS). Tests included small field, off axis, EDW, IMRT and VMAT plans. For each plan a point dose was measured to establish ground truth. Lastly, patient plans were compared for both TPS systems and the CSP. Results: Beam parameters agreed within 2%. The output factors for small fields were changed for the 15 MV beam by 2 and 1.5 % for the 1 cm and 2 cm field sizes, respectively. For the 6 MV beam output factors were adjusted by 3−0.8% for field sizes ranging from 1 to 5 cm. The MLC dynamic leaf gap was adjusted by 1.5 mm for 18 MV beam. Differences between the CSP and the TPS were noted in the built-up region. These differences affected the gamma pass rate in the surface region, however this effect is reduced with increasing number of beam angles and does not affect point dose calculations at depth. All IMRT and VMAT plans agreed with the CSP using a gamma pass rate of 95% (3%, 3mm). Conclusion: The CSP is used to verify point doses for all 3D plans generated in our clinic for the last 6 months. No point dose mismatches were encountered since the CSP was implemented. Next, the CSP will be adapted for secondary checks of all IMRT plans. KL had a beta tester agreement with Mobius Medical for an in-kind equipment and software loan

  7. SU-E-T-192: Commissioning of a Commercial 3D Dose Calculation Program

    Energy Technology Data Exchange (ETDEWEB)

    Langen, K; Guerrero, M; Xu, H; Zhou, J; Zhang, B; Chen, S [University of Maryland School of Medicine, Baltimore, MD (United States); Killefer, M [Hastings College, Hastings, Nebraska (United States)

    2015-06-15

    Purpose: To commission a commercial software package (CSP) that is used as secondary dose calculation check. The CSP uses an independent golden data beam model. However, some parameters can be modified to generate a customer specific model. Plan comparisons and point dose measurements were performed to test if and to what extent the beam model needed adjustment to optimize results. Methods: Beam parameter configurations were compared between the CSP and both TPS. Twelve phantom test plans ranging from simple to complex were generated in two treatment planning systems (TPS). Tests included small field, off axis, EDW, IMRT and VMAT plans. For each plan a point dose was measured to establish ground truth. Lastly, patient plans were compared for both TPS systems and the CSP. Results: Beam parameters agreed within 2%. The output factors for small fields were changed for the 15 MV beam by 2 and 1.5 % for the 1 cm and 2 cm field sizes, respectively. For the 6 MV beam output factors were adjusted by 3−0.8% for field sizes ranging from 1 to 5 cm. The MLC dynamic leaf gap was adjusted by 1.5 mm for 18 MV beam. Differences between the CSP and the TPS were noted in the built-up region. These differences affected the gamma pass rate in the surface region, however this effect is reduced with increasing number of beam angles and does not affect point dose calculations at depth. All IMRT and VMAT plans agreed with the CSP using a gamma pass rate of 95% (3%, 3mm). Conclusion: The CSP is used to verify point doses for all 3D plans generated in our clinic for the last 6 months. No point dose mismatches were encountered since the CSP was implemented. Next, the CSP will be adapted for secondary checks of all IMRT plans. KL had a beta tester agreement with Mobius Medical for an in-kind equipment and software loan.

  8. Analysis and monitoring of energy security and prediction of indicator values using conventional non-linear mathematical programming

    Directory of Open Access Journals (Sweden)

    Elena Vital'evna Bykova

    2011-09-01

    Full Text Available This paper describes the concept of energy security and a system of indicators for its monitoring. The indicator system includes more than 40 parameters that reflect the structure and state of fuel and energy complex sectors (fuel, electricity and heat & power, as well as takes into account economic, environmental and social aspects. A brief description of the structure of the computer system to monitor and analyze energy security is given. The complex contains informational, analytical and calculation modules, provides applications for forecasting and modeling energy scenarios, modeling threats and determining levels of energy security. Its application to predict the values of the indicators and methods developed for it are described. This paper presents a method developed by conventional nonlinear mathematical programming needed to address several problems of energy and, in particular, the prediction problem of the security. An example of its use and implementation of this method in the application, "Prognosis", is also given.

  9. The executive MBA in information security

    CERN Document Server

    Trinckes, John J

    2009-01-01

    Supplying a complete overview of the concepts executives need to know, this book provides the tools needed to ensure your organization has an effective information security management program in place. It also includes a ready-to use security framework for developing workable programs and supplies proven tips for avoiding common pitfalls.

  10. Cost of the Cervical Cancer Screening Program at the Mexican Social Security Institute

    Directory of Open Access Journals (Sweden)

    Víctor Granados-García

    2014-09-01

    Full Text Available Objective. To estimate the annual cost of the National Cervical Cancer Screening Program (CCSP of the Mexican Institute of Social Security (IMSS. Materials and methods. This cost analysis examined regional coverage rates reported by IMSS. We estimated the number of cytology, colposcopy, biopsy and pathology evaluations, as well as the diagnostic test and treatment costs for cervical intraepithelial neoplasia grade II and III (CIN 2/3 and cervical cancer. Diagnostic test costs were estimated using a micro-costing technique. Sensitivity analyses were performed. Results. The cost to perform 2.7 million cytology tests was nearly 38 million dollars, which represents 26.1% of the total program cost (145.4 million. False negatives account for nearly 43% of the program costs. Conclusion. The low sensitivity of the cytology test generates high rates of false negatives, which results in high institutional costs from the treatment of undetected cervical cancer cases.

  11. Integrating Programming Language and Operating System Information Security Mechanisms

    Science.gov (United States)

    2016-08-31

    suggestions for reducing the burden, to the Department of Defense, Executive Service Directorate (0704-0188). Respondents should be aware that...improve the precision of security enforcement, and to provide greater assurance of information security. This grant focuses on two key projects: language...based control of authority; and formal guarantees for the correctness of audit information. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17

  12. Cyber Security and Resilient Systems

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the

  13. Cyber Security and Resilient Systems

    International Nuclear Information System (INIS)

    Anderson, Robert S.

    2009-01-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation's cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested - both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the

  14. National Strategy to Secure Cyberspace

    National Research Council Canada - National Science Library

    Schwalm, Keith T

    2006-01-01

    ... of a national strategy for securing cyberspace. The approach explored the development of cyber technology strategies and programs related to the mission and roles of Homeland Security Advanced Research Projects Agency...

  15. Software Quality and Security in Teachers' and Students' Codes When Learning a New Programming Language

    Directory of Open Access Journals (Sweden)

    Arnon Hershkovitz

    2015-09-01

    Full Text Available In recent years, schools (as well as universities have added cyber security to their computer science curricula. This topic is still new for most of the current teachers, who would normally have a standard computer science background. Therefore the teachers are trained and then teaching their students what they have just learned. In order to explore differences in both populations’ learning, we compared measures of software quality and security between high-school teachers and students. We collected 109 source files, written in Python by 18 teachers and 31 students, and engineered 32 features, based on common standards for software quality (PEP 8 and security (derived from CERT Secure Coding Standards. We use a multi-view, data-driven approach, by (a using hierarchical clustering to bottom-up partition the population into groups based on their code-related features and (b building a decision tree model that predicts whether a student or a teacher wrote a given code (resulting with a LOOCV kappa of 0.751. Overall, our findings suggest that the teachers’ codes have a better quality than the students’ – with a sub-group of the teachers, mostly males, demonstrate better coding than their peers and the students – and that the students’ codes are slightly better secured than the teachers’ codes (although both populations show very low security levels. The findings imply that teachers might benefit from their prior knowledge and experience, but also emphasize the lack of continuous involvement of some of the teachers with code-writing. Therefore, findings shed light on computer science teachers as lifelong learners. Findings also highlight the difference between quality and security in today’s programming paradigms. Implications for these findings are discussed.

  16. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  17. A nuclear facility Security Analyzer written in Prolog

    International Nuclear Information System (INIS)

    Zimmerman, B.D.

    1987-01-01

    The Security Analyzer project was undertaken to use the Prolog artificial intelligence programming language and Entity-Relationship database construction techniques to produce an intelligent database computer program capable of analyzing the effectiveness of a nuclear facility's security systems. The Security Analyzer program can search through a facility to find all possible surreptitious entry paths that meet various user-selected time and detection probability criteria. The program can also respond to user-formulated queries concerning the database information. The intelligent database approach allows the program to perform a more comprehensive path search than other programs that only find a single optimal path. The program also is more flexible in that the database, once constructed, can be interrogated and used for purposes independent of the searching function

  18. A nuclear facility Security Analyzer written in PROLOG

    International Nuclear Information System (INIS)

    Zimmerman, B.D.

    1987-08-01

    The Security Analyzer project was undertaken to use the Prolog ''artificial intelligence'' programming language and Entity-Relationship database construction techniques to produce an intelligent database computer program capable of analyzing the effectiveness of a nuclear facility's security systems. The Security Analyzer program can search through a facility to find all possible surreptitious entry paths that meet various user-selected time and detection probability criteria. The program can also respond to user-formulated queries concerning the database information. The intelligent database approach allows the program to perform a more comprehensive path search than other programs that only find a single ''optimal'' path. The program also is more flexible in that the database, once constructed, can be interrogated and used for purposes independent of the searching function

  19. Convergence of Corporate and Information Security

    OpenAIRE

    Syed; Rahman, M.; Donahue, Shannon E.

    2010-01-01

    As physical and information security boundaries have become increasingly blurry many organizations are experiencing challenges with how to effectively and efficiently manage security within the corporate. There is no current standard or best practice offered by the security community regarding convergence; however many organizations such as the Alliance for Enterprise Security Risk Management (AESRM) offer some excellent suggestions for integrating a converged security program. This paper rep...

  20. Current status of international training center for nuclear security and security issues in Korea

    International Nuclear Information System (INIS)

    Lee, Jong-UK; Sin, Byung Woo

    2013-01-01

    During the 2010 Nuclear Security Summit (NSS) President Lee declared that Korea will establish an international training center (ITC) for nuclear security near the Korea Institute of Nuclear Nonproliferation and Control (KINAC). It will be open to the world in 2014. The government's long term goal is to make the center a hub for education and training in the nuclear field in Asia. The ITC will accomplish this by establishing facilities for practical and realistic exercises through the use of a test bed and various other experiments. The center will also provide comprehensive educational programs for nuclear newcomers. Its main programs include: a well designed educational program, customized training courses, and on-the-job training. This paper will discuss the current status of the ITC and describe practical plans for solving current security issues in Korea. (authors)

  1. Cyber security evaluation of II&C technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Ken [Idaho National Laboratory (INL), Idaho Falls, ID (United States)

    2014-11-01

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a

  2. 76 FR 81516 - Homeland Security Advisory Council

    Science.gov (United States)

    2011-12-28

    ... Transportation Security Administration's (TSA) Frequent Traveler Program; examine evolving threats in cyber... Evolving Threats in Cyber Security. Basis for Closure: In accordance with Section 10(d) of the Federal... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0111] Homeland Security Advisory Council...

  3. Secure Web Developers Needed!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    You’re about to launch a new website? Cool!! With today’s web programming languages like PHP, Java, Python or Perl, complex websites can be created, easily fulfilling all your use cases. But hold on. Did you ever think about how easily this can be abused? Attackers today are already using automatic tools which can quickly and easily find and exploit vulnerable web applications.   Web applications often suffer from security vulnerabilities, i.e. design flaws or programming bugs that remained undetected during the whole software development cycle. In production these vulnerabilities become security holes, providing an opportunity for exploitation, and can pose immense security risks (and there is no reason to believe that CERN is immune to this). The costs associated with eliminating these bugs could be loosely described by the "1:10:100 rule", i.e. the relative costs for fixing are 1:10:100 for fixing them in the programming:testing:production phases. Thus, the...

  4. The IAEA Assistance Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard R [ORNL; Hawk, Mark B [ORNL; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  5. Food for Work Program and its Implications on Food Security: A Critical Review with a Practical Example from the Amhara Region, Ethiopia

    Directory of Open Access Journals (Sweden)

    Ashenafi Gedamu

    2006-10-01

    Full Text Available A systematic evaluation of food-for-work (FFW programs in Ethiopia is seriously lacking. Most of the few available reports indicate that these programs have reached very few achievements in terms of food security and reduction of poverty at large. As expressed by Holden et al. (2005, FFW programs are commonly aimed to produce or maintain potentially valuable public goods necessary to stimulate productivity and thus income growth. Natural resources management, like rural road construction, erosion control and afforestation of degraded lands can be mentioned as valuable measures which could stimulate productivity and agricultural growth. The poverty reduction and food security impact of food or cash for work activities are larger if they offer not only seasonal job opportunities to the rural community but also long term employment possibilities. This is more likely if the projects are regionally dispersed and combined with basic education. In the Ethiopian context, it was always questionable if the continuous boom in food aid (regardless of cash or food for work purposes was the solution for the long standing food insecurity and poverty crises in the country. The study discusses the efficiency of FFW programs that aimed to reduce rural poverty and ensure food security on the one hand, and the impact of the food aid on resource and time allocation of the participating households for own food production on the other. The study is based on a field research conducted at a FFW program project, in the Amhara region, Ethiopia run by the German Agency for Technical Cooperation (GTZ with the view of improving food security in the Amhara region, Ethiopia. A household theoretical model is used to analyze the sample data, whether FFW program may indeed reduce household food insecurity and/or has some crowding-out effects on labour allocation of participating households for own field production.

  6. FAA computer security : recommendations to address continuing weaknesses

    Science.gov (United States)

    2000-12-01

    In September, testimony before the Committee on Science, House of Representatives, focused on the Federal Aviation Administration's (FAA) computer security program. In brief, we reported that FAA's agency-wide computer security program has serious, p...

  7. 48 CFR 52.204-2 - Security Requirements.

    Science.gov (United States)

    2010-10-01

    ... Agreement (DD Form 441), including the National Industrial Security Program Operating Manual (DOD 5220.22-M... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false Security Requirements. 52....204-2 Security Requirements. As prescribed in 4.404(a), insert the following clauses: Security...

  8. Secure Java For Web Application Development

    CERN Document Server

    Bhargav, Abhay

    2010-01-01

    As the Internet has evolved, so have the various vulnerabilities, which largely stem from the fact that developers are unaware of the importance of a robust application security program. This book aims to educate readers on application security and building secure web applications using the new Java Platform. The text details a secure web application development process from the risk assessment phase to the proof of concept phase. The authors detail such concepts as application risk assessment, secure SDLC, security compliance requirements, web application vulnerabilities and threats, security

  9. 21st Century Security Manager

    Directory of Open Access Journals (Sweden)

    Stelian ARION

    2010-11-01

    Full Text Available We live in world of uncertainty that generates major paradigms changing that affect security risk management. Modern organization’s security risks management can’t be done without a profound knowlegde and daily practice for security governance, security risk management and resilience. 21st Century security manager need to deal with several areas of konwledge in order to succesfully manage security risks. The document presents the advantages, disadvantages and challenges for security managers thah have government backgroud, or IT security backgroud, or are promoted from organization’s inside leaders. There are six different areas of knowledge that successful security programs of the future must incorporate, either in the knowledge base of their leaders or in the collective knowledge of the leading staff. They are government elements, security organization, emerging issue awareness, IT security, business elements and executive leadership.

  10. Financing concentrating solar power in the Middle East and North Africa-Subsidy or investment?

    International Nuclear Information System (INIS)

    Trieb, Franz; Mueller-Steinhagen, Hans; Kern, Juergen

    2011-01-01

    The paper presents a strategy for the market introduction of concentrating solar power (CSP) plants in the Middle East and North Africa (MENA) that will not require considerable subsidization and will not constitute a significant burden for electricity consumers in the region. In the first section, the paper explains the need of MENA countries for sustainable supply of electricity and calculates the cost of electricity for a model case country. In the second part, the cost development of concentrating solar power plants is calculated on the basis of expectations for the expansion of CSP on a global level. After that, the challenges for the market introduction of CSP in MENA are explained. Finally, we present a strategy for the market introduction of CSP in MENA, removing the main barriers for financing and starting market introduction in the peak load and the medium load segment of power supply. The paper explains why long-term power purchase agreements (PPA) for CSP should be calculated on the basis of avoided costs, starting in the peak load segment. Such PPA are not yet available, the paper aims to convince policy makers to introduce them. - Research Highlights: → Concentrating Solar Power in the Mediterranean Region (MED-CSP 2005) (www.dlr.de/tt/med-csp). → Trans-Mediterranean Interconnection for Concentrating Solar Power (TRANS-CSP 2006) (www.dlr.de/tt/trans-csp). → Concentrating Solar Power for Seawater Desalination (AQUA-CSP 2007) (www.dlr.de/tt/aqua-csp). → Risk of Energy Availability: Common Corridors for Europe Supply Security (REACCESS 2009) (http://reaccess.epu.ntua.gr/). → Combined Solar Power and Desalination in the Mediterranean (MED-CSD 2010) (www.med-csd-ec.eu).

  11. Training programs for the systems approach to nuclear security

    International Nuclear Information System (INIS)

    Ellis, Doris E.

    2005-01-01

    In support of the US Government and the International Atomic Energy Agency (IAEA) Nuclear Security Programmes, Sandia National Laboratories (SNL) has advocated and practiced a risk-based, systematic approach to nuclear security. The risk equation has been implemented as the basis for a performance methodology for the design and evaluation of Physical Protection Systems against a Design Basis Threat (DBT) for theft or sabotage of nuclear and/or radiological materials. Since integrated systems must include people as well as technology and the man-machine interface, a critical aspect of the human element is to train all stakeholders in nuclear security on the systems approach. Current training courses have been beneficial but are still limited in scope. SNL has developed two primary international courses and is completing development of three new courses that will be offered and presented in the near term. In the long-term, SNL envisions establishing a comprehensive nuclear security training curriculum that will be developed along with a series of forthcoming IAEA Nuclear Security Series guidance documents.

  12. Excerpts from the report: "BeyondTMY - Meteorological data sets for CSP/STE performance simulations"

    Science.gov (United States)

    Nielsen, Kristian Pagh; Vignola, Frank; Ramírez, Lourdes; Blanc, Philippe; Meyer, Richard; Blanco, Manuel

    2017-06-01

    In order to facilitate comprehensive economic modeling of CSP/STE power plants realistic long-term meteorological datasets with temporal resolution down to 1 minute is a main premise. Currently available standard datasets do not fulfil this premise. The datasets also need to combine the high quality of well-maintained ground-based irradiance measurements and the global coverage of satellite-derived data. Even with the best available data it is necessary to account for the uncertainty in this and the sampling uncertainty from finite time-series to enable the optimal statistical characterization. It is a general challenge that satellite-derived data lack the required temporal resolution, and also often does not cover periods with major volcanic eruptions. Here we see prospects in synthetically generated realistic datasets, although research and development work is required on how to optimally produce and quality assure these.

  13. Real time system design of motor imagery brain-computer interface based on multi band CSP and SVM

    Science.gov (United States)

    Zhao, Li; Li, Xiaoqin; Bian, Yan

    2018-04-01

    Motion imagery (MT) is an effective method to promote the recovery of limbs in patients after stroke. Though an online MT brain computer interface (BCT) system, which apply MT, can enhance the patient's participation and accelerate their recovery process. The traditional method deals with the electroencephalogram (EEG) induced by MT by common spatial pattern (CSP), which is used to extract information from a frequency band. Tn order to further improve the classification accuracy of the system, information of two characteristic frequency bands is extracted. The effectiveness of the proposed feature extraction method is verified by off-line analysis of competition data and the analysis of online system.

  14. Safeguards and Security FY 1996 Program Plan: WBS 6.6

    International Nuclear Information System (INIS)

    Lee, F.D.

    1995-08-01

    The Safeguards and Security (SAS) Program is based upon integrity, competence and innovation in the protection of the public and Hanford resources through: (1) outstanding assistance, oversight, education, and counsel to their customers to ensure the protection of the public, site personnel, assets, and information; (2) value-added and cost-effective solutions to Hanford issues; and (3) risk management techniques to ensure effective asset protection, site accessibility, and the flexibility to adapt to changing customer needs. This plan is divided into two parts: overview and SAS WBS (work breakdown structure) dictionary sheets. The overview is divided into vision and mission, goals and objectives, assumptions and priorities, milestones, and a summary. The SAS WBS dictionary sheets are divided into department overhead, general and administrative, sitewide support, Hanford patrol, traffic safety, and locksmith services

  15. Safeguards and Security FY 1996 Program Plan: WBS 6.6

    Energy Technology Data Exchange (ETDEWEB)

    Lee, F.D.

    1995-08-01

    The Safeguards and Security (SAS) Program is based upon integrity, competence and innovation in the protection of the public and Hanford resources through: (1) outstanding assistance, oversight, education, and counsel to their customers to ensure the protection of the public, site personnel, assets, and information; (2) value-added and cost-effective solutions to Hanford issues; and (3) risk management techniques to ensure effective asset protection, site accessibility, and the flexibility to adapt to changing customer needs. This plan is divided into two parts: overview and SAS WBS (work breakdown structure) dictionary sheets. The overview is divided into vision and mission, goals and objectives, assumptions and priorities, milestones, and a summary. The SAS WBS dictionary sheets are divided into department overhead, general and administrative, sitewide support, Hanford patrol, traffic safety, and locksmith services.

  16. 12 CFR 605.501 - Information Security Officer.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Information Security Officer. 605.501 Section... Information Security Officer. (a) The Information Security Officer of the Farm Credit Administration shall be responsible for implementation and oversight of the information security program and procedures adopted by the...

  17. Canadian International Food Security Research Fund (CIFSRF ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Canadian International Food Security Research Fund (CIFSRF). The Canadian International Food Security Research Fund (CIFS-RF) is a collaborative program of the Canadian International Development Agency (CIDA) and IDRC valued at CA $61 654 707 (CIDA: CA $50 000 000; IDRC: CA $11 654 707). The program ...

  18. Bechtel Hanford, Inc. Network Security Plan for the Environmental Restoration Contract

    International Nuclear Information System (INIS)

    Slade, B.E.

    2000-01-01

    This document was created to address ERC computer security needs that are outlined by DOE Order 1360.2B, Unclassified Computer Security Program. DOE Order 1360.2B has been canceled and replaced with DOE Notice 205.1, Unclassified Cyber Security Program. The ERC response to DOE Notice 205.1 is to generate BHI-01343, Cyber Security Program Plan, which is not available for public access or viewing

  19. An Enterprise Security Program and Architecture to Support Business Drivers

    Directory of Open Access Journals (Sweden)

    Brian Ritchot

    2013-08-01

    Full Text Available This article presents a business-focused approach to developing and delivering enterprise security architecture that is focused on enabling business objectives while providing a sensible and balanced approach to risk management. A balanced approach to enterprise security architecture can create the important linkages between the goals and objectives of a business, and it provides appropriate measures to protect the most critical assets within an organization while accepting risk where appropriate. Through a discussion of information assurance, this article makes a case for leveraging enterprise security architectures to meet an organizations' need for information assurance. The approach is derived from the Sherwood Applied Business Security Architecture (SABSA methodology, as put into practice by Seccuris Inc., an information assurance integrator. An understanding of Seccuris’ approach will illustrate the importance of aligning security activities with high-level business objectives while creating increased awareness of the duality of risk. This business-driven approach to enterprise security architecture can help organizations change the perception of IT security, positioning it as a tool to enable and assure business success, rather than be perceived as an obstacle to be avoided.

  20. Network Security Is Manageable

    Science.gov (United States)

    Roberts, Gary

    2006-01-01

    An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…

  1. 10 CFR 602.16 - National security.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...

  2. Integrated Nuclear Security Support Plan (INSSP)

    International Nuclear Information System (INIS)

    Moore, G.M.

    2010-01-01

    Integrated Nuclear Security Support Plan (INSSP) purposes the framework for a comprehensive approach to addressing specific national security needs. It provides means for coordinating nuclear security assistance to member states. Identifies responsible parties for completion of nuclear security activities which are necessary to build sustainable nuclear security programs. International Atomic Energy Agency INSSP development process is based on findings and recommendations from a range of nuclear security missions and other information needs assessments. Takes into account of the ongoing work activities of other bilateral assistance.

  3. New directions for African security

    NARCIS (Netherlands)

    Haastrup, Toni; Dijkstra, Hylke

    2017-01-01

    African security, particularly conflict-related political violence, is a key concern in international relations. This forum seeks to advance existing research agendas by addressing four key themes: domestic politics and peacekeeping; security sector reform programs; peace enforcement; and the

  4. 10 CFR 712.16 - DOE security review.

    Science.gov (United States)

    2010-01-01

    ... part. (c) Any mental/personality disorder or behavioral issues found in a personnel security file... 10 Energy 4 2010-01-01 2010-01-01 false DOE security review. 712.16 Section 712.16 Energy... Program Procedures § 712.16 DOE security review. (a) A personnel security specialist will perform a...

  5. Nanotechnology, voluntary oversight, and corporate social performance: does company size matter?

    International Nuclear Information System (INIS)

    Kuzma, Jennifer; Kuzhabekova, Aliya

    2011-01-01

    In this article, we examine voluntary oversight programs for nanotechnology in the context of corporate social performance (CSP) in order to better understand the drivers, barriers, and forms of company participation in such programs. At the theoretical level, we use the management framework of CSP to understand the voluntary behavior of companies. At the empirical level, we investigate nanotech industry participation in the Environmental Protection Agency’s Nanoscale Materials Stewardship Program (NMSP) as an example of CSP, in order to examine the effects of company characteristics on CSP outcomes. The analysis demonstrates that, on the average, older and larger companies for which nanotech is one of the many business activities demonstrate greater CSP as judged by company actions, declarations, and self-evaluations. Such companies tended to submit more of the requested information to the NMSP, including specific information about health and safety, and to claim fewer of the submitted items as confidential business information. They were also more likely to have on-line statements of generic and nano-specific corporate social responsibility principles, policies, and achievements. The article suggests a need to encourage smaller and younger companies to participate in voluntary oversight programs for nanotechnology and presents options for better design of these programs.

  6. Nanotechnology, voluntary oversight, and corporate social performance: does company size matter?

    Science.gov (United States)

    Kuzma, Jennifer; Kuzhabekova, Aliya

    2011-04-01

    In this article, we examine voluntary oversight programs for nanotechnology in the context of corporate social performance (CSP) in order to better understand the drivers, barriers, and forms of company participation in such programs. At the theoretical level, we use the management framework of CSP to understand the voluntary behavior of companies. At the empirical level, we investigate nanotech industry participation in the Environmental Protection Agency's Nanoscale Materials Stewardship Program (NMSP) as an example of CSP, in order to examine the effects of company characteristics on CSP outcomes. The analysis demonstrates that, on the average, older and larger companies for which nanotech is one of the many business activities demonstrate greater CSP as judged by company actions, declarations, and self-evaluations. Such companies tended to submit more of the requested information to the NMSP, including specific information about health and safety, and to claim fewer of the submitted items as confidential business information. They were also more likely to have on-line statements of generic and nano-specific corporate social responsibility principles, policies, and achievements. The article suggests a need to encourage smaller and younger companies to participate in voluntary oversight programs for nanotechnology and presents options for better design of these programs.

  7. Redox-neutral rhodium-catalyzed C-H functionalization of arylamine N-oxides with diazo compounds: primary C(sp(3))-H/C(sp(2))-H activation and oxygen-atom transfer.

    Science.gov (United States)

    Zhou, Bing; Chen, Zhaoqiang; Yang, Yaxi; Ai, Wen; Tang, Huanyu; Wu, Yunxiang; Zhu, Weiliang; Li, Yuanchao

    2015-10-05

    An unprecedented rhodium(III)-catalyzed regioselective redox-neutral annulation reaction of 1-naphthylamine N-oxides with diazo compounds was developed to afford various biologically important 1H-benzo[g]indolines. This coupling reaction proceeds under mild reaction conditions and does not require external oxidants. The only by-products are dinitrogen and water. More significantly, this reaction represents the first example of dual functiaonalization of unactivated a primary C(sp(3) )H bond and C(sp(2) )H bond with diazocarbonyl compounds. DFT calculations revealed that an intermediate iminium is most likely involved in the catalytic cycle. Moreover, a rhodium(III)-catalyzed coupling of readily available tertiary aniline N-oxides with α-diazomalonates was also developed under external oxidant-free conditions to access various aminomandelic acid derivatives by an O-atom-transfer reaction. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  8. Microsoft Windows Security Essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed,

  9. 76 FR 64388 - Biweekly Notice; Applications and Amendments to Facility Operating Licenses; Involving No...

    Science.gov (United States)

    2011-10-18

    ... social security numbers, home addresses, or home phone numbers in their filings, unless an NRC regulation... amendment approves the Cyber Security Plan (CSP) and associated implementation schedule, and revises the... on electronic storage media. Participants may not submit paper copies of their filings unless they...

  10. National Nuclear Security Administration Nonproliferation Graduate Fellowship Program Annual Report in Brief: October 2007 - May 2008

    Energy Technology Data Exchange (ETDEWEB)

    Berkman, Clarissa O.; Fankhauser, Jana G.; Sandusky, Jessica A.

    2009-05-01

    This abbreviated Annual Report covers program activities of the National Nuclear Security Administration (NNSA) Nonproliferation Graduate Fellowship Program (NGFP) from October 2007 through May 2008--the timeframe between the last Annual Report (which covered activities through September 2007) and the next report (which will begin with June 2008 activities). In that timeframe, the NGFP continued building a solid foundation as the program began reaping the benefits of recently implemented changes. This report is organized by Fellowship class and the pertinent program activities for each, including: October 2007 Recruiting events and final applications (Class of 2008) Winter 2007 Selection and hiring (Class of 2008) Spring 2008 Career development roundtables (Class of 2007) Orientation planning (Class of 2008) Recruitment planning and university outreach (Class of 2009) May 2008 Closing ceremony (Class of 2007)

  11. Results in Developing an Engineering Degree Program in Safeguards and Security of Nuclear Materials at Moscow Engineering Physics Institute

    International Nuclear Information System (INIS)

    Kryuchkov, Eduard F.; Geraskin, Nikolay I.; Killinger, Mark H.; Goodey, Kent O.; Butler, Gilbert W.; Duncan, Cristen L.

    2007-01-01

    The world's first master's degree program in nuclear safeguards and security, established at Moscow Engineering Physics Institute (MEPhI), has now graduated nine classes of students. Most of the graduates have gone on to work at government agencies, research organizations, or obtain their PhD. In order to meet the demand for safeguards and security specialists at nuclear facilities, MEPhI established a 5-1/2 year engineering degree program that provides more hands-on training desired by facilities. In February 2004, the first students began their studies in the new discipline Nuclear Material Safeguards and Nonproliferation. This class, as well as other subsequent classes, included students who started the program in their third year of studies, as the first 2-1/2 years consists of general engineering curriculum. Fourteen students made up the first graduating class, receiving their engineering degrees in February 2007. The topics addressed in this paper include specific features of the program caused by peculiarities of Russian education legislation and government quality control of academic education. This paper summarizes the main joint actions undertaken by MEPhI and the US National Laboratories in conjunction with the U.S. Department of Energy, to develop the engineering degree program. Also discussed are the program's specific training requirements, student internships, and job placement. The paper concludes with recommendations from a recent international seminar on nonproliferation education and training

  12. A methodology for performing computer security reviews

    International Nuclear Information System (INIS)

    Hunteman, W.J.

    1991-01-01

    DOE Order 5637.1, ''Classified Computer Security,'' requires regular reviews of the computer security activities for an ADP system and for a site. Based on experiences gained in the Los Alamos computer security program through interactions with DOE facilities, we have developed a methodology to aid a site or security officer in performing a comprehensive computer security review. The methodology is designed to aid a reviewer in defining goals of the review (e.g., preparation for inspection), determining security requirements based on DOE policies, determining threats/vulnerabilities based on DOE and local threat guidance, and identifying critical system components to be reviewed. Application of the methodology will result in review procedures and checklists oriented to the review goals, the target system, and DOE policy requirements. The review methodology can be used to prepare for an audit or inspection and as a periodic self-check tool to determine the status of the computer security program for a site or specific ADP system. 1 tab

  13. A methodology for performing computer security reviews

    International Nuclear Information System (INIS)

    Hunteman, W.J.

    1991-01-01

    This paper reports on DIE Order 5637.1, Classified Computer Security, which requires regular reviews of the computer security activities for an ADP system and for a site. Based on experiences gained in the Los Alamos computer security program through interactions with DOE facilities, the authors have developed a methodology to aid a site or security officer in performing a comprehensive computer security review. The methodology is designed to aid a reviewer in defining goals of the review (e.g., preparation for inspection), determining security requirements based on DOE policies, determining threats/vulnerabilities based on DOE and local threat guidance, and identifying critical system components to be reviewed. Application of the methodology will result in review procedures and checklists oriented to the review goals, the target system, and DOE policy requirements. The review methodology can be used to prepare for an audit or inspection and as a periodic self-check tool to determine the status of the computer security program for a site or specific ADP system

  14. Key Based Mutual Authentication (KBMA Mechanism for Secured Access in MobiCloud Environment

    Directory of Open Access Journals (Sweden)

    Donald A. Cecil

    2016-01-01

    Full Text Available Mobile Cloud Computing (MCC fuels innovation in Mobile Computing and opens new pathways between mobile devices and infrastructures. There are several issues in MCC environment as it integrates various technologies. Among all issues, security lies on the top where many users are not willing to adopt the cloud services. This paper focuses on the authentication. The objective of this paper is to provide a mechanism for authenticating all the entities involved in accessing the cloud services. A mechanism called Key Based Mutual Authentication (KBMA is proposed which is divided into two processes namely registration and authentication. Registration is a one-time process where the users are registered for accessing the cloud services by giving the desired unique information. Authentication process is carried out mutually to verify the identities of Device and Cloud Service Provider (CSP. Scyther tool is used for analysing the vulnerability in terms of attacks. The result claims show that the proposed mechanism is resilient against various attacks.

  15. A Study of the Effect of Information Security Policies on Information Security Breaches in Higher Education Institutions

    Science.gov (United States)

    Waddell, Stanie Adolphus

    2013-01-01

    Many articles within the literature point to the information security policy as one of the most important elements of an effective information security program. Even though this belief is continually referred to in many information security scholarly articles, very few research studies have been performed to corroborate this sentiment. Doherty and…

  16. The IAEA Assistance and Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Hawk, Mark B [ORNL; Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard [Transport Security and Safety, Oak Ridge; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  17. Evaluation Program initiative

    International Nuclear Information System (INIS)

    Rich, B.L.

    1987-01-01

    The purpose of this paper is to provide the Department of Energy's (DOE) safeguards and security community with some insights on an important management initiative by the Office of Security Evaluations (OSE). The paper will present the ''what, where, who, when, and why'' of a new Evaluation Program. The Evaluation Program will be comprised of a continuing series of regular and special evaluations of DOE safeguards and security programs and policies. The evaluations will be integrative and ''crosscutting,'' i.e. will extend across DOE organizational lines. Evaluations will be offered as positive advisories to DOE managers with safeguards and security responsibilities and will not be rated. They will complement the ongoing OSE Inspection Program of inspections conducted by OSE's Inspection Division. The purpose for the evaluations is to establish an accurate and current assessment of the effectiveness and status of safeguards and security programs and policies and to provide DOE managers with required information on program and policy effectiveness

  18. Enhancing Global Health Security: US Africa Command's Disaster Preparedness Program.

    Science.gov (United States)

    Morton Hamer, Melinda J; Reed, Paul L; Greulich, Jane D; Beadling, Charles W

    2018-03-07

    US Africa Command's Disaster Preparedness Program (DPP), implemented by the Center for Disaster and Humanitarian Assistance Medicine, partnered with US Government agencies and international organizations to promote stability and security on the African continent by engaging with African Partner Nations' (PN) civil and military authorities to improve disaster management capabilities. From 2008 to 2015, DPP conducted disaster preparedness and response programming with 17 PNs. DPP held a series of engagements with each, including workshops, strategic planning, developing preparedness and response plans, tabletop exercises, and prioritizing disaster management capability gaps identified through the engagements. DPP partners collected data for each PN to further capacity building efforts. Thus far, 9 countries have completed military pandemic plans, 10 have developed national pandemic influenza plans, 9 have developed military support to civil authorities plans, and 11 have developed disaster management strategic work plans. There have been 20 national exercises conducted since 2009. DPP was cited as key in implementation of Ebola response plans in PNs, facilitated development of disaster management agencies in DPP PNs, and trained nearly 800 individuals. DPP enhanced PNs' ability to prepare and respond to crises, fostering relationships between international agencies, and improving civil-military coordination through both national and regional capacity building. (Disaster Med Public Health Preparedness. 2018;page 1 of 11).

  19. Value of Cooperative Relationships for Security of a Safer World

    International Nuclear Information System (INIS)

    Malollari, Ilirjan; Civici, Nikolla; Hirsch, Kristin; Randolph, John David

    2010-01-01

    Cooperation of countries for improving security of radioactive and nuclear assets is clearly the key to success in establishing a more safe and secure world. Over the past few years the United States Department of Energy s Global Threat Reduction Initiatives (GTRI) program has been actively engaged with many countries of the world to identify, account for, and support enhancements to security and accounting measures for these materials. The Republic of Albania has demonstrated its willingness and desire to work closely with the United States to achieve and implement the GTRI goals for security of their assets. The GTRI program has assisted the International Atomic Energy Agency (IAEA) in development on a variety of subject areas related to security of sources and nuclear materials. Albania, a Member State of the IAEA, received training and information support from the agency. The leadership of the Albanian nuclear program has changed but the commitment of Albania to work closely with GTRI continues. The GTRI/Albania global partnership made significant accomplishments in security and safe storage of Albania's nuclear assets. This paper will describe a brief history of the Albanian program and the achievements resulting from the cooperative program with GTRI, which have resulted in a more secure Albania.

  20. Do you write secure code?

    CERN Multimedia

    Computer Security Team

    2011-01-01

    At CERN, we are excellent at producing software, such as complex analysis jobs, sophisticated control programs, extensive monitoring tools, interactive web applications, etc. This software is usually highly functional, and fulfils the needs and requirements as defined by its author. However, due to time constraints or unintentional ignorance, security aspects are often neglected. Subsequently, it was even more embarrassing for the author to find out that his code flawed and was used to break into CERN computers, web pages or to steal data…   Thus, if you have the pleasure or task of producing software applications, take some time before and familiarize yourself with good programming practices. They should not only prevent basic security flaws in your code, but also improve its readability, maintainability and efficiency. Basic rules for good programming, as well as essential books on proper software development, can be found in the section for software developers on our security we...

  1. 12 CFR 208.61 - Bank security procedures.

    Science.gov (United States)

    2010-01-01

    ... procedures for opening and closing for business and for the safekeeping of all currency, negotiable...; the cost of the security devices; other security measures in effect at the banking office; and the... directors on the implementation, administration, and effectiveness of the security program. (e) Reserve...

  2. 76 FR 4079 - Information Technology (IT) Security

    Science.gov (United States)

    2011-01-24

    ... Security, consistent with Federal policies for the security of unclassified information and information... Certification Program, and provide a Web site link within a contract clause to a library where contractors can... Security should be addressed through government-wide policies, standards, and requirements. NASA response...

  3. 76 FR 46907 - Ammonium Nitrate Security Program

    Science.gov (United States)

    2011-08-03

    ... Maritime Transportation Security Act NAICS North American Industrial Classification System NPRM Notice of.... Commenters noted, for example, that equipment used for transporting bulk ammonium nitrate, such as hoppers...

  4. Cyber Security--Are You Prepared?

    Science.gov (United States)

    Newman, Scott

    2007-01-01

    During the summer 2002 term, Oklahoma State University-Okmulgee's Information Technologies Division offered a one credit-hour network security course--which barely had adequate student interest to meet the institution's enrollment requirements. Today, OSU-Okmulgee boasts one of the nation's premier cyber security programs. Many prospective…

  5. National Security Education Program: Background and Issues

    National Research Council Canada - National Science Library

    Kuenzi, Jeffrey J; Riddle, Wayne C

    2005-01-01

    ... knowledgeable about the languages and cultures of foreign nations, especially those which are of national security concern and have not traditionally been the focus of American interest and study...

  6. Information security governance simplified from the boardroom to the keyboard

    CERN Document Server

    Fitzgerald, Todd

    2011-01-01

    Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security d

  7. Government/Industry Partnership on the Security of Radioactive Sources

    International Nuclear Information System (INIS)

    Cefus, Greg; Colhoun, Stefan C.; Freier, Keith D.; Wright, Kyle A.; Herdes, Gregory A.

    2006-01-01

    In the past, industry radiation protection programs were built almost exclusively around radiation safety and the minimization of radiation dose exposure to employees. Over the last decade, and especially the last few years, the emphasis has shifted to include the physical security and enhanced control of radioactive materials. The threat of nuclear and radiological terrorism is a genuine international security concern. In May 2004, the U.S. Department of Energy/U.S. National Nuclear Security Administration unveiled the Global Threat Reduction Initiative (GTRI) to respond to a growing international concern for the proper control and security of radioactive and nuclear materials. An integral part of the GTRI, the International Radiological Threat Reduction (IRTR) Program, was established in February 2002, originally as a Task Force. The IRTR Program is foremost a government-to-government cooperative program with the mission to reduce the risk posed by vulnerable radioactive materials that could be used in a Radioactive Dispersal Device (RDD). However, governments alone cannot prevent the misuse and illicit trafficking of radioactive sources. By expanding the role of private industry as a partner, existing government regulatory infrastructures can be enhanced by formulating and adopting industry self-regulation and self-policing measures. There is international concern regarding the security and control of the vast number of well-logging sources used during oil exploration operations. The prevalence of these sources, coupled with their portability, is a legitimate security concern. The energy exploration industry has well established safety and security protocols and the IRTR Program seeks to build on this foundation. However, the IRTR Program does not have sufficient resources to address the issue without industry assistance, so it is looking to the oil and gas industry to help identify alternative means for accomplishing our mutual objectives. This paper describes

  8. (In)security factor atomic bomb. An analysis of the crisis with the Iranian nuclear program

    International Nuclear Information System (INIS)

    Bock, Andreas

    2012-04-01

    Iran is a rational actor in the international politics that decides on the basis of the perception of threat. Iran's security situation is comparable with that of Israel with the rational consequence to rely on the atomic program with respect to deterrence and self-defense. The solution of the Iran crisis is basically dependent on a change of the perception of threat. A military act against the Iranian nuclear facilities would be counterproductive, would only slowing down the program but not prevent further activities. In fact a military act would enhance the perception of threat. For the analysis of the Iran crises the author used the Cuba crisis as blueprint, were mislead perceptions were responsible for the escalation.

  9. Tools & training for more secure software

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    Just by fate of nature, software today is shipped out as “beta”, coming with vulnerabilities and weaknesses, which should already have been fixed at the programming stage. This presentation will show the consequences of suboptimal software, why good programming, thorough software design, and a proper software development process is imperative for the overall security of the Organization, and how a few simple tools and training are supposed to make CERN software more secure.

  10. Operating Nuclear Power Stations in a Regulated Cyber Security Environment

    Energy Technology Data Exchange (ETDEWEB)

    Dorman, E.

    2014-07-01

    The United States Nuclear Regulatory Commission (NRC) issued 10CFR73.54 to implement a regulated Cyber Security Program at each operating nuclear reactor facility. Milestones were implemented December 31, 2012 to mitigate the attack vectors for the most critical digital assets acknowledged by the industry and the NR C. The NRC inspections have begun. The nuclear Cyber Security Plan, implemented by the site Cyber Security Program (Program), is an element of the operating license at each facility. (Author)

  11. Operating Nuclear Power Stations in a Regulated Cyber Security Environment

    International Nuclear Information System (INIS)

    Dorman, E.

    2014-01-01

    The United States Nuclear Regulatory Commission (NRC) issued 10CFR73.54 to implement a regulated Cyber Security Program at each operating nuclear reactor facility. Milestones were implemented December 31, 2012 to mitigate the attack vectors for the most critical digital assets acknowledged by the industry and the NR C. The NRC inspections have begun. The nuclear Cyber Security Plan, implemented by the site Cyber Security Program (Program), is an element of the operating license at each facility. (Author)

  12. Energy Security and Restoration Exercise Program/Best Practices and Information Sharing

    Energy Technology Data Exchange (ETDEWEB)

    Barbara McCabe; John Kovach

    2009-03-30

    The first year of this cooperative agreement focused on the following elements: curriculum development and presentation, curriculum maintenance, enhancements, and effectiveness, and smart card initiative. During the second year of this grant, with redirection from DOE, the IUOE modified its mission statement under the cooperative agreement. It states: 'The mission of the IUOE is to provide expertise to provide best practices, information sharing, and develop scenarios and conduct exercises ranging in size and complexity from table top to national level to prepare all stakeholders to protect and restore energy infrastructure should an event, terrorist or natural, occur'. The Program developed a number of products under this Cooperative Agreement. These products include: FOSTER (Facility Operations Safety Training Event Response) Curriculum and Training Models, Alternative Energy Supply - Generators Training Module, Liquefied Natural Gas Training Module, Education Program - Distributed Generations, Compendium of Resources and References, Energy Security and Restoration Training Manual, Manual of Situations and Scenarios Developed for Emergency Exercises, Manual of Best Practices/Lessons Learned for Energy Load Management, Training Plan, Strategic Information and Exercise Plan, National Certification Plan Report, and a Smart Card Project Report.

  13. Software For Computer-Security Audits

    Science.gov (United States)

    Arndt, Kate; Lonsford, Emily

    1994-01-01

    Information relevant to potential breaches of security gathered efficiently. Automated Auditing Tools for VAX/VMS program includes following automated software tools performing noted tasks: Privileged ID Identification, program identifies users and their privileges to circumvent existing computer security measures; Critical File Protection, critical files not properly protected identified; Inactive ID Identification, identifications of users no longer in use found; Password Lifetime Review, maximum lifetimes of passwords of all identifications determined; and Password Length Review, minimum allowed length of passwords of all identifications determined. Written in DEC VAX DCL language.

  14. Defense Security Cooperation Agency Vision 2020. Update 1

    Science.gov (United States)

    2015-10-01

    the feasibility and pros/ cons of developing a DoD- wide security cooperation workforce development and management program including training...Synchronizing Security Cooperation Activities ..................................................................................... 7 Meeting...Security Cooperation ............................. 15 6. Remaining a Provider of Choice for Our International Customers

  15. 78 FR 55270 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... their official duties. The computer system also maintains a real-time audit of individuals who access... Secure Flight Program regulations \\4\\ for the purpose of enhancing the security of air travel in the... detection of individuals on federal government watch lists who seek to travel by air, and to facilitate the...

  16. Building Economic Security Today: making the health-wealth connection in Contra Costa county's maternal and child health programs.

    Science.gov (United States)

    Parthasarathy, Padmini; Dailey, Dawn E; Young, Maria-Elena D; Lam, Carrie; Pies, Cheri

    2014-02-01

    In recent years, maternal and child health professionals have been seeking approaches to integrating the Life Course Perspective and social determinants of health into their work. In this article, we describe how community input, staff feedback, and evidence from the field that the connection between wealth and health should be addressed compelled the Contra Costa Family, Maternal and Child Health (FMCH) Programs Life Course Initiative to launch Building Economic Security Today (BEST). BEST utilizes innovative strategies to reduce inequities in health outcomes for low-income Contra Costa families by improving their financial security and stability. FMCH Programs' Women, Infants, and Children Program (WIC) conducted BEST financial education classes, and its Medically Vulnerable Infant Program (MVIP) instituted BEST financial assessments during public health nurse home visits. Educational and referral resources were also developed and distributed to all clients. The classes at WIC increased clients' awareness of financial issues and confidence that they could improve their financial situations. WIC clients and staff also gained knowledge about financial resources in the community. MVIP's financial assessments offered clients a new and needed perspective on their financial situations, as well as support around the financial and psychological stresses of caring for a child with special health care needs. BEST offered FMCH Programs staff opportunities to engage in non-traditional, cross-sector partnerships, and gain new knowledge and skills to address a pressing social determinant of health. We learned the value of flexible timelines, maintaining a long view for creating change, and challenging the traditional paradigm of maternal and child health.

  17. 6 CFR 27.204 - Minimum concentration by security issue.

    Science.gov (United States)

    2010-01-01

    ... Section 27.204 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.204 Minimum concentration by security issue. (a) Release Chemicals—(1) Release-Toxic Chemicals. If a release-toxic chemical of interest...

  18. 32 CFR 154.42 - Evaluation of personnel security information.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Evaluation of personnel security information... SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Adjudication § 154.42 Evaluation of personnel security information. (a) The criteria and adjudicative policy to be used in applying the...

  19. Human Reliability Program Overview

    Energy Technology Data Exchange (ETDEWEB)

    Bodin, Michael

    2012-09-25

    This presentation covers the high points of the Human Reliability Program, including certification/decertification, critical positions, due process, organizational structure, program components, personnel security, an overview of the US DOE reliability program, retirees and academia, and security program integration.

  20. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    International Nuclear Information System (INIS)

    Rogers, E.; deBoer, G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-01-01

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC and A). Though MPC and A systems can significantly upgrade nuclear security, they do not eliminate the 'human factor.' Gen. Eugene Habiger, a former 'Assistant Secretary for Safeguards and Security' at the U.S. Department of Energy's (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that 'good security is 20% equipment and 80% people.' Although eliminating the 'human factor' is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  1. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    Energy Technology Data Exchange (ETDEWEB)

    Rogers,E.; deBoer,G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." Gen. Eugene Habiger, a former "Assistant Secretary for Safeguards and Security" at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that "good security is 20% equipment and 80% people." Although eliminating the "human factor" is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  2. A cost-benefit analysis of the Mexican Social Security Administration's family planning program.

    Science.gov (United States)

    Nortman, D L; Halvas, J; Rabago, A

    1986-01-01

    A cost-benefit analysis of the family planning program of the Mexican Social Security System (IMSS) was undertaken to test the hypothesis that IMSS's family planning services yield a net savings to IMSS by reducing the load on its maternal and infant care service. The cost data are believed to be of exceptionally high quality because they were empirically ascertained by a retrospective and prospective survey of unit time and personnel costs per specified detailed type of service in 37 IMSS hospitals and 16 clinics in 13 of Mexico's 32 states. Based on the average cost per case, the analysis disclosed that for every peso (constant 1983 currency) that IMSS spent on family planning services to its urban population during 1972-1984 inclusive, the agency saved nine pesos. The article concludes by raising the speculative question as to the proportion of the births averted by the IMSS family planning program that would have been averted in the absence of IMSS's family planning services.

  3. [The concept and measurement of food security].

    Science.gov (United States)

    Kim, Kirang; Kim, Mi Kyung; Shin, Young Jeon

    2008-11-01

    During the past two decades, food deprivation and hunger have been recognized to be not just the concerns of only underdeveloped or developing countries, but as problems for many affluent Western nations as well. Many countries have made numerous efforts to define and measure the extent of these problems. Based on these efforts, the theory and practice of food security studies has significantly evolved during the last decades. Thus, this study aims to provide a comprehensive review of the concept and measurement of food security. In this review, we introduce the definition and background of food security, we describe the impact of food insecurity on nutrition and health, we provide its measurements and operational instruments and we discuss its applications and implications. Some practical information for the use of the food security index in South Korea is also presented. Food security is an essential element in achieving a good nutritional and health status and it has an influence to reduce poverty. The information about the current understanding of food security can help scientists, policy makers and program practitioners conduct research and maintain outreach programs that address the issues of poverty and the promotion of food security.

  4. The remote security station (RSS)

    International Nuclear Information System (INIS)

    Pletta, J.B.

    1991-01-01

    This paper reports that, as an outgrowth of research into physical security systems, Sandia is investigating robotic technologies for improving physical security performance and flexibility. Robotic systems have the potential to allow more effective utilization of security personnel, especially in scenarios where they might be exposed to harm. They also can supplement fixed site installations where sensors have failed or where transient assets are present. The Remote Security Station (RSS) program for the defense Nuclear Agency is developing a proof-of-principle robotic system which will be used to evaluate the role, and associated cost, of robotic technologies in exterior physical security systems. The RSS consists of three primary elements: a fixed but quickly moveable tripod with intrusion detection sensors and assessment camera; a mobile robotic platform with a functionally identical security module; and a control console which allows an operator to perform security functions and teleoperate the mobile platform

  5. Software Safety and Security

    CERN Document Server

    Nipkow, T; Hauptmann, B

    2012-01-01

    Recent decades have seen major advances in methods and tools for checking the safety and security of software systems. Automatic tools can now detect security flaws not only in programs of the order of a million lines of code, but also in high-level protocol descriptions. There has also been something of a breakthrough in the area of operating system verification. This book presents the lectures from the NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security; a summer school held at Bayrischzell, Germany, in 2011. This Advanced Study Institute was

  6. 7 CFR 766.112 - Additional security for restructured loans.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Additional security for restructured loans. 766.112..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN SERVICING-SPECIAL Loan Servicing Programs § 766.112 Additional security for restructured loans. (a) If the borrower is delinquent prior to restructuring, the...

  7. Design of large scale applications of secure multiparty computation : secure linear programming

    NARCIS (Netherlands)

    Hoogh, de S.J.A.

    2012-01-01

    Secure multiparty computation is a basic concept of growing interest in modern cryptography. It allows a set of mutually distrusting parties to perform a computation on their private information in such a way that as little as possible is revealed about each private input. The early results of

  8. Nevada National Security Site Radiation Protection Program

    Energy Technology Data Exchange (ETDEWEB)

    Managers' Council, Radiological Control

    2018-03-12

    This is a shared document required by 10 CFR 835 for all contractors conducting radiological work at the Nevada National Security Site. Please record the Author as "Radiological Control Managers' Council" for consistency with previous RPPs and Rad Con Manuals.

  9. Security Analysis of Parlay/OSA Framework

    NARCIS (Netherlands)

    Corin, R.J.; Di Caprio, G.; Etalle, Sandro; Gnesi, S.; Lenzini, Gabriele; Moiso, C.; Villain, B.

    2004-01-01

    This paper analyzes the security of the Trust and Security Management (TSM) protocol, an authentication protocol which is part of the Parlay/OSA Application Program Interfaces (APIs). Architectures based on Parlay/OSA APIs allow third party service providers to develop new services that can access,

  10. Security Analysis of Parlay/OSA Framework

    NARCIS (Netherlands)

    Corin, R.J.; Di Caprio, G.; Etalle, Sandro; Gnesi, S.; Lenzini, Gabriele; Moiso, C.

    This paper analyzes the security of the Trust and Security Management (TSM) protocol, an authentication protocol which is part of the Parlay/OSA Application Program Interfaces (APIs). Architectures based on Parlay/OSA APIs allow third party service providers to develop new services that can access,

  11. Oregon's Gun Relief Program for Adjudicated Mentally Ill Persons: The Psychiatric Security Review Board.

    Science.gov (United States)

    Britton, Juliet; Bloom, Joseph D

    2015-06-01

    This article describes the State of Oregon's implementation of two programs designed to comply with federal gun laws regarding reporting individuals who have received mental health adjudications in criminal and civil courts. One mandate requires that states submit names of adjudicated individuals to the National Instant Criminal Background Check System (NICS) while the second requires that the state establish a qualifying gun restoration program for those disqualified from gun ownership. In 2009, Oregon's Legislature developed an administrative approach to gun restoration and assigned the responsibility for conducting these hearing to the Oregon Psychiatric Security Review Board (PSRB). The PSRB is a state administrative board that has existed since 1977 and has been primarily focused on the supervision and treatment of adult and juvenile insanity acquittees. The gun restoration program began in 2010, but to date has only received three completed petitions requesting restoration of firearm rights. The article concludes with a discussion that surmises why very few of the Oregonians who are listed in NICS have submitted petitions for relief. Copyright © 2015 John Wiley & Sons, Ltd.

  12. Analyzing the security of an existing computer system

    Science.gov (United States)

    Bishop, M.

    1986-01-01

    Most work concerning secure computer systems has dealt with the design, verification, and implementation of provably secure computer systems, or has explored ways of making existing computer systems more secure. The problem of locating security holes in existing systems has received considerably less attention; methods generally rely on thought experiments as a critical step in the procedure. The difficulty is that such experiments require that a large amount of information be available in a format that makes correlating the details of various programs straightforward. This paper describes a method of providing such a basis for the thought experiment by writing a special manual for parts of the operating system, system programs, and library subroutines.

  13. 49 CFR 659.27 - Internal safety and security reviews.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Internal safety and security reviews. 659.27... State Oversight Agency § 659.27 Internal safety and security reviews. (a) The oversight agency shall... safety and security reviews in its system safety program plan. (b) The internal safety and security...

  14. Y-12 Groundwater Protection Program CY 2009 Triennial Report Of The Monitoring Well Inspection And Maintenance Program, Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2013-06-01

    This document is the triennial report for the Well Inspection and Maintenance Program of the Y- 12 Groundwater Protection Program (GWPP), at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12). This report formally documents well inspection events conducted on active and inactive wells at Y-12 during calendar years (CY) 2007 through 2009; it documents well maintenance and plugging and abandonment activities completed since the last triennial inspection event (CY 2006); and provides summary tables of well inspection events, well maintenance events, and well plugging and abandonment events during the reference time period.

  15. Ligand-Controlled Chemoselective C(acyl)–O Bond vs C(aryl)–C Bond Activation of Aromatic Esters in Nickel Catalyzed C(sp2)–C(sp3) Cross-Couplings

    KAUST Repository

    Chatupheeraphat, Adisak

    2018-02-20

    A ligand-controlled and site-selective nickel catalyzed Suzuki-Miyaura cross-coupling reaction with aromatic esters and alkyl organoboron reagents as coupling partners was developed. This methodology provides a facile route for C(sp2)-C(sp3) bond formation in a straightforward fashion by successful suppression of the undesired β-hydride elimination process. By simply switching the phosphorus ligand, the ester substrates are converted into the alkylated arenes and ketone products, respectively. The utility of this newly developed protocol was demonstrated by its wide substrate scope, broad functional group tolerance and application in the synthesis of key intermediates for the synthesis of bioactive compounds. DFT studies on the oxidative addition step helped rationalizing this intriguing reaction chemoselectivity: whereas nickel complexes with bidentate ligands favor the C(aryl)-C bond cleavage in the oxidative addition step leading to the alkylated product via a decarbonylative process, nickel complexes with monodentate phosphorus ligands favor activation of the C(acyl)-O bond, which later generates the ketone product.

  16. HITACHI security concept for industrial control systems

    International Nuclear Information System (INIS)

    Endoh, H.; Yamada, T.; Okubo, S.; Nakano, T.

    2012-01-01

    Security is a necessary factor for the safe and efficient operation of today's control systems. To ensure safe operation of control systems throughout their lifetime, security measures must be carefully planned in the development phase and then maintained continuously during the operation phase and other following phases. To ensure operation within the system's safe states, Hitachi proposes security concept processes (1) to derive security measures rationally and (2) to maintain the security model over the system life cycle. Hitachi also proposes security development programs which support the integration of standards-compliant systems and development of robust control equipment. (author)

  17. Company's Data Security - Case Study

    Science.gov (United States)

    Stera, Piotr

    This paper describes a computer network and data security problems in an existing company. Two main issues were pointed out: data loss protection and uncontrolled data copying. Security system was designed and implemented. The system consists of many dedicated programs. This system protect from data loss and detected unauthorized file copying from company's server by a dishonest employee.

  18. 40 CFR 211.110-2 - National security exemptions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 211.110... ABATEMENT PROGRAMS PRODUCT NOISE LABELING General Provisions § 211.110-2 National security exemptions. (a) A new product which is produced to conform with specifications developed by national security agency...

  19. Y-12 Groundwater Protection Program CY2012 Triennial Report Of The Monitoring Well Inspection And Maintenance Program Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2013-09-01

    This document is the triennial report for the Well Inspection and Maintenance Program of the Y- 12 Groundwater Protection Program (GWPP), at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12). This report formally documents well inspections completed by the GWPP on active and inactive wells at Y-12 during calendar years (CY) 2010 through 2012. In addition, this report also documents well inspections performed under the Y-12 Water Resources Restoration Program, which is administered by URS|CH2M Oak Ridge (UCOR). This report documents well maintenance activities completed since the last triennial inspection event (CY 2009); and provides summary tables of well inspections and well maintenance activities during the reference time period.

  20. Corporate strategic plan for safeguards and security

    International Nuclear Information System (INIS)

    1997-06-01

    Department of Energy (DOE) safeguards and security (S and S) is a team effort, consisting of Field, National Laboratories, Program Office, and Headquarters units cooperating to support the Department's diverse security needs. As an integral part of the nation's security structure, the DOE S and S Program regularly supports and works in cooperation with other US Government agencies and private industry to improve the national security posture. Thus, inter- and intra-agency partnerships play an invaluable role in the continuing efforts to integrate and implement improved ways of doing business. Their Corporate Strategic Plan provides a road map to guide, track, and provide feedback for the incorporation and implementation of S and S activities within DOE. Part 1 Planning Framework, describes those overarching factors which influence the planning endeavors. Part 2, Strategic Perspective, outlines where the S and S Program has been and how they will move to the future through core competencies, changing cultural thinking, and implementing their strategies. Part 3, Strategic and Operational Integration, details critical focus areas, strategies, and success indicators designed to enhance inter-agency S and S integration and promote cooperation with external agencies. This Plan will be reviewed annually to ensure it remains supportive and fully-engaged with the nation's and international security environments

  1. Rhodium(III)-Catalyzed [3+2]/[5+2] Annulation of 4-Aryl 1,2,3-Triazoles with Internal Alkynes through Dual C(sp2)-H Functionalization.

    Science.gov (United States)

    Yang, Yuan; Zhou, Ming-Bo; Ouyang, Xuan-Hui; Pi, Rui; Song, Ren-Jie; Li, Jin-Heng

    2015-05-26

    A rhodium(III)-catalyzed [3+2]/[5+2] annulation of 4-aryl 1-tosyl-1,2,3-triazoles with internal alkynes is presented. This transformation provides straightforward access to indeno[1,7-cd]azepine architectures through a sequence involving the formation of a rhodium(III) azavinyl carbene, dual C(sp(2))-H functionalization, and [3+2]/[5+2] annulation. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  2. 75 FR 68370 - Agency Information Collection Activities: Office of Infrastructure Protection; Chemical Security...

    Science.gov (United States)

    2010-11-05

    ... DEPARTMENT OF HOMELAND SECURITY National Protection and Programs Directorate [Docket No. DHS-2010-0071] Agency Information Collection Activities: Office of Infrastructure Protection; Chemical Security...: The Department of Homeland Security (DHS), National Protection and Programs Directorate (NPPD), Office...

  3. 75 FR 25844 - Federal Advisory Committee; National Security Education Board Members Meeting

    Science.gov (United States)

    2010-05-10

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; National Security... June 23, 2010, from 8 a.m. to 12:30 p.m. ADDRESSES: The meeting will be held at the National Security.... Kevin Gormley, Program Officer, National Security Education Program, 1101 Wilson Boulevard, Suite 1210...

  4. US oil dependency and energy security

    International Nuclear Information System (INIS)

    Noel, P.

    2002-01-01

    The three papers of this document were written in the framework of a seminar organized the 30 may 2002 by the IFRI in the framework of its program Energy and Climatic Change. The first presentation deals with the american oil policy since 1980 (relation between the oil dependence and the energy security, the Reagan oil policy, the new oil policy facing the increase of the dependence). The second one deals with the US energy security (oil security, domestic energy security, policy implications). The last presentation is devoted to the US oil dependence in a global context and the problems and policies of international energy security. (A.L.B.)

  5. 78 FR 29145 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-05-17

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0022] President's National Security Telecommunications Advisory Committee AGENCY: National Protection and Programs Directorate, DHS. ACTION: Committee... notice of a May 22, 2013, meeting of the President's National Security Telecommunications Advisory...

  6. Speeding decisions. Social security's information exchange program.

    Science.gov (United States)

    Winter, Kitt; Hastings, Bob

    2011-05-01

    The Social Security Administration has plenty of reasons to streamline its records request process-more than 15 million reasons each year, in fact. That's why it has been pioneering information exchange projects with the private sector, including use of the Nationwide Health Information Network.

  7. Marketing Plan for the National Security Technology Incubator

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubator program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.

  8. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  9. 40 CFR 205.5-2 - National security exemptions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 205.5-2... PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National security... a national security exemption is required. (c) For purposes of section 11(d) of the Act, any...

  10. 78 FR 72600 - Proposed Priorities, Requirements, and Definitions-Charter Schools Program (CSP) Grants for...

    Science.gov (United States)

    2013-12-03

    ... financial assistance for the planning, program design, and initial implementation of charter schools; (2.... Charter schools are explicitly designed to have the autonomy to employ innovative, promising [[Page 72601

  11. Muddling Through: An Analysis of Security Force Assistance in Iraq

    Science.gov (United States)

    2017-05-25

    OSC-I mostly fell back into their comfort zone of managing 60 foreign military sales programs as the nominal advisement programs quickly fell apart...implications of these observations are critical to future SFA efforts, as the US government seeks to continue a long-term strategy of advising and...Iraqi Army, Mosul, ISIS, Advise and Assist, Security Assistance, Security Cooperation, MNSTC-I, OIF 16. SECURITY CLASSIFICATION OF: 17. LIMITATION

  12. Review of Thermal Materials for CSP Plants and LCOE Evaluation for Performance Improvement using Chilean Strategic Minerals: Lithium Salts and Copper Foams

    Directory of Open Access Journals (Sweden)

    Gustavo Cáceres

    2016-01-01

    Full Text Available The improvement of solar thermal technologies in emerging economies like Chile is particularly attractive because the country is endowed with one of the most consistently high solar potentials, lithium and copper reserves. In recent years, growing interests for lithium based salts and copper foams in application of thermal technologies could change the landscape of Chile transforming its lithium reserves and copper availability into competitive energy produced in the region. This study reviews the technical advantages of using lithium based salts—applied as heat storage media and heat transfer fluid—and copper foam/Phase Change Materials (PCM alternatives—applied as heat storage media—within tower and parabolic trough Concentrated Solar Power (CSP plants, and presents a first systematic evaluation of the costs of these alternatives based on real plant data. The methodology applied is based on material data base compilation of price and technical properties, selection of CSP plant and estimation of amount of required material, and analysis of Levelized Cost of Electricity (LCOE. Results confirm that some lithium based salts are effective in reducing the amount of required material and costs for the Thermal Energy Storage (TES systems for both plant cases, with savings of up to 68% and 4.14% in tons of salts and LCOE, respectively. Copper foam/PCM composites significantly increase thermal conductivity, decreasing the volume of the TES system, but costs of implementation are still higher than traditional options.

  13. Los Alamos National Laboratory Facilities, Security and Safeguards Division, Safeguards and Security Program Office, Protective Force Oversight Program

    International Nuclear Information System (INIS)

    1995-01-01

    The purpose of this document is to identify and describe the duties and responsibilities of Facility Security and Safeguards (FSS) Safeguards and Security (SS) organizations (groups/offices) with oversight functions over the Protection Force (PF) subcontractor. Responsible organizations will continue their present PF oversight functions under the Cost Plus Award Fee (CPAF) assessment, but now will be required to also coordinate, integrate, and interface with other FSS S and S organizations and with the PF subcontractor to measure performance, assess Department of Energy (DOE) compliance, reduce costs, and minimize duplication of effort. The role of the PF subcontractor is to provide the Laboratory with effective and efficient protective force services. PF services include providing protection for the special nuclear material, government property and classified or sensitive information developed and/or consigned to the Laboratory, as well as protection for personnel who work or participate in laboratory activities. FSS S and S oversight of both performance and compliance standards/metrics is essential for these PF objectives to be met

  14. 40 CFR 204.5-2 - National security exemptions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 204.5-2... PROGRAMS NOISE EMISSION STANDARDS FOR CONSTRUCTION EQUIPMENT General Provisions § 204.5-2 National security... for a national security exemption is required. (c) For purposes of section 11(d) of the Act, any...

  15. Shipment security update - 2003

    International Nuclear Information System (INIS)

    Patterson, John; Anne, Catherine

    2003-01-01

    At the 2002 RERTR, NAC reported on the interim measures taken by the U.S. Nuclear Regulatory Commission to enhance the security afforded to shipments of spent nuclear fuel. Since that time, there have been a number of additional actions focused on shipment security including training programs sponsored by the U.S. Department of Transportation and the Electric Power Research Council, investigation by the Government Accounting Office, and individual measures taken by shippers and transportation agents. The paper will present a status update regarding this dynamic set of events and provide an objective assessment of the cost, schedule and technical implications of the changing security landscape. (author)

  16. Site security personnel training manual

    International Nuclear Information System (INIS)

    1978-10-01

    As required by 10 CFR Part 73, this training manual provides guidance to assist licensees in the development of security personnel training and qualifications programs. The information contained in the manual typifies the level and scope of training for personnel assigned to perform security related tasks and job duties associated with the protection of nuclear fuel cycle facilities and nuclear power reactors

  17. Natural variation for responsiveness to flg22, flgII-28, and csp22 and Pseudomonas syringae pv. tomato in heirloom tomatoes.

    Directory of Open Access Journals (Sweden)

    Selvakumar Veluchamy

    Full Text Available Tomato (Solanum lycopersicum L. is susceptible to many diseases including bacterial speck caused by Pseudomonas syringae pv. tomato. Bacterial speck disease is a serious problem worldwide in tomato production areas where moist conditions and cool temperatures occur. To enhance breeding of speck resistant fresh-market tomato cultivars we identified a race 0 field isolate, NC-C3, of P. s. pv. tomato in North Carolina and used it to screen a collection of heirloom tomato lines for speck resistance in the field. We observed statistically significant variation among the heirloom tomatoes for their response to P. s. pv. tomato NC-C3 with two lines showing resistance approaching a cultivar that expresses the Pto resistance gene, although none of the heirloom lines have Pto. Using an assay that measures microbe-associated molecular pattern (MAMP-induced production of reactive oxygen species (ROS, we investigated whether the heirloom lines showed differential responsiveness to three bacterial-derived peptide MAMPs: flg22 and flgII-28 (from flagellin and csp22 (from cold shock protein. Significant differences were observed for MAMP responsiveness among the lines, although these differences did not correlate strongly with resistance or susceptibility to bacterial speck disease. The identification of natural variation for MAMP responsiveness opens up the possibility of using a genetic approach to identify the underlying loci and to facilitate breeding of cultivars with enhanced disease resistance. Towards this goal, we discovered that responsiveness to csp22 segregates as a single locus in an F2 population of tomato.

  18. Media rights and media security

    Science.gov (United States)

    Baugher, Mark

    2005-03-01

    Digital Rights Management (DRM) systems typically do not treat rights management as a security problem. DRM uses cryptographic techniques but not security relationships. Instead, DRM systems use "tamper-resistant mechanisms" to discourage unauthorized access to rights-managed content. Although proven ineffective in practice, tamper-resistant mechanisms penalize legitimate customers with added complexity and costs that arise from tamper-resisting data or program code. This paper explores how a security relationship between provider and consumer might be more effective for managing rights to content works on two-way networks.

  19. Electro-Kinetic Pumping with Slip Irreversibility in Heat Exchange of CSP-Powered Bio-Digester Assemblies

    Directory of Open Access Journals (Sweden)

    Emmanuel O.B. Ogedengbe

    2012-12-01

    Full Text Available Parametric studies of the effects of slip irreversibility in concentrating solar power (CSP-powered bio-digester assemblies are investigated. Complexities regarding the identification of the appropriate electro-kinetic phenomena for certain electrolyte phases are reviewed. The application of exergy analysis to the design of energy conversion devices, like solar thermal collectors, for the required heat of formation in a downdraft waste food bio-digester, is discussed. Thermal management in the silicon-based substrate of the energy system is analyzed. The rectangular-shaped micro-channels are simulated with a finite-volume, staggered coupling of the pressure-velocity fields. Entropy generation transport within the energy system is determined and coupled with the solution procedure. Consequently, the effects of channel size perturbation, Reynolds number, and pressure ratios on the thermal performance and exergy destruction are presented. A comparative analysis of the axial heat conduction for thermal management in energy conversion devices is proposed.

  20. 7 CFR 1735.22 - Loan security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 11 2010-01-01 2010-01-01 false Loan security. 1735.22 Section 1735.22 Agriculture... GENERAL POLICIES, TYPES OF LOANS, LOAN REQUIREMENTS-TELECOMMUNICATIONS PROGRAM Loan Purposes and Basic Policies § 1735.22 Loan security. (a) RUS makes loans only if, in the judgment of the Administrator, the...