WorldWideScience

Sample records for security research group

  1. Privacy and Security Research Group workshop on network and distributed system security: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    1993-05-01

    This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System. Selected papers were processed separately for inclusion in the Energy Science and Technology Database.

  2. Quantum Secure Group Communication.

    Science.gov (United States)

    Li, Zheng-Hong; Zubairy, M Suhail; Al-Amri, M

    2018-03-01

    We propose a quantum secure group communication protocol for the purpose of sharing the same message among multiple authorized users. Our protocol can remove the need for key management that is needed for the quantum network built on quantum key distribution. Comparing with the secure quantum network based on BB84, we show our protocol is more efficient and securer. Particularly, in the security analysis, we introduce a new way of attack, i.e., the counterfactual quantum attack, which can steal information by "invisible" photons. This invisible photon can reveal a single-photon detector in the photon path without triggering the detector. Moreover, the photon can identify phase operations applied to itself, thereby stealing information. To defeat this counterfactual quantum attack, we propose a quantum multi-user authorization system. It allows us to precisely control the communication time so that the attack can not be completed in time.

  3. Securing Distributed Research

    CERN Multimedia

    CERN. Geneva

    2018-01-01

    Global science calls for global infrastructure. A typical large-scale research group will use a suite of international services and involve hundreds of collaborating institutes and users from around the world. How can these users access those services securely? How can their digital identities be established, verified and maintained? We will explore the motivation for distributed authentication and the ways in which research communities are addressing the challenges. We will discuss security incident response in distributed environments - a particular challenge for the operators of these infrastructures. Through this course you should gain an overview of federated identity technologies and protocols, including x509 certificates, SAML and OIDC.

  4. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  5. Secure Group Communications for Large Dynamic Multicast Group

    Institute of Scientific and Technical Information of China (English)

    Liu Jing; Zhou Mingtian

    2003-01-01

    As the major problem in multicast security, the group key management has been the focus of research But few results are satisfactory. In this paper, the problems of group key management and access control for large dynamic multicast group have been researched and a solution based on SubGroup Secure Controllers (SGSCs) is presented, which solves many problems in IOLUS system and WGL scheme.

  6. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  7. European perspectives on security research

    CERN Document Server

    2011-01-01

    Europe’s networked societies of today are shaped by a growing interconnection in almost all areas of life. The complexity of our infrastructures and the concurrent accessibility to means of destruction by terrorist groups and individual perpetrators call for innovative security solutions. However, such evolving innovations inevitably raise fundamental questions of concern in our societies. How do we balance the imperatives of securing our citizens and infrastructures on the one hand, and of protecting of our sacredly held civil liberties on the other? The topical network ‘Safety and Security’ of acatech – the German Academy of Science and Engineering – invited experts from the science academies of various European countries to share their perspectives on security research and the aspect of safety during a two-day workshop hosted by the Fraunhofer Institute for High-Speed Dynamics, Ernst-Mach-Institut in March 2010. This publication is a compilation of contributions made during the workshop.

  8. Maritime Cyber Security University Research

    Science.gov (United States)

    2016-05-01

    i Classification | CG-926 RDC | author | audience | month year Maritime Cyber Security University Research Phase I - Final Report...Distribution Statement A: Approved for public release; distribution is unlimited. May 2016 Report No. CG-D-06-16 Maritime Cyber Security...Director United States Coast Guard Research & Development Center 1 Chelsea Street New London, CT 06320 Maritime Cyber Security University

  9. A security analysis of version 2 of the Network Time Protocol (NTP): A report to the privacy and security research group

    Science.gov (United States)

    Bishop, Matt

    1991-01-01

    The Network Time Protocol is being used throughout the Internet to provide an accurate time service. The security requirements are examined of such a service, version 2 of the NTP protocol is analyzed to determine how well it meets these requirements, and improvements are suggested where appropriate.

  10. Secure coprocessing applications and research issues

    Energy Technology Data Exchange (ETDEWEB)

    Smith, S.W.

    1996-08-01

    The potential of secure coprocessing to address many emerging security challenges and to enable new applications has been a long-standing interest of many members of the Computer Research and Applications Group, including this author. The purpose of this paper is to summarize this thinking, by presenting a taxonomy of some potential applications and by summarizing what we regard as some particularly interesting research questions.

  11. Small Group Research

    Science.gov (United States)

    McGrath, Joseph E.

    1978-01-01

    Summarizes research on small group processes by giving a comprehensive account of the types of variables primarily studied in the laboratory. These include group structure, group composition, group size, and group relations. Considers effects of power, leadership, conformity to social norms, and role relationships. (Author/AV)

  12. Physical security at research reactors

    International Nuclear Information System (INIS)

    Clark, R.A.

    1977-01-01

    Of the 84 non-power research facilities licensed under 10 CFR Part 50, 73 are active (two test reactors, 68 research reactors and three critical facilities) and are required by 10 CFR Part 73.40 to provide physical protection against theft of SNM and against industrial sabotage. Each licensee has developed a security plan required by 10 CFR Part 50.34(c) to demonstrate the means of compliance with the applicable requirements of 10 CFR Part 73. In 1974, the Commission provided interim guidance for the organization and content of security plans for (a) test reactors, (b) medium power research and training reactors, and (c) low power research and training reactors. Eleven TRIGA reactors, with power levels greater than 250 kW and all other research and training reactors with power levels greater than 100 kW and less than or equal to 5,000 kW are designated as medium power research and training reactors. Thirteen TRIGA reactors with authorized power levels less than 250 kW are considered to be low power research and training reactors. Additional guidance for complying with the requirements of 73.50 and 73.60, if applicable, is provided in the Commission's Regulatory Guides. The Commission's Office of Inspection and Enforcement inspects each licensed facility to assure that an approved security plan is properly implemented with appropriate procedures and physical protection systems

  13. Water System Security and Resilience in Homeland Security Research

    Science.gov (United States)

    EPA's water security research provides tools needed to improve infrastructure security and to recover from an attack or contamination incident involving chemical, biological, or radiological (CBR) agents or weapons.

  14. Homogeneous group, research, institution

    Directory of Open Access Journals (Sweden)

    Francesca Natascia Vasta

    2014-09-01

    Full Text Available The work outlines the complex connection among empiric research, therapeutic programs and host institution. It is considered the current research state in Italy. Italian research field is analyzed and critic data are outlined: lack of results regarding both the therapeutic processes and the effectiveness of eating disorders group analytic treatment. The work investigates on an eating disorders homogeneous group, led into an eating disorder outpatient service. First we present the methodological steps the research is based on including the strong connection among theory and clinical tools. Secondly clinical tools are described and the results commented. Finally, our results suggest the necessity of validating some more specifical hypothesis: verifying the relationship between clinical improvement (sense of exclusion and painful emotions reduction and specific group therapeutic processes; verifying the relationship between depressive feelings, relapses and transition trough a more differentiated groupal field.Keywords: Homogeneous group; Eating disorders; Institutional field; Therapeutic outcome

  15. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  16. IT Security Specialist | IDRC - International Development Research ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The IT Security Specialist takes a strategic role in the delivery of Infrastructure ... on IT Security to project managers, business clients and senior management. ... as a team member or a team leader by undertaking research, investigations, ...

  17. Australian International Food Security Research Centre | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Australian International Food Security Research Centre. Australian International Food Security Research Centre. http://aciar.gov.au/AIFSC. Cultivate Africa's Future. The Cultivate Africa's Future research partnership is designed to support applied research to combat hunger in sub-Saharan Africa by harnessing the potential ...

  18. Doing focus group research

    DEFF Research Database (Denmark)

    Lindegaard, Laura Bang

    2014-01-01

    Scholars of ethnomethodologically informed discourse studies are often sceptical of the use of interview data such as focus group data. Some scholars quite simply reject interview data with reference to a general preference for so-called naturally occurring data. Other scholars acknowledge...... that interview data can be of some use if the distinction between natural and contrived data is given up and replaced with a distinction between interview data as topic or as resource. In greater detail, such scholars argue that interview data are perfectly adequate if the researcher wants to study the topic...... of interview interaction, but inadequate as data for studying phenomena that go beyond the phenomenon of interview interaction. Neither of these more and less sceptical positions are, on the face of it, surprising due to the ethnomethodological commitment to study social order as accomplished in situ...

  19. A German Perspective on Security Research

    Science.gov (United States)

    Thoma, Klaus; Hiller, Daniel; Leismann, Tobias; Drees, Birgit

    Prior to 2007, there was no coherent federal approach to conceptualise and fund security research in Germany. This changed with the initiation of the national program for civil security research, managed by the German Ministry for Education and Research (BMBF). Over the course of only four years a continuous build-up of national capacities on civil security was established to better protect German citizens, commodities and infrastructures against terrorism, organised crime and the effects of man-made and natural disasters.

  20. Secure Learning and Learning for Security: Research in the Intersection

    OpenAIRE

    Rubinstein, Benjamin

    2010-01-01

    Statistical Machine Learning is used in many real-world systems, such as web search, network and power management, online advertising, finance and health services, in which adversaries are incentivized to attack the learner, motivating the urgent need for a better understanding of the security vulnerabilities of adaptive systems. Conversely, research in Computer Security stands to reap great benefits by leveraging learning for building adaptive defenses and even designing intelligent attacks ...

  1. Canadian International Food Security Research Fund (CIFSRF ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Canadian International Food Security Research Fund (CIFSRF). The Canadian International Food Security Research Fund (CIFS-RF) is a collaborative program of the Canadian International Development Agency (CIDA) and IDRC valued at CA $61 654 707 (CIDA: CA $50 000 000; IDRC: CA $11 654 707). The program ...

  2. Maritime Cyber Security University Research: Phase 1

    Science.gov (United States)

    2016-05-01

    i Classification | CG-926 RDC | author | audience | month year Maritime Cyber Security University Research Phase I - Final Report...Appendices Distribution Statement A: Approved for public release; distribution is unlimited. May 2016 Report No. CG-D-07-16 Maritime ...Macesker Executive Director United States Coast Guard Research & Development Center 1 Chelsea Street New London, CT 06320 Maritime Cyber Security

  3. Group Work. Research Brief

    Science.gov (United States)

    Walker, Karen

    2010-01-01

    According to Johnson and Johnson, group work helps increase student retention and satisfaction, develops strong oral communication and social skills, as well as higher self-esteem (University of Minnesota, n.d.). Group work, when planned and implemented deliberately and thoughtfully helps students develop cognitive and leadership skills as well as…

  4. Canadian International Food Security Research Fund (CIFSRF)

    International Development Research Centre (IDRC) Digital Library (Canada)

    . The Canadian International Food Security Research Fund(CIFSRF) is a program of Canada's International Development Research. Centre (IDRC) undertaken with the financial support of the. Government of Canada provided through Foreign ...

  5. A Forward-secure Grouping-proof Protocol for Multiple RFID Tags

    Directory of Open Access Journals (Sweden)

    Liu Ya-li

    2012-09-01

    Full Text Available Designing secure and robust grouping-proof protocols based on RFID characteristics becomes a hotspot in the research of security in Internet of Things (IOT. The proposed grouping-proof protocols recently have security and/or privacy omission and these schemes afford order-dependence by relaying message among tags through an RFID reader. In consequence, aiming at enhancing the robustness, improving scalability, reducing the computation costs on resource-constrained devices, and meanwhile combing Computational Intelligence (CI with Secure Multi-party Communication (SMC, a Forward-Secure Grouping-Proof Protocol (FSGP for multiple RFID tags based on Shamir's (, secret sharing is proposed. In comparison with the previous grouping-proof protocols, FSGP has the characteristics of forward-security and order-independence addressing the scalability issue by avoiding relaying message. Our protocol provides security enhancement, performance improvement, and meanwhile controls the computation cost, which equilibrates both security and low cost requirements for RFID tags.

  6. A Research Agenda for Security Engineering

    Directory of Open Access Journals (Sweden)

    Rich Goyette

    2013-08-01

    Full Text Available Despite nearly 30 years of research and application, the practice of information system security engineering has not yet begun to exhibit the traits of a rigorous scientific discipline. As cyberadversaries have become more mature, sophisticated, and disciplined in their tradecraft, the science of security engineering has not kept pace. The evidence of the erosion of our digital security – upon which society is increasingly dependent – appears in the news almost daily. In this article, we outline a research agenda designed to begin addressing this deficit and to move information system security engineering toward a mature engineering discipline. Our experience suggests that there are two key areas in which this movement should begin. First, a threat model that is actionable from the perspectives of risk management and security engineering should be developed. Second, a practical and relevant security-measurement framework should be developed to adequately inform security-engineering and risk-management processes. Advances in these areas will particularly benefit business/government risk assessors as well as security engineers performing security design work, leading to more accurate, meaningful, and quantitative risk analyses and more consistent and coherent security design decisions. Threat modelling and security measurement are challenging activities to get right – especially when they need to be applied in a general context. However, these are decisive starting points because they constitute the foundation of a scientific security-engineering practice. Addressing these challenges will require stronger and more coherent integration between the sub-disciplines of risk assessment and security engineering, including new tools to facilitate that integration. More generally, changes will be required in the way security engineering is both taught and practiced to take into account the holistic approach necessary from a mature, scientific

  7. Canadian International Food Security Research Fund | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Canadian International Food Security Research Fund (CIFSRF) invests in scaling up ... for farming families, and improve nutrition throughout the Global South. ... universities, civil society organizations, governments, and the private sector, ...

  8. A European Perspective on Security Research

    Science.gov (United States)

    Liem, Khoen; Hiller, Daniel; Castex, Christoph

    Tackling the complexity and interdependence of today's security environment in the globalized world of the 21st century is an everlasting challenge. Whereas the end of the Cold War presented a caesura of global dimension for the political and economic architecture and a realignment of power distribution and international relations between former adversaries, September 11th of 2001 may be seen as another caesura. Since then, specifically among countries of the Western hemisphere, traditional security paradigms and theories have been critically questioned and the different security cultures and perceptions have resulted in diverse security and defence policies as well as in security research efforts of individual countries. Consensus, it seems, exists on the question of what the threats are that our modern interconnected societies are facing. Whether looking at international terrorism, organized crime, climate change, the illegal trafficking of goods and people or naturally caused catastrophes, these phenomena all have in common that they are in most cases of transnational nature. Formerly existing dividing lines between internal and external security continue to fade, presenting an enormous challenge for those in charge of designing security policy and even more so for the various institutions safeguarding European security. That is why dissent often revolves around the question on how to get hold of these complex problems. Geographic location, cultural background, ethical make-up of society as well as relations with neighbouring countries are all important aspects to be considered when assessing the security culture and policy of individual countries.

  9. Research Advances of Social Security Problems in China —Visualization Research based on Bibliometrics

    Institute of Scientific and Technical Information of China (English)

    赵琳

    2016-01-01

    This article summarized the research progress and characteristics of Chinese social security issues from 2000 papers, which record in CNKI. We find that, the topic in the field of social security is board and dispersion. Due to the huge system and complex problem of social security, there is no central theme. Through cluster analysis, multi dimensional scaling analysis and social network analysis, we got the high frequency keywords atlas. Then, we summarized the research topic to six parts. They are rural social security, urban and rural social security co-ordination, vulnerable group social security, social security fund management, the social insurance system, and social security system and government responsibility. It summed up the theme of the module, meanwhile, combined the practice analysis.

  10. Research Award: Agriculture and Food Security

    International Development Research Centre (IDRC) Digital Library (Canada)

    Corey Piccioni

    2013-08-07

    Aug 7, 2013 ... research awards providing a unique opportunity to enhance research skills and gain a fresh perspecve on crucial development issues. These one‐year, paid, ... programming through a research acvity focusing on agriculture and food security, specifically on the gender and social (equity) dimensions of ...

  11. A secure quantum group signature scheme based on Bell states

    International Nuclear Information System (INIS)

    Zhang Kejia; Song Tingting; Zuo Huijuan; Zhang Weiwei

    2013-01-01

    In this paper, we propose a new secure quantum group signature with Bell states, which may have applications in e-payment system, e-government, e-business, etc. Compared with the recent quantum group signature protocols, our scheme is focused on the most general situation in practice, i.e. only the arbitrator is trusted and no intermediate information needs to be stored in the signing phase to ensure the security. Furthermore, our scheme has achieved all the characteristics of group signature—anonymity, verifiability, traceability, unforgetability and undeniability, by using some current developed quantum and classical technologies. Finally, a feasible security analysis model for quantum group signature is presented. (paper)

  12. Public key infrastructure for DOE security research

    Energy Technology Data Exchange (ETDEWEB)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  13. Authentic leadership, group cohesion and group identification in security and emergency teams.

    Science.gov (United States)

    García-Guiu López, Carlos; Molero Alonso, Fernando; Moya Morales, Miguel; Moriano León, Juan Antonio

    2015-01-01

    Authentic leadership (AL) is a kind of leadership that inspires and promotes positive psychological capacities, underlining the moral and ethical component of behavior. The proposed investigation studies the relations among AL, cohesion, and group identification in security and emergency teams. A cross-sectional research design was conducted in which participated 221 members from 26 fire departments and operative teams from the local police of three Spanish provinces. The following questionnaires were administered: Authentic Leadership (ALQ), Group Cohesion (GEQ), and Mael and Ashford's Group Identification Questionnaire. A direct and positive relation was found between AL, cohesion, and group identification. An indirect relation was also found between AL and group cohesion through group identification, indicating the existence of partial mediation. The utility of the proposed model based on AL is considered; this model can be employed by those in charge of the fire departments and operative groups in organizations to improve workteams' cohesion. Both AL and group identification help to explain group cohesion in organizations committed to security and emergencies.

  14. Research award: Agriculture and Food Security | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Research shows that appropriate food security interventions can improve ... sector within the context of increased productivity and reduction of post-harvest loss, rural ... The successful candidate will allocate 50% of his/her time for a research ... with a focus on agriculture;; Business administration and/or management, with a ...

  15. [Biological research and security institutes].

    Science.gov (United States)

    Darsie, G; Falczuk, A J; Bergmann, I E

    2006-04-01

    The threat of using biological material for ago-bioterrorist ends has risen in recent years, which means that research and diagnostic laboratories, biological agent banks and other institutions authorised to carry out scientific activities have had to implement biosafety and biosecurity measures to counter the threat, while carrying out activities to help prevent and monitor the accidental or intentional introduction of exotic animal diseases. This article briefly sets outthe basic components of biosafety and biosecurity, as well as recommendations on organisational strategies to consider in laboratories that support agro-bioterrorist surveillance and prevention programs.

  16. Virtual Focus Groups: New Frontiers in Research

    Directory of Open Access Journals (Sweden)

    Lyn Turney

    2005-06-01

    Full Text Available New information and communication technologies in the form of learning management systems provide unique and inventive opportunities for qualitative researchers. Their intrinsic ability to record discursive data in text format accurately and to provide safe, secure, and anonymous environments for participants makes them amenable for use as advanced research tools. In this article, the authors report on a collaborative project that tested the potential of online discussion boards for use in virtual focus groups. What the researchers found was that not only was the method theoretically sound, it actually enhanced their ability to connect with difficult-to-access populations that were disparately spread.

  17. Integrating security in a group oriented distributed system

    Science.gov (United States)

    Reiter, Michael; Birman, Kenneth; Gong, LI

    1992-01-01

    A distributed security architecture is proposed for incorporation into group oriented distributed systems, and in particular, into the Isis distributed programming toolkit. The primary goal of the architecture is to make common group oriented abstractions robust in hostile settings, in order to facilitate the construction of high performance distributed applications that can tolerate both component failures and malicious attacks. These abstractions include process groups and causal group multicast. Moreover, a delegation and access control scheme is proposed for use in group oriented systems. The focus is the security architecture; particular cryptosystems and key exchange protocols are not emphasized.

  18. Group Policy Fundamentals, Security, and the Managed Desktop

    CERN Document Server

    Moskowitz, Jeremy

    2010-01-01

    The ultimate Group Policy guide-now updated for Windows 7 and Server 2008 R2!. IT and network administrators can streamline their Windows Server management tasks by using Group Policy tools to automate or implement rules, processes, or new security across the enterprise. In this comprehensive guide, Microsoft Group Policy MVP Jeremy Moskowitz thoroughly explores Group Policy across all Windows platforms, including the latest on Windows 7 and Server 2008 R2. If you're a Windows network administrator managing scores of users and computers, you need this essential reference on your desk.: Covers

  19. Food security: what the community wants. Learning through focus groups.

    Science.gov (United States)

    Hargrove, D; Dewolfe, J A; Thompson, L

    1994-01-01

    We used focus groups to learn the range of issues threatening food security of low income residents in our community. Five major themes emerged from the discussions: literacy, money, time, mental health and self-esteem, suggesting several approaches that could help ensure food security: 1) education, 2) sharing of resources, 3) coalition building, and 4) advocacy. Education programs have to be practical, allowing for demonstrations and hands-on learning while emphasizing skill building and problem solving. Incorporating a social aspect into learning may compensate for the social isolation and would capitalize on the impressive mutual support we witnessed. Strategies based on self-help and peer assistance may counteract low self-esteem and overcome suspicion of health professionals. A community-wide effort is needed to address the factors contributing to food insecurity. We envision the formation of a coalition of professionals, agencies, and low income people to develop a comprehensive strategy for achieving food security.

  20. A Cluster Based Group Signature Mechanism For Secure Vanet Communication

    Directory of Open Access Journals (Sweden)

    Navjot Kaur

    2015-08-01

    Full Text Available Vehicular adhoc network is one of the recent area of research to administer safety to human lives controlling of messages and in disposal of messages to users and passengers. VANETs allows communication of moving vehicular nodes. Movement of nodes leads in changing network size and scenario. Whenever a new node joins the network there is a threat of malicious node attack. So we need an environment that is secure and trust worthy. Therefore a new cluster based secure technique is proposed where cluster head is responsible for providing communication between the vehicular nodes. Performance parameters used in this paper are message drop ratio packet delay ratio and verification time.

  1. Academic Information Security Researchers: Hackers or Specialists?

    Science.gov (United States)

    Dadkhah, Mehdi; Lagzian, Mohammad; Borchardt, Glenn

    2018-04-01

    In this opinion piece, we present a synopsis of our findings from the last 2 years concerning cyber-attacks on web-based academia. We also present some of problems that we have faced and try to resolve any misunderstandings about our work. We are academic information security specialists, not hackers. Finally, we present a brief overview of our methods for detecting cyber fraud in an attempt to present general guidelines for researchers who would like to continue our work. We believe that our work is necessary for protecting the integrity of scholarly publishing against emerging cybercrime.

  2. Laboratory research irradiators with enhanced security features

    International Nuclear Information System (INIS)

    Srivastava, Piyush

    2016-01-01

    Over the years BRIT has developed state of art technology for laboratory research irradiators which are suited most for carrying out research and development works in the fields of radiation processing. These equipment which house radioactive sources up to 14 kCi are having a number of features to meet users requirements. They are manufactured as per the national and International standards of safety codes. The paper deals with design, development and application aspects of laboratory research irradiator called Gamma Chamber and also the new security features planned for incorporation in the equipment. Equipment are being regularly manufactured, supplied and installed by BRIT in India and Abroad. There is a number of such equipment in use at different institutions and are found to be very useful. (author)

  3. Laboratory research irradiators with enhanced security features

    International Nuclear Information System (INIS)

    Srivastava, Piyush

    2014-01-01

    Over the years BRIT has developed state of art technology for laboratory research irradiators which are suited most for carrying out research and development works in the fields of radiation processing. These equipment which house radioactive sources up to 14 kCi are having a number of features to meet users requirements. They are manufactured as per the national and International standards of safety codes. The paper deals with design, development and application aspects of laboratory research irradiator called Gamma Chamber and also the new security features planned for incorporation in the equipment. Equipment are being regularly manufactured, supplied and installed by BRIT in India and Abroad. There are a number of such equipment in use at different institutions and are found to be very useful. (author)

  4. Focus groups in organizational research

    Directory of Open Access Journals (Sweden)

    L. Kamfer

    1989-05-01

    Full Text Available Focus groups are commonly used in marketing research. In this article an application of the focus group technique within an organizational context is described. Nine focus groups were conducted during the planning stage of a survey intended to establish employee perceptions of advancement policies and practices in a major South African manufacturing company. Fourteen themes emerged from a content analysis of the discussions. Two of these reflected aspects requiring commitment decisions from management toward the survey. The others indicated areas of concern which should be included in the survey. In this way, the focus groups contributed useful information for the subsequent sample survey. Opsomming Fokusgroepe word algemeen in bemarkingsnavorsing aangewend. In hierdie studie word 'n toepassingvan die fokusgroeptegniek in die konteks van 'n opname binne 'n organisasie beskryf. Nege fokusgroepbesprekings is gevoer tydens die beplanningstadium van 'n opname wat binne 'n Suid-Afrikaanse vervaardigingsonderneming gedoen is. Die doel van die opname was om die persepsies van werknemers teenoor die bestaande personeel- en bestuursontwikkelingsbeleid en -praktyke van die maatskappy te bepaal. Veertien temas is deur middel van 'n inhoudontleding gei'dentifiseer. Twee hiervan het aspekte aangedui waaroor bestuur beginselbesluite t.o.v. die opname sou moes neem. Die ander het probleemareas aangedui wat by die ondersoek selfingesluit behoort te word. Sodoende het die fokusgroepe inligting verskafwat vir die latere vraelysopname belangrik was.

  5. Canadian International Food Security Research Fund (CIFSRF)

    International Development Research Centre (IDRC) Digital Library (Canada)

    The research team will test innovative mechanisms such as elec- tronic vouchers to target vulnerable groups on a large scale. E-voucher discounts delivered by mobile phone to 65,000 lactat- ing mothers will provide a temporary price incentive to help build a market for the product. The scheme will also enable researchers.

  6. Nuclear Security Management for Research Reactors and Related Facilities

    International Nuclear Information System (INIS)

    2016-03-01

    This publication provides a single source guidance to assist those responsible for the implementation of nuclear security measures at research reactors and associated facilities in developing and maintaining an effective and comprehensive programme covering all aspects of nuclear security on the site. It is based on national experience and practices as well as on publications in the field of nuclear management and security. The scope includes security operations, security processes, and security forces and their relationship with the State’s nuclear security regime. The guidance is provided for consideration by States, competent authorities and operators

  7. Improving food security and nutrition through research | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Informing policy through agriculture and food security research. Improving the uptake of agricultural and food security research into policy and practice is a central objective of IDRC's Agriculture and Food Security program. To maximize the impact of proven solutions, the program set out to inform and engage both Canadian ...

  8. Risk Based Security Management at Research Reactors

    Energy Technology Data Exchange (ETDEWEB)

    Ek, David R. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)

    2015-09-01

    This presentation provides a background of what led to the international emphasis on nuclear security and describes how nuclear security is effectively implemented so as to preserve the societal benefits of nuclear and radioactive materials.

  9. Eduroam: Secure WiFi roaming for education and research

    CSIR Research Space (South Africa)

    Miteff, S

    2012-10-01

    Full Text Available In this presentation the author introduces the Eduroam initiative, and explains how it combines existing wireless security technologies in a novel way, to enable secure global roaming for end users at university campuses and research institutions....

  10. Seven layers of security to help protect biomedical research facilities.

    Science.gov (United States)

    Mortell, Norman

    2010-04-01

    In addition to risks such as theft and fire that can confront any type of business, the biomedical research community often faces additional concerns over animal rights extremists, infiltrations, data security and intellectual property rights. Given these concerns, it is not surprising that the industry gives a high priority to security. This article identifies security threats faced by biomedical research companies and shows how these threats are ranked in importance by industry stakeholders. The author then goes on to discuss seven key 'layers' of security, from the external environment to the research facility itself, and how these layers all contribute to the creation of a successfully secured facility.

  11. Summary of Research 1997, Interdisciplinary Academic Groups

    National Research Council Canada - National Science Library

    Boger, Dan

    1999-01-01

    This report contains information of research projects in the interdisciplinary groups, Command, Control, and Communications Academic Group, Information Warfare Academic Group, Space Systems Academic...

  12. Security Research on Engineering Database System

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database management system (EDBMS). Through studying and analyzing the database security, to draw a series of securi ty rules, which reach B1, level security standard. Which includes discretionary access control (DAC), mandatory access control (MAC) and audit. The EDBMS implem ents functions of DAC, ...

  13. Securing medical research: a cybersecurity point of view.

    Science.gov (United States)

    Schneier, Bruce

    2012-06-22

    The problem of securing biological research data is a difficult and complicated one. Our ability to secure data on computers is not robust enough to ensure the security of existing data sets. Lessons from cryptography illustrate that neither secrecy measures, such as deleting technical details, nor national solutions, such as export controls, will work.

  14. Cloud Security: Issues and Research Directions

    Science.gov (United States)

    2014-11-18

    4. Cloud Computing Security: What Changes with Software - Defined Networking ? Maur´ıcio Tsugawa, Andr´ea Matsunaga, and Jos´e A. B. Fortes 5...machine’s memory from an untrusted or malicious hypervisor. In Chapter 4, Tsugawa et al. discuss the security issues introduced when Software - Defined ... Networking ( SDN ) is deployed within and across clouds. Chapters 5-9 are focused on the protection of data stored in the cloud. In Chapter 5, Wang et

  15. Antigovernment Groups. A Growing Threat to US Security

    Energy Technology Data Exchange (ETDEWEB)

    Swift, Alicia L. [Los Alamos National Laboratory

    2016-04-25

    Domestic terrorism is a growing threat in the United States, particularly from the 998 right-wing antigovernment (AG) groups in existence in 2015. In the years since the September 11, 2001 attacks in New York City, right-wing anti-government acts have oc- curred more often and killed more people in the United States than Muslim extremists. Such AG group members are often in uenced by racist, anti-Semitic, or anti-Islamic views, believe conspiracy theories about the government, and often refuse to pay taxes or participate in frivolous lawsuits in order to intentionally waste the government's time. There is, however, a violent element to these groups which participates in events ranging from the armed take-over of federal land in Oregon, to an armed stand-o with federal agents in Nevada, to the bombing of the Oklahoma City building which killed 168 people. Such acts may be conducted by a few individuals, as is the case of the Oklahoma City bombing, or an entire group. Such groups have a wide range of capabilities, with typical weapons including legal and illegal rearms, with a focus on purchasing fully automatic weapons; hand grenades, with some homemade; deadly tox- ins, like ricin (in multiple cases) and sodium cyanide (in one case); transportation, such as all-terrain vehicles (ATVs); arson, with the intent of destroying federal property; and explosives, often in large numbers and including pipe bombs, truck bombs, IEDs, and other homemade explosives. The growing acceptance of these violent methods by Republican congressmen and governors, however, only increases visibility of such groups and encourages their behavior. Coupled with the removal of the Department of Homeland Security's division responsible for monitoring such groups, the result could prove disastrous for the safety of United States citizens.

  16. The Security Research of Digital Library Network

    Science.gov (United States)

    Zhang, Xin; Song, Ding-Li; Yan, Shu

    Digital library is a self-development needs for the modern library to meet the development requirements of the times, changing the way services and so on. digital library from the hardware, technology, management and other aspects to objective analysis of the factors of threats to digital library network security. We should face up the problems of digital library network security: digital library network hardware are "not hard", the technology of digital library is relatively lag, digital library management system is imperfect and other problems; the government should take active measures to ensure that the library funding, to enhance the level of network hardware, to upgrade LAN and prevention technology, to improve network control technology, network monitoring technology; to strengthen safety management concepts, to prefect the safety management system; and to improve the level of security management modernization for digital library.

  17. Government's role in power supply security. A working group report

    International Nuclear Information System (INIS)

    2004-01-01

    The working group was to analyse the Government's role in terms of improving the security of supply of the electricity market in exceptionally difficult capacity situations and to make propositions for the ways of arranging a tendering procedure concerning security of supply and capacity control, so as to meet the requirements of the EC Energy Internal Market Directives after 1 July 2004. The Working Group considers that there is no need at this stage to introduce a separate new system intended as a supplement to technical reserves in Finland. Such a system would not bring new capacity for the use of the power system, and in the case of existing capacity, production would only be transferred from one market to another. However, the situation may change from this, if there occur such factors on the market that aim to raise the market price of electricity or if it turned out that reserve power plants would be decommissioned on a large scale. The working group proposes that such a provision be added to the Electricity Market Act that would oblige the electricity supplier to notify the Energy Market Authority of a planned service outage of a power plant of at least 100 MVA producing electricity separately, which would fall within the time period 1 December - 28 February. The Energy Market Authority would be vested with the powers to postpone the outage due to a tight output situation, if there are not technical or safety- bound obstacles to this. It is important for the sufficiency of the power need of the Internal Market that the price signals of the market are reflected to both producers and consumers of electricity. The working group further proposes that the Ministry of Trade and Industry would look into development of the meter-reading requirements, so that they would, for their part, create the conditions for price flexibility in power consumption and for new sales products of electricity. In addition, tightening of the hourly metering requirement related to the

  18. The Δ a research group

    Science.gov (United States)

    Maitzen, H. M.; Paunzen, E.; Pöhnl, H.; Rode-Paunzen, M.; Netopil, M.; Stütz, Ch.; Baum, H.

    2004-12-01

    We summarize of more than 25 years of research with the three filter, intermediate-band, Δ a photometric system. It investigates the flux depression at λ 5200 found in magnetic chemically peculiar (CP) objects. Starting with photoelectric measurements it has steadily developed introducing new and more efficient filters as well as the modern CCD technique. So far more than twenty papers were devoted to searching for new CP stars in our Milky Way up to distances of 5000 pc and even in the Large Magellanic Cloud. In the latter, the first extragalactic CP stars were detected. In addition, we have presented theoretical isochrones and synthetic colors from the latest available stellar atmospheres. The theoretical predictions agree very well with observations allowing not only to determine the reddening and age of open clusters from our photometry but also to investigate the flux depression at λ 5200 in more detail. As an outlook, we present a new approach to search for chemically peculiar horizontal branch stars in globular clusters and to detect stellar variability of various objects observed during our photometric observations.

  19. Organization of an undergraduate research group

    International Nuclear Information System (INIS)

    Hill, J.; Noteboom, E.

    1995-01-01

    Traditionally, research groups consist of senior physicists, staff members, and graduate students. The physics department at Creighton University has formed a Relativistic Heavy Ion physics research group consisting primarily of undergraduate students. Although senior staff and graduate students are actively involved, undergraduate research and the education of undergraduates is the focus of the group. The presentation, given by two undergraduate members of the group, will outline progress made in the group's organization, discuss the benefits to the undergraduate group members, and speak to the balance which must be struck between education concerns and research goals

  20. SecurityCom: A Multi-Player Game for Researching and Teaching Information Security Teams

    Directory of Open Access Journals (Sweden)

    Douglas P. Twitchell

    2007-12-01

    Full Text Available A major portion of government and business organizations’ attempts to counteract information security threats is teams of security personnel.  These teams often consist of personnel of diverse backgrounds in specific specialties such as network administration, application development, and business administration, resulting in possible conflicts between security, functionality, and availability.  This paper discusses the use of games to teach and research information security teams and outlines research to design and build a simple, team-oriented, configurable, information security game. It will be used to study how information security teams work together to defend against attacks using a multi-player game, and to study the use of games in training security teams.  Studying how information security teams work, especially considering the topic of shared-situational awareness, could lead to better ways of forming, managing, and training teams.  Studying the effectiveness of the game as a training tool could lead to better training for security teams. 

  1. Research on food security makes a difference for African women ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    17 avr. 2014 ... There is ample evidence that addressing gender inequalities and empowering women are vital to meeting the challenges of improving food and nutrition security, and enabling poor rural people to overcome poverty. A central objective of the Canadian International Food Security Research Fund (CIFSRF) is ...

  2. Research on food security makes a difference for African women ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-05-05

    May 5, 2016 ... There is ample evidence that addressing gender inequalities and empowering women are vital to meeting the challenges of improving food and nutrition security, and enabling poor rural people to overcome poverty. A central objective of the Canadian International Food Security Research Fund (CIFSRF) is ...

  3. Information Security Issues in Higher Education and Institutional Research

    Science.gov (United States)

    Custer, William L.

    2010-01-01

    Information security threats to educational institutions and their data assets have worsened significantly over the past few years. The rich data stores of institutional research are especially vulnerable, and threats from security breaches represent no small risk. New genres of threat require new kinds of controls if the institution is to prevent…

  4. Research Awards: Agriculture and Food Security program Deadline ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Jean-Claude Dumais

    2012-09-12

    Sep 12, 2012 ... HEAD OFFICE / SIÈGE : 150 Kent Street / 150, rue Kent PO Box ... to pursue their research goals in a dynamic team environment in ... You should have an interest in agriculture, food security, nutrition, rural livelihoods, and.

  5. Improving food security and nutrition through research | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-10-06

    Oct 6, 2016 ... In Canada, the 2012 federal budget highlighted CIFSRF's success, noting how the ... New animal vaccines could keep more African farmers in business ... Research on food security makes a difference for African women.

  6. USAF Institute for National Security Studies 1998 Research Results Conference

    National Research Council Canada - National Science Library

    1998-01-01

    The USAF Institute for National Security Studies (INSS), in cooperation with HQ USAF Nuclear and Counterproliferation Directorate, sponsored its 6th annual Research Results Conference on 19 - 20 November 1998...

  7. Secure Group Formation Protocol for a Medical Sensor Network Prototype

    DEFF Research Database (Denmark)

    Andersen, Jacob

    2009-01-01

    , and experience from user workshops and observations of clinicians at work on a hospital ward show that if the security mechanisms are not well designed, the technology is either rejected altogether, or they are circumvented leaving the system wide open to attacks. Our work targets the problem of designing......Designing security mechanisms such as privacy and access control for medical sensor networks is a challenging task; as such systems may be operated very frequently, at a quick pace, and at times in emergency situations. Understandably, clinicians hold extra unproductive tasks in low regard...... wireless sensors to be both secure and usable by exploring different solutions on a fully functional prototype platform. In this paper, we present an Elliptic Curve Cryptography (ECC) based protocol, which offers fully secure sensor set-up in a few seconds on standard (Telos) hardware. We evaluate...

  8. Improving Control System Security through the Evaluation of Current Trends in Computer Security Research

    Energy Technology Data Exchange (ETDEWEB)

    Rolston

    2005-03-01

    At present, control system security efforts are primarily technical and reactive in nature. What has been overlooked is the need for proactive efforts, focused on the IT security research community from which new threats might emerge. Evaluating cutting edge IT security research and how it is evolving can provide defenders with valuable information regarding what new threats and tools they can anticipate in the future. Only known attack methodologies can be blocked, and there is a gap between what is known to the general security community and what is being done by cutting edge researchers --both those trying to protect systems and those trying to compromise them. The best security researchers communicate with others in their field; they know what cutting edge research is being done; what software can be penetrated via this research; and what new attack techniques and methodologies are being circulated in the black hat community. Standardization of control system applications, operating systems, and networking protocols is occurring at a rapid rate, following a path similar to the standardization of modern IT networks. Many attack methodologies used on IT systems can be ported over to the control system environment with little difficulty. It is extremely important to take advantage of the lag time between new research, its use on traditional IT networks, and the time it takes to port the research over for use on a control system network. Analyzing nascent trends in IT security and determining their applicability to control system networks provides significant information regarding defense mechanisms needed to secure critical infrastructure more effectively. This work provides the critical infrastructure community with a better understanding of how new attacks might be launched, what layers of defense will be needed to deter them, how the attacks could be detected, and how their impact could be limited.

  9. Information security management: a proposal to improve the effectiveness of information security in the scientific research environment

    International Nuclear Information System (INIS)

    Alexandria, Joao Carlos Soares de

    2009-01-01

    The increase of the connectivity in the business environment, combined with the growing dependency of information systems, has become the information security management an important governance tool. Information security has as main goal to protect the business transactions in order to work normally. In this way, It will be safeguarding the business continuity. The threats of information come from hackers' attacks, electronic frauds and spying, as well as fire, electrical energy interruption and humans fault. Information security is made by implementation of a set of controls, including of the others politics, processes, procedures, organizational structures, software and hardware, which require a continuous management and a well established structure to be able to face such challenges. This work tried to search the reasons why the organizations have difficulties to make a practice of information security management. Many of them just limit to adopt points measures, sometimes they are not consistent with their realities. The market counts on enough quantity of standards and regulations related to information security issues, for example, ISO/IEC 27002, American Sarbanes-Oxley act, Basel capital accord, regulations from regulatory agency (such as the Brazilians ones ANATEL, ANVISA and CVM). The market researches have showed that the information security implementation is concentrated on a well-defined group of organization mainly formed by large companies and from specifics sectors of economy, for example, financial and telecommunication. However, information security must be done by all organizations that use information systems to carry out their activities, independently of its size or economic area that it belongs. The situation of information security in the governmental sector of Brazil, and inside its research institutions, is considered worrying by the Brazilian Court of Accounts (TCU). This research work presents an assessment and diagnostic proposal of

  10. Using Focus Group Research in Public Relations.

    Science.gov (United States)

    Grunig, Larissa A.

    1990-01-01

    Analyzes a recent instance of focus group research applied to a public relations case (rather than a marketing case). Reviews the advantages and disadvantages of this qualitative method, and describes the case of a county department of mental health relying on focus group research to help plan a program aimed at reducing the stigma of mental…

  11. Organisational Information Security Strategy: Review, Discussion and Future Research

    Directory of Open Access Journals (Sweden)

    Craig A. Horne

    2017-05-01

    Full Text Available Dependence on information, including for some of the world’s largest organisations such as governments and multi-national corporations, has grown rapidly in recent years. However, reports of information security breaches and their associated consequences indicate that attacks are escalating on organisations conducting these information-based activities. Organisations need to formulate strategy to secure their information, however gaps exist in knowledge. Through a thematic review of academic security literature, (1 we analyse the antecedent conditions that motivate the adoption of a comprehensive information security strategy, (2 the conceptual elements of strategy and (3 the benefits that are enjoyed post-adoption. Our contributions include a definition of information security strategy that moves from an internally-focussed protection of information towards a strategic view that considers the organisation, its resources and capabilities, and its external environment. Our findings are then used to suggest future research directions.

  12. Research helps improve food security and nutrition

    International Development Research Centre (IDRC) Digital Library (Canada)

    Corey Piccioni

    agricultural productivity, improving nutrition, and raising incomes of men and women smallholder farmers. IDRC accomplishes this through joint partnerships with Global. Affairs Canada and the Australian Centre for International. Agricultural Research. Our researchers use a variety of approaches to: • Increase productivity of ...

  13. Research Award: Governance, Security, and Justice

    International Development Research Centre (IDRC) Digital Library (Canada)

    IDRC CRDI

    and marginalized groups have difficulty claiming their right to live in a safe and prosperous environment. ... Applicants should clearly outline their qualifications for this position, and explain how this opportunity will advance their career goals.

  14. ANNEX A: RESEARCH FOR FOOD SECURITY

    International Development Research Centre (IDRC) Digital Library (Canada)

    rvernooy

    2013-04-05

    Apr 5, 2013 ... CIDA's aim is to i) manage Canada's support and ... Food and nutritional insecurity, climate change, new and emerging diseases, and the .... groups). All projects require the sound assessment of environmental impact and the.

  15. Energy Innovation. IVO Group`s Research and Development Report

    Energy Technology Data Exchange (ETDEWEB)

    Salminen, P.; Laiho, Y.; Kaikkonen, H.; Leisio, C.; Hinkkanen, S. [eds.

    1996-11-01

    This annual booklet of the IVO Group`s research and development activities presents a number of articles, written by experts from IVO. The products described are examples of the environmentally-oriented selection made available by the IVO Group. In fact, the entire energy technology developed in Finland is environmentally oriented, if seen from the international perspective. The new business potential of environmental technology is great, and it is believed that in the year 2000, exportation of Finnish know-how in the field of energy-saving and efficiency will exceed the value of out energy imports

  16. Energy Innovation. IVO group`s research and development report

    Energy Technology Data Exchange (ETDEWEB)

    Salminen, P.; Laiho, Y.; Kaikkonen, H.; Leisio, C.; Hinkkanen, S.; Fletcher, R. [eds.

    1997-11-01

    This annual booklet of the IVO Group`s research and development activities presents a number of articles, written by experts from IVO. The products described are examples of the environmentally-oriented selection made available by the IVO Group. In fact, the entire energy technology developed in Finland is environmentally oriented, if seen from the international perspective. The new business potential of environmental technology is great, and it is believed that in the year 2000, exportation of Finnish know-how in the field of energy-saving and efficiency will exceed the value of out energy imports

  17. Research Award: Agriculture and Food Security Program

    International Development Research Centre (IDRC) Digital Library (Canada)

    IDRC CRDI

    social) without adverse consequences to societies and the environment. ... research will place particular attention on the interactions of public sector ... Applicants should clearly outline their qualifications for this position, and explain how this ...

  18. Regional disarmament and security issues. Report of working group II

    International Nuclear Information System (INIS)

    Ravenhill, J.

    1994-01-01

    Substantial progress has been made in building cooperation in the Asia-pacific region in remarkably short period of time. Problems of regional disarmament are analysed by linking the economic and security issues. International cooperation regimes, whether in the military sphere, such as the Non-proliferation treaty, or in the trade sphere such as the General Agreement on Tariffs and Trade, inevitably impose restrictions on the autonomy of member States. The integrity of the regime depends on countries' acceptance of the obligations it imposes. The task ahead is to convince all countries in the region that cooperation in the security sphere will be of even greater long-term benefit

  19. Including Everyone in Research: The Burton Street Research Group

    Science.gov (United States)

    Abell, Simon; Ashmore, Jackie; Wilson, Dorothy; Beart, Suzie; Brownley, Peter; Butcher, Adam; Clarke, Zara; Combes, Helen; Francis, Errol; Hayes, Stefan; Hemmingham, Ian; Hicks, Kerry; Ibraham, Amina; Kenyon, Elinor; Lee, Darren; McClimens, Alex; Collins, Michelle; Newton, John; Wilson, Dorothy

    2007-01-01

    In our paper we talk about what it is like to be a group of people with and without learning disabilities researching together. We describe the process of starting and maintaining the research group and reflect on the obstacles that we have come across, and the rewards such research has brought us. Lastly we put forward some ideas about the role…

  20. Research Market Gap in Law Enforcement Technology: Lessons from Czech Security Research Funding Programmes

    Directory of Open Access Journals (Sweden)

    Luděk Moravec

    2014-12-01

    Full Text Available While security research funding schemes are nothing new to the EU (Horizon 2020 and FP7, or to several Member States, their priorities and procedures are usually decided administratively or shaped by advisory groups of varying membership. Only recently did the EU shift its focus to the role of end users in security research programmes, seeking their input in order to maximise the utility of funded solutions. Such a hint to limited usefulness of some industrial solutions is not exactly inconspicuous. This paper discusses the gap between the stated needs of law enforcement agencies in terms of R&D funding and the grant project applications in the area of law enforcement. It aims to define and describe the gap, and consequently the market opportunities, between the supply and demand sides represented by industry-driven grant project applications and end-user-formulated calls. The study is based on empirical data from two Czech security research funding programmes that have been running since 2010 and should deliver their results by 2015. It seeks to contribute some preliminary observations about the structure of both end user needs and industry capabilities in such a particular area as law enforcement technology.

  1. Secure Group Formation Protocol for a Medical Sensor Network Prototype

    DEFF Research Database (Denmark)

    Andersen, Jacob

    2009-01-01

    , and experience from user workshops and observations of clinicians at work on a hospital ward show that if the security mechanisms are not well designed, the technology is either rejected altogether, or they are circumvented leaving the system wide open to attacks. Our work targets the problem of designing...

  2. Enhanced Security for Online Exams Using Group Cryptography

    Science.gov (United States)

    Jung, I. Y.; Yeom, H. Y.

    2009-01-01

    While development of the Internet has contributed to the spread of online education, online exams have not been widely adopted. An online exam is defined here as one that takes place over the insecure Internet, and where no proctor is in the same location as the examinees. This paper proposes an enhanced secure online exam management environment…

  3. Research groups in biomedical sciences. Some recommendations

    Directory of Open Access Journals (Sweden)

    Ricardo Cardona

    2015-07-01

    Full Text Available Despite the growing number of scientific publications reflecting a greater number of people interested in the biomedical sciences, many research groups disappear secondary to poor internal organization. From the review of the available literature, we generate a series of recommendations that may be useful for the creation of a research group or to improve the productivity of an existing group. Fluid communication between its members with a common overall policy framework allows the creation of a good foundation that will lead to the consolidation of the group.

  4. Cyber Security: Big Data Think II Working Group Meeting

    Science.gov (United States)

    Hinke, Thomas; Shaw, Derek

    2015-01-01

    This presentation focuses on approaches that could be used by a data computation center to identify attacks and ensure malicious code and backdoors are identified if planted in system. The goal is to identify actionable security information from the mountain of data that flows into and out of an organization. The approaches are applicable to big data computational center and some must also use big data techniques to extract the actionable security information from the mountain of data that flows into and out of a data computational center. The briefing covers the detection of malicious delivery sites and techniques for reducing the mountain of data so that intrusion detection information can be useful, and not hidden in a plethora of false alerts. It also looks at the identification of possible unauthorized data exfiltration.

  5. Enhancing effectiveness of agriculture group in supporting government program to increase food security

    Science.gov (United States)

    Retnowati, Daru; Subarjo, A. H.

    2018-05-01

    Food Security is closely related to agriculture, including fisheries. Food is a basic necessity and indispensable to humans. Nowadays, there are many agricultural lands and fisheries are turning to settlements and offices. To overcome these obstacles, the government took the policy of forming farmer groups. Farmer groups are channeling the government assistance, whether capital, seeds, training, or technology and knowledge assistance. This research is qualitative. The population in this study were members of the fish farming group in Purwomartani, Kalasan, Sleman. The population in this study were 4 Farmers Group in Purwomartani, Kalasan, Sleman. The sample in this research is 1 farmer group with the largest number of members that is 31 people. For the other three groups of fish farmers the number of members is 20 people. The results show that farmer groups are effective in supporting government programs. The role of farmer groups is needed to support the successful management of agricultural land, improvement of knowledge and skills of fish farmers, renewal of agricultural technology and equipment, and marketing of agricultural products.

  6. Final report for the protocol extensions for ATM Security Laboratory Directed Research and Development Project

    Energy Technology Data Exchange (ETDEWEB)

    Tarman, T.D.; Pierson, L.G.; Brenkosh, J.P. [and others

    1996-03-01

    This is the summary report for the Protocol Extensions for Asynchronous Transfer Mode project, funded under Sandia`s Laboratory Directed Research and Development program. During this one-year effort, techniques were examined for integrating security enhancements within standard ATM protocols, and mechanisms were developed to validate these techniques and to provide a basic set of ATM security assurances. Based on our experience during this project, recommendations were presented to the ATM Forum (a world-wide consortium of ATM product developers, service providers, and users) to assist with the development of security-related enhancements to their ATM specifications. As a result of this project, Sandia has taken a leading role in the formation of the ATM Forum`s Security Working Group, and has gained valuable alliances and leading-edge experience with emerging ATM security technologies and protocols.

  7. Privacy and Security in Mobile Health (mHealth) Research.

    Science.gov (United States)

    Arora, Shifali; Yttri, Jennifer; Nilse, Wendy

    2014-01-01

    Research on the use of mobile technologies for alcohol use problems is a developing field. Rapid technological advances in mobile health (or mHealth) research generate both opportunities and challenges, including how to create scalable systems capable of collecting unprecedented amounts of data and conducting interventions-some in real time-while at the same time protecting the privacy and safety of research participants. Although the research literature in this area is sparse, lessons can be borrowed from other communities, such as cybersecurity or Internet security, which offer many techniques to reduce the potential risk of data breaches or tampering in mHealth. More research into measures to minimize risk to privacy and security effectively in mHealth is needed. Even so, progress in mHealth research should not stop while the field waits for perfect solutions.

  8. A Perspective on Research Challenges in Information Security

    Science.gov (United States)

    2011-11-01

    UNCLASSIFIED A Perspective on Research Challenges in Information Security Tamas Abraham, David Adie, Angela Billard, Paul Buckland, Michael Frangos ...Abstract (U) 4. AUTHORS Tamas Abraham, David Adie, Angela Billard, Paul Buckland, Michael Frangos , Ben Long, Mar- tin Lucas, Paul Montague, Dean Philp

  9. CARONTE project: Creating an Agenda for Research on Transportation Security

    Energy Technology Data Exchange (ETDEWEB)

    Leon Bello, J.; Gonzalez Viosca, E.

    2016-07-01

    Europe’s prosperity relies on effective transport systems. Any attacks and disturbances to land freight and passenger transport would have significant impact on economic growth, territorial cohesion, social development and the environment. Unfortunately, there are weaknesses in the land transport security.The objective of CARONTE project is define a future research agenda for security in land transport that focuses on core gaps caused by emerging risks while avoiding any doubling-up of research elsewhere. Its research agenda will cover all threats, including cyber-crime, and security aspects across all modes of land transportation. At the same time, it will respect the fundamental human rights and privacy of European citizens. The step-by-step method of CARONTE’s consortium has analyzed the state of the art and emerging risks; has identified gaps, analyses and assessments of potential solutions; and has produced an overall research agenda for the future. CARONTE’s results will answer the following questions among others: Which existing research projects merit a follow up and extension? Where are the combinations or synergy effects to be attended? Which themes and topics should be elaborated in new research projects? Who should be involved and integrated in future research projects (stakeholders, authorities, etc.)? The CARONTE consortium includes universities and research institutes, companies, and end-users providing with experience in research and consultancy in transportation, logistics, infrastructure management, security and communications. ITENE - Instituto Tecnológico del Embalaje, Transporte y Logística-has been one of the Project partners among a total of 11 members from eight different countries in the European Union which have also been supported via a High Level Advisory Board. (Author)

  10. Journal Club: a group of research experience

    OpenAIRE

    Draganov, Patricia Bover; Silva, Maria Regina Guimarães; Neves, Vanessa Ribeiro; Sanna, Maria Cristina

    2018-01-01

    ABSTRACT Introduction: the Journal Club (JC) is a teaching and learning strategy developed by individuals who meet to discuss scientific articles in periodicals. Objective: to describe the experience of the JC strategy at the Group for Studies and Research in Health Services Administration and Nursing Management (Gepag). Method: case studies or scientific research demonstration mode of practical experience for the understanding and justification of facts. Results: Gepag JC emerged in 2008...

  11. Security Analysis of Accountable Anonymous Group Communication in Dissent

    Science.gov (United States)

    2013-01-31

    instance, group discussion forums or instant messaging. Misbehaving users may abuse this anonymity to disrupt communication, however, and existing...Abstract Users often wish to communicate anonymously on the Internet using, for instance, group discussion forums or instant messaging. Misbehaving users may...personal reprisal (Stein 2003). Yet anonymity makes it difficult to trace or exclude misbehaving participants (Davenport 2002). Online proto- cols

  12. Research group librarian – a cooperating partner in research?

    Directory of Open Access Journals (Sweden)

    Heidi Kristin Olsen

    2012-11-01

    Full Text Available Academic libraries encounter many challenges when providing services for researchers and it is evident that use of the library in information searches has reduced significantly over time and continues to decrease.However, a study in Norway in 2007, at Vestfold University College (VUC, demonstrated that there is great potential to increase faculty staff’s use of the library’s digital resources with the right form of engagement. The findings led VUC’s library to focus on its services for this particular user group.In 2009, VUC library initiated a study to investigate the possible effects of a librarian participating as a ‘Research Group Librarian’.The research project, in which this new role was tried out, was called ‘Kindergarten space, materiality, learning and meaning-making’. This was a three year project, funded by the Research Council of Norway. There were eight part time researchers involved in this project, two senior researchers and the research group librarian.The study adopted an ethnographic approach. The research group librarian was a fully participating member of the research team throughout the project.The empirical sources for the study included:semi-structured interviews with the project leader and the participating researchers: short individual interviews at the beginning of the project with each of the research group participants; several group interviews with the majority of the research team midway in the project;observation and field notesThe results are presented under the following categories:implications for the researcher; emphasising behaviour in relation to information search and reference management skills;communication and information within, and evolving from, the project;collaboration in writing a review article;implications for the library – internal, and at VUC in general;the librarian’s role – a ‘boundary worker’?The study demonstrated that as a member of a research group a librarian can

  13. Journal Club: a group of research experience

    Directory of Open Access Journals (Sweden)

    Patricia Bover Draganov

    Full Text Available ABSTRACT Introduction: the Journal Club (JC is a teaching and learning strategy developed by individuals who meet to discuss scientific articles in periodicals. Objective: to describe the experience of the JC strategy at the Group for Studies and Research in Health Services Administration and Nursing Management (Gepag. Method: case studies or scientific research demonstration mode of practical experience for the understanding and justification of facts. Results: Gepag JC emerged in 2008 and, in 2014, was computerized with the Google Drive®, in order to increase its scope and optimize the Group›s meetings. From April to May 2014, the instrument was tested and adjusted, resulting in advancements. Final considerations: the advantages involved optimizing the time of meetings, facilitation of access to publications of interest to the Group and creating the database to support future research.

  14. Journal Club: a group of research experience.

    Science.gov (United States)

    Draganov, Patricia Bover; Silva, Maria Regina Guimarães; Neves, Vanessa Ribeiro; Sanna, Maria Cristina

    2018-01-01

    the Journal Club (JC) is a teaching and learning strategy developed by individuals who meet to discuss scientific articles in periodicals. to describe the experience of the JC strategy at the Group for Studies and Research in Health Services Administration and Nursing Management (Gepag). case studies or scientific research demonstration mode of practical experience for the understanding and justification of facts. Gepag JC emerged in 2008 and, in 2014, was computerized with the Google Drive®, in order to increase its scope and optimize the Group›s meetings. From April to May 2014, the instrument was tested and adjusted, resulting in advancements. the advantages involved optimizing the time of meetings, facilitation of access to publications of interest to the Group and creating the database to support future research.

  15. Ethical Guidelines for Computer Security Researchers: "Be Reasonable"

    Science.gov (United States)

    Sassaman, Len

    For most of its existence, the field of computer science has been lucky enough to avoid ethical dilemmas by virtue of its relatively benign nature. The subdisciplines of programming methodology research, microprocessor design, and so forth have little room for the greater questions of human harm. Other, more recently developed sub-disciplines, such as data mining, social network analysis, behavioral profiling, and general computer security, however, open the door to abuse of users by practitioners and researchers. It is therefore the duty of the men and women who chart the course of these fields to set rules for themselves regarding what sorts of actions on their part are to be considered acceptable and what should be avoided or handled with caution out of ethical concerns. This paper deals solely with the issues faced by computer security researchers, be they vulnerability analysts, privacy system designers, malware experts, or reverse engineers.

  16. Research program of the Neutrino Research Group. Year 2004

    International Nuclear Information System (INIS)

    2004-01-01

    For the last two decades, neutrino physics has been producing major discoveries including neutrino oscillations. These results gave clear confirmation that active neutrinos oscillate and therefore have mass with three different mass states. This is a very important result showing that the Minimal Standard Model is incomplete and requires an extension which is not yet known. The neutrino research field is very broad and active, at the frontier of today's particle physics. The creation of a Neutrino Research Group (GDR) was proposed in 2004 with the aim of gathering CEA and CNRS research teams working on Neutrino Physics on experimental or theoretical level. This document presents the Research program of the Neutrino Research Group which is divided into 5 working groups with the following activities: 1 - Determination of neutrino parameters; 2 - Physics beyond the standard model; 3 - Neutrinos in the universe; 4 - Accelerators, detection means, R and D and valorisation; 5 - Common tools to all working groups. The research group participating laboratories and teams are listed at the end of the document

  17. A Dual Perspective on Risks and Security Within Research Assistantships

    Directory of Open Access Journals (Sweden)

    Johannes Petrus Rossouw

    2013-01-01

    Full Text Available Although research assistantships are considered research learning venues in graduate education, there is a scarcity of literature that examines ethical elements attached to the employment of graduate student research assistants or the position of their research supervisors. This article explores the need to implement formal regulations specific to research assistantships in order to increase security and decrease risks for research assistants and research supervisors. Relationships between research assistants and research supervisors have some similarities with regular employment relationships; yet some distinct differences arise due to the educational and developmental nature of research assistantships. The article is written from a dual perspective reflecting the authors’ roles (a research supervisor and a research assistant, respectively and institutional locations (Faculties of Education in South Africa and Canada. The authors draw from existing literature, an analysis of institutional policies and practices at their universities, and their personal and professional experiences to illustrate risks that research assistants and their supervisors may face within research assistantships. They assess the extent to which existing and proposed policies and practices influence working conditions and safeguard experiences within graduate research assistantships. The findings reveal that research assistantships are a unique form of employment focused on educational and professional development that requires specific documentation of expected standards of practice. The authors argue that lack of clear regulations exposes both parties to unnecessary risks and offer recommendations for creating a “Standards of Good Practice” document that will be useful for individuals engaged in research assistantships.

  18. Computer science security research and human subjects: emerging considerations for research ethics boards.

    Science.gov (United States)

    Buchanan, Elizabeth; Aycock, John; Dexter, Scott; Dittrich, David; Hvizdak, Erin

    2011-06-01

    This paper explores the growing concerns with computer science research, and in particular, computer security research and its relationship with the committees that review human subjects research. It offers cases that review boards are likely to confront, and provides a context for appropriate consideration of such research, as issues of bots, clouds, and worms enter the discourse of human subjects review.

  19. Research groups: How big should they be?

    Science.gov (United States)

    Cook, Isabelle; Grange, Sam; Eyre-Walker, Adam

    2015-01-01

    Understanding the relationship between scientific productivity and research group size is important for deciding how science should be funded. We have investigated the relationship between these variables in the life sciences in the United Kingdom using data from 398 principle investigators (PIs). We show that three measures of productivity, the number of publications, the impact factor of the journals in which papers are published and the number of citations, are all positively correlated to group size, although they all show a pattern of diminishing returns-doubling group size leads to less than a doubling in productivity. The relationships for the impact factor and the number of citations are extremely weak. Our analyses suggest that an increase in productivity will be achieved by funding more PIs with small research groups, unless the cost of employing post-docs and PhD students is less than 20% the cost of a PI. We also provide evidence that post-docs are more productive than PhD students both in terms of the number of papers they produce and where those papers are published.

  20. Research groups: How big should they be?

    Directory of Open Access Journals (Sweden)

    Isabelle Cook

    2015-06-01

    Full Text Available Understanding the relationship between scientific productivity and research group size is important for deciding how science should be funded. We have investigated the relationship between these variables in the life sciences in the United Kingdom using data from 398 principle investigators (PIs. We show that three measures of productivity, the number of publications, the impact factor of the journals in which papers are published and the number of citations, are all positively correlated to group size, although they all show a pattern of diminishing returns—doubling group size leads to less than a doubling in productivity. The relationships for the impact factor and the number of citations are extremely weak. Our analyses suggest that an increase in productivity will be achieved by funding more PIs with small research groups, unless the cost of employing post-docs and PhD students is less than 20% the cost of a PI. We also provide evidence that post-docs are more productive than PhD students both in terms of the number of papers they produce and where those papers are published.

  1. How to conduct focus groups: researching group priorities through discussion.

    Science.gov (United States)

    1992-01-01

    Focus groups serve to uncover priorities and beliefs of a target group, but health project designers do not always take the time to seek this information beforehand. Focus groups also allow various local subgroups to communicate their concerns before the project starts. Focus groups can also breed ideas and dialogue that individual interviews cannot and they provide baseline information so managers can determine if attitudes or priorities have resulted from the project. Diverse people have different beliefs, e.g., women who have young children view oral rehydration therapy differently from women with no children. Project designers can use these basic differences to arrive at some conclusions about general attitudes. Focus group facilitators should have a discussion outline to help keep the group on the topic of concern. They should limit sessions to 60-90 minutes. Each focus groups should include 8-10 people. It is important to have members of various community subgroups in each group. Yet group designers should be careful not to include within the same group, those who may intimidate other people in the group, e.g., in situations where farmers depend on middlemen, farmers may not be open if middlemen are also in the focus group. Facilitators should launch each session with an attempt to encourage the members to be open and to feel comfortable. For example, in Malawi, a facilitator leads her focus group discussions with songs. Stories are another icebreaker. It is important that all focus groups centering around a certain project discuss the same topics. Facilitators need to stress to the group that all discussions are to be kept confidential. The designers should also carefully word the questions so that facilitators will not impart their bias. Facilitators should not direct the group to certain conclusions, but instead keep the discussions focused.

  2. Model Based Cyber Security Analysis for Research Reactor Protection System

    International Nuclear Information System (INIS)

    Sho, Jinsoo; Rahman, Khalil Ur; Heo, Gyunyoung; Son, Hanseong

    2013-01-01

    The study on the qualitative risk due to cyber-attacks into research reactors was performed using bayesian Network (BN). This was motivated to solve the issues of cyber security raised due to digitalization of instrumentation and control (I and C) system. As a demonstrative example, we chose the reactor protection system (RPS) of research reactors. Two scenarios of cyber-attacks on RPS were analyzed to develop mitigation measures against vulnerabilities. The one is the 'insertion of reactor trip' and the other is the 'scram halt'. The six mitigation measures are developed for five vulnerability for these scenarios by getting the risk information from BN

  3. Securing Cyberspace: Towards an Agenda for Research and Practice

    Directory of Open Access Journals (Sweden)

    Renaud Levesque

    2015-11-01

    Full Text Available In this article, we seek to identify the important challenges preventing security in cyberspace and to identify the key questions that nations should set out to answer to play a leading role in securing cyberspace. An important assertion is that the challenge of securing cyberspace transcends the abilities of any single entity and requires a radical shift in our approach in how: i research is conducted, ii cybersecurity researchers are educated, iii new defendable systems are developed, and iv effective defensive countermeasures are deployed. Our response draws upon extensive source material and our personal experiences as cybersecurity professionals contributing to the establishment of the VENUS Cybersecurity Corporation, a not-for-profit corporation that aims to make Canada a global leader in cybersecurity. We view the challenge to be global and transdisciplinary in nature and this article to be of relevance world-wide to senior decision makers, policy makers, managers, educators, strategists, futurists, scientists, technologists, and others interested in shaping the online world of the future.

  4. Bubble Chamber Research Group Microcomputer Unit

    International Nuclear Information System (INIS)

    Bairstow, R.; Barlow, J.; Mace, P.R.; Seller, P.; Waters, M.; Watson, J.G.

    1982-05-01

    A distributed data acquisition system has been developed by the Bubble Chamber Research Group at the Rutherford Appleton laboratory for use with their film measuring machines. The system is based upon a set of microcomputers linked together with a VAX 11/780 computer, in a local area computer network. This network is of the star type and uses a packet switching technique. Each film measuring machine is equipped with a microcomputer which controls the function of the table, buffers data and enhances the interface between operators and machines. This paper provides a detailed description of each microcomputer and can be used as a reference manual for these computers. (author)

  5. An Overview of Computer Network security and Research Technology

    OpenAIRE

    Rathore, Vandana

    2016-01-01

    The rapid development in the field of computer networks and systems brings both convenience and security threats for users. Security threats include network security and data security. Network security refers to the reliability, confidentiality, integrity and availability of the information in the system. The main objective of network security is to maintain the authenticity, integrity, confidentiality, availability of the network. This paper introduces the details of the technologies used in...

  6. EU-US standards harmonization task group report : feedback to standards development organizations - security

    Science.gov (United States)

    2012-11-12

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  7. Security and health research databases: the stakeholders and questions to be addressed.

    Science.gov (United States)

    Stewart, Sara

    2006-01-01

    Health research database security issues abound. Issues include subject confidentiality, data ownership, data integrity and data accessibility. There are also various stakeholders in database security. Each of these stakeholders has a different set of concerns and responsibilities when dealing with security issues. There is an obvious need for training in security issues, so that these issues may be addressed and health research will move on without added obstacles based on misunderstanding security methods and technologies.

  8. Learning to provide children with a secure base and a safe haven: The Circle of Security-Parenting (COS-P) group intervention.

    Science.gov (United States)

    Kim, Monica; Woodhouse, Susan S; Dai, Chenchen

    2018-05-21

    Insecure attachment is linked to a host of negative child outcomes, including internalizing and externalizing behavior problems. Circle of Security-Parenting (COS-P) is a manualized, video-based, eight unit, group parenting intervention to promote children's attachment security. COS-P was designed to be easily implemented, so as to make attachment interventions more widely available to families. We present the theoretical background of COS-P, research evidence supporting the COS approach, as well as a description of the COS-P intervention protocol. The case example of "Alexa," mother of three children (aged 7, 6, and 4 years), illustrates how parents can make use of the COS-P intervention to better understand children's needs, build skills in observing and interpreting children's signals, learn to recognize and regulate their own responses to their children, and learn new ways of responding to children's needs. © 2018 Wiley Periodicals, Inc.

  9. ETSON strategic orientations on research activities. ETSON research group activity

    Energy Technology Data Exchange (ETDEWEB)

    Van Dorseelaere, J.P.; Barrachin, M. [IRSN, Saint Paul les Durance (France). Centre de Cadarache; Millington, D. [Wood RSD, Warrington (United Kingdom); and others

    2018-01-15

    In 2011, ETSON published the ''Position Paper of the Technical Safety Organizations: Research Needs in Nuclear Safety for Gen 2 and Gen 3 NPPs''. This paper, published only a few months after the Fukushima-Daiichi severe accidents, presented the priorities for R and D on the main pending safety issues. It was produced by the ETSON Research Group (ERG) that has the mandate of identifying and prioritizing safety research needs, sharing information on research projects in which ETSON members are involved, defining and launching new research projects and disseminating knowledge among ETSON members. Six years after this publication, many R and D international projects finished in diverse frames, and other ones have started. In particular a lot of work was done (and is going on..) on the analysis of the Fukushima-Daiichi severe accidents. Meanwhile a roadmap on research on Gen. 2 and 3 nuclear power plants (NPP), including safety aspects, was produced by the NUGENIA association, followed by a more detailed document as ''NUGENIA global vision''. It was also demonstrated that the ETSON R and D priorities were consistent with the implementation of the 2014 Euratom Directive on safety of nuclear installations.

  10. 26 CFR 1.1081-7 - Sale of stock or securities received upon exchange by members of system group.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 11 2010-04-01 2010-04-01 true Sale of stock or securities received upon.... Orders § 1.1081-7 Sale of stock or securities received upon exchange by members of system group. (a... which are members of the same system group consists of stock or securities issued by the corporation...

  11. Research on network information security model and system construction

    OpenAIRE

    Wang Haijun

    2016-01-01

    It briefly describes the impact of large data era on China’s network policy, but also brings more opportunities and challenges to the network information security. This paper reviews for the internationally accepted basic model and characteristics of network information security, and analyses the characteristics of network information security and their relationship. On the basis of the NIST security model, this paper describes three security control schemes in safety management model and the...

  12. Remote Sensing Information Sciences Research Group: Santa Barbara Information Sciences Research Group, year 4

    Science.gov (United States)

    Estes, John E.; Smith, Terence; Star, Jeffrey L.

    1987-01-01

    Information Sciences Research Group (ISRG) research continues to focus on improving the type, quantity, and quality of information which can be derived from remotely sensed data. Particular focus in on the needs of the remote sensing research and application science community which will be served by the Earth Observing System (EOS) and Space Station, including associated polar and co-orbiting platforms. The areas of georeferenced information systems, machine assisted information extraction from image data, artificial intelligence and both natural and cultural vegetation analysis and modeling research will be expanded.

  13. The Two Faces of Security in Hybrid Political Orders: A Framework for Analysis and Research

    Directory of Open Access Journals (Sweden)

    Robin Luckham

    2013-09-01

    Full Text Available This paper reframes the security and development debate through fresh theoretical lenses, which view security as highly contested both in the realm of politics and in the realm of ideas. For some analysts security concerns political power, including the use of organised force to establish and maintain social orders and to protect them from external and internal threats. For others it is about how individuals and communities are protected (or protect themselves from violence, abuse of power and other existential risks. We integrate both approaches whilst placing our focus on the deep tensions between them. Combining them is especially apposite in the hybrid political orders of conflict-torn regions in the developing world – where the state and its monopoly of violence are contested and diverse state and non-state security actors coexist, collaborate or compete. We ask what security in these hybrid contexts looks like from below, that is from the perspective of “end users”, be these citizens of states, members of local communities or those who are marginalised and insecure. What are their own vernacular understandings of security, and how do these understandings link to wider conceptions of citizen and of human security? Even when security and insecurity are experienced and decided locally, they are at the same time determined nationally and globally. It is at the interfaces between local agency, state power and global order that the most politically salient and analytically challenging issues tend to arise. To analyse these interfaces we focus on three interconnecting political spaces, each characterised by their own forms of hybridity, in which security is negotiated with end-users: (i “unsecured borderlands” where state authority is suspended or violently challenged by alternative claimants to power or providers of security, including non-state armed groups; (ii “contested Leviathans”, that is state security structures whose

  14. Model Based Cyber Security Analysis for Research Reactor Protection System

    Energy Technology Data Exchange (ETDEWEB)

    Sho, Jinsoo; Rahman, Khalil Ur; Heo, Gyunyoung [Kyung Hee Univ., Yongin (Korea, Republic of); Son, Hanseong [Joongbu Univ., Geumsan (Korea, Republic of)

    2013-07-01

    The study on the qualitative risk due to cyber-attacks into research reactors was performed using bayesian Network (BN). This was motivated to solve the issues of cyber security raised due to digitalization of instrumentation and control (I and C) system. As a demonstrative example, we chose the reactor protection system (RPS) of research reactors. Two scenarios of cyber-attacks on RPS were analyzed to develop mitigation measures against vulnerabilities. The one is the 'insertion of reactor trip' and the other is the 'scram halt'. The six mitigation measures are developed for five vulnerability for these scenarios by getting the risk information from BN.

  15. Lysimeter Research Group - A scientific community network for lysimeter research

    Science.gov (United States)

    Cepuder, Peter; Nolz, Reinhard; Bohner, Andreas; Baumgarten, Andreas; Klammler, Gernot; Murer, Erwin; Wimmer, Bernhard

    2014-05-01

    A lysimeter is a vessel that isolates a volume of soil between ground surface and a certain depth, and includes a sampling device for percolating water at its bottom. Lysimeters are traditionally used to study water and solute transport in the soil. Equipped with a weighing system, soil water sensors and temperature sensors, lysimeters are valuable instruments to investigate hydrological processes in the system soil-plant-atmosphere, especially fluxes across its boundary layers, e.g. infiltration, evapotranspiration and deep drainage. Modern lysimeter facilities measure water balance components with high precision and high temporal resolution. Hence, lysimeters are used in various research disciplines - such as hydrology, hydrogeology, soil science, agriculture, forestry, and climate change studies - to investigate hydrological, chemical and biological processes in the soil. The Lysimeter Research Group (LRG) was established in 1992 as a registered nonprofit association with free membership (ZVR number: 806128239, Austria). It is organized as an executive board with an international scientific steering committee. In the beginning the LRG focused mainly on nitrate contamination in Austria and its neighboring countries. Today the main intention of the LRG is to advance interdisciplinary exchange of information between researchers and users working in the field of lysimetry on an international level. The LRG also aims for the dissemination of scientific knowledge to the public and the support of decision makers. Main activities are the organization of a lysimeter conference every two years in Raumberg-Gumpenstein (Styria, Austria), the organization of excursions to lysimeter stations and related research sites around Europe, and the maintenance of a website (www.lysimeter.at). The website contains useful information about numerous European lysimeter stations regarding their infrastructure, instrumentation and operation, as well as related links and references which

  16. A Critical assesment of IS Security Research Between 1990-2004

    DEFF Research Database (Denmark)

    Willison, Robert Andrew; Siponen, Mikko

    This paper reviews the IS security literature for the period 1990-2004. More specifically three security journals and the top twenty IS journals were examined. In total 1280 papers were analysed in terms of theories, research methods and research topics. Our research found that 1043 of the papers...... with fourteen of these topics totaling 71.05% of the articles. This papers offers implications for future research directions on IS security, scholars to publish IS security research, tenure practice, and IS security classification schemas....

  17. Privacy, security, and the public health researcher in the era of electronic health record research.

    Science.gov (United States)

    Goldstein, Neal D; Sarwate, Anand D

    2016-01-01

    Health data derived from electronic health records are increasingly utilized in large-scale population health analyses. Going hand in hand with this increase in data is an increasing number of data breaches. Ensuring privacy and security of these data is a shared responsibility between the public health researcher, collaborators, and their institutions. In this article, we review the requirements of data privacy and security and discuss epidemiologic implications of emerging technologies from the computer science community that can be used for health data. In order to ensure that our needs as researchers are captured in these technologies, we must engage in the dialogue surrounding the development of these tools.

  18. Asynchronous Group Key Distribution on top of the CC2420 Security Mechanisms for Sensor Networks

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg

    2009-01-01

    scheme with no time synchronization requirements. The scheme decreases the number of key updates by providing them on an as needed basis according to the amount of network traffic. We evaluate the CC2420 radio security mechanism and show how to use it as a basis to implement secure group communication......A sensor network is a network consisting of small, inexpensive, low-powered sensor nodes that communicate to complete a common task. Sensor nodes are characterized by having limited communication and computation capabilities, energy, and storage. They often are deployed in hostile environments...... creating a demand for encryption and authentication of the messages sent between them. Due to severe resource constraints on the sensor nodes, efficient key distribution schemes and secure communication protocols with low overhead are desired. In this paper we present an asynchronous group key distribution...

  19. Chair Report Consultancy Meeting on Nuclear Security Assessment Methodologies (NUSAM) Transport Case Study Working Group

    Energy Technology Data Exchange (ETDEWEB)

    Shull, Doug [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-08-19

    The purpose of the consultancy assignment was to (i) apply the NUSAM assessment methods to hypothetical transport security table top exercise (TTX) analyses and (ii) document its results to working materials of NUSAM case study on transport. A number of working group observations, using the results of TTX methodologies, are noted in the report.

  20. Confidence- and security-building in South-East Asia. Working group II

    International Nuclear Information System (INIS)

    Alagappa, M.

    1991-01-01

    Discussion in the Working Group II focused on the following subjects: the establishment of a zone of peace, freedom and neutrality in South-East Asia; the establishment of a nuclear weapon-free zone in South-East Asia; the Cambodian conflict; regional co-operation; military security confidence-building measures

  1. Interest Groups and Strategic Constructivism: Business Actors and Border Security Policies in the European Union

    NARCIS (Netherlands)

    Baird, T.E.

    Evidence suggests that business lobbying shapes European Union (EU) border security policies, but there has been no detailed empirical and theoretical work detailing how interest groups exert influence in this domain. Building on strategic constructivist accounts of policy-making, the article argues

  2. On Business-Driven IT Security Management and Mismatches between Security Requirements in Firms, Industry Standards and Research Work

    Science.gov (United States)

    Frühwirth, Christian

    Industry managers have long recognized the vital importance of information security for their businesses, but at the same time they perceived security as a technology-driven rather then a business-driven field. Today, this notion is changing and security management is shifting from technology- to business-oriented approaches. Whereas there is evidence of this shift in the literature, this paper argues that security standards and academic work have not yet taken it fully into account. We examine whether this disconnect has lead to a misalignment of IT security requirements in businesses versus industry standards and academic research. We conducted 13 interviews with practitioners from 9 different firms to investigate this question. The results present evidence for a significant gap between security requirements in industry standards and actually reported security vulnerabilities. We further find mismatches between the prioritization of security factors in businesses, standards and real-world threats. We conclude that security in companies serves the business need of protecting information availability to keep the business running at all times.

  3. Securing recruitment and obtaining informed consent in minority ethnic groups in the UK

    Directory of Open Access Journals (Sweden)

    Roy Tapash

    2008-03-01

    Full Text Available Abstract Background Previous health research has often explicitly excluded individuals from minority ethnic backgrounds due to perceived cultural and communication difficulties, including studies where there might be language/literacy problems in obtaining informed consent. This study addressed these difficulties by developing audio-recorded methods of obtaining informed consent and recording data. This report outlines 1 our experiences with securing recruitment to a qualitative study investigating alternative methods of data collection, and 2 the development of a standardised process for obtaining informed consent from individuals from minority ethnic backgrounds whose main language does not have an agreed written form. Methods Two researchers from South Asian backgrounds recruited adults with Type 2 diabetes whose main language was spoken and not written, to attend a series of focus groups. A screening tool was used at recruitment in order to assess literacy skills in potential participants. Informed consent was obtained using audio-recordings of the patient information and recording patients' verbal consent. Participants' perceptions of this method of obtaining consent were recorded. Results Recruitment rates were improved by using telephone compared to face-to-face methods. The screening tool was found to be acceptable by all potential participants. Audio-recorded methods of obtaining informed consent were easy to implement and accepted by all participants. Attrition rates differed according to ethnic group. Snowballing techniques only partly improved participation rates. Conclusion Audio-recorded methods of obtaining informed consent are an acceptable alternative to written consent in study populations where literacy skills are variable. Further exploration of issues relating to attrition is required, and a range of methods may be necessary in order to maximise response and participation rates.

  4. Growing researchers from the historically disadvantaged groups ...

    African Journals Online (AJOL)

    This article provides an overview of the nature and quality of research supervision and mentorship practices employed by supervisors and mentors of interns in a South African research council in an attempt to increase the pool and change the face of researchers in the country. Through a series of studies conducted by the ...

  5. Confidence- and security-building in North-East Asia. Working group I

    International Nuclear Information System (INIS)

    Cotton, J.

    1991-01-01

    In the discussions in Working Group I there were two general preoccupations which prevailed throughout the consideration of questions relating to North-East Asian confidence and security building: how much could North-East Asia learn from the European experience in Confidence Building measures, and could any of the underlying factors- economic, political and social which has moved Europe towards military and security accommodation be seen to work also in the Asia-Pacific region. The problem of North Korea is underlined in view of non acceptance of the IAEA safeguards regime although it had entered into multilateral set of obligations with other signatories by assenting the Non-proliferation Treaty

  6. Security and Health Research Databases: The Stakeholders and Questions to Be Addressed

    OpenAIRE

    Stewart, Sara

    2006-01-01

    Health research database security issues abound. Issues include subject confidentiality, data ownership, data integrity and data accessibility. There are also various stakeholders in database security. Each of these stakeholders has a different set of concerns and responsibilities when dealing with security issues. There is an obvious need for training in security issues, so that these issues may be addressed and health research will move on without added obstacles based on misunderstanding s...

  7. Theory, Demonstration and Methods Research on Social Security of Migrant Workers by Domestic Scholar

    OpenAIRE

    Yang, Zhen; Wang, Weifang

    2011-01-01

    Social security of migrant workers has been significant in dissolving social contradictions and achieving the economic and social development in China during the transitional period. The researches of domestic scholar on social security of migrant workers can be classified into three categories. Firstly, theoretical analysis on social security of migrant workers, including researches on the appeal of social security and misunderstanding of recognition, theory-construction of rural worker soci...

  8. Stories of People Who Have Attended a Lesbian, Gay, Bisexual and Trans Support Group in a Secure Intellectual Disability Service.

    Science.gov (United States)

    Tallentire, Liz; Smith, Matthew; David, Lee; Roberts, Adam; Bruce; Morrow, Sarah; Withers, Paul; Smith, Ian

    2016-08-31

    This research is about people who have intellectual disabilities and live in a secure hospital. It is about a group of people who meet at a support group. The support group is for people who are lesbian, gay, bisexual or transgender. These people with intellectual disabilities helped with planning, doing, and telling other people about the research. They told their stories about going to the support group. Their stories were joined together into a group story. The story said that the group helped people in lots of different ways. For some people going to the group was difficult at first because it was ?coming out'. This means telling other people you are lesbian, gay, bisexual, or transgender. Then it got easier and people started to feel better about themselves. Then they wanted to help others and this was important in their lives. This group seemed to help people get better. We have given some ideas for setting up other groups and doing more research. © 2016 John Wiley & Sons Ltd.

  9. The research of computer network security and protection strategy

    Science.gov (United States)

    He, Jian

    2017-05-01

    With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.

  10. Theory, Demonstration and Methods: Research on Social Security of Migrant Workers by Domestic Scholar

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Social security of migrant workers has been significant in dissolving social contradictions and achieving the economic and social development in China during the transitional period. The researches of domestic scholar on social security of migrant workers can be classified into three categories. Firstly, theoretical analysis on social security of migrant workers, including researches on the appeal of social security and misunderstanding of recognition, theory-construction of rural worker social security, policy defects and equity construction in social security system of migrant workers. Secondly, real studies on social security of migrant workers, including researches on sequence of demand and influencing factors of social security of migrant workers as well as intrinsic motivation forming the perspective on social security. Lastly, road exploration of establishing social security system, including researches on the multi-level development of rural worker social security system, comparison of "Double-low method", "Guangdong Method" and "Shanghai Method" of the social security of migrant workers in Zhejiang Province and establishing multi-level social security system according to the hierarchy after the internal differentiation.

  11. Spins, Stalls, and Shutdowns: Pitfalls of Qualitative Policing and Security Research

    Directory of Open Access Journals (Sweden)

    Randy K. Lippert

    2015-11-01

    Full Text Available This article explores key elements of qualitative research on policing and security agencies, including barriers encountered and strategies to prevent them. While it is oft-assumed that policing/security agencies are difficult to access due to their clandestine or bureaucratic nature, this article demonstrates this is not necessarily the case, as access was gained for three distinct qualitative research projects. Yet, access and subsequent research were not without pitfalls, which we term security spins, security stalls, and security shutdowns. We illustrate how each was encountered and argue these pitfalls are akin to researchers falling into risk categories, not unlike those used by policing/security agents in their work. Before concluding we discuss methodological strategies for scholars to avoid these pitfalls and to advance research that critically interrogates the immense policing/security realm. URN: http://nbn-resolving.de/urn:nbn:de:0114-fqs1601108

  12. Security of Gas Supply in the Countries of the Visegrád Group

    Directory of Open Access Journals (Sweden)

    Michał Tarnawski

    2015-12-01

    Full Text Available In spite of efforts on the part of the European Union to promote renewable sources of energy, conventional resources such as oil, natural gas and coal still dominate in individual EU energy mixes. With the rising costs of resources, their uneven distribution and limited supply, each state is busy trying to ensure its energy security. Secure and stable supply of energy resources has becoming the main preoccupation, especially in the countries of Central and Eastern Europe. Over the recent years, the Visegrád Group states have made particularly intensive efforts to ensure their supply of natural gas. The unstable political situation in the east of Europe as well as changes in natural gas markets (shale gas revolution in the USA, increased importance of LNG gave rise to new challenges when it comes to ensuring gas security, but also new opportunities to become independent of eastern imports. It is precisely the fact of being dependent on natural gas imported from Russia that determines the situation of Visegrád Group states. The present paper tries to analyse the situation in Poland, the Czech Republic, Slovakia and Hungary in terms of security of their natural gas supply.

  13. Research on information security system of waste terminal disposal process

    Science.gov (United States)

    Zhou, Chao; Wang, Ziying; Guo, Jing; Guo, Yajuan; Huang, Wei

    2017-05-01

    Informatization has penetrated the whole process of production and operation of electric power enterprises. It not only improves the level of lean management and quality service, but also faces severe security risks. The internal network terminal is the outermost layer and the most vulnerable node of the inner network boundary. It has the characteristics of wide distribution, long depth and large quantity. The user and operation and maintenance personnel technical level and security awareness is uneven, which led to the internal network terminal is the weakest link in information security. Through the implementation of security of management, technology and physics, we should establish an internal network terminal security protection system, so as to fully protect the internal network terminal information security.

  14. Research and realization of info-net security controlling system

    Science.gov (United States)

    Xu, Tao; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-03-01

    The thesis introduces some relative concepts about Network Cybernetics, and we design and realize a new info-net security controlling system based on Network Cybernetics. The system can control the endpoints, safely save files, encrypt communication, supervise actions of users and show security conditions, in order to realize full-scale security management. At last, we simulate the functions of the system. The results show, the system can ensure the controllability of users and devices, and supervise them real-time. The system can maximize the security of the network and users.

  15. Research on information security in big data era

    Science.gov (United States)

    Zhou, Linqi; Gu, Weihong; Huang, Cheng; Huang, Aijun; Bai, Yongbin

    2018-05-01

    Big data is becoming another hotspot in the field of information technology after the cloud computing and the Internet of Things. However, the existing information security methods can no longer meet the information security requirements in the era of big data. This paper analyzes the challenges and a cause of data security brought by big data, discusses the development trend of network attacks under the background of big data, and puts forward my own opinions on the development of security defense in technology, strategy and product.

  16. Qualitative Research in Group Work: Status, Synergies, and Implementation

    Science.gov (United States)

    Rubel, Deborah; Okech, Jane E. Atieno

    2017-01-01

    The article aims to advance the use of qualitative research methods to understand group work. The first part of this article situates the use of qualitative research methods in relationship to group work research. The second part examines recent qualitative group work research using a framework informed by scoping and systematic review methods and…

  17. Theory Loves Practice: A Teacher Researcher Group

    Science.gov (United States)

    Hochtritt, Lisa; Thulson, Anne; Delaney, Rachael; Dornbush, Talya; Shay, Sarah

    2014-01-01

    Once a month, art educators from the Denver metro area have been gathering together in the spirit of inquiry to explore issues of the perceived theory and daily practice divide. The Theory Loves Practice (TLP) group was started in 2010 by Professors Rachael Delaney and Anne Thulson from Metropolitan State University of Denver (MSU) and now has 40…

  18. Modern International Research Groups: Networks and Infrastructure

    Science.gov (United States)

    Katehi, Linda

    2009-05-01

    In a globalized economy, education and research are becoming increasing international in content and context. Academic and research institutions worldwide try to internationalize their programs by setting formal or informal collaborations. An education that is enhanced by international experiences leads to mobility of the science and technology workforce. Existing academic cultures and research structures are at odds with efforts to internationalize education. For the past 20-30 years, the US has recognized the need to improve the abroad experience of our scientists and technologists: however progress has been slow. Despite a number of both federally and privately supported programs, efforts to scale up the numbers of participants have not been satisfactory. The exchange is imbalanced as more foreign scientists and researchers move to the US than the other way around. There are a number of issues that contribute to this imbalance but we could consider the US academic career system, as defined by its policies and practices, as a barrier to internationalizing the early career faculty experience. Strict curricula, pre-tenure policies and financial commitments discourage students, post doctoral fellows and pre-tenure faculty from taking international leaves to participate in research abroad experiences. Specifically, achieving an international experience requires funding that is not provided by the universities. Furthermore, intellectual property requirements and constraints in pre-tenure probationary periods may discourage students and faculty from collaborations with peers across the Atlantic or Pacific or across the American continent. Environments that support early career networking are not available. This presentation will discuss the increasing need for international collaborations and will explore the need for additional programs, more integration, better conditions and improved infrastructures that can encourage and support mobility of scientists. In addition

  19. The Common Body of Knowledge: A Framework to Promote Relevant Information Security Research

    Directory of Open Access Journals (Sweden)

    Kenneth J. Knapp

    2007-03-01

    Full Text Available This study proposes using an established common body of knowledge (CBK as one means of organizing information security literature.  Consistent with calls for more relevant information systems (IS research, this industry-developed framework can motivate future research towards topics that are important to the security practitioner.  In this review, forty-eight articles from ten IS journals from 1995 to 2004 are selected and cross-referenced to the ten domains of the information security CBK.  Further, we distinguish articles as empirical research, frameworks, or tutorials.  Generally, this study identified a need for additional empirical research in every CBK domain including topics related to legal aspects of information security.  Specifically, this study identified a need for additional IS security research relating to applications development, physical security, operations security, and business continuity.  The CBK framework is inherently practitioner oriented and using it will promote relevancy by steering IS research towards topics important to practitioners.  This is important considering the frequent calls by prominent information systems scholars for more relevant research.  Few research frameworks have emerged from the literature that specifically classify the diversity of security threats and range of problems that businesses today face.  With the recent surge of interest in security, the need for a comprehensive framework that also promotes relevant research can be of great value.

  20. Hydrodynamic model research in Waseda group

    International Nuclear Information System (INIS)

    Muroya, Shin

    2010-01-01

    Constructing 'High Energy Material Science' had been proposed by Namiki as the guiding principle for the scientists of the high energy physics group lead by himself in Waseda University when the author started to study multiple particle production in 1980s toward the semi-phenomenological model for the quark gluon plasma (QGP). Their strategy was based on three stages to build an intermediate one between the fundamental theory of QCD and the phenomenological model. The quantum theoretical Langevin equation was taken up as the semi-phenomenological model at the intermediate stage and the Landau hydrodynamic model was chosen as the phenomenological model to focus on the 'phase transition' of QGP. A review is given here over the quantum theoretical Langevin equation formalism developed there and followed by the further progress with the 1+1 dimensional viscous fluid model as well as the hydrodynamic model with cylindrical symmetry. The developments of the baryon fluid model and Hanbury-Brown Twiss effect are also reviewed. After 1995 younger generation physicists came to the group to develop those models further. Activities by Hirano, Nonaka and Morita beyond the past generation's hydrodynamic model are picked up briefly. (S. Funahashi)

  1. Researching Style: Epistemology, Paradigm Shifts and Research Interest Groups

    Science.gov (United States)

    Rayner, Stephen

    2011-01-01

    This paper identifies the need for a deliberate approach to theory building in the context of researching cognitive and learning style differences in human performance. A case for paradigm shift and a focus upon research epistemology is presented, building upon a recent critique of style research. A proposal for creating paradigm shift is made,…

  2. Dynamic Group Management Scheme for Sustainable and Secure Information Sensing in IoT

    Directory of Open Access Journals (Sweden)

    Hyungjoo Kim

    2016-10-01

    Full Text Available The services provided to users in the environment associated with the Internet of Things (hereinafter referred to as IoT begin with the information collected from sensors. It is imperative to transmit high-quality sensor data for providing better services. It is also required to collect data only from those authenticated sensors. Moreover, it is imperative to collect high-quality data on a sustainable and continuous basis in order to provide services anytime and anywhere in the IoT environment. Therefore, high-quality, authenticated sensor networks should be constructed. The most prominent routing protocol to enhance the energy consumption efficiency for the sustainable data collection in a sensor network is the LEACH routing protocol. The LEACH routing protocol transmits sensor data by measuring the energy of sensors and allocating sensor groups dynamically. However, these sensor networks have vulnerabilities such as key leakage, eavesdropping, replay attack and relay attack, given the nature of wireless network communication. A large number of security techniques have been studied in order to solve these vulnerabilities. Nonetheless, these studies still cannot support the dynamic sensor group allocation of the LEACH routing protocol. Furthermore, they are not suitable for the sensor nodes whose hardware computing ability and energy resources are limited. Therefore, this paper proposed a group sensor communication protocol that utilizes only the four fundamental arithmetic operations and logical operation for the sensor node authentication and secure data transmission. Through the security analysis, this paper verified that the proposed scheme was secure to the vulnerabilities resulting from the nature of wireless network communication. Moreover, this paper verified through the performance analysis that the proposed scheme could be utilized efficiently.

  3. The Quality of Maternal Secure-Base Scripts Predicts Children's Secure-Base Behavior at Home in Three Sociocultural Groups

    Science.gov (United States)

    Vaughn, Brian E.; Coppola, Gabrielle; Verissimo, Manuela; Monteiro, Ligia; Santos, Antonio Jose; Posada, German; Carbonell, Olga A.; Plata, Sandra J.; Waters, Harriet S.; Bost, Kelly K.; McBride, Brent; Shin, Nana; Korth, Bryan

    2007-01-01

    The secure-base phenomenon is central to the Bowlby/Ainsworth theory of attachment and is also central to the assessment of attachment across the lifespan. The present study tested whether mothers' knowledge about the secure-base phenomenon, as assessed using a recently designed wordlist prompt measure for eliciting attachment-relevant stories,…

  4. Research award: Agriculture and Food Security 2019 | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The AFS program works with organizations to intensify and diversify small‐scale ... and social) without adversely impacting societies and the environment. ... loss, rural economic development, improved food and nutrition security, and the ...

  5. Research uncovers what citizens' think about the security sector in ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2015-07-27

    Jul 27, 2015 ... Here, direct experience with security services leads to more negative opinions, and perceptions of personal and family safety play a critical role in citizens' ... sector and the justice system as perceived by the general public.

  6. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  7. Ethical Issues in the Research of Group Work

    Science.gov (United States)

    Goodrich, Kristopher M.; Luke, Melissa

    2017-01-01

    This article provides a primer for researchers exploring ethical issues in the research of group work. The article begins with an exploration of relevant ethical issues through the research process and current standards guiding its practice. Next, the authors identify resources that group work researchers can consult prior to constructing their…

  8. Research on mobile electronic commerce security technology based on WPKI

    Science.gov (United States)

    Zhang, Bo

    2013-07-01

    Through the in-depth study on the existing mobile e-commerce and WAP protocols, this paper presents a security solution of e-commerce system based on WPKI, and describes its implementation process and specific implementation details. This solution uniformly distributes the key used by the various participating entities , to fully ensure the confidentiality, authentication, fairness and integrity of mobile e-commerce payments, therefore has some pract ical value for improving the security of e-commerce system.

  9. Electric Power Infrastructure Reliability And Security Research And Development Initiative. Final report

    International Nuclear Information System (INIS)

    Dale, S.; Meeker, R.; Steurer, M.; Li, H.; Pamidi, S.; Rodrigo, H.; Suryanarayanan, S.; Cartes, D.; Ordonez, J.; Domijan, A.; Liu, W.; Cox, D.; McLaren, P.; Hovsapian, R.; Edwards, D.; Simmons, S.; Wilde, N.; Woodruff, S.; Kopriva, D.; Hussaini, Y.; Mohammed, O.; Zheng, J.; Baldwin, T.L.

    2008-01-01

    This is the final scientific/technical report for the Electric Power Infrastructure Reliability and Security R and D Initiative sponsored by the U.S. Department of Energy, Office of Electricity Delivery and Energy Reliability, under award number DE-FG02-05CH11292. This report covers results from the FSU-led, multi-institution effort conducted over the period 8/15/05 to 10/14/2007. Building upon existing infrastructure for power systems research, modeling, and simulation, the Center for Advanced Power Systems (CAPS) at Florida State University (FSU) is developing world-class programs in electric power systems research and education to support future electric power system needs and challenges. With U.S. Department of Energy Support, FSU CAPS has engaged in a multi-faceted effort to conduct basic and applied research towards understanding, developing, and deploying technologies and approaches that can lead to improved reliability and security of the North American electric power generation and delivery infrastructure. This wide-reaching project, through a number of carefully selected thrusts cutting across several research disciplines, set out to address key terrestrial electric utility power system issues and challenges. The challenges and the thrusts to address them were arrived at through analysis of a number of national reports and recommendations combined with input from an experienced multi-disciplined team of power systems research staff and faculty at FSU CAPS. The resulting project effort can be grouped into four major areas: - Power Systems and New Technology Insertion - Controls, Protection, and Security - Simulation Development - High Temperature Superconductivity (HTS)

  10. International University Research Ventures: Implications for U.S. Economic Competitiveness National Security

    Science.gov (United States)

    2018-03-31

    NTERNATIONAL UNIVERSITY RESEARCH VENTURES: IMPLICATIONS FOR US ECONOMIC COMPETITIVENESS AND NATIONAL SECURITY The views, opinions and/or findings...UNIVERSITY RESEARCH VENTURES: IMPLICATIONS FOR US ECONOMIC COMPETITIVENESS AND NATIONAL SECURITY Report Term: 0-Other Email: mzak@gatech.edu...expected to inform political and economic theories about technology transfer, innovation, economic competitiveness, and democratization/civil

  11. Patient informed governance of distributed research networks: results and discussion from six patient focus groups.

    Science.gov (United States)

    Mamo, Laura A; Browe, Dennis K; Logan, Holly C; Kim, Katherine K

    2013-01-01

    Understanding how to govern emerging distributed research networks is essential to their success. Distributed research networks aggregate patient medical data from many institutions leaving data within the local provider security system. While much is known about patients' views on secondary medical research, little is known about their views on governance of research networks. We conducted six focus groups with patients from three medical centers across the U.S. to understand their perspectives on privacy, consent, and ethical concerns of sharing their data as part of research networks. Participants positively endorsed sharing their health data with these networks believing that doing so could advance healthcare knowledge. However, patients expressed several concerns regarding security and broader ethical issues such as commercialism, public benefit, and social responsibility. We suggest that network governance guidelines move beyond strict technical requirements and address wider socio-ethical concerns by fully including patients in governance processes.

  12. Cyber Security Research Frameworks For Coevolutionary Network Defense

    Energy Technology Data Exchange (ETDEWEB)

    Rush, George D. [Missouri Univ. of Science and Technology, Rolla, MO (United States); Tauritz, Daniel Remy [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-12-03

    Several architectures have been created for developing and testing systems used in network security, but most are meant to provide a platform for running cyber security experiments as opposed to automating experiment processes. In the first paper, we propose a framework termed Distributed Cyber Security Automation Framework for Experiments (DCAFE) that enables experiment automation and control in a distributed environment. Predictive analysis of adversaries is another thorny issue in cyber security. Game theory can be used to mathematically analyze adversary models, but its scalability limitations restrict its use. Computational game theory allows us to scale classical game theory to larger, more complex systems. In the second paper, we propose a framework termed Coevolutionary Agent-based Network Defense Lightweight Event System (CANDLES) that can coevolve attacker and defender agent strategies and capabilities and evaluate potential solutions with a custom network defense simulation. The third paper is a continuation of the CANDLES project in which we rewrote key parts of the framework. Attackers and defenders have been redesigned to evolve pure strategy, and a new network security simulation is devised which specifies network architecture and adds a temporal aspect. We also add a hill climber algorithm to evaluate the search space and justify the use of a coevolutionary algorithm.

  13. Research on the security of nuclear power equipment

    International Nuclear Information System (INIS)

    Zhao Jiong; Wu Jinzong

    2008-06-01

    Recently, the rapidly growing economy in conflict with the lack of power in the whole country become more and more seriously in our country. In other hand, there is also various kind of problems such as greenhouse effect and the oil price rising conditions. It greatly promote our country's development of Nuclear power project. As forecast, the number of Nuclear Power Plant will increase greatly in the future. However, the security of the Nuclear Power Plant is one of the topics that people always pay more attention to. Combining with the practice experience of Nuclear Power Plant in Japanese, the security of Nuclear Power Plant in multi-angles is discussed. It is pointed that the risk assesment and management system of nuclear power plant are effective measure for security of the development of nuclear power. (authors)

  14. Practices for caring in nursing: Brazilian research groups.

    Science.gov (United States)

    Erdmann, A L; de Andrade, S R; de Mello, A L Ferreira; Klock, P; do Nascimento, K C; Koerich, M Santos; Backes, D Stein

    2011-09-01

    The present study considers the production of knowledge and the interactions in the environment of research and their relationships in the system of caring in nursing and health. To elaborate a theoretical model of the organization of the practices used for caring, based on the experiences made by the research groups of administration and management in nursing, in Brazil. The study is based on grounded theory. Twelve leaders of research groups, working as professors in public universities in the south and the south-east of Brazil, distributed in sample groups, were interviewed. The core phenomenon 'research groups of administration and management in nursing: arrangements and interactions in the system of caring in nursing' was derived from the categories: conceptual bases and contexts of the research groups; experiencing interactions in the research groups; functionality of the research groups; and outputs of the research groups. The research groups are integrated in the system of caring in nursing. The activities of the Brazilian administration and management in nursing research groups are process oriented and in a process of constant renovation, socially relevant, operate in a complex scenario and contribute to the advancement of the organizations of the system of caring in nursing through strengthening the connection among academia, service and community. © 2011 The Authors. International Nursing Review © 2011 International Council of Nurses.

  15. Trends in Research on the Security of Medical Information in Korea: Focused on Information Privacy Security in Hospitals.

    Science.gov (United States)

    Kim, Yong-Woon; Cho, Namin; Jang, Hye-Jung

    2018-01-01

    Information technology involves a risk of privacy violation in providing easy access to confidential information,such as personal information and medical information through the Internet. In this study, we investigated medical information security to gain a better understanding of trends in research related to medical information security. We researched papers published on '의료정보' and 'medical information' in various Korean journals during a 10-year period from 2005 to 2015. We also analyzed these journal papers for each fiscal year; these papers were categorized into the areas of literature research and empirical research, and were further subdivided according to themes and subjects. It was confirmed that 48 papers were submitted to 35 academic journals. There were 33 (68.8%) literature review articles, and analysis of secondary data was not carried out at all. In terms of empirical research, 8 (16.7%) surveys and 7 (14.6%) program developments were studied. As a result of analyzing these papers according to the research theme by research method, 17 (35.4%) papers on laws, systems, and policies were the most numerous. It was found that among the literature research papers on medical personnel were the most common, and among the empirical research papers, research on experts in information protection and medical personnel were the most common. We suggest that further research should be done in terms of social perception, human resource development, and technology development to improve risk management in medical information systems.

  16. Canadian International Food Security Research Fund - Phase II ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The fund was designed to finance initiatives to solve global food and ... food security and enhance nutrition in developing countries; -increase food ... In a context of rising food prices, millions of Africans in marginal areas rely on a range of ...

  17. Linking research and food security policies in MENA | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    21 حزيران (يونيو) 2013 ... Hammou Laamrani works for IDRC as a specialist in agriculture, water, and knowledge management. He believes that ... Food security challenges are also related to the low adoption of technologies to optimize food availability and storage, reduce post-harvest losses, and improve food safety. Unless food ...

  18. Researches on the Security of Cluster-based Communication Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yanhong Sun

    2014-08-01

    Full Text Available Along with the in-depth application of sensor networks, the security issues have gradually become the bottleneck of wireless sensor applications. To provide a solution for security scheme is a common concern not only of researchers but also of providers, integrators and users of wireless sensor networks. Based on this demand, this paper focuses on the research of strengthening the security of cluster-based wireless sensor networks. Based on the systematic analysis of the clustering protocol and its security enhancement scheme, the paper introduces the broadcast authentication scheme, and proposes an SA-LEACH network security enhancement protocol. The performance analysis and simulation experiments prove that the protocol consumes less energy with the same security requirements, and when the base station is comparatively far from the network deployment area, it is more advantageous in terms of energy consumption and t more suitable for wireless sensor networks.

  19. Research collaboration in groups and networks: differences across academic fields.

    Science.gov (United States)

    Kyvik, Svein; Reymert, Ingvild

    2017-01-01

    The purpose of this paper is to give a macro-picture of collaboration in research groups and networks across all academic fields in Norwegian research universities, and to examine the relative importance of membership in groups and networks for individual publication output. To our knowledge, this is a new approach, which may provide valuable information on collaborative patterns in a particular national system, but of clear relevance to other national university systems. At the system level, conducting research in groups and networks are equally important, but there are large differences between academic fields. The research group is clearly most important in the field of medicine and health, while undertaking research in an international network is most important in the natural sciences. Membership in a research group and active participation in international networks are likely to enhance publication productivity and the quality of research.

  20. 16th Department of Energy Computer Security Group Training Conference: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    1994-04-01

    Various topic on computer security are presented. Integrity standards, smartcard systems, network firewalls, encryption systems, cryptography, computer security programs, multilevel security guards, electronic mail privacy, the central intelligence agency, internet security, and high-speed ATM networking are typical examples of discussed topics. Individual papers are indexed separately.

  1. Community Savings Groups, Financial Security, and HIV Risk Among Female Sex Workers in Iringa, Tanzania.

    Science.gov (United States)

    Mantsios, Andrea; Galai, Noya; Mbwambo, Jessie; Likindikoki, Samuel; Shembilu, Catherine; Mwampashi, Ard; Beckham, S W; Leddy, Anna; Davis, Wendy; Sherman, Susan; Kennedy, Caitlin; Kerrigan, Deanna

    2018-02-24

    This study assessed the association between community savings group participation and consistent condom use (CCU) among female sex workers (FSW) in Iringa, Tanzania. Using cross-sectional data from a survey of venue-based FSW (n = 496), logistic regression was used to examine the associations between financial indicators including community savings group participation and CCU. Over one-third (35%) of the women participated in a savings group. Multivariable regression results indicated that participating in a savings group was significantly associated with nearly two times greater odds of CCU with new clients in the last 30 days (aOR = 1.77, 95% CI 1.10-2.86). Exploratory mediation analysis indicated that the relationship between savings group participation and CCU was partially mediated by financial security, as measured by monthly income. Findings indicate that community savings groups may play an important role in reducing sexual risk behaviors of FSW and hold promise as part of comprehensive, community-led HIV prevention strategies among FSW.

  2. Modeling and simulation for cyber-physical system security research, development and applications.

    Energy Technology Data Exchange (ETDEWEB)

    Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.

    2010-02-01

    This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.

  3. GRIP LANGLEY AEROSOL RESEARCH GROUP EXPERIMENT (LARGE) V1

    Data.gov (United States)

    National Aeronautics and Space Administration — Langley Aerosol Research Group Experiment (LARGE) measures ultrafine aerosol number density, total and non-volatile aerosol number density, dry aerosol size...

  4. Overlapping values, mutual prejudices. Empirical research into the ethos of police officers and private security guards

    NARCIS (Netherlands)

    van Steden, R.; van der Wal, Z.; Lasthuizen, K.M.

    2015-01-01

    What determines professional motivations and values of security operatives: sector or profession? Our article aims to answer this question through a survey study among police officers (n = 405) and private security guards (n = 329) in the Netherlands. Our results show that both groups closely

  5. Research Award: Policy and Planning Group (PPG) Deadline: 12 ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Jean-Claude Dumais

    2012-09-12

    Sep 12, 2012 ... mentorship in research, research management, and grant administration allows research awardees to pursue their research goals in a dynamic team environment in one of the world's leaders in generating new knowledge to meet global challenges. The Policy and Planning Group (PPG) is responsible for ...

  6. Research on Influence of Cloud Environment on Traditional Network Security

    Science.gov (United States)

    Ming, Xiaobo; Guo, Jinhua

    2018-02-01

    Cloud computing is a symbol of the progress of modern information network, cloud computing provides a lot of convenience to the Internet users, but it also brings a lot of risk to the Internet users. Second, one of the main reasons for Internet users to choose cloud computing is that the network security performance is great, it also is the cornerstone of cloud computing applications. This paper briefly explores the impact on cloud environment on traditional cybersecurity, and puts forward corresponding solutions.

  7. Group heterogeneity increases the risks of large group size: a longitudinal study of productivity in research groups.

    Science.gov (United States)

    Cummings, Jonathon N; Kiesler, Sara; Bosagh Zadeh, Reza; Balakrishnan, Aruna D

    2013-06-01

    Heterogeneous groups are valuable, but differences among members can weaken group identification. Weak group identification may be especially problematic in larger groups, which, in contrast with smaller groups, require more attention to motivating members and coordinating their tasks. We hypothesized that as groups increase in size, productivity would decrease with greater heterogeneity. We studied the longitudinal productivity of 549 research groups varying in disciplinary heterogeneity, institutional heterogeneity, and size. We examined their publication and citation productivity before their projects started and 5 to 9 years later. Larger groups were more productive than smaller groups, but their marginal productivity declined as their heterogeneity increased, either because their members belonged to more disciplines or to more institutions. These results provide evidence that group heterogeneity moderates the effects of group size, and they suggest that desirable diversity in groups may be better leveraged in smaller, more cohesive units.

  8. Quantitative Approaches to Group Research: Suggestions for Best Practices

    Science.gov (United States)

    McCarthy, Christopher J.; Whittaker, Tiffany A.; Boyle, Lauren H.; Eyal, Maytal

    2017-01-01

    Rigorous scholarship is essential to the continued growth of group work, yet the unique nature of this counseling specialty poses challenges for quantitative researchers. The purpose of this proposal is to overview unique challenges to quantitative research with groups in the counseling field, including difficulty in obtaining large sample sizes…

  9. Focus Group in Community Mental Health Research: Need for Adaption.

    Science.gov (United States)

    Zupančič, Vesna; Pahor, Majda; Kogovšek, Tina

    2018-04-27

    The article presents an analysis of the use of focus groups in researching community mental health users, starting with the reasons for using them, their implementation in mental health service users' research, and the adaptations of focus group use when researching the experiences of users. Based on personal research experience and a review of scientific publications in the Google Scholar, Web of Science, ProQuest, EBSCOhost, and Scopus databases, 20 articles published between 2010 and 2016 were selected for targeted content analysis. A checklist for reporting on the use of focus groups with community mental health service users, aiming to improve the comparability, verifiability and validity was developed. Adaptations of the implementation of focus groups in relation to participants' characteristics were suggested. Focus groups are not only useful as a scientific research technique, but also for ensuring service users' participation in decision-making in community mental health and evaluating the quality of the mental health system and services .

  10. Research Groups & Research Subjects - RED | LSDB Archive [Life Science Database Archive metadata

    Lifescience Database Archive (English)

    Full Text Available rch Groups & Research Subjects Data detail Data name Research Groups & Research Sub... Number of data entries 174 entries Data item Description Research ID Research ID (Subject number) Institute...tion Download License Update History of This Database Site Policy | Contact Us Research Groups & Research Subjects - RED | LSDB Archive ... ...switchLanguage; BLAST Search Image Search Home About Archive Update History Data List Contact us RED Resea... Organization Section Section (Department) User name User name Experimental title Experimental title (Rese

  11. A Research on Issues Related to RFID Security and Privacy

    Science.gov (United States)

    Kim, Jongki; Yang, Chao; Jeon, Jinhwan

    Radio Frequency Identification (RFID) is a technology for automated identification of objects and people. RFID systems have been gaining more popularity in areas especially in supply chain management and automated identification systems. However, there are many existing and potential problems in the RFID systems which could threat the technology's future. To successfully adopt RFID technology in various applications, we need to develop the solutions to protect the RFID system's data information. This study investigates important issues related to privacy and security of RFID based on the recent literature and suggests solutions to cope with the problem.

  12. Remote Sensing Information Sciences Research Group, Santa Barbara Information Sciences Research Group, year 3

    Science.gov (United States)

    Estes, J. E.; Smith, T.; Star, J. L.

    1986-01-01

    Research continues to focus on improving the type, quantity, and quality of information which can be derived from remotely sensed data. The focus is on remote sensing and application for the Earth Observing System (Eos) and Space Station, including associated polar and co-orbiting platforms. The remote sensing research activities are being expanded, integrated, and extended into the areas of global science, georeferenced information systems, machine assissted information extraction from image data, and artificial intelligence. The accomplishments in these areas are examined.

  13. Using gender research in development: food security in practice

    OpenAIRE

    Quisumbing, Agnes R.; McClafferty, Bonnie

    2006-01-01

    Metadata only record This guide presents research from several countries in IFPRI's research program on gender and intrahousehold relations, using quantitative and qualitative methods. It examines the implications of these issues in the success of development initiatives and suggestions for integrating gender research in projects and policy. The guide is divided into the following sections: the importance of using gender and intrahousehold research to inform projects and policies; gender a...

  14. Everything moves on: referral trends to a leavers' group in a high secure hospital and trial leave progress of group graduates.

    Science.gov (United States)

    Adshead, Gwen; Pyszora, Natalie; Wilson, Claire; Gopie, Ramesh; Thomas, Deryk; Smith, Julia; Glorney, Emily; Moore, Estelle; Tapp, James

    2017-04-01

    Moving on from high secure psychiatric care can be a complex and potentially stressful experience, which may hinder progression. A leavers' group in a UK high secure hospital is offered to support patients with this transition. The aims of this study are to investigate characteristics of patients referred for the leavers' group and compare outcomes for leavers' group graduates with those for patients who never attended a leavers' group for any reason. A retrospective quasi-experimental design was applied to data extracted from various records sources - within and outside the high security hospital. About one-fifth of patients who left the hospital on trial leave during the study were referred to the leavers' group (N = 109). Referred patients were significantly more likely to have either been admitted from another high-security hospital or transferred from prison for treatment and have a diagnosis of paranoid schizophrenia. Patients not referred had a significantly higher rate of previously refusing to participate in groups. There was a tendency for rate of return from trial leave for group graduates to be lower than that of patients who did not attend the leavers' group, but this just failed to reach statistical significance (rate ratio [RR] = 1.04; CI 0.97-1.11). A leavers' group appeared to be a valued therapy option for people who had spent a long time in high secure psychiatric care, or those who continued to require hospital treatment beyond prison tariffs. There was a low return rate from trial leave, which made the evaluation of this outcome difficult. A detailed study into both the reasons for return from trial leave and successes would provide further information on ideal preparation for moving on. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  15. Research perspectives overview at DBNRRC to maintain sustainable food security

    Science.gov (United States)

    The research issues that the Dale Bumpers National Rice Research Center (DBNRRC) is addressing for the rice industry and research community are 1) changing rice production practices, 2) diminishing irrigation resources, 3) loss of export markets due to poor quality, 4) emerging high value specialty...

  16. Research Award: Governance, Security and Justice (GSJ) Deadline ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Jean-Claude Dumais

    2012-09-12

    Sep 12, 2012 ... IDRC's Research Awards are a unique opportunity for master's and ... proposal should demonstrate an understanding of the principles that inform research ... Women's studies, gender studies; or. • Information and communication technologies. Knowledge of research for development, field experience in a ...

  17. Activity report of the Neutrino Research Group. Year 2006

    International Nuclear Information System (INIS)

    2007-01-01

    For the last two decades, neutrino physics has been producing major discoveries including neutrino oscillations. These results gave clear confirmation that active neutrinos oscillate and therefore have mass with three different mass states. This is a very important result showing that the Minimal Standard Model is incomplete and requires an extension which is not yet known. The neutrino research field is very broad and active, at the frontier of today's particle physics. The Neutrino Research Group (GDR) was created in January 2005 with the aim of gathering CEA and CNRS research teams working on Neutrino Physics on experimental or theoretical level. This document is the 2006 activity report of the research group, two years after its creation. It presents the results of the 5 working groups: 1 - Determination of neutrino parameters; 2 - Physics beyond the standard model; 3 - Neutrinos in the universe; 4 - Accelerators, detection means, R and D and valorisation; 5 - Common tools to all working groups. The proposed neutrino physics road-map and the actual and future short-, medium- and long-term projects are presented in appendixes. The Neutrino research group organization, the Memphys specific mission group, the research group participating laboratories and teams, as well as the Memphys project are presented too

  18. Group functioning of a collaborative family research team.

    Science.gov (United States)

    Johnson, S K; Halm, M A; Titler, M G; Craft, M; Kleiber, C; Montgomery, L A; Nicholson, A; Buckwalter, K; Cram, E

    1993-07-01

    Collaborative research teams are an attractive means of conducting nursing research in the clinical setting because of the many opportunities that collaboration can supply. These opportunities include a chance to: (1) network with other nurses who have similar interests, (2) share knowledge and expertise for designing clinical studies that directly affect daily practice, (3) develop instruments, (4) write grant proposals, (5) collect and analyze data, and (6) prepare manuscripts for publication. The effectiveness of research teams, however, is strongly influenced by group functioning. This article describes the functioning of a collaborative family interventions research team of nursing faculty members and CNSs at a large Midwestern university setting. The formation of the group and membership characteristics are described, along with strategies used to identify the research focus and individual and group goals. Aspects related to the influence of the group on members and the internal operations of the group are also addressed. Future strategies to be explored will focus on the size of the group and joint authorship issues. The authors also set forth a number of recommendations for development of collaborative research groups.

  19. NAMMA LANGLEY AEROSOL RESEARCH GROUP EXPERIMENT NAVIGATION DATA V1

    Data.gov (United States)

    National Aeronautics and Space Administration — The NAMMA Langley Aerosol Research Group Experiment Navigation Data is the DC-8 NAV data (ICATS) extracted into columns with time correction. These data files were...

  20. Medicinal Plant Research Group, School of Pharmacy, College of ...

    African Journals Online (AJOL)

    Medicinal Plant Research Group, School of Pharmacy, College of Health Sciences, University of Nairobi,. P.O. Box 19676-00202, ... of plant used, the dosage form and procedures for preparation and ... by thermal gravimetric methods. In finely.

  1. The Nuclear Safeguards and Security Activities under Euratom Research and Training Programme

    International Nuclear Information System (INIS)

    Abousahl, S.; Palajova, Z.; Janssens, W.A.M.; Luetzenkirchen, K.; Goncalves, J.G.M.; Aregbe, Y.; )

    2015-01-01

    Nuclear safeguards and security are absolute priorities for the EU. At technical level, the Joint Research Centre (JRC) as the European Commission's in-house science service plays an important role in the field of nuclear research, training and education that include nuclear safety, safeguards and security. The JRC's nuclear research activities are defined in a Council Regulation on the research and training programme of the European Atomic Energy Community. The JRC works closely with EC safeguards authority, whose mission is to ensure that nuclear material within the EU is not diverted from its intended use according to Euratom treaty. Technologies, methodologies and trainings are developed according to the Euratom Safeguards inspectorate's needs. In the area of nuclear security, the JRC contributes to the development of specific expertise in the field of nuclear forensics and border security detection as well as related training efforts for first front-line responders and national experts. The JRC provides its expert support for the implementation of internal EU action plans mainly in the field of radiological and nuclear security. At an international level, the JRC cooperates with the IAEA mainly through the EC support programme on the control of nuclear materials and facilities in order to avoid proliferation or diversion. Close cooperation with IAEA nuclear security is developed through the recent signature of a dedicated practical arrangement. Key partnerships have also been developed in the field of safeguards and security with the US-DoE, Russia, Japan and China. In addition, JRC contributes significantly to the EU nuclear safeguards and security outreach activities implemented under the Instrument for Nuclear Safety Cooperation and Instrument contributing to Stability and Peace. In this paper we will highlight some of the JRC contributions to the enhancement of nuclear safeguards and security at EU and international levels. (author)

  2. Safeguards and security research and development: Program status report, February-July 1981

    International Nuclear Information System (INIS)

    Henry, C.N.; Walton, R.B.

    1982-04-01

    This report, one of a series of biannual progress reports, describes the status of research and development in the Safeguards and Security Program at Los Alamos from February-July 1981. Most work covered here is sponsored by the Office of Safeguards and Security of the Department of Energy; however, project activities that are technically closely related to nuclear safeguards and security also are included where appropriate for conveying information useful to the nuclear community. The report comprises four major subject areas: Security Development and Support; Nuclear Materials Measurement and Engineering; Nuclear Facility Safeguards Support; and International Safeguards, Technology Transfer, and Training. Some technical topics included in the subject areas are computer and informational security, chemical and nondestructive analysis of nuclear materials, process modeling and analysis, nuclear materials accounting systems, evaluation of prototype measurement instrumentation and procedures in nuclear facilities, design and consultation for facilities, technical exchange, training courses, and international safeguards

  3. Safeguards and security research and development: Program status report, February-July 1981

    Energy Technology Data Exchange (ETDEWEB)

    Henry, C.N.; Walton, R.B. (comps.)

    1982-04-01

    This report, one of a series of biannual progress reports, describes the status of research and development in the Safeguards and Security Program at Los Alamos from February-July 1981. Most work covered here is sponsored by the Office of Safeguards and Security of the Department of Energy; however, project activities that are technically closely related to nuclear safeguards and security also are included where appropriate for conveying information useful to the nuclear community. The report comprises four major subject areas: Security Development and Support; Nuclear Materials Measurement and Engineering; Nuclear Facility Safeguards Support; and International Safeguards, Technology Transfer, and Training. Some technical topics included in the subject areas are computer and informational security, chemical and nondestructive analysis of nuclear materials, process modeling and analysis, nuclear materials accounting systems, evaluation of prototype measurement instrumentation and procedures in nuclear facilities, design and consultation for facilities, technical exchange, training courses, and international safeguards.

  4. UCLA Particle Physics Research Group annual progress report

    International Nuclear Information System (INIS)

    Nefkens, B.M.K.

    1983-11-01

    The objectives, basic research programs, recent results, and continuing activities of the UCLA Particle Physics Research Group are presented. The objectives of the research are to discover, to formulate, and to elucidate the physics laws that govern the elementary constituents of matter and to determine basic properties of particles. The research carried out by the Group last year may be divided into three separate programs: (1) baryon spectroscopy, (2) investigations of charge symmetry and isospin invariance, and (3) tests of time reversal invariance. The main body of this report is the account of the techniques used in our investigations, the results obtained, and the plans for continuing and new research. An update of the group bibliography is given at the end

  5. Outcomes of Mixed-Age Groupings. Research Highlights.

    Science.gov (United States)

    Stegelin, Dolores A.

    1997-01-01

    A review of the literature on mixed-age settings reveals benefits in the areas of social and cognitive development. Research on the psychosocial advantages of mixed-age groupings is less consistent. Factors such as group size, age range, time together, and context-specific curriculum activities may have a relationship to the level of success and…

  6. Sustainable Transportation Systems Research Group: Ongoing and Past Activities

    OpenAIRE

    Gkritza, Konstantina "Nadia"; Hurtado, Davis Chacon; Gkartzonikas, Christos; Ke, Yue; Losada, Lisa L

    2017-01-01

    This presentation describes the ongoing and past activities of the Sustainable Transportation Systems Research (STSR) group at Purdue University (https://engineering.purdue.edu/STSRG). The STSR group aims to achieve green, safe, efficient, and equitable transportation systems by studying and modeling transportation externalities, using state of the art statistical, econometric, and economic analysis tools.

  7. Big Data in the Campus Landscape: Security and Privacy. ECAR Working Group Paper

    Science.gov (United States)

    Barnett, William; Corn, Mike; Hillegas, Curt; Wada, Kent

    2015-01-01

    This paper is part of series of the EDUCAUSE Center for Analysis and Research Campus Cyberinfrastructure (ECAR-CCI) Working Group. The topic of big data continues to receive a great deal of publicity because of its promise for opening new avenues of scholarly discovery and commercial opportunity. The ability to sift rapidly through massive amounts…

  8. Enabling nutrient security and sustainability through systems research.

    Science.gov (United States)

    Kaput, Jim; Kussmann, Martin; Mendoza, Yery; Le Coutre, Ronit; Cooper, Karen; Roulin, Anne

    2015-05-01

    Human and companion animal health depends upon nutritional quality of foods. Seed varieties, seasonal and local growing conditions, transportation, food processing, and storage, and local food customs can influence the nutrient content of food. A new and intensive area of investigation is emerging that recognizes many factors in these agri-food systems that influence the maintenance of nutrient quality which is fundamental to ensure nutrient security for world populations. Modeling how these systems function requires data from different sectors including agricultural, environmental, social, and economic, but also must incorporate basic nutrition and other biomedical sciences. Improving the agri-food system through advances in pre- and post-harvest processing methods, biofortification, or fortifying processed foods will aid in targeting nutrition for populations and individuals. The challenge to maintain and improve nutrient quality is magnified by the need to produce food locally and globally in a sustainable and consumer-acceptable manner for current and future populations. An unmet requirement for assessing how to improve nutrient quality, however, is the basic knowledge of how to define health. That is, health cannot be maintained or improved by altering nutrient quality without an adequate definition of what health means for individuals and populations. Defining and measuring health therefore becomes a critical objective for basic nutritional and other biomedical sciences.

  9. A secure effective dynamic group password-based authenticated key agreement scheme for the integrated EPR information system

    Directory of Open Access Journals (Sweden)

    Vanga Odelu

    2016-01-01

    Full Text Available With the rapid growth of the Internet, a lot of electronic patient records (EPRs have been developed for e-medicine systems. The security and privacy issues of EPRs are important for the patients in order to understand how the hospitals control the use of their personal information, such as name, address, e-mail, medical records, etc. of a particular patient. Recently, Lee et al. proposed a simple group password-based authenticated key agreement protocol for the integrated EPR information system (SGPAKE. However, in this paper, we show that Lee et al.’s protocol is vulnerable to the off-line weak password guessing attack and as a result, their scheme does not provide users’ privacy. To withstand this security weakness found in Lee et al.’s scheme, we aim to propose an effective dynamic group password-based authenticated key exchange scheme for the integrated EPR information system, which retains the original merits of Lee et al.’s scheme. Through the informal and formal security analysis, we show that our scheme provides users’ privacy, perfect forward security and known-key security, and also protects online and offline password guessing attacks. Furthermore, our scheme efficiently supports the dynamic group password-based authenticated key agreement for the integrated EPR information system. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications tool and show that our scheme is secure against passive and active attacks.

  10. Bridging the practitioner-scientist gap in group psychotherapy research.

    Science.gov (United States)

    Lau, Mark A; Ogrodniczuk, John; Joyce, Anthony S; Sochting, Ingrid

    2010-04-01

    Bridging the practitioner-scientist gap requires a different clinical research paradigm: participatory research that encourages community agency-academic partnerships. In this context, clinicians help define priorities, determine the type of evidence that will have an impact on their practice (affecting the methods that are used to produce the evidence), and develop strategies for translating, implementing, and disseminating their findings into evidence-based practice. Within this paradigm, different roles are assumed by the partners, and sometimes these roles are blended. This paper will consider the perspectives of people who assume these different roles (clinician, researcher, and clinician-researcher) with group psychotherapy as the specific focus. Finally, the establishment of a practice-research network will be discussed as a potentially promising way to better engage group therapists in research.

  11. UCLA Particle Physics Research Group annual progress report

    International Nuclear Information System (INIS)

    Nefkens, B.M.K.

    1981-08-01

    The objectives, basic research programs, recent results and continuing activities of the UCLA Particle Physics Research Group are presented. The objectives of the research are to discover, to formulate, and to elucidate the physics laws that govern the elementary constituents of matter and to determine basic properties of particles. A synopsis of research carried out last year is given. The main body of this report is the account of the techniques used in our investigations, the results obtained, and the plans for continuing and new research

  12. A multilayered analysis of energy security research and the energy supply process

    International Nuclear Information System (INIS)

    Kiriyama, Eriko; Kajikawa, Yuya

    2014-01-01

    Highlights: • The analysis reveals that energy security research is highly multidisciplinary. • Diversification is important for ensuring security in the energy supply process. • A multilayered overview of the energy supply process is important for energy risk management. • Consumer lifestyle innovation will be a part of energy security in the future. - Abstract: After the Fukushima nuclear disaster, a reassessment of the energy system is needed in order to include such aspects as human security and resilience. More open and careful discussions are needed concerning the various risks and uncertainties of future energy options, both in Japan and globally. In this paper, we aim to offer a fundamental basis for discourse on energy security by analyzing the status and trends in academic publications on that issue. Our bibliometrics analysis indicates that research has shifted from promoting strategies for ensuring the self-sufficiency of the primary energy to diversification of the secondary energy supply chain by introducing energy networks consisting of an infrastructure established through international coordination. In the literature, the concept of energy security is ambiguous and allows for multiple interpretations. Our results illustrate the existence of highly multidisciplinary topics within energy security, which can be categorized into four perspectives: geopolitical, economic, policy related, and technological

  13. Wireless Sensor Network Security Enhancement Using Directional Antennas: State of the Art and Research Challenges.

    Science.gov (United States)

    Curiac, Daniel-Ioan

    2016-04-07

    Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to various types of security attacks. A possible solution to reduce the security risks is to use directional antennas instead of omnidirectional ones or in conjunction with them. Due to their increased complexity, higher costs and larger sizes, directional antennas are not traditionally used in wireless sensor networks, but recent technology trends may support this method. This paper surveys existing state of the art approaches in the field, offering a broad perspective of the future use of directional antennas in mitigating security risks, together with new challenges and open research issues.

  14. Research of ios operating system security and the abuse of its exploits

    OpenAIRE

    Jucius, Mindaugas

    2017-01-01

    iOS operating system, which is developed by Apple Inc., is claimed to be the most secure product in the market. In the light of worsening human rights conditions, mainly concerning data privacy breaches performed on governmental level, the need to be reassured about the security of software that runs in our pockets is strengthened. This thesis is focused on researching on potential iOS security exploits and their abuse to access private information or perform malicious actions without user’s ...

  15. Coalition works to secure open access to published research

    CERN Multimedia

    Brown, Susan

    2006-01-01

    "Paying upfront: a group of particle physicists has proposed a new way to pay for immediate free access to journal articles in their field. They want to raise five million to six million euros (about US $7-million) a year to buy open access to peer-reviewed papers in top physics journals. (2 pages)

  16. Security in Nano Communication: Challenges and Open Research Issues

    NARCIS (Netherlands)

    Dressler, Falko; Kargl, Frank

    Nano communication is one of the fastest growing emerging research fields. In recent years, much progress has been achieved in developing nano machines supporting our needs in health care and other scenarios. However, experts agree that only the interaction among nano machines allows to address the

  17. Annual Report 2011-2012 (RAND National Security Research Division)

    Science.gov (United States)

    2012-01-01

    Reports & Bookstore Make a charitable contribution Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by...research team included a former CEO of the Australian Defence Science and Technology Organisation , as well as former officials from U .S . subma- rine

  18. Neutrino Research Group. 2011-2014 activity report

    International Nuclear Information System (INIS)

    2014-01-01

    For the last two decades, neutrino physics has been producing major discoveries including neutrino oscillations. These results gave clear confirmation that active neutrinos oscillate and therefore have mass with three different mass states. This is a very important result showing that the Minimal Standard Model is incomplete and requires an extension which is not yet known. The neutrino research field is very broad and active, at the frontier of today's particle physics. The Neutrino Research Group (GDR) was created in January 2005 with the aim of gathering CEA and CNRS research teams working on Neutrino Physics on experimental or theoretical level. This document is the 2011-2014 activity report of the research group, ten years after its creation. It presents the results of the 5 working groups: 1 - Determination of neutrino parameters; 2 - Physics beyond the standard model; 3 - Neutrinos in the universe; 4 - Accelerators, detection means, R and D and valorisation; 5 - Common tools to all working groups. The research group structure, participating laboratories and teams and the neutrino physics road-map are presented in appendixes

  19. The sustainable development thematic in the research groups

    Directory of Open Access Journals (Sweden)

    Maria Cristina Comunian Ferraz

    2007-11-01

    Full Text Available The technological innovation brought for the debate the question of the sustainable technological development. The article presents an entirety of theoretical reflections on the science, technology and sustainable development themes and to aim the contributions of the Information Science, while interdisciplinary science, with respect to the understanding of the sustainable development. With basis in this reference it was carried through the investigation of descriptive exploratory nature with quanti-qualitative boarding, having as main objective to identify the presence of the sustainable development thematic in research groups of the UFSCar registered in cadastre in the National Directory of Research Groups of the CNPq. The results had shown that the sustainable development thematic is present in eleven researchgroups of the UFSCar distributed in different knowledge areas. Comparing the data gotten with the research groups of the country that had participated of 2004 Census of the National Directory of Research Groups of the CNPq it was verified that it has similarity between both the data. In accordance with scientific literature, confirms that the sustainable development thematic is interdisciplinar and that the knowledge production of the research groups is result to know articulated in some of the knowledge areas.

  20. Global Manufacturing Research: Experience Exchange Group (EEG) contributions

    DEFF Research Database (Denmark)

    Bruun, Peter

    1998-01-01

    of preliminary studies found interesting to set upan EEG composed of representatives from industry and a researcher. Inthe paper some general research methods pertinent to the areaindustrial management is discussed. The EEG concept is introduced andcharacterised in comparison with the other methods. EEG...... activities aredescribed and a tentative coupling to the phases in a research processis proposed. Following this is a discussion of methodological andquality requirements. It is considered how EEG activities couldpossible contribute to an industrial rooted research. The paper endsup looking at future research......The intention of this paper is to clarify if and how an ExperienceExchange Group (EEG) can be involved in a research process in the areaof industrial management. For exemplification of the topic an ongoingresearch in global manufacturing is referred to. In this research itwas after a series...

  1. The role of research in global food and nutrition security - Discussion paper

    NARCIS (Netherlands)

    Fischler, F.; Wilkinson, D.; Benton, T.; Daniel, H.; Darcy-Vrillon, B.; Hedlund, K.; Heffernan, P.; Kok, E.J.; Saarela, M.; Jakubczyk, E.; Sorlini, C.; Swinnen, J.; Braun, von J.; Ash, K.; Rojas Briales, E.; Buckwell, A.; Frewen, M.; Karlsson, M.

    2015-01-01

    The present discussion document gives an overview of where European research can add the most value in relation to tackling food and nutrition security challenges and points to areas where we can expand our research potential. Moreover, it highlights the need to develop a governance structure that

  2. Securing water quality and quantity: Research and development perspective

    CSIR Research Space (South Africa)

    Pienaar, H

    2012-10-01

    Full Text Available : ? economic growth & development ? human & environmental needs ? meeting international obligations ? energy needs (strategic water users) ? ensuring availability and allocation (all other users) ? CSIR 2012 Slide 3 Background ? SA 30th driest country... and quantity: Research and development perspective 4th Biennial Conference Harrison Pienaar 10 October 2012 Presentation outline ? Introduction and background to water in South Africa ? Transboundary water resource aspects ? Water related challenges...

  3. Should Security Researchers Experiment More and Draw More Inferences?

    Science.gov (United States)

    2011-08-01

    knowledge would be enormous. To obtain a large and representative sample of keystroke-dynamics research papers, we consulted the IEEE Xplore database... IEEE Xplore are similar to those published elsewhere), these confidence intervals estimate the re- gions where those true percentages would lie with 95...of articles and conference pro- ceedings published by the IEEE , to which our university maintains a subscription. We conducted two keyword searches for

  4. Methodological Approach Into Researching Traffic Under Extraordinary Security Circumstances

    Directory of Open Access Journals (Sweden)

    Peter-Anthony Ercegovac

    2008-09-01

    Full Text Available The complexity of researching traffic under extraordinaryconditions in order to implement a more efficient and functionaltraffic management strategy under both normal and irregularconditions- as well as the grey zone of when the changefrom normal into extraordinary traffic conditions actually occur-provides the researcher with numerous methodologicalproblems.Starting from the viewpoint that the field of traffic scienceneeds an increase into the capacity of research into traffic underextraordinary conditions we have chosen to define withinthis article a specific methodological approach that undertakesa study into the exposure, menace, threat and risk faced by trafficsystems under extraordinary conditions through utilisingmethods utilised by the military that allow for the possible resolutionof such problems through compatible testing of both simulatedand real life conditions that such systems may face.In searching for possible applicable solutions to such demandingparametres we believe that the use of concrete informationin real time and real space in order to bring about amore efficient functioning of traffic under extraordinary conditionscan be achieved through the use of the analytical capacityof traffic systems information gathering attained through theusage of Uninhabited Flying Vehicles (UFVs in monitoringroad, rail and maritime traffic and transport.

  5. Ganando Confianza: Research Focus Groups with Immigrant Mexican Mothers.

    Science.gov (United States)

    Hausmann-Stabile, Carolina; Zayas, Luis H; Runes, Sandra; Abenis-Cintron, Anna; Calzada, Esther

    2011-03-01

    Immigrant families with children with developmental disabilities must be served using culturally sensitive approaches to service and research to maximize treatment benefits. In an effort to better understand cultural issues relevant to the provision of parenting programs for immigrant Mexican mothers of children with developmental disabilities, we conducted sustained focus groups through which we could learn more about our participants and thereby improve services. This paper reports on the challenges and lessons learned from these groups. We characterize the key lessons as (a) recruitment and retention is more than agreement to participate; (b) confidentiality is not just a word but an activity; (c) the complicated nature of language; (d) cultural norms shape the group process; (e) appreciating the value of taking time; and (f) gender issues and group interaction. Service providers and researchers who work with Mexican families may benefit from our experiences as they promote and develop programs and projects in the developmental disabilities field.

  6. Focus Group Interview in Family Practice Research: Implementing a qualitative research method

    OpenAIRE

    Wood, Marjorie L.

    1992-01-01

    Focus group interviews, described as a qualitative research method with good potential in family medicine, are traced from their origins in market research to their growing role in sociology and medicine. Features of this method are described, including design, conduct, and analysis. Both proven and potential areas for primary care research using focus groups are outlined.

  7. Comparative Study on Cyber Securities between Power Reactor and Research Reactor with Bayesian Update

    International Nuclear Information System (INIS)

    Shin, Jinsoo; Heo, Gyunyoung; Son, Han Seong

    2016-01-01

    The Stuxnet has shown that nuclear facilities are no more safe from cyber-attack. Due to practical experiences and concerns on increasing of digital system application, cyber security has become the important issue in nuclear industry. Korea Institute of Nuclear Nonproliferation and control (KINAC) published a regulatory standard (KINAC/RS-015) to establish cyber security framework for nuclear facilities. However, it is difficult to research about cyber security. It is hard to quantify cyber-attack which has malicious activity which is different from existing design basis accidents (DBAs). We previously proposed a methodology on development of a cyber security risk model with BBN. However, the methodology had a limitation in which the input data as prior information was solely on expert opinions. In this study, we propose a cyber security risk model for instrumentation and control (I and C) system of nuclear facilities with some equation for quantification by using Bayesian Belief Network (BBN) in order to overcome the limitation of previous research. The proposed model has been used for comparative study on cyber securities between large-sized nuclear power plants (NPPs) and small-sized Research Reactors (RR). In this study, we proposed the cyber security risk evaluation model with BBN. It includes I and C architecture, which is a target system of cyber-attack, malicious activity, which causes cyber-attack from attacker, and mitigation measure, which mitigates the cyber-attack risk. Likelihood and consequence as prior information are evaluated by considering characteristics of I and C architecture and malicious activity. The BBN model provides posterior information with Bayesian update by adding any of assumed cyber-attack scenarios as evidence. Cyber security risk for nuclear facilities is analyzed by comparing between prior information and posterior information of each node. In this study, we conducted comparative study on cyber securities between power reactor

  8. Comparative Study on Cyber Securities between Power Reactor and Research Reactor with Bayesian Update

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Jinsoo; Heo, Gyunyoung [Kyung Hee University, Yongin (Korea, Republic of); Son, Han Seong [Joongbu Univiersity, Geumsan (Korea, Republic of)

    2016-10-15

    The Stuxnet has shown that nuclear facilities are no more safe from cyber-attack. Due to practical experiences and concerns on increasing of digital system application, cyber security has become the important issue in nuclear industry. Korea Institute of Nuclear Nonproliferation and control (KINAC) published a regulatory standard (KINAC/RS-015) to establish cyber security framework for nuclear facilities. However, it is difficult to research about cyber security. It is hard to quantify cyber-attack which has malicious activity which is different from existing design basis accidents (DBAs). We previously proposed a methodology on development of a cyber security risk model with BBN. However, the methodology had a limitation in which the input data as prior information was solely on expert opinions. In this study, we propose a cyber security risk model for instrumentation and control (I and C) system of nuclear facilities with some equation for quantification by using Bayesian Belief Network (BBN) in order to overcome the limitation of previous research. The proposed model has been used for comparative study on cyber securities between large-sized nuclear power plants (NPPs) and small-sized Research Reactors (RR). In this study, we proposed the cyber security risk evaluation model with BBN. It includes I and C architecture, which is a target system of cyber-attack, malicious activity, which causes cyber-attack from attacker, and mitigation measure, which mitigates the cyber-attack risk. Likelihood and consequence as prior information are evaluated by considering characteristics of I and C architecture and malicious activity. The BBN model provides posterior information with Bayesian update by adding any of assumed cyber-attack scenarios as evidence. Cyber security risk for nuclear facilities is analyzed by comparing between prior information and posterior information of each node. In this study, we conducted comparative study on cyber securities between power reactor

  9. [The virtual environment of a research group: the tutors' perspective].

    Science.gov (United States)

    Prado, Cláudia; Casteli, Christiane Pereira Martins; Lopes, Tania Oliveira; Kobayashi, Rika M; Peres, Heloísa Helena Ciqueto; Leite, Maria Madalena Januário

    2012-02-01

    The Grupo de Estudos e Pesquisas de Tecnologia da Informação nos Processos de Trabalho em Enfermagem (Study and Research Group for Information Technology in the Nursing Working Processes, GEPETE) has the purpose of producing and socializing knowledge in information technology and health and nursing communication, making associations with research groups in this field and promoting student participation. This study was performed by the group tutors with the objective to report on the development of the virtual learning environment (VLE) and the tutors' experience as mediators of a research group using the Moodle platform. To do this, a VLE was developed and pedagogical mediation was performed following the theme of mentoring. An initial diagnosis was made of the difficulties in using this technology in interaction and communication, which permitted the proposal of continuing to use the platform as a resource to support research activities, offer lead researchers the mechanisms to socialize projects and offer the possibility of giving advice at a distance.

  10. Developing a physics expert identity in a biophysics research group

    Science.gov (United States)

    Rodriguez, Idaykis; Goertzen, Renee Michelle; Brewe, Eric; Kramer, Laird H.

    2015-06-01

    We investigate the development of expert identities through the use of the sociocultural perspective of learning as participating in a community of practice. An ethnographic case study of biophysics graduate students focuses on the experiences the students have in their research group meetings. The analysis illustrates how the communities of practice-based identity constructs of competencies characterize student expert membership. A microanalysis of speech, sound, tones, and gestures in video data characterize students' social competencies in the physics community of practice. Results provide evidence that students at different stages of their individual projects have opportunities to develop social competencies such as mutual engagement, negotiability of the repertoire, and accountability to the enterprises as they interact with group members. The biophysics research group purposefully designed a learning trajectory including conducting research and writing it for publication in the larger community of practice as a pathway to expertise. The students of the research group learn to become socially competent as specific experts of their project topic and methodology, ensuring acceptance, agency, and membership in their community of practice. This work expands research on physics expertise beyond the cognitive realm and has implications for how to design graduate learning experiences to promote expert identity development.

  11. Exploring Forms of Triangulation to Facilitate Collaborative Research Practice: Reflections From a Multidisciplinary Research Group

    Directory of Open Access Journals (Sweden)

    Tarja Tiainen

    2006-10-01

    Full Text Available This article contains critical reflections of a multidisciplinary research group studying the human and technological dynamics around some newly offered electronic services in a specific rural area of Finland. For their research, the group adopted ethnography. On facing the challenges of doing ethnographic research in a multidisciplinary setting, the group evolved its own breed of research practice based on multiple forms of triangulation. This implied the use of multiple data sources, methods, theories, and researchers, in different combinations. One of the outcomes of the work is a model for collaborative research. It highlights, among others, the importance of creating a climate for collaboration within the research group and following a process of individual and collaborative writing to achieve the potential benefits of such research. The article also identifies a set of remaining challenges relevant to collaborative research.

  12. Final report for the Integrated and Robust Security Infrastructure (IRSI) laboratory directed research and development project

    Energy Technology Data Exchange (ETDEWEB)

    Hutchinson, R.L.; Hamilton, V.A.; Istrail, G.G.; Espinoza, J.; Murphy, M.D.

    1997-11-01

    This report describes the results of a Sandia-funded laboratory-directed research and development project titled {open_quotes}Integrated and Robust Security Infrastructure{close_quotes} (IRSI). IRSI was to provide a broad range of commercial-grade security services to any software application. IRSI has two primary goals: application transparency and manageable public key infrastructure. IRSI must provide its security services to any application without the need to modify the application to invoke the security services. Public key mechanisms are well suited for a network with many end users and systems. There are many issues that make it difficult to deploy and manage a public key infrastructure. IRSI addressed some of these issues to create a more manageable public key infrastructure.

  13. Security approaches in using tablet computers for primary data collection in clinical research.

    Science.gov (United States)

    Wilcox, Adam B; Gallagher, Kathleen; Bakken, Suzanne

    2013-01-01

    Next-generation tablets (iPads and Android tablets) may potentially improve the collection and management of clinical research data. The widespread adoption of tablets, coupled with decreased software and hardware costs, has led to increased consideration of tablets for primary research data collection. When using tablets for the Washington Heights/Inwood Infrastructure for Comparative Effectiveness Research (WICER) project, we found that the devices give rise to inherent security issues associated with the potential use of cloud-based data storage approaches. This paper identifies and describes major security considerations for primary data collection with tablets; proposes a set of architectural strategies for implementing data collection forms with tablet computers; and discusses the security, cost, and workflow of each strategy. The paper briefly reviews the strategies with respect to their implementation for three primary data collection activities for the WICER project.

  14. Biomedical Research Group, Health Division annual report 1954

    Energy Technology Data Exchange (ETDEWEB)

    Langham, W.H.; Storer, J.B.

    1955-12-31

    This report covers the activities of the Biomedical Research Group (H-4) of the Health Division during the period January 1 through December 31, 1954. Organizationally, Group H-4 is divided into five sections, namely, Biochemistry, Radiobiology, Radiopathology, Biophysics, and Organic Chemistry. The activities of the Group are summarized under the headings of the various sections. The general nature of each section`s program, publications, documents and reports originating from its members, and abstracts and summaries of the projects pursued during the year are presented.

  15. Security in the Asia-Pacific region. Report on working group 5

    International Nuclear Information System (INIS)

    1997-01-01

    Security in the Asia-Pacific region is highly dependent on nuclear weapons-proliferation which can be achieved in two steps: non-introduction of nuclear weapons by nuclear powers, and creation of nuclear-weapon-free zone. The causes and steps towards arms build-up in the region are discussed. On of the indispensable factors in improving the relations between the countries in the zone is creation of confidence building measures and a security forum

  16. Secure web book to store structural genomics research data.

    Science.gov (United States)

    Manjasetty, Babu A; Höppner, Klaus; Mueller, Uwe; Heinemann, Udo

    2003-01-01

    Recently established collaborative structural genomics programs aim at significantly accelerating the crystal structure analysis of proteins. These large-scale projects require efficient data management systems to ensure seamless collaboration between different groups of scientists working towards the same goal. Within the Berlin-based Protein Structure Factory, the synchrotron X-ray data collection and the subsequent crystal structure analysis tasks are located at BESSY, a third-generation synchrotron source. To organize file-based communication and data transfer at the BESSY site of the Protein Structure Factory, we have developed the web-based BCLIMS, the BESSY Crystallography Laboratory Information Management System. BCLIMS is a relational data management system which is powered by MySQL as the database engine and Apache HTTP as the web server. The database interface routines are written in Python programing language. The software is freely available to academic users. Here we describe the storage, retrieval and manipulation of laboratory information, mainly pertaining to the synchrotron X-ray diffraction experiments and the subsequent protein structure analysis, using BCLIMS.

  17. Substantial Research Secures the Blue Future for our Blue Plant

    Directory of Open Access Journals (Sweden)

    Moustafa Abdel Maksoud

    2016-06-01

    Full Text Available Earth, the blue planet, is our home, and seas and oceans cover more than 70% of its surface. As the earth’s population rapidly increases and available resources decrease, seas and oceans can play a key role in assuring the long-term survival of humankind. Renewable maritime energy has huge potential to provide a considerable part of the earth’s population with decarbonised electricity generation systems. Renewable maritime energy is very flexible and can be harvested above the water’s free surface by using offshore wind turbines, on the water’s surface by using wave energy converters or below the water’s surface by using current or tidal turbines. The supposed conflict between environmental protection measures and economic interests is neither viable nor reasonable. Renewable maritime energy can be the motor for considerable substantial economic growth for many maritime regions and therefore for society at large. The fastest growing sector of renewable maritime energy is offshore wind. The annual report of the European Wind Energy Association from the year 2015 confirms the growing relevance of the offshore wind industry. In 2015, the total installed and grid-connected capacity of wind power was 12,800 MW in the EU and 6,013.4 MW in Germany. 38% of the 2015 annual installation in Germany was offshore, accounting for a capacity of 2,282.4 MW. However, there are a limited number of available installation sites in shallow water, meaning that there is an urgent need to develop new offshore structures for water depths greater than 50m. The persistent trend towards deeper waters has encouraged the offshore wind industry to look for floating wind turbine structures and larger turbines. Floating wind turbine technologies are at an early stage of development and many technical and economic challenges will still need to be faced. Nonetheless, intensive research activities and the employment of advanced technologies are the key factors in

  18. The ethics of research using electronic mail discussion groups.

    Science.gov (United States)

    Kralik, Debbie; Warren, Jim; Price, Kay; Koch, Tina; Pignone, Gino

    2005-12-01

    The aim of this paper is to identify and discuss the ethical considerations that have confronted and challenged the research team when researchers facilitate conversations using private electronic mail discussion lists. The use of electronic mail group conversations, as a collaborative data generation method, remains underdeveloped in nursing. Ethical challenges associated with this approach to data generation have only begun to be considered. As receipt of ethics approval for a study titled; 'Describing transition with people who live with chronic illness' we have been challenged by many ethical dilemmas, hence we believe it is timely to share the issues that have confronted the research team. These discussions are essential so we can understand the possibilities for research interaction, communication, and collaboration made possible by advanced information technologies. Our experiences in this study have increased our awareness for ongoing ethical discussions about privacy, confidentiality, consent, accountability and openness underpinning research with human participants when generating data using an electronic mail discussion group. We describe how we work at upholding these ethical principles focusing on informed consent, participant confidentiality and privacy, the participants as threats to themselves and one another, public-private confusion, employees with access, hackers and threats from the researchers. A variety of complex issues arise during cyberspace research that can make the application of traditional ethical standards troublesome. Communication in cyberspace alters the temporal, spatial and sensory components of human interaction, thereby challenging traditional ethical definitions and calling to question some basic assumptions about identity and ones right to keep aspects of it confidential. Nurse researchers are bound by human research ethics protocols; however, the nature of research by electronic mail generates moral issues as well as ethical

  19. Group Organization and Communities of Practice in Translational Research

    Directory of Open Access Journals (Sweden)

    Victor J. Krawczyk

    2014-12-01

    Full Text Available The collective lived experience of translational research teams requires further appreciation, particularly at the stages of group formation. To achieve this, we conducted a case study of a translational research team (n = 16. Through the case description and then discussing case-based themes with community of practice theory, themes such as “Being Open” and “Working as a Group” found that this team’s mutual respect, cooperation, and their sharing of knowledge uncovered an alternative way that professionals organize themselves for translational research projects. In conjunction to this finding, our analysis showed that the team has qualities of a community of practice.

  20. Securing personnel in nuclear fuel cycle research and development in Japan

    International Nuclear Information System (INIS)

    Sekino, H.

    1993-01-01

    The PNC, a japanese governmental research and development organization, is concerned with research and development into building and operating advanced power reactors and R and D into the whole cycle of the nuclear fuel. PNC promotes international cooperation with the USA and European countries as well as technical cooperation with the private sectors in uranium enrichment, reprocessing and advanced reactor development. This report discusses the current situation and problems in securing PNC personnel, in securing 'loan' staff for PNC, and in personnel exchanges for technical transfer and international cooperation. 5 figs

  1. Activity report of the Neutrino Research Group. Year 2010

    International Nuclear Information System (INIS)

    2011-01-01

    For the last two decades, neutrino physics has been producing major discoveries including neutrino oscillations. These results gave clear confirmation that active neutrinos oscillate and therefore have mass with three different mass states. This is a very important result showing that the Minimal Standard Model is incomplete and requires an extension which is not yet known. The neutrino research field is very broad and active, at the frontier of today's particle physics. The Neutrino Research Group (GDR) was created in January 2005 with the aim of gathering CEA and CNRS research teams working on Neutrino Physics on experimental or theoretical level. This document is the 2010 activity report of the research group, six years after its creation. It presents the results of the 5 working groups: 1 - Determination of neutrino parameters; 2 - Physics beyond the standard model; 3 - Neutrinos in the universe; 4 - Accelerators, detection means, R and D and valorisation; 5 - Common tools to all working groups. The proposed neutrino physics road-map and the actual and future short-, medium- and long-term projects are presented in appendixes

  2. Collaborating in Life Science Research Groups: The Question of Authorship

    Science.gov (United States)

    Muller, Ruth

    2012-01-01

    This qualitative study explores how life science postdocs' perceptions of contemporary academic career rationales influence how they relate to collaboration within research groups. One consequential dimension of these perceptions is the high value assigned to publications. For career progress, postdocs consider producing publications and…

  3. Preparing School Leaders: Action Research on the Leadership Study Group

    Science.gov (United States)

    Kamler, Estelle

    2016-01-01

    This article reports an action research study that examined the Leadership Study Group, one learning activity designed to build knowledge and skills for aspiring school leaders and implemented in a six-credit introductory course for school leader certification. Through analysis of a variety of qualitative data collected over nine semesters, I…

  4. About the Nutritional Science Research Group | Division of Cancer Prevention

    Science.gov (United States)

    The Nutritional Science Research Group (NSRG) promotes and supports studies establishing a comprehensive understanding of the precise role of diet and food components in modulating cancer risk and tumor cell behavior. This focus includes approaches to characterize molecular targets and variability in individual responses to nutrients and dietary patterns. |

  5. Security Approaches in Using Tablet Computers for Primary Data Collection in Clinical Research

    OpenAIRE

    Wilcox, Adam B.; Gallagher, Kathleen; Bakken, Suzanne

    2013-01-01

    Next-generation tablets (iPads and Android tablets) may potentially improve the collection and management of clinical research data. The widespread adoption of tablets, coupled with decreased software and hardware costs, has led to increased consideration of tablets for primary research data collection. When using tablets for the Washington Heights/Inwood Infrastructure for Comparative Effectiveness Research (WICER) project, we found that the devices give rise to inherent security issues asso...

  6. A social epistemology of research groups collaboration in scientific practice

    CERN Document Server

    Wagenknecht, Susann

    2016-01-01

    This book investigates how collaborative scientific practice yields scientific knowledge. At a time when most of today’s scientific knowledge is created in research groups, the author reconsiders the social character of science to address the question of whether collaboratively created knowledge should be considered as collective achievement, and if so, in which sense. Combining philosophical analysis with qualitative empirical inquiry, this book provides a comparative case study of mono- and interdisciplinary research groups, offering insight into the day-to-day practice of scientists. The book includes field observations and interviews with scientists to present an empirically-grounded perspective on much-debated questions concerning research groups’ division of labor, relations of epistemic dependence and trust.

  7. NNSA Laboratory Directed Research and Development Program 2008 Symposium--Focus on Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Kotta, P R; Sketchley, J A

    2008-08-20

    The Laboratory Directed Research and Development (LDRD) Program was authorized by Congress in 1991 to fund leading-edge research and development central to the national laboratories core missions. LDRD anticipates and engages in projects on the forefront of science and engineering at the Department of Energy (DOE) national laboratories, and has a long history of addressing pressing national security needs at the National Nuclear Security Administration (NNSA) laboratories. LDRD has been a scientific success story, where projects continue to win national recognition for excellence through prestigious awards, papers published and cited in peer-reviewed journals, mainstream media coverage, and patents granted. The LDRD Program is also a powerful means to attract and retain top researchers from around the world, to foster collaborations with other prominent scientific and technological institutions, and to leverage some of the world's most technologically advanced assets. This enables the LDRD Program to invest in high-risk and potentially high-payoff research that creates innovative technical solutions for some of our nation's most difficult challenges. Worldwide energy demand is growing at an alarming rate, as developing nations continue to expand their industrial and economic base on the back of limited global resources. The resulting international conflicts and environmental consequences pose serious challenges not only to this nation, but to the international community as well. The NNSA and its national security laboratories have been increasingly called upon to devote their scientific and technological capabilities to help address issues that are not limited solely to the historic nuclear weapons core mission, but are more expansive and encompass a spectrum of national security missions, including energy security. This year's symposium highlights some of the exciting areas of research in alternative fuels and technology, nuclear power, carbon

  8. Security of supply on the electricity market. Report of a working group

    International Nuclear Information System (INIS)

    2000-06-01

    The shift from a regulated electricity market to open competitive electricity markets has been fast in Finland. Finland together with Sweden, Norway and partly also Denmark form a common market area where the internal trade in electricity has markedly increased. Partly as a result of this, the share of net import in our electricity consumption has increased. The low price level on the Nordic market has contributed to an increased import of electricity to Finland. The generally clearly increased production of hydroelectric power together with the functioning principles of the Nordic electricity exchange have lead to a situation where the competitive position of indigenous electricity, especially that from condensing power, has become more difficult. In Finland, several condensing power plants have, accordingly, been closed and the trend seems to continue. Similar development has taken place also in Sweden and Denmark. In the current market situation, the decisions upon investment in the construction of new power plants have further been postponed until later. Because the economic interest of the market players in maintaining slow reserve capacity has been reduced in the current market situation, there is concern whether the market is able to guarantee the security of electricity supply in all circumstances with varying demand taking also account of possible long-term malfunction of power plants or disturbances in the import of electricity or gas. Sweden and Norway are besides Finland net importers of electricity in normal hydrological years. Of the Nordic countries, only Denmark is able to balance the Nordic demand for electricity in case of a poor hydrological year. The price level on the electricity market is expected to remain low still for years. Building new capacity during the coming few years seems unlikely in all Nordic countries. The increased consumption of electricity as a result of economic growth and the reduction in capacity will however lead to a

  9. Revisiting the use of focus group in social research

    Directory of Open Access Journals (Sweden)

    Betina Freidin

    2016-06-01

    Full Text Available The methodological reflections on focus groups presented in this article draw from a research project on middle-class people living in Metropolitan Buenos Aires. The study addresses health discourses and practices in the contemporary scenario characterized by the diversification of specialists, the growing media coverage of recommendations of healthy living and wellbeing, the implementation of public policies on health promotion, and the expansion of the industry of related products and services.  The objective of the article is to reflect, based on our fieldwork experience, on two aspects that have received special attention in the recent methodological literature: the criteria to compose the groups and their consequences on the conversational dynamic, and the strategies to account for the group interaction in data analysis. Included in the latter, we explore the potential of GF research to observe health identity work. We frame our study and the decisions about design issues into the current debates on the variety of uses of the research group methodology.

  10. Globus Nexus: A Platform-as-a-Service Provider of Research Identity, Profile, and Group Management.

    Science.gov (United States)

    Chard, Kyle; Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian

    2016-03-01

    Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.

  11. Globus Nexus: A Platform-as-a-Service provider of research identity, profile, and group management

    Energy Technology Data Exchange (ETDEWEB)

    Chard, Kyle; Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian

    2016-03-01

    Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.

  12. Systematic review of control groups in nutrition education intervention research.

    Science.gov (United States)

    Byrd-Bredbenner, Carol; Wu, FanFan; Spaccarotella, Kim; Quick, Virginia; Martin-Biggers, Jennifer; Zhang, Yingting

    2017-07-11

    Well-designed research trials are critical for determining the efficacy and effectiveness of nutrition education interventions. To determine whether behavioral and/or cognition changes can be attributed to an intervention, the experimental design must include a control or comparison condition against which outcomes from the experimental group can be compared. Despite the impact different types of control groups can have on study outcomes, the treatment provided to participants in the control condition has received limited attention in the literature. A systematic review of control groups in nutrition education interventions was conducted to better understand how control conditions are described in peer-reviewed journal articles compared with experimental conditions. To be included in the systematic review, articles had to be indexed in CINAHL, PubMed, PsycINFO, WoS, and/or ERIC and report primary research findings of controlled nutrition education intervention trials conducted in the United States with free-living consumer populations and published in English between January 2005 and December 2015. Key elements extracted during data collection included treatment provided to the experimental and control groups (e.g., overall intervention content, tailoring methods, delivery mode, format, duration, setting, and session descriptions, and procedures for standardizing, fidelity of implementation, and blinding); rationale for control group type selected; sample size and attrition; and theoretical foundation. The search yielded 43 publications; about one-third of these had an inactive control condition, which is considered a weak study design. Nearly two-thirds of reviewed studies had an active control condition considered a stronger research design; however, many failed to report one or more key elements of the intervention, especially for the control condition. None of the experimental and control group treatments were sufficiently detailed to permit replication of the

  13. Brazilian pediatric research groups, lines of research, and main areas of activity

    Directory of Open Access Journals (Sweden)

    Priscila H.A. Oliveira

    2015-06-01

    Full Text Available OBJECTIVES: The Brazilian scientific production in the pediatrics field has been increasing significantly. It is important to identify the distribution and activity of these groups in the country and the main study areas, contributing with data for better resource allocation by institutions. METHODS: An active research was conducted in the National Council of Technological and Scientific Development (Conselho Nacional de Desenvolvimento Científico e Tecnológico [CNPq] website, using as filters the macro area of the research group (Health Sciences, the area (Medicine, and descriptors related to pediatrics. Research lines and main area of pediatric research groups were classified according to the subject predominantly studied by each group. The scientific production of the leader of the pediatric research group between 2011 and 2014 was also analyzed. RESULTS: Most pediatric research groups in Brazil have more than five years of activity and are concentrated in the Southeast and South regions of the country; São Paulo, Rio Grande do Sul, and Minas Gerais are the states with most groups. Of the 132 specific pediatric research groups analyzed, 14.4% have lines of research in multiple areas and 11.4% in child and adolescent health. Among the 585 lines of research of these groups, the most prevalent areas were: oncology, infectious diseases, epidemiology, and gastroenterology. CONCLUSIONS: The pediatric research groups in Brazil have relevant scientific production, including works published in international publications, and are concentrated in regions with higher socioeconomic index. Most groups registered in CNPq started their activity in the last five years (46%, reflecting the recent growth of scientific production in this area.

  14. Design and develop a video conferencing framework for real-time telemedicine applications using secure group-based communication architecture.

    Science.gov (United States)

    Mat Kiah, M L; Al-Bakri, S H; Zaidan, A A; Zaidan, B B; Hussain, Muzammil

    2014-10-01

    One of the applications of modern technology in telemedicine is video conferencing. An alternative to traveling to attend a conference or meeting, video conferencing is becoming increasingly popular among hospitals. By using this technology, doctors can help patients who are unable to physically visit hospitals. Video conferencing particularly benefits patients from rural areas, where good doctors are not always available. Telemedicine has proven to be a blessing to patients who have no access to the best treatment. A telemedicine system consists of customized hardware and software at two locations, namely, at the patient's and the doctor's end. In such cases, the video streams of the conferencing parties may contain highly sensitive information. Thus, real-time data security is one of the most important requirements when designing video conferencing systems. This study proposes a secure framework for video conferencing systems and a complete management solution for secure video conferencing groups. Java Media Framework Application Programming Interface classes are used to design and test the proposed secure framework. Real-time Transport Protocol over User Datagram Protocol is used to transmit the encrypted audio and video streams, and RSA and AES algorithms are used to provide the required security services. Results show that the encryption algorithm insignificantly increases the video conferencing computation time.

  15. Energy Innovation 1996. IVO Group's Research and Development Report

    International Nuclear Information System (INIS)

    Salminen, P.; Laiho, Y.; Kaikkonen, H.; Leisio, C.; Hinkkanen, S.

    1996-01-01

    This annual booklet of the IVO Group's research and development activities presents a number of articles, written by experts from IVO. The products described are examples of the environmentally-oriented selection made available by the IVO Group. In fact, the entire energy technology developed in Finland is environmentally oriented, if seen from the international perspective. The new business potential of environmental technology is great, and it is believed that in the year 2000, exportation of Finnish know-how in the field of energy-saving and efficiency will exceed the value of out energy imports

  16. UCLA Particle and Nuclear Physics Research Group, 1993 progress report

    International Nuclear Information System (INIS)

    Nefkens, B.M.K.; Clajus, M.; Price, J.W.; Tippens, W.B.; White, D.B.

    1993-09-01

    The research programs of the UCLA Particle and Nuclear Physics Research Group, the research objectives, results of experiments, the continuing activities and new initiatives are presented. The primary goal of the research is to test the symmetries and invariances of particle/nuclear physics with special emphasis on investigating charge symmetry, isospin invariance, charge conjugation, and CP. Another important part of our work is baryon spectroscopy, which is the determination of the properties (mass, width, decay modes, etc.) of particles and resonances. We also measure some basic properties of light nuclei, for example the hadronic radii of 3 H and 3 He. Special attention is given to the eta meson, its production using photons, electrons, π ± , and protons, and its rare and not-so-rare decays. In Section 1, the physics motivation of our research is outlined. Section 2 provides a summary of the research projects. The status of each program is given in Section 3. We discuss the various experimental techniques used, the results obtained, and we outline the plans for the continuing and the new research. Details are presented of new research that is made possible by the use of the Crystal Ball Detector, a highly segmented NaI calorimeter and spectrometer with nearly 4π acceptance (it was built and used at SLAC and is to be moved to BNL). The appendix contains an update of the bibliography, conference participation, and group memos; it also indicates our share in the organization of conferences, and gives a listing of the colloquia and seminars presented by us

  17. Use of the Web by a Distributed Research group Performing Distributed Computing

    Science.gov (United States)

    Burke, David A.; Peterkin, Robert E.

    2001-06-01

    A distributed research group that uses distributed computers faces a spectrum of challenges--some of which can be met by using various electronic means of communication. The particular challenge of our group involves three physically separated research entities. We have had to link two collaborating groups at AFRL and NRL together for software development, and the same AFRL group with a LANL group for software applications. We are developing and using a pair of general-purpose, portable, parallel, unsteady, plasma physics simulation codes. The first collaboration is centered around a formal weekly video teleconference on relatively inexpensive equipment that we have set up in convenient locations in our respective laboratories. The formal virtual meetings are augmented with informal virtual meetings as the need arises. Both collaborations share research data in a variety of forms on a secure URL that is set up behind the firewall at the AFRL. Of course, a computer-generated animation is a particularly efficient way of displaying results from time-dependent numerical simulations, so we generally like to post such animations (along with proper documentation) on our web page. In this presentation, we will discuss some of our accomplishments and disappointments.

  18. Research Activities of Geotechnical Research Group of NIIS from the Past to Present

    Science.gov (United States)

    Horii, N.; Toyosawa, Y.; Tamate, S.; Itoh, K.

    In this paper, firstly the memories of Prof. Tatsuoka's laboratory and research works carried out when the first author visited Prof. Tatsuoka's laboratory as a visiting researcher from May 1986 for about 1 year are described. Secondly, the research activities of Geotechnical Research Group of NIIS are introduced. Main emphasis is given on the research activities conducted using old geotechnical centrifuge (NIIS Mark-I centrifuge) and newly developed geotechnical centrifuge (NIIS Mark-II centrifuge).

  19. Collecting School Counseling Group Work Data: Initiating Consensual Qualitative Research through Practitioner-Researcher Partnerships

    Science.gov (United States)

    Springer, Sarah I.; Land, Christy W.; Moss, Lauren J.; Cinotti, Daniel

    2018-01-01

    Group counseling interventions can be complex to assess and research. Over the years, The "Journal for Specialists in Group Work" ("JSGW") has highlighted many of these challenges and offered valued approaches to designing projects that promote the efficacy and meaningfulness of group work in various settings. Similarly, school…

  20. Pastoral Group Counselling at a High Security Prison in Israel: Integrating Pierre Janet's Psychological Analysis with Fritz Perls' Gestalt Therapy.

    Science.gov (United States)

    Brown, Paul; Brown, Marta

    2015-03-01

    This is a report of a short-term, pastoral counselling group conducted with Jewish internees in a high security prison in Israel. It was held as an adjunct to daily secular individual and group counselling and rehabilitation run by the Department of Social Work. Pastoral counselling employed spiritual and psychosocial methodologies to reduce anger, improve prisoner frustration tolerance, and develop a sense of self-efficacy and communal identity. It combined semi-didactic scriptural input with Pierre Janet's personality model, Fritz Perls' gestalt therapy, and analysis of the group process. © The Author(s) 2015 Reprints and permissions:sagepub.co.uk/journalsPermissions.nav.

  1. Building Interdisciplinary Qualitative Research Networks: Reflections on Qualitative Research Group (QRG) at the University of Manitoba

    Science.gov (United States)

    Roger, Kerstin Stieber; Halas, Gayle

    2012-01-01

    As qualitative research methodologies continue to evolve and develop, both students and experienced researchers are showing greater interest in learning about and developing new approaches. To meet this need, faculty at the University of Manitoba created the Qualitative Research Group (QRG), a community of practice that utilizes experiential…

  2. Children's Oncology Group's 2013 blueprint for research: behavioral science.

    Science.gov (United States)

    Noll, Robert B; Patel, Sunita K; Embry, Leanne; Hardy, Kristina K; Pelletier, Wendy; Annett, Robert D; Patenaude, Andrea; Lown, E Anne; Sands, Stephen A; Barakat, Lamia P

    2013-06-01

    Behavioral science has long played a central role in pediatric oncology clinical service and research. Early work focused on symptom relief related to side effects of chemotherapy and pain management related to invasive medical procedures. As survival rates improved, the focused has shifted to examination of the psychosocial impact, during and after treatment, of pediatric cancer and its treatment on children and their families. The success of the clinical trials networks related to survivorship highlights an even more critical role in numerous domains of psychosocial research and care. Within the cooperative group setting, the field of behavioral science includes psychologists, social workers, physicians, nurses, and parent advisors. The research agenda of this group of experts needs to focus on utilization of psychometrically robust measures to evaluate the impact of treatment on children with cancer and their families during and after treatment ends. Over the next 5 years, the field of behavioral science will need to develop and implement initiatives to expand use of standardized neurocognitive and behavior batteries; increase assessment of neurocognition using technology; early identification of at-risk children/families; establish standards for evidence-based psychosocial care; and leverage linkages with the broader behavioral health pediatric oncology community to translate empirically supported research clinical trials care to practice. Copyright © 2012 Wiley Periodicals, Inc.

  3. Research on offense and defense technology for iOS kernel security mechanism

    Science.gov (United States)

    Chu, Sijun; Wu, Hao

    2018-04-01

    iOS is a strong and widely used mobile device system. It's annual profits make up about 90% of the total profits of all mobile phone brands. Though it is famous for its security, there have been many attacks on the iOS operating system, such as the Trident apt attack in 2016. So it is important to research the iOS security mechanism and understand its weaknesses and put forward targeted protection and security check framework. By studying these attacks and previous jailbreak tools, we can see that an attacker could only run a ROP code and gain kernel read and write permissions based on the ROP after exploiting kernel and user layer vulnerabilities. However, the iOS operating system is still protected by the code signing mechanism, the sandbox mechanism, and the not-writable mechanism of the system's disk area. This is far from the steady, long-lasting control that attackers expect. Before iOS 9, breaking these security mechanisms was usually done by modifying the kernel's important data structures and security mechanism code logic. However, after iOS 9, the kernel integrity protection mechanism was added to the 64-bit operating system and none of the previous methods were adapted to the new versions of iOS [1]. But this does not mean that attackers can not break through. Therefore, based on the analysis of the vulnerability of KPP security mechanism, this paper implements two possible breakthrough methods for kernel security mechanism for iOS9 and iOS10. Meanwhile, we propose a defense method based on kernel integrity detection and sensitive API call detection to defense breakthrough method mentioned above. And we make experiments to prove that this method can prevent and detect attack attempts or invaders effectively and timely.

  4. Nevada Natonal Security Site-Directed Research and Development FY 2010 Annual Report

    International Nuclear Information System (INIS)

    Bender, Howard

    2011-01-01

    This annual report of the Site-Directed Research and Development (SDRD) program represents the highly significant R and D accomplishments conducted during fiscal year 2010. This year was noteworthy historically, as the Nevada Test Site was renamed to the Nevada National Security Site (NNSS). This change not only recognizes how the site's mission has evolved, but also heralds a future of new challenges and opportunities for the NNSS. In many ways, since its inception in 2002, the SDRD program has helped shape that evolving mission. As we approach 2012, SDRD will also mark a milestone, having completed its first full decade of innovative R and D in support of the site and national security. The program continues to fund advanced science and technology development across traditional Department of Energy (DOE) nuclear security areas such as stockpile stewardship and non-proliferation while also supporting Department of Homeland Security (DHS) needs, and specialized work for government agencies like the Department of Defense (DoD) and others. The NNSS will also contribute technologies in the areas of treaty verification and monitoring, two areas of increasing importance to national security. Keyed to the NNSS's broadened scope, the SDRD program will continue to anticipate and advance R and D projects that will help the NNSS meet forthcoming challenges.

  5. Information security management: a proposal to improve the effectiveness of information security in the scientific research environment; Gestao da seguranca da informacao: uma proposta para potencializar a efetividade da seguranca da informacao em ambiente de pesquisa cientifica

    Energy Technology Data Exchange (ETDEWEB)

    Alexandria, Joao Carlos Soares de

    2009-07-01

    The increase of the connectivity in the business environment, combined with the growing dependency of information systems, has become the information security management an important governance tool. Information security has as main goal to protect the business transactions in order to work normally. In this way, It will be safeguarding the business continuity. The threats of information come from hackers' attacks, electronic frauds and spying, as well as fire, electrical energy interruption and humans fault. Information security is made by implementation of a set of controls, including of the others politics, processes, procedures, organizational structures, software and hardware, which require a continuous management and a well established structure to be able to face such challenges. This work tried to search the reasons why the organizations have difficulties to make a practice of information security management. Many of them just limit to adopt points measures, sometimes they are not consistent with their realities. The market counts on enough quantity of standards and regulations related to information security issues, for example, ISO/IEC 27002, American Sarbanes-Oxley act, Basel capital accord, regulations from regulatory agency (such as the Brazilians ones ANATEL, ANVISA and CVM). The market researches have showed that the information security implementation is concentrated on a well-defined group of organization mainly formed by large companies and from specifics sectors of economy, for example, financial and telecommunication. However, information security must be done by all organizations that use information systems to carry out their activities, independently of its size or economic area that it belongs. The situation of information security in the governmental sector of Brazil, and inside its research institutions, is considered worrying by the Brazilian Court of Accounts (TCU). This research work presents an assessment and diagnostic proposal

  6. Research activities of the nuclear graphite research group at the University of Manchester, UK

    International Nuclear Information System (INIS)

    Marsden, B.J.; Fok, A.S.L.; Marrow, J.; Mummery, P.

    2004-01-01

    In 2001 the Nuclear Safety Division (NSD) of the UK Health and Safety Executive (HSE) decided to underwrite the Nuclear Graphite Research Group (NGRG) at the University of Manchester, UK with the aim of providing a source of independent research and advice to the HSE (NSD). Since then the group has rapidly expanded to 16 members and attracted considerable funding from the nuclear power industry and the regulator for a wide range of research and consultancy work. It is now also part of the Material Performance Centre within the BNFL Universities Research Alliance. Extensive collaboration exists between the group and other nuclear research institutes, both in the UK and overseas. This paper briefly describes some of the research programmes being carried out by the NGRG at Manchester. (author)

  7. Relation Analysis of Knowledge Management, Research, and Innovation in University Research Groups

    Directory of Open Access Journals (Sweden)

    Heyder Paez-Logreira

    2016-12-01

    Full Text Available Knowledge is a competitive advantage for companies. Knowledge Management helps to keep this competitiveness. Universities face with challenges in research, innovation and international competitiveness. The purpose of this paper includes studying Knowledge Management Models, and Innovation Models apply to Research Groups of Universities, through an analysis of relation in inter-organizational level. Some researchers and leaders of research groups participated in a survey about knowledge management and innovation. Here we show the relationship between knowledge management, innovation and research, including processes and operations performed by universities around these. We organize the results in three dimensions: Knowledge Management perception, the relationship between Knowledge Management and Innovation, and Strategic Knowledge organization. Too, we identify a generality of good practices, challenges, and limitations on Research Groups for Knowledge Management.

  8. Creating and sustaining a military women's Health Research Interest Group.

    Science.gov (United States)

    Wilson, Candy; Trego, Lori; Rychnovsky, Jacqueline; Steele, Nancy; Foradori, Megan

    2015-01-01

    In 2008, four doctorate military nurse scientists representing the triservices (Army, Navy, and Air Force) identified a common interest in the health and care of all women in the armed forces. For 7 years, the team's shared vision to improve servicewomen's health inspired them to commit to a rigorous schedule of planning, developing, and implementing an innovative program that has the capability of advancing scientific knowledge and influencing health policy and practice through research. The ultimate goal of the Military Women's Health Research Interest Group (MWHRIG) is to support military clinicians and leaders in making evidence-based practice and policy decisions. They developed a 4-pronged approach to cultivate the science of military women's healthcare: evaluate the existing evidence, develop a research agenda that addresses gaps in knowledge, facilitate the collaboration of multidisciplinary research, and build the bench of future researchers. The MWHRIG has been a resource to key leaders; its value has been validated by multiservice and multidisciplinary consultations. However, the journey to goal attainment has only been achieved by the enduring commitment of these MWHRIG leaders and their passion to ensure the health and wellbeing of the many women who serve in the United States military. This article describes their journey of dedication.

  9. Provably-Secure Authenticated Group Diffie-Hellman KeyExchange

    Energy Technology Data Exchange (ETDEWEB)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2007-01-01

    Authenticated key exchange protocols allow two participantsA and B, communicating over a public network and each holding anauthentication means, to exchange a shared secret value. Methods designedto deal with this cryptographic problem ensure A (resp. B) that no otherparticipants aside from B (resp. A) can learn any information about theagreed value, and often also ensure A and B that their respective partnerhas actually computed this value. A natural extension to thiscryptographic method is to consider a pool of participants exchanging ashared secret value and to provide a formal treatment for it. Startingfrom the famous 2-party Diffie-Hellman (DH) key exchange protocol, andfrom its authenticated variants, security experts have extended it to themulti-party setting for over a decade and completed a formal analysis inthe framework of modern cryptography in the past few years. The presentpaper synthesizes this body of work on the provably-secure authenticatedgroup DH key exchange.

  10. Cryptographic Research and NSA: Report of the Public Cryptography Study Group.

    Science.gov (United States)

    Davida, George I.

    1981-01-01

    The Public Cryptography Study Group accepted the claim made by the National Security Agency that some information in some publications concerning cryptology could be inimical to national security, and is allowing the establishment of a voluntary mechanism, on an experimental basis, for NSA to review cryptology manuscripts. (MLW)

  11. Energy Innovation 1998. IVO group`s research and development report

    Energy Technology Data Exchange (ETDEWEB)

    Salminen, P; Laiho, Y; Kaikkonen, H; Leisio, C; McConchie, R; Fletcher, R [eds.

    1998-07-01

    The IVO Group is a Finnish company mastering all aspects of the entire energy chain, and also operating extensively on the international market. The Group`s operations concentrate on five business areas: energy, engineering, operation and maintenance, grid services, and energy measurement. The personnel numbers well over 8 800, and the turnover is about FIM 14 billion. The services to customers include the supply of electricity and heat, the planning, construction, operation and maintenance of power plants and transmission systems, the transmission of power, and other services requiring expertise in all the key fields of energy engineering. Mastery of the entire energy chain gives us a substantial competitive edge on international markets, where the IVO Group has been a player for decades. The operations have expanded to the other Nordic countries, which now constitute the home market. Focal areas also include Great Britain, Central and Eastern Europe and Southeast Asia. The IVO Group annually invests some FIM 250 million in research and development. A large proportion of this money is used for the development of environmentally benign solutions

  12. Making the world more secure, one research reactor at a time

    International Nuclear Information System (INIS)

    Mutluer, Adem; Rickwood, Peter

    2015-01-01

    During the night of 29 September 2014, a heavy transport plane took off from an air base in Kazakhstan after an operation to remove fuel and increase the security of a research reactor. In its cargo bay sat four massive containers, provided by the IAEA, that had been filled with a total of 10.2 kilograms of highly enriched uranium (HEU), on its way to be diluted to a safe substance or securely stored at the flight’s destination in Russia. The operation represented the latest achievement in a global programme involving the IAEA, the Russian Federation and the United States to assist several countries, including Kazakhstan, in eliminating the risks associated with HEU, while still maintaining the important scientific research conducted at the reactor. HEU is a security risk, as it is an ingredient that can be used to create a nuclear device intended for malicious use. It is not encouraged to use HEU in a research reactor as safer low enriched uranium (LEU) can be used instead (see box). In the 1960s and 1970s, when many of the world’s research reactors were built, technology using LEU was not yet available, so in order to perform experiments HEU fuel was required. As of next year, less proliferation sensitive LEU will be used to fuel the light water research reactor in Alatau near Almaty, the largest city in Kazakhstan.

  13. Making the world more secure, one research reactor at a time

    International Nuclear Information System (INIS)

    Mutluer, Adem; Rickwood, Peter

    2015-01-01

    During the night of 29 September 2014, a heavy transport plane took off from an air base in Kazakhstan after an operation to remove fuel and increase the security of a research reactor. In its cargo bay sat four massive containers, provided by the IAEA, that had been filled with a total of 10.2 kilograms of highly enriched uranium (HEU), on its way to be diluted to a safe substance or securely stored at the flight’s destination in Russia. The operation represented the latest achievement in a global programme involving the IAEA, the Russian Federation and the United States to assist several countries, including Kazakhstan, in eliminating the risks associated with HEU, while still maintaining the important scientific research conducted at the reactor. HEU is a security risk, as it is an ingredient that can be used to create a nuclear device intended for malicious use. It is not encouraged to use HEU in a research reactor as safer low enriched uranium (LEU) can be used instead (see box). In the 1960s and 1970s, when many of the world’s research reactors were built, technology using LEU was not yet available, so in order to perform experiments HEU fuel was required. As of next year, less proliferation sensitive LEU will be used to fuel the light water research reactor in Alatau near Almaty, the largest city in Kazakhstan. .

  14. Environmental Assessment: Conversion of the 820th Security Forces Group at Moody AFB, Georgia to a Contingency Response Group

    Science.gov (United States)

    2003-08-01

    Contingency Response Group (CRG) at Moody Air Force Base (AFB), GA . DESCRIPTION OF THE PROPOSED ACTION AND ALTERNATIVES. The United States Air Force...sinkhole formation. 3.5.3.3 Soils Moody AFB Moody AFB is located in the Tifton Upland District of the Lower Coastal Plain. In general, soils on...base. Arsenic, barium, chromium, copper, iron, selenium, and zinc have been found to be naturally occurring in the area. Predominant soils are Tifton

  15. Promoting Agricultural Research and Development to Strengthen Food Security in South Asia

    Directory of Open Access Journals (Sweden)

    Ghose Bishwajit

    2014-01-01

    Full Text Available This study aims to highlight the status of agricultural R&D in South Asia and contends that creating an effective agricultural research and innovation systems is a vital element to ensure food security in this region. South Asia is home to around one-fourth of mankind and houses the largest proportion of undernourished people in the world. Despite a period of marked economic growth averaging 6% a year over the past two decades, it remains the world's second poorest region contributing a mere 2.2% in global annual GDP. Agriculture is the mainstay of South Asian economy employing around 60% of the total workforce and generating around 20% of total GDP. South Asia has the recognition of being the second most food-insecure region next only to sub-Saharan Africa. Though there is growing evidence that technological innovation has a key role to play in increasing agricultural production and strengthening food security, agricultural research and development (R&D sector has failed to garner sufficient attention till now. This study also depicts the current situation of food security in South Asia and illustrates how agricultural education and innovation hold the master key to solve the food security issues for the world's most densely populated region.

  16. Clinical gait analysis : A review of research at the Interdepartmental Research group of Kinesiology in Leiden

    NARCIS (Netherlands)

    Daanen, H. A M

    1990-01-01

    In this article the methodology used in the Interdepartmental Research Group of Kinesiology to quantify (clinical) human gait is elaborated upon. Four methods are described: analysis of temporal parameters, goniometry, accelerometry and electromyography. A correct representation of electromyographic

  17. A standard for test reliability in group research.

    Science.gov (United States)

    Ellis, Jules L

    2013-03-01

    Many authors adhere to the rule that test reliabilities should be at least .70 or .80 in group research. This article introduces a new standard according to which reliabilities can be evaluated. This standard is based on the costs or time of the experiment and of administering the test. For example, if test administration costs are 7 % of the total experimental costs, the efficient value of the reliability is .93. If the actual reliability of a test is equal to this efficient reliability, the test size maximizes the statistical power of the experiment, given the costs. As a standard in experimental research, it is proposed that the reliability of the dependent variable be close to the efficient reliability. Adhering to this standard will enhance the statistical power and reduce the costs of experiments.

  18. Managing security and privacy concerns over data storage in healthcare research.

    Science.gov (United States)

    Mackenzie, Isla S; Mantay, Brian J; McDonnell, Patrick G; Wei, Li; MacDonald, Thomas M

    2011-08-01

    Issues surrounding data security and privacy are of great importance when handling sensitive health-related data for research. The emphasis in the past has been on balancing the risks to individuals with the benefit to society of the use of databases for research. However, a new way of looking at such issues is that by optimising procedures and policies regarding security and privacy of data to the extent that there is no appreciable risk to the privacy of individuals, we can create a 'win-win' situation in which everyone benefits, and pharmacoepidemiological research can flourish with public support. We discuss holistic measures, involving both information technology and people, taken to improve the security and privacy of data storage. After an internal review, we commissioned an external audit by an independent consultant with a view to optimising our data storage and handling procedures. Improvements to our policies and procedures were implemented as a result of the audit. By optimising our storage of data, we hope to inspire public confidence and hence cooperation with the use of health care data in research. Copyright © 2011 John Wiley & Sons, Ltd.

  19. Brazilian pediatric research groups, lines of research, and main areas of activity

    Directory of Open Access Journals (Sweden)

    Priscila H.A. Oliveira

    2015-05-01

    Conclusions: The pediatric research groups in Brazil have relevant scientific production, including works published in international publications, and are concentrated in regions with higher socioeconomic index. Most groups registered in CNPq started their activity in the last five years (46%, reflecting the recent growth of scientific production in this area.

  20. Fostering Undergraduate Research Experiences in Management Information Systems through the "Research Group" Framework

    Science.gov (United States)

    Bartkus, Ken; Mills, Robert; Olsen, David

    2010-01-01

    The purpose of this paper is to propose an innovative approach to engaged learning. Founded on the principles of a scholarly think-tank and administered along the lines of a consulting organization, the proposed "Research Group" framework is designed to facilitate effective and efficient undergraduate research experiences in Management…

  1. Management of the Interface between Nuclear Safety and Security for Research Reactors

    International Nuclear Information System (INIS)

    2016-08-01

    The aim of this publication is to provide technical guidelines and practical information to assist Member States, operating organizations and regulatory bodies, on the basis of international good practices, and to manage the interface between nuclear safety and security at research reactor facilities in an integrated and coordinated manner. The publication was developed based on input from IAEA technical and consultants' meetings held between 2013 and 2015

  2. Group-effort Applied Research: Expanding Opportunities for Undergraduate Research through Original, Class-Based Research Projects

    Science.gov (United States)

    Moore, Sean D.; Teter, Ken

    2014-01-01

    Undergraduate research clearly enriches the educational development of participating students, but these experiences are limited by the inherent inefficiency of the standard one student-one mentor model for undergraduate research. Group-effort applied research (GEAR) was developed as a strategy to provide substantial numbers of undergraduates with…

  3. International Piping Integrity Research Group (IPIRG) Program. Final report

    International Nuclear Information System (INIS)

    Wilkowski, G.; Schmidt, R.; Scott, P.

    1997-06-01

    This is the final report of the International Piping Integrity Research Group (IPIRG) Program. The IPIRG Program was an international group program managed by the U.S. Nuclear Regulatory Commission and funded by a consortium of organizations from nine nations: Canada, France, Italy, Japan, Sweden, Switzerland, Taiwan, the United Kingdom, and the United States. The program objective was to develop data needed to verify engineering methods for assessing the integrity of circumferentially-cracked nuclear power plant piping. The primary focus was an experimental task that investigated the behavior of circumferentially flawed piping systems subjected to high-rate loadings typical of seismic events. To accomplish these objectives a pipe system fabricated as an expansion loop with over 30 meters of 16-inch diameter pipe and five long radius elbows was constructed. Five dynamic, cyclic, flawed piping experiments were conducted using this facility. This report: (1) provides background information on leak-before-break and flaw evaluation procedures for piping, (2) summarizes technical results of the program, (3) gives a relatively detailed assessment of the results from the pipe fracture experiments and complementary analyses, and (4) summarizes advances in the state-of-the-art of pipe fracture technology resulting from the IPIRG program

  4. Phase 2 of the International Piping Integrity Research Group programme

    International Nuclear Information System (INIS)

    Darlaston, B.J.

    1994-01-01

    The results of phase 1 of the International Piping Integrity Research Group (IPIRG-1) programme have been widely reported. The significance of the results is reviewed briefly, in order to put the phase 2 programme into perspective. The success of phase 1 led the participants to consider further development and validation of pipe and pipe component fracture analysis technology as part of another international group programme (IPIRG-2). The benefits of combined funding and of the technical exchanges and interactions are considered to be of significant advantage and value. The phase 2 programme has been designed with the overall objective of developing and experimentally validating methods of predicting the fracture behaviour of nuclear reactor safety-related piping, to both normal operating and accident loads. The programme will add to the engineering estimation analysis methods that have been developed for straight pipes. The pipe system tests will expand the database to include seismic loadings and flaws in fittings, such as bends, elbows and tees, as well as ''short'' cracks. The results will be used to validate further the analytical methods, expand the capability to make fittings and extend the quasi-static results for the USNRC's new programme on short cracks in piping and piping welds. The IPIRG-2 programme is described to provide a clear understanding of the content, strategy, potential benefits and likely significance of the work. ((orig.))

  5. International piping integrity research group (IPIRG) program final report

    International Nuclear Information System (INIS)

    Schmidt, R.; Wilkowski, G.; Scott, P.; Olsen, R.; Marschall, C.; Vieth, P.; Paul, D.

    1992-04-01

    This is the final report of the International Piping Integrity Research Group (IPIRG) Programme. The IPIRG Programme was an international group programme managed by the U.S. Nuclear Regulatory Commission and funded by a consortium of organizations from nine nations: Canada, France, Italy, Japan, Sweden, Switzerland, Taiwan, the United Kingdom, and the United states. The objective of the programme was to develop data needed to verify engineering methods for assessing the integrity of nuclear power plant piping that contains circumferential defects. The primary focus was an experimental task that investigated the behaviour of circumferentially flawed piping and piping systems to high-rate loading typical of seismic events. To accomplish these objectives a unique pipe loop test facility was designed and constructed. The pipe system was an expansion loop with over 30 m of 406-mm diameter pipe and five long radius elbows. Five experiments on flawed piping were conducted to failure in this facility with dynamic excitation. The report: provides background information on leak-before-break and flaw evaluation procedures in piping; summarizes the technical results of the programme; gives a relatively detailed assessment of the results from the various pipe fracture experiments and complementary analyses; and, summarizes the advances in the state-of-the-art of pipe fracture technology resulting from the IPIRG Program

  6. International Piping Integrity Research Group (IPIRG) Program. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Wilkowski, G.; Schmidt, R.; Scott, P. [and others

    1997-06-01

    This is the final report of the International Piping Integrity Research Group (IPIRG) Program. The IPIRG Program was an international group program managed by the U.S. Nuclear Regulatory Commission and funded by a consortium of organizations from nine nations: Canada, France, Italy, Japan, Sweden, Switzerland, Taiwan, the United Kingdom, and the United States. The program objective was to develop data needed to verify engineering methods for assessing the integrity of circumferentially-cracked nuclear power plant piping. The primary focus was an experimental task that investigated the behavior of circumferentially flawed piping systems subjected to high-rate loadings typical of seismic events. To accomplish these objectives a pipe system fabricated as an expansion loop with over 30 meters of 16-inch diameter pipe and five long radius elbows was constructed. Five dynamic, cyclic, flawed piping experiments were conducted using this facility. This report: (1) provides background information on leak-before-break and flaw evaluation procedures for piping, (2) summarizes technical results of the program, (3) gives a relatively detailed assessment of the results from the pipe fracture experiments and complementary analyses, and (4) summarizes advances in the state-of-the-art of pipe fracture technology resulting from the IPIRG program.

  7. Family conflict, emotional security, and child development: translating research findings into a prevention program for community families.

    Science.gov (United States)

    Cummings, E Mark; Schatz, Julie N

    2012-03-01

    The social problem posed by family conflict to the physical and psychological health and well-being of children, parents, and underlying family relationships is a cause for concern. Inter-parental and parent-child conflict are linked with children's behavioral, emotional, social, academic, and health problems, with children's risk particularly elevated in distressed marriages. Supported by the promise of brief psycho-educational programs (e.g., Halford et al. in Journal of Family Psychology 22:497-505, 2008; Sanders in Journal of Family Psychology 22:506-517, 2008), the present paper presents the development and evaluation of a prevention program for community families with children, concerned with family-wide conflict and relationships, and building on Emotional Security Theory (Davies and Cummings in Psychological Bulletin 116:387-411, 1994). This program uniquely focuses on translating research and theory in this area into brief, engaging programs for community families to improve conflict and emotional security for the sake of the children. Evaluation is based on multi-domain and multi-method assessments of family-wide and child outcomes in the context of a randomized control design. A series of studies are briefly described in the programmatic development of a prevention program for conflict and emotional security for community families, culminating in a program for family-wide conflict and emotional security for families with adolescents. With regard to this ongoing program, evidence is presented at the post-test for improvements in family-wide functioning, consideration of the relative benefits for different groups within the community, and preliminary support for the theoretical bases for program outcomes.

  8. Cohort Profile: The Applied Research Group for Kids (TARGet Kids!).

    Science.gov (United States)

    Carsley, Sarah; Borkhoff, Cornelia M; Maguire, Jonathon L; Birken, Catherine S; Khovratovich, Marina; McCrindle, Brian; Macarthur, Colin; Parkin, Patricia C

    2015-06-01

    The Applied Research Group for Kids (TARGet Kids!) is an ongoing open longitudinal cohort study enrolling healthy children (from birth to 5 years of age) and following them into adolescence. The aim of the TARGet Kids! cohort is to link early life exposures to health problems including obesity, micronutrient deficiencies and developmental problems. The overarching goal is to improve the health of Canadians by optimizing growth and developmental trajectories through preventive interventions in early childhood. TARGet Kids!, the only child health research network embedded in primary care practices in Canada, leverages the unique relationship between children and families and their trusted primary care practitioners, with whom they have at least seven health supervision visits in the first 5 years of life. Children are enrolled during regularly scheduled well-child visits. To date, we have enrolled 5062 children. In addition to demographic information, we collect physical measurements (e.g. height, weight), lifestyle factors (nutrition, screen time and physical activity), child behaviour and developmental screening and a blood sample (providing measures of cardiometabolic, iron and vitamin D status, and trace metals). All data are collected at each well-child visit: twice a year until age 2 and every year until age 10. Information can be found at: http://www.targetkids.ca/contact-us/. © The Author 2014; all rights reserved. Published by Oxford University Press on behalf of the International Epidemiological Association.

  9. Research on fully distributed optical fiber sensing security system localization algorithm

    Science.gov (United States)

    Wu, Xu; Hou, Jiacheng; Liu, Kun; Liu, Tiegen

    2013-12-01

    A new fully distributed optical fiber sensing and location technology based on the Mach-Zehnder interferometers is studied. In this security system, a new climbing point locating algorithm based on short-time average zero-crossing rate is presented. By calculating the zero-crossing rates of the multiple grouped data separately, it not only utilizes the advantages of the frequency analysis method to determine the most effective data group more accurately, but also meets the requirement of the real-time monitoring system. Supplemented with short-term energy calculation group signal, the most effective data group can be quickly picked out. Finally, the accurate location of the climbing point can be effectively achieved through the cross-correlation localization algorithm. The experimental results show that the proposed algorithm can realize the accurate location of the climbing point and meanwhile the outside interference noise of the non-climbing behavior can be effectively filtered out.

  10. The Y-12 National Security Complex Foreign Research Reactor Uranium Supply Production

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, T. [Nuclear Technology and Nonproliferation Programs, B and W Y-12, L.L.C., Y-12 National Security Complex, Oak Ridge, Tennessee (United States); Keller, A.P. [Disposition and Supply Programs, B and W Y-12, L.L.C., Y-12 National Security Complex, Oak Ridge, Tennessee (United States)

    2011-07-01

    The Foreign Research Reactor (FRR) Uranium Supply Program at the Y-12 National Security Complex supports the nonproliferation objectives of the National Nuclear Security Administration (NNSA) HEU Disposition, the Reduced Enrichment Research and Test Reactors (RERTR), and the United States (U.S.) FRR Spent Nuclear Fuel (SNF) Acceptance Programs. The FRR Supply Program supports the important U.S. government nuclear nonproliferation commitment to serve as a reliable and cost-effective uranium supplier for those foreign research reactors that are converting or have converted to Low-Enriched Uranium (LEU) fuel under the RERTR Program. The NNSA Y-12 Site Office maintains the prime contracts with foreign government agencies for the supply of LEU for their research reactors. The LEU is produced by down blending Highly Enriched Uranium (HEU) that has been declared surplus to the U.S. national defense needs. The down blending and sale of the LEU supports the Surplus HEU Disposition Program Record of Decision to make the HEU non-weapons usable and to recover the economic value of the uranium to the extent feasible. In addition to uranium metal feedstock for fuel fabrication, Y-12 can produce LEU in different forms to support new fuel development or target fabrication for medical isotope production. With production improvements and efficient delivery preparations, Y-12 continues to successfully support the global research reactor community. (author)

  11. Safeguards and security research and development progress report, October 1993--September 1994

    Energy Technology Data Exchange (ETDEWEB)

    Smith, D.B.; Jaramillo, G.R. [comp.

    1995-08-01

    This report describes the activities carried out by the Los Alamos Safeguards and Security Research and Development (R&D) program from October 1993 through September 1994. The activities presented in the first part of the report were directed primarily to domestic US safeguards applications and were, for the most part, sponsored by the Department of Energy`s Office of Safeguards and Security (DOE/OSS, NN-50). The activities described in Part 2, International Safeguards, were supported by the International Safeguards Division of the Office of Arms Control and Nonproliferation (DOE/OACN, NN-40). Part 3 describes several safeguards or safeguards-related activities that have other sponsors. The final part of the report lists titles and abstracts of Los Alamos safeguards R&D reports, technical journal articles, and conference papers that were published or presented in 1994.

  12. Safeguards and Security Research and Development progress report, October 1990--September 1991

    International Nuclear Information System (INIS)

    Smith, D.B.; Jaramillo, G.R.

    1992-07-01

    This report describes the activities carried out by the Los Alamos Safeguards and Security Research And Development (R ampersand D) program from October 1990 through September 1991. The activities presented in the first three parts--Science and Technology Base Development, Basic Systems Design, and Onsite Test and Evaluation and Facility Support--were, for the most part, sponsored by the Department of Energy's Office of Safeguards and Security (DOE/OSS). The activities described in Part 4--International Safeguards--were supported by the International Safeguards Division of the Office of Arms Control and Nonproliferation (OACN/IS). Part 5 describes several safeguards or safeguards-related activities that have sponsors other than the DOE/OSS or OACN/IS. The final part of the report lists titles and abstracts of Los Alamos safeguards R ampersand D reports, technical journal articles, and conference papers that were published in 1991

  13. Enhancing the Safety, Security and Resilience of ICT and Scada Systems Using Action Research

    Science.gov (United States)

    Johnsen, Stig; Skramstad, Torbjorn; Hagen, Janne

    This paper discusses the results of a questionnaire-based survey used to assess the safety, security and resilience of information and communications technology (ICT) and supervisory control and data acquisition (SCADA) systems used in the Norwegian oil and gas industry. The survey identifies several challenges, including the involvement of professionals with different backgrounds and expertise, lack of common risk perceptions, inadequate testing and integration of ICT and SCADA systems, poor information sharing related to undesirable incidents and lack of resilience in the design of technical systems. Action research is proposed as a process for addressing these challenges in a systematic manner and helping enhance the safety, security and resilience of ICT and SCADA systems used in oil and gas operations.

  14. Research on image reconstruction of DR/SSCT security inspection system

    International Nuclear Information System (INIS)

    Li Jian; Cong Peng

    2008-01-01

    On the basis of DR (Digital Radiography)/CT security inspection system, DR/SSCT (single slice spiral CT) security inspection system was developed. This spiral CT system can improve the CT system's drawbacks. The research work includes in replacing the former data acquisition system by a new system which can acquire projection data of multi-slices and devising the SSCT reconstruction algorithms. Simulation experiments and practical experiments were devised to contrast several algorithms. Interpolation technique was operated in detectors data in order to improve the algorithms. In conclusion, the system exploits an algorithm of weighted average of 360 degree LI (Linear Interpolation) and JH-HI (Jiang Hsieh-Half scan Interpolation). (authors)

  15. Safeguards and security research and development progress report, October 1993--September 1994

    International Nuclear Information System (INIS)

    Smith, D.B.; Jaramillo, G.R.

    1995-08-01

    This report describes the activities carried out by the Los Alamos Safeguards and Security Research and Development (R ampersand D) program from October 1993 through September 1994. The activities presented in the first part of the report were directed primarily to domestic US safeguards applications and were, for the most part, sponsored by the Department of Energy's Office of Safeguards and Security (DOE/OSS, NN-50). The activities described in Part 2, International Safeguards, were supported by the International Safeguards Division of the Office of Arms Control and Nonproliferation (DOE/OACN, NN-40). Part 3 describes several safeguards or safeguards-related activities that have other sponsors. The final part of the report lists titles and abstracts of Los Alamos safeguards R ampersand D reports, technical journal articles, and conference papers that were published or presented in 1994

  16. Final report of the group research. Advanced Technology for Medical Imaging Research. 1996-2000 FY

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-03-01

    This report involves the organization of the research groups (4 units of radiopharmaceutical chemistry, radiotracer and radiopharmacology, clinical imaging, and molecular informative research), 5 research reports and 38 published research papers. The research reports concern Fundamental researches on the availability and production of PET radiopharmaceuticals using the National Institute of Radiological Sciences (NIRS) cyclotron, Design and evaluation of in vivo radiopharmaceuticals for PET measurement (kinetics and metabolism in small animals and primates), Fundamental studies on development of technique radiation measurement, Clinical application of medical imaging technology in the fields of neuroscience, cardiovascular, cancer diagnosis and others, and A study to establish and evaluate a lung cancer screening system using spiral CT units which is in pilot-progress in Kanto and Kansai regions. (N.I.)

  17. The protocols for the 10/66 dementia research group population-based research programme

    OpenAIRE

    Salas Aquiles; Rodriguez Juan; McKeigue Paul; Jacob KS; Krishnamoorthy ES; Huang Yueqin; Guerra Mariella; Gavrilova Svetlana I; Dewey Michael; Arizaga Raul; Albanese Emiliano; Acosta Daisy; Ferri Cleusa P; Prince Martin; Sosa Ana

    2007-01-01

    Abstract Background Latin America, China and India are experiencing unprecedentedly rapid demographic ageing with an increasing number of people with dementia. The 10/66 Dementia Research Group's title refers to the 66% of people with dementia that live in developing countries and the less than one tenth of population-based research carried out in those settings. This paper describes the protocols for the 10/66 population-based and intervention studies that aim to redress this imbalance. Meth...

  18. Nevada National Security Site: Site-Directed Research and Development (SDRD) Fiscal Year 2015 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Bender, Howard A. [National Security Technologies, LLC. (NSTec), Mercury, NV (United States). Site-Directed Research and Development Program

    2016-04-01

    This report presents results of multiple research projects, new and ongoing, funded under the Site-Directed Research and Development Program for the Nevada National Security Site during federal fiscal year 2015. The Site's legacy capabilities in remote sensing combined with new paradigms for emergency response and consequence management help drive the need to develop advanced aerial sensor platforms. Likewise, dynamic materials science is a critical area of scientific research for which basic physics issues are still unresolved. New methods of characterizing materials in extreme states are vitally needed, and these efforts are paving the way with new knowledge. Projects selected in FY 2015 for the Exploratory Research portfolio exhibit a strong balance of NNSS mission relevance. Geoscience, seismology, and techniques for detecting underground nuclear events are still essential focus areas. Many of the project reports in the second major section of this annual report are ongoing continuations in multi-year lifecycles. Diagnostic techniques for stockpile and nuclear security science figured prominently as well, with a few key efforts coming to fruition, such as phase transition detection. In other areas, modeling efforts toward better understanding plasma focus physics has also started to pay dividends for major program needs.

  19. Nuclear decay data files of the Dosimetry Research Group

    International Nuclear Information System (INIS)

    Eckerman, K.F.; Westfall, R.J.; Ryman, J.C.; Cristy, M.

    1993-12-01

    This report documents the nuclear decay data files used by the Dosimetry Research Group at Oak Ridge National Laboratory and the utility DEXRAX which provides access to the files. The files are accessed, by nuclide, to extract information on the intensities and energies of the radiations associated with spontaneous nuclear transformation of the radionuclides. In addition, beta spectral data are available for all beta-emitting nuclides. Two collections of nuclear decay data are discussed. The larger collection contains data for 838 radionuclides, which includes the 825 radionuclides assembled during the preparation of Publications 30 and 38 of the International Commission on Radiological Protection (ICRP) and 13 additional nuclides evaluated in preparing a monograph for the Medical Internal Radiation Dose (MIRD) Committee of the Society of Nuclear Medicine. The second collection is composed of data from the MIRD monograph and contains information for 242 radionuclides. Abridged tabulations of these data have been published by the ICRP in Publication 38 and by the Society of Nuclear Medicine in a monograph entitled ''MIRD: Radionuclide Data and Decay Schemes.'' The beta spectral data reported here have not been published by either organization. Electronic copies of the files and the utility, along with this report, are available from the Radiation Shielding Information Center at Oak Ridge National Laboratory

  20. Children's Oncology Group's 2013 blueprint for research: acute myeloid leukemia.

    Science.gov (United States)

    Gamis, Alan S; Alonzo, Todd A; Perentesis, John P; Meshinchi, Soheil

    2013-06-01

    For the 365 children diagnosed with acute myeloid leukemia in the US annually, 5-year survival for patients on COG trials with low, intermediate, and high risk disease is 83%, 62%, and 23%, respectively. Recent advances include improved therapeutic stratification, improved survival with dose intensification, and further elucidation of the heterogeneity specific to childhood AML. These discoveries now guide current strategy incorporating targeted agents to pathways specific to childhood AML as well as evaluating methods to increase the sensitivity of the leukemic stem cell, first in Phase II feasibility trials followed by Phase III efficacy trials of the most promising agents. Acute myeloid leukemia in children, though with similar subgroups to adults, remains uniquely different based upon quite different prevalence of subtypes as well as overall response to therapy. The Children's Oncology Group's research agenda builds upon earlier efforts to better elucidate the leukemogenic steps distinct to childhood AML in order to more scientifically develop and test novel therapeutic approaches to the treatment and ultimate cure for children with this disorder. Pediatr Blood Cancer 2013; 60: 964-971. © 2012 Wiley Periodicals, Inc. Copyright © 2012 Wiley Periodicals, Inc.

  1. Group-Effort Applied Research (GEAR): Expanding Opportunities for Undergraduate Research Through Original, Class-Based Research Projects

    Science.gov (United States)

    Moore, Sean D.; Teter, Ken

    2014-01-01

    Undergraduate research clearly enriches the educational development of participating students, but these experiences are limited by the inherent inefficiency of the standard one student - one mentor model for undergraduate research. Group-Effort Applied Research (GEAR) was developed as a strategy to provide substantial numbers of undergraduates with meaningful research experiences. The GEAR curriculum delivers concept-driven lecture material and provides hands-on training in the context of an active research project from the instructor's lab. Because GEAR is structured as a class, participating students benefit from intensive, supervised research training that involves a built-in network of peer support and abundant contact with faculty mentors. The class format also ensures a relatively standardized and consistent research experience. Furthermore, meaningful progress toward a research objective can be achieved more readily with GEAR than with the traditional one student - one mentor model of undergraduate research because sporadic mistakes by individuals in the class are overshadowed by the successes of the group as a whole. Three separate GEAR classes involving three distinct research projects have been offered to date. In this paper, we provide an overview of the GEAR format and review some of the recurring themes for GEAR instruction. We propose GEAR can serve as a template to expand student opportunities for life science research without sacrificing the quality of the mentored research experience. PMID:24898007

  2. Nevada National Security Site. Site-Directed Research and Development FY 2011 Annual Report

    International Nuclear Information System (INIS)

    Bender, Howard

    2012-01-01

    This fiscal year 2011 annual report of the Site-Directed Research and Development program, the 10th anniversary edition, recognizes a full decade of innovative R and D accomplishments in support of the Nevada National Security Site (NNSS). Last year the NNSS itself was renamed to reflect a diversifying mission, and our R and D program has contributed significantly to shape emerging missions that will continue to evolve. New initiatives in stockpile stewardship science, nonproliferation, and treaty verification and monitoring have had substantial successes in FY 2011, and many more accomplishments are expected. SDRD is the cornerstone on which many of these initiatives rest. Historically supporting our main focus areas, SDRD is also building a solid foundation for new, and non-traditional, emerging national security missions. The program continues its charter to advance science and technology for a broad base of agencies including the U.S. Department of Energy (DOE), U.S. Department of Defense (DoD), U.S. Department of Homeland Security (DHS), and many others.

  3. The Praxis of Social Enterprise and Human Security: An Applied Research Agenda

    Directory of Open Access Journals (Sweden)

    Malcolm David Brown

    2014-01-01

    Full Text Available The growth of social enterprise within development NGO work might lead one to suspect it has been irredeemably corrupted by neo-liberal capitalism. However, using the tools of capitalism is not the same as subscribing to the values of capitalism. This paper is situated at the intersection of five fields: human security, international development, social enterprise, social franchising, and left-wing anti-capitalist thought. It examines the relevance of social en­terprise to human security and to development, the relationship between social enterprise and the anti-capitalist values of the left, and it then focuses on social franchising—a subset of social enterprise that highlights the importance of cooperation—suggesting that it may be a useful methodology for NGOs carrying out educational work in parts of the developing world. It syn­thesises and extends ideas that I have presented elsewhere [1-3], it draws on ethnographic fieldwork on the Thai-Burma border, and it puts forward an agenda for further applied research that is rooted in a sociological analysis of civil society and contributes to the human security paradigm.

  4. Nevada National Security Site-Directed Research and Development FY 2011 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Howard Bender, comp.

    2012-04-25

    This fiscal year 2011 annual report of the Site-Directed Research and Development program, the 10th anniversary edition, recognizes a full decade of innovative R&D accomplishments in support of the Nevada National Security Site (NNSS). Last year the NNSS itself was renamed to reflect a diversifying mission, and our R&D program has contributed significantly to shape emerging missions that will continue to evolve. New initiatives in stockpile stewardship science, nonproliferation, and treaty verification and monitoring have had substantial successes in FY 2011, and many more accomplishments are expected. SDRD is the cornerstone on which many of these initiatives rest. Historically supporting our main focus areas, SDRD is also building a solid foundation for new, and non-traditional, emerging national security missions. The program continues its charter to advance science and technology for a broad base of agencies including the U.S. Department of Energy (DOE), U.S. Department of Defense (DoD), U.S. Department of Homeland Security (DHS), and many others.

  5. Refractory Research Group - U.S. DOE, Albany Research Center [Institution Profile

    Energy Technology Data Exchange (ETDEWEB)

    Bennett, James P.

    2004-09-01

    The refractory research group at the Albany Research Center (ARC) has a long history of conducting materials research within the U.S. Bureau of Mines, and more recently, within the U.S. Dept. of Energy. When under the U.S. Bureau of Mines, research was driven by national needs to develop substitute materials and to conserve raw materials. This mission was accomplished by improving refractory material properties and/or by recycling refractories using critical and strategic materials. Currently, as a U.S. Dept of Energy Fossil Energy field site, research is driven primarily by the need to assist DOE in meeting its vision to develop economically and environmentally viable technologies for the production of electricity from fossil fuels. Research at ARC impacts this vision by: • Providing information on the performance characteristics of materials being specified for the current generation of power systems; • Developing cost-effective, high performance materials for inclusion in the next generation of fossil power systems; and • Solving environmental emission and waste problems related to fossil energy systems. A brief history of past refractory research within the U.S. Bureau of Mines, the current refractory research at ARC, and the equipment and capabilities used to conduct refractory research at ARC will be discussed.

  6. Programmable Logic Controllers for Research on the Cyber Security of Industrial Power Plants

    Science.gov (United States)

    2017-02-12

    any commercial carriers for shipment of the Goods . WESCO will use its reasonable efforts to comply with Buyer’s requests as to method and route of...and includes a small electrical substation control environment. The lab has already been used to support the research of the PI and his student ...large gToup of gTaduate and undergTadnatc students . The PI is also dcvclopiug a course on control systems security, and t lms wi ll use the lab to

  7. A research on the security of wisdom campus based on geospatial big data

    Science.gov (United States)

    Wang, Haiying

    2018-05-01

    There are some difficulties in wisdom campus, such as geospatial big data sharing, function expansion, data management, analysis and mining geospatial big data for a characteristic, especially the problem of data security can't guarantee cause prominent attention increasingly. In this article we put forward a data-oriented software architecture which is designed by the ideology of orienting data and data as kernel, solve the problem of traditional software architecture broaden the campus space data research, develop the application of wisdom campus.

  8. Introduction to Future Wireless Networks research group's projects/activities (St. Petersburg)

    CSIR Research Space (South Africa)

    Lysko, Albert A

    2017-05-01

    Full Text Available , Peace, Safety and Security  Materials Science and manufacturing  Meraka Institute (Information and Communication Technology)  Modelling and Digital Science  Natural Resources and the Environment  Implementation Unit  National Research Centres... CSIR Units and Centres  Operating Units  Biosciences  Built Environment  Defence, Peace, Safety and Security  Materials Science and manufacturing  Meraka Institute (Information and Communication Technology)  Modelling and Digital...

  9. Project on National Security Reform: Vision Working Group Report and Scenarios

    Science.gov (United States)

    2010-07-01

    tive of a traditional interagency space working group. It is hard to put a finger on just when the land grab for the moon began. It might have...scenario, a standing Inter- agency Team has been formed to bridge differences in agency priorities. 93 It is hard to put a finger on just when the Moon...6, 1997, pp. 633-647. 243 14. Stephen Millet , “The future of scenarios: challenges and opportunities,” Strategy & Leadership, Vol. 31, No. 2, 2003

  10. Invasive Species Working Group: Research Summary and Expertise Directory

    Science.gov (United States)

    Jack Butler; Dean Pearson; Mee-Sook Kim

    2009-01-01

    Rocky Mountain Research Station (RMRS) personnel have scientific expertise in widely ranging disciplines and conduct multidisciplinary research on invasive species issues with emphasis in terrestrial and aquatic habitats throughout the Interior West, Great Plains, and related areas (fig. 1; Expertise Directory; appendix). RMRS invasive species research covers an array...

  11. Research on Issues concerning Social Security for Migrant Workers in Harmonious Society

    OpenAIRE

    Zhang, Hua

    2013-01-01

    This article analyzes the status quo of social security for migrant workers in China, and points out that there are deep system and concept reasons for the lack of labor rights and interests security, social security, equality and the right to development, political participation channels for the current migrant workers. This article then expounds the adverse effects of lack of social security for migrant workers on building a harmonious society: the lack of social security for migrant worker...

  12. Foreign research reactor uranium supply program: The Y-12 national security complex process

    International Nuclear Information System (INIS)

    Nelson, T.; Eddy, B.G.

    2010-01-01

    The Foreign Research Reactor (FRR) Uranium Supply Program at the Y-12 National Security Complex supports the nonproliferation objectives of the HEU Disposition Program, the Reduced Enrichment Research and Test Reactors (RERTR) Program, and the United States FRR Spent Nuclear Fuel (SNF) Acceptance Program. The Y-12 National Nuclear Security Administration (NNSA) Y-12 Site Office maintains the prime contracts with foreign governments for the supply of Low-Enriched Uranium (LEU) for their research reactors. The LEU is produced by down blending Highly Enriched Uranium (HEU) that has been declared surplus to the U.S. national defense needs. The down blending and sale of the LEU supports the Surplus HEU Disposition Program Record of Decision to make the HEU non-weapons usable and to recover the economic value of the uranium to the extent feasible. This program supports the important U.S. government and nuclear nonproliferation commitment to serve as a reliable and cost-effective uranium supplier for those foreign research reactors that are converting or have converted to LEU fuel under the guidance of the NNSA RERTR Program. In conjunction with the FRR SNF Acceptance Program which supports the global nonproliferation efforts to disposition U.S.-origin HEU, the Y-12 FRR Uranium Supply Program can provide the LEU for the replacement fuel fabrication. In addition to feedstock for fuel fabrication, Y-12 supplies LEU for target fabrication for medical isotope production. The Y-12 process uses supply forecasting tools, production improvements and efficient delivery preparations to successfully support the global research reactor community

  13. [A study of the occupational stress norm and it' s application for the technical group and scientific research group].

    Science.gov (United States)

    Yang, Xin-wei; Liu, Ze-jun; Zhao, Pei-qing; Bai, Shao-ying; Pang, Xing-huo; Wang, Zhi-ming; Jin, Tai-yi; Lan, Ya-jia

    2006-11-01

    A study of the occupational stress norm and it' s application for the technical group and scientific research group. In this study, cross-sectional study method is used, and a synthetic way of sorting and randomized sampling is adopted to deal with research targets(235 scientific research group, 857 technical group). Descriptive statistics for OSI-R scale scores for the technical group and scientific research group were modulated. Scale raw score to T-score conversion tables derived from the OSI-R normative sample for technical group and scientific research group were established. OSI-R profile from for technical group and scientific research group were established. For the ORQ and PSQ scales, scores at or above 70T indicate a strong levels of maladaptive stress and strain. Score in the range of 60T to 69T suggest middle levels of maladaptive stress and strain. Score in the range of 40T to 59T indicate normal levels of stress and strain. Score below 40T indicate a relative absence of occupational stress and strain. For the PRQ scales, score below 30T indicate a significant lack of coping resources. Score in the range of 30T to 39T suggest middle deficits in coping resources. Score in the range of 40T to 59T indicate average coping resources. Scores at or above 60T indicate a strong levels of coping resources. Different intervention measure should be take to reduce the occupational stress so as to improve the work ability.

  14. Inspection methods for physical protection Task III review of other agencies' physical security activities for research reactors

    International Nuclear Information System (INIS)

    In Task I of this project, the current Nuclear Regulatory Commission (NRC) position-on physical security practices and procedures at research reactors were reviewed. In the second task, a sampling of the physical security plans was presented and the three actual reactor sites described in the security plans were visited. The purpose of Task III is to review other agencies' physical security activities for research reactors. During this phase, the actions, procedures and policies of two domestic and two foreign agencies other than the NRC that relate to the research reactor community were examined. The agencies examined were: International Atomic Energy Agency; Canadian Atomic Energy Control Board; Department of Energy; and American Nuclear Insurers

  15. FAR Research Project: What do we know about group audits

    NARCIS (Netherlands)

    Hanes Downey, Denise; Gold, A.H.

    Despite concerns about the quality of group audits, recently raised by practice, inspectors, regulators, and standard setters, only a limited number of academic studies have specifically examined these engagements to date. This paper first describes some of the concerns about group audits to explain

  16. Priming the Secure Attachment Schema Affects the Emotional Face Processing Bias in Attachment Anxiety: An fMRI Research

    Directory of Open Access Journals (Sweden)

    Xu Chen

    2017-04-01

    Full Text Available Our study explored how priming with a secure base schema affects the processing of emotional facial stimuli in individuals with attachment anxiety. We enrolled 42 undergraduate students between 18 and 27 years of age, and divided them into two groups: attachment anxiety and attachment secure. All participants were primed under two conditions, the secure priming using references to the partner, and neutral priming using neutral references. We performed repeated attachment security priming combined with a dual-task paradigm and functional magnetic resonance imaging. Participants’ reaction times in terms of responding to the facial stimuli were also measured. Attachment security priming can facilitate an individual’s processing of positive emotional faces; for instance, the presentation of the partner’s name was associated with stronger activities in a wide range of brain regions and faster reaction times for positive facial expressions in the subjects. The current finding of higher activity in the left-hemisphere regions for secure priming rather than neutral priming is consistent with the prediction that attachment security priming triggers the spread of the activation of a positive emotional state. However, the difference in brain activity during processing of both, positive and negative emotional facial stimuli between the two priming conditions appeared in the attachment anxiety group alone. This study indicates that the effect of attachment secure priming on the processing of emotional facial stimuli could be mediated by chronic attachment anxiety. In addition, it highlights the association between higher-order processes of the attachment system (secure attachment schema priming and early-stage information processing system (attention, given the increased attention toward the effects of secure base schema on the processing of emotion- and attachment-related information among the insecure population. Thus, the following study has

  17. Societal output and use of research performed by health research groups

    Directory of Open Access Journals (Sweden)

    van Ark Gerrit

    2010-10-01

    Full Text Available Abstract The last decade has seen the evaluation of health research pay more and more attention to societal use and benefits of research in addition to scientific quality, both in qualitative and quantitative ways. This paper elaborates primarily on a quantitative approach to assess societal output and use of research performed by health research groups (societal quality of research. For this reason, one of the Dutch university medical centres (i.e. the Leiden University Medical Center (LUMC was chosen as the subject of a pilot study, because of its mission to integrate top patient care with medical, biomedical and healthcare research and education. All research departments were used as units of evaluation within this university medical centre. The method consisted of a four-step process to reach a societal quality score per department, based on its (research outreach to relevant societal stakeholders (the general public, healthcare professionals and the private sector. For each of these three types of stakeholders, indicators within four modes of communication were defined (knowledge production, knowledge exchange, knowledge use and earning capacity. These indicators were measured by a bottom-up approach in a qualitative way (i.e. all departments of the LUMC were asked to list all activities they would consider to be of societal relevance, after which they were converted into quantitative scores. These quantitative scores could then be compared to standardised scientific quality scores that are based on scientific publications and citations of peer-reviewed articles. Based on the LUMC pilot study, only a weak correlation was found between societal and scientific quality. This suggests that societal quality needs additional activities to be performed by health research groups and is not simply the consequence of high scientific quality. Therefore we conclude that scientific and societal evaluation should be considered to be synergistic in terms

  18. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  19. Wireless Spectrum Research & Development Senior Steering Group's Testbed Information Portal

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — This application contains a list of Federal R&D sites that are available for public-private collaborative research efforts in the field of spectrum and wireless...

  20. RESEARCH AND UNIVERSITY IN BRAZIL: organization and institutionalization of research groups in Geography

    Directory of Open Access Journals (Sweden)

    Janaina Francisca de Souza Campos Vinha

    2015-06-01

    Full Text Available This paper presents reflections on the still poorly treated and discussed theme. The formation of research groups is a "new" form of organization of academic and scientific work that has recently been institutionalized by the major institutions of higher education, research and development agencies in Brazil. The research groups in Geography were treated mainly on two aspects: as important spaces for socialization of knowledge that has been growing steadily and that subsidize the training of future teachers, foster critical and reflective stance, highlighting the collective work in the study of common themes; and as important socialization spaces of knowledge that has been growing steadily, and as part of the restructuring process initiated in the 1990s, a period that the Groups Directory Research of Brazil (DGPB formalizes the groups with CNPq. By analyzing the role of postgraduate research and its relation to the formation of research groups have demonstrated that besides the expressiveness achieved with the increase of the groups in all regions of the country, this form of organization also brought repercussions to the fields of education and research segments that incorporated resets the world of work and readjusted neoliberal policies. Este artigo apresenta reflexões sobre uma temática ainda pouco tratada e discutida. A formação de grupos de pesquisa é uma “nova” forma de organização do trabalho acadêmico e científico que recentemente foi institucionalizado pelos principais centros de Ensino Superior, pesquisas e agências de fomento no Brasil. Os grupos de pesquisa em Geografia foram tratados, sobretudo, diante de dois aspectos: como espaços importantes de socialização do conhecimento que vem crescendo progressivamente e que subsidiam a formação do futuro docente e fomentam a postura crítica e reflexiva, com destaque ao trabalho coletivo no estudo de temas em comum; e como parte do processo de reestruturação produtiva

  1. Research on a Valuation Standard and the Actual Condition About Security Management in PACS

    International Nuclear Information System (INIS)

    Jeong, Jae Ho; Son, Gi Gyeong; Kang, Hee Doo; Dong, Kyung Rae; Kweon, Dae Cheol; Kim, Hyun Soo

    2008-01-01

    This study is to prepare an evaluation standard about personal information protection and security management of a medical institution and to build up a grade standard of evaluation in PACS environment. We built up evaluation index based on 10 detailed items in four big categories (political security, technical security, data management security and physical security) by referring to ISO17799 (BS 7799), HIPPA (Health Insurance and Portability and Accountability Act of 1996) and domestic medical law. We have investigated at the thirty places where medical facility with the extracted security criteria and security evaluation index. Average score of physical security list, one of the big categories, was 18.5/20 (93%) at all medical institutions. Political security score was 18.5/30 (62%), data management security score was 12/20 (60%) and technical security score was 17.5/30 (58%). Therefore, security evaluation score was average 67 in 30 general hospitals, which was 4th level. The results showed that it is necessary to establish evaluation and management standard about personal information protection and security consciousness which are weak in PACS environment.

  2. Research Note: Headteacher Support Groups Initiative within the ...

    African Journals Online (AJOL)

    Eastern Africa Social Science Research Review. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 18, No 1 (2002) >. Log in or Register to get access to full text downloads.

  3. Present status of research activities conducted by research group for heavy elements microbiology in JAERI

    International Nuclear Information System (INIS)

    Ohnuki, Toshihiko; Ozaki, Takuo; Yoshida, Takahiro

    2004-01-01

    It has been recognized that microbial transformations of radionuclides and toxic metals could be significant in the environment, but there is a paucity of information on the mechanisms of biotransformation of radionuclides by the microorganisms. An understanding at the fundamental level the mechanisms of mobilization, immobilization and bioavailability of radioactive elements in particular the actinides is important from the standpoint of mobility of actinides in the environment, disposal of radioactive wastes in deep geological formation, remediation of contaminated soils and materials, and development of strategies for the long-term stewardship of the contaminated sites. The microbiology research group in Japan Atomic Energy Research Institute (JAERI) is conducting basic scientific research on microbial interactions with actinides. Fundamental research on microbial transformations of actinides include elucidation of the mechanisms of dissolution and precipitation of various chemical forms such as ionic, oxides, organic and inorganic complexes of actinides by aerobic or anaerobic microorganisms under relevant microbial process conditions. State-of-the-art analytical techniques are used to determine the interaction of actinides with microorganisms at the molecular level to understand the structure function relationship. These techniques include time-resolved laser fluorescence spectroscopy (TRLFS) to determine the coordination number, oxidation states and the nearest neighbor by X-ray absorption near-edge structure (XANES) and extended X-ray absorption fine structure (EXAFS) at the Synchrotron Light Source, identification of functional groups by nuclear magnetic resonance (NMR), determination of chemical forms by transmission electron microscopy (TEM), and genomic (DNA) manipulation by molecular techniques. We here report the present status of our research activities on accumulation of lanthanides(III) by microorganisms, application of micro-particle induced X

  4. The analysis of the public support, results, and the research field structure of the Czech security R

    Directory of Open Access Journals (Sweden)

    Faťun Martin

    2017-07-01

    Full Text Available The article is devoted to an analysis of the public support and results of the security oriented R&D in Czechia in the years 2011–2015. The aim is to provide a knowledge base for active participation of users of results and existing and potential beneficiaries of public support in the development of the system and programs of the security research after 2017. The introductory part of the text describes the national environment of the security R&D, and the methodology of the data analysis of projects and programs and the bibliometric analyses of results of the security research. The analysis is focused in particular upon the distribution of the public funding, and the results obtained in R&D programs financed by the Ministry of the interior (MoI. The existing overlaps between R&D activities sponsored by MoI and by other governmental bodies are also examined.

  5. Research on group enterprise multimedia information publishing system

    Directory of Open Access Journals (Sweden)

    Zhimin Dong

    2017-01-01

    Full Text Available A electric power group enterprises to actively explore the innovation of enterprise culture management, making full use of modern information and communication technologies, construction of trans-regional multimedia information publishing platform. Construction of a municipal pilot units in Group region, for example, through consolidation, Office LANs, corporate networks in electric power communication network, cable TV network, realized with pictures, video, PPT, FLASH animations, WORD documents, WEB pages, video conference streams, radio, television, and other media as the carrier’s digital communications.

  6. Research on Lightweight Information Security System of the Internet of Things

    OpenAIRE

    Ying Li; Li Ping Du; JianWei Guo; Xin Zhao

    2013-01-01

    In order to improve the security of information transmitted in the internet of things, this study designs an information security system architecture of internet of things based on a lightweight cryptography. In this security system, an authentication protocol, encryption/decryption protocol and signature verification protocol are proposed and implemented. All these security protocol are used to verify the legality of access device and to protect the confidentiality and integrity of transform...

  7. Basic research needs to assure a secure energy future. A report from the Basic Energy Sciences Advisory Committee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2003-02-01

    This report has highlighted many of the possible fundamental research areas that will help our country avoid a future energy crisis. The report may not have adequately captured the atmosphere of concern that permeated the discussions at the workshop. The difficulties facing our nation and the world in meeting our energy needs over the next several decades are very challenging. It was generally felt that traditional solutions and approaches will not solve the total energy problem. Knowledge that does not exist must be obtained to address both the quantity of energy needed to increase the standard of living world-wide and the quality of energy generation needed to preserve the environment. In terms of investments, it was clear that there is no single research area that will secure the future energy supply. A diverse range of economic energy sources will be required--and a broad range of fundamental research is needed to enable these. Many of the issues fall into the traditional materials and chemical sciences research areas, but with specific emphasis on understanding mechanisms, energy related phenomena, and pursuing novel directions in, for example, nanoscience and integrated modeling. An important result from the discussions, which is hopefully apparent from the brief presentations above, is that the problems that must be dealt with are truly multidisciplinary. This means that they require the participation of investigators with different skill sets. Basic science skills have to be complemented by awareness of the overall nature of the problem in a national and world context, and with knowledge of the engineering, design, and control issues in any eventual solution. It is necessary to find ways in which this can be done while still preserving the ability to do first-class basic science. The traditional structure of research, with specific disciplinary groupings, will not be sufficient. This presents great challenges and opportunities for the funders of the

  8. Research Projects at Chulalongkorn University for the Master Degree Programme in Nuclear Security and Safeguard

    International Nuclear Information System (INIS)

    Nilsuwankosit, S.

    2015-01-01

    The Department of Nuclear Engineering, Faculty of Engineering, Chulalongkorn University, Thailand, began its master degree programme in nuclear security and safeguard in November 2013 with the support from the CBRN-Center of Excellence, European Union. This programme was planned as a way to raise the awareness of various local agencies in ASEAN countries regarding the threat of CBRN events. In the long run, the programme will also serve as the platform to develop the human resource and to provide the professional assistance required to counter such threat in the region. The programme closely follows the guideline as given by the IAEA and employs its materials as the main source of references. The first batch of 20 students came from countries in the ASEAN community. Due to the nature of the program, each student is required to conduct the research and a thesis based on such research is to be submitted as part of the requirement for the graduation. Currently, the research subjects that are readily available to the students can be classified into 5 categories: 1. subjects with neutron generator, 2. subjects with nuclear electronics and instruments, 3. subjects with industrial applications, 4. subjects with computer simulations, and 5. subjects with policy research. (author)

  9. "Ganando Confianza": Research Focus Groups with Immigrant Mexican Mothers

    Science.gov (United States)

    Hausmann-Stabile, Carolina; Zayas, Luis H.; Runes, Sandra; Abenis-Cintron, Anna; Calzada, Esther

    2011-01-01

    Immigrant families with children with developmental disabilities must be served using culturally sensitive approaches to service and research to maximize treatment benefits. In an effort to better understand cultural issues relevant to the provision of parenting programs for immigrant Mexican mothers of children with developmental disabilities, we…

  10. Pattern of Skin disorders across age groups | Ayanlowo | Research ...

    African Journals Online (AJOL)

    Research Journal of Health Sciences. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 5, No 3 (2017) >. Log in or Register to get access to full text downloads. Username, Password, Remember me, or Register · Download this PDF file. The PDF file you selected ...

  11. Research review of nongovernmental organizations' security policies for humanitarian programs in war, conflict, and postconflict environments.

    Science.gov (United States)

    Rowley, Elizabeth; Burns, Lauren; Burnham, Gilbert

    2013-06-01

    To identify the most and least commonly cited security management messages that nongovernmental organizations (NGOs) are communicating to their field staff, to determine the types of documentation that NGOs most often use to communicate key security messages, and to distinguish the points of commonality and divergence across organizations in the content of key security messages. The authors undertook a systematic review of available security policies, manuals, and training materials from 20 international humanitarian NGOs using the InterAction Minimum Operating Security Standards as the basis for a review framework. The most commonly cited standards include analytical security issues such as threat and risk assessment processes and guidance on acceptance, protection, and deterrence approaches. Among the least commonly cited standards were considering security threats to national staff during staffing decision processes, incorporating security awareness into job descriptions, and ensuring that national staff security issues are addressed in trainings. NGO staff receive security-related messages through multiple document types, but only 12 of the 20 organizations have a distinct security policy document. Points of convergence across organizations in the content of commonly cited standards were found in many areas, but differences in security risk and threat assessment guidance may undermine communication between aid workers about changes in local security environments. Although the humanitarian community has experienced significant progress in the development of practical staff security guidance during the past 10 years, gaps remain that can hinder efforts to garner needed resources, clarify security responsibilities, and ensure that the distinct needs of national staff are recognized and addressed.

  12. The research of network database security technology based on web service

    Science.gov (United States)

    Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin

    2013-03-01

    Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.

  13. Frontiers in transport phenomena research and education: Energy systems, biological systems, security, information technology and nanotechnology

    Energy Technology Data Exchange (ETDEWEB)

    Bergman, T.L.; Faghri, A. [Department of Mechanical Engineering, The University of Connecticut, Storrs, CT 06269-3139 (United States); Viskanta, R. [School of Mechanical Engineering, Purdue University, West Lafayette, IN 47907-2088 (United States)

    2008-09-15

    A US National Science Foundation-sponsored workshop entitled ''Frontiers in Transport Phenomena Research and Education: Energy Systems, Biological Systems, Security, Information Technology, and Nanotechnology'' was held in May of 2007 at the University of Connecticut. The workshop provided a venue for researchers, educators and policy-makers to identify frontier challenges and associated opportunities in heat and mass transfer. Approximately 300 invited participants from academia, business and government from the US and abroad attended. Based upon the final recommendations on the topical matter of the workshop, several trends become apparent. A strong interest in sustainable energy is evident. A continued need to understand the coupling between broad length (and time) scales persists, but the emerging need to better understand transport phenomena at the macro/mega scale has evolved. The need to develop new metrology techniques to collect and archive reliable property data persists. Societal sustainability received major attention in two of the reports. Matters involving innovation, entrepreneurship, and globalization of the engineering profession have emerged, and the responsibility to improve the technical literacy of the public-at-large is discussed. Integration of research thrusts and education activities is highlighted throughout. Specific recommendations, made by the panelists with input from the international heat transfer community and directed to the National Science Foundation, are included in several reports. (author)

  14. Securing Canada’s Information-Technology Infrastructure: Context, Principles, and Focus Areas of Cybersecurity Research

    Directory of Open Access Journals (Sweden)

    Dan Craigen

    2013-07-01

    Full Text Available This article addresses the challenges of cybersecurity and ultimately the provision of a stable and resilient information-technology infrastructure for Canada and, more broadly, the world. We describe the context of current cybersecurity challenges by synthesizing key source material whose importance was informed by our own real-world experiences. Furthermore, we present a checklist of guiding principles to a unified response, complete with a set of action-oriented research topics that are linked to known operational limitations. The focus areas are used to drive the formulation of a unified and relevant research and experimental development program, thereby moving us towards a stable and resilient cyberinfrastructure. When cybersecurity is viewed as an inherently interdisciplinary problem of societal concern, we expect that fundamentally new research perspectives will emerge in direct response to domain-specific protection requirements for information-technology infrastructure. Purely technical responses to cybersecurity challenges will be inadequate because human factors are an inherent aspect of the problem. This article will interest managers and entrepreneurs. Senior management teams can assess new technical developments and product releases to fortify their current security solutions, while entrepreneurs can harness new opportunities to commercialize novel technology to solve a high-impact cybersecurity problem..

  15. 75 FR 57768 - Access to Confidential Business Information by Eastern Research Group and Its Identified...

    Science.gov (United States)

    2010-09-22

    ... Business Information by Eastern Research Group and Its Identified Subcontractor AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Eastern Research Group... the information may be claimed or determined to be Confidential Business Information (CBI). DATES...

  16. Cyber security level assignment for research reactor digital instrumentation and control system architecture using concept of defense in depth

    International Nuclear Information System (INIS)

    Shin, Jin Soo; Heo, Gyun Young; Son, Han Seong; Kim, Young Ki; Park, Jaek Wan

    2012-01-01

    Due to recent aging of the analog instrumentation of many nuclear power plants (NPPs) and research reactors, the system reliability decreases while maintenance and testing costs increase. In addition, it is difficult to find the substitutable analog equipment s due to obsolescence. Therefore, the instrumentation and control (I and C) systems have changed from analog system to digital system due to these facts. With the introduction of digital systems, research reactors are forced to care for the problem of cyber attacks because I and C systems have been digitalized using networks or communication systems. Especially, it is more issued at research reactors due to the accessibility of human resources. In the real world, an IBM researcher has been successful in controlling the software by penetrating a NPPs network in U.S. on July 2008 and acquiring the control right of nuclear facilities after one week. Moreover, the malignant code called 'stuxnet' impaired the nearly 1,000 centrifugal separators in Iran according to an IAEA report. The problem of cyber attacks highlights the important of cyber security, which should be emphasized. Defense.in.depth (DID) is a significant concept for the cyber security to work properly. DID institutes and maintains a hardy program for critical digital asset (CDA) by implementing multiple security boundaries. In this work, we assign cyber security levels to a typical digital I and C system using DID concept. This work is very useful in applying the concept of DID to nuclear industry with respect to cyber security

  17. Cyber security level assignment for research reactor digital instrumentation and control system architecture using concept of defense in depth

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Jin Soo; Heo, Gyun Young [Kyung Hee University, Seoul (Korea, Republic of); Son, Han Seong [Joongbu Univ., Chungnam (Korea, Republic of); Kim, Young Ki; Park, Jaek Wan [KAERI, Daejeon (Korea, Republic of)

    2012-10-15

    Due to recent aging of the analog instrumentation of many nuclear power plants (NPPs) and research reactors, the system reliability decreases while maintenance and testing costs increase. In addition, it is difficult to find the substitutable analog equipment s due to obsolescence. Therefore, the instrumentation and control (I and C) systems have changed from analog system to digital system due to these facts. With the introduction of digital systems, research reactors are forced to care for the problem of cyber attacks because I and C systems have been digitalized using networks or communication systems. Especially, it is more issued at research reactors due to the accessibility of human resources. In the real world, an IBM researcher has been successful in controlling the software by penetrating a NPPs network in U.S. on July 2008 and acquiring the control right of nuclear facilities after one week. Moreover, the malignant code called 'stuxnet' impaired the nearly 1,000 centrifugal separators in Iran according to an IAEA report. The problem of cyber attacks highlights the important of cyber security, which should be emphasized. Defense.in.depth (DID) is a significant concept for the cyber security to work properly. DID institutes and maintains a hardy program for critical digital asset (CDA) by implementing multiple security boundaries. In this work, we assign cyber security levels to a typical digital I and C system using DID concept. This work is very useful in applying the concept of DID to nuclear industry with respect to cyber security.

  18. The Application of Biometrics in Critical Infrastructures Operations: Guidance for Security Managers. ERNCIP Thematic Group Applied Biometrics for CIP. Deliverable: Guidance for Security Managers - Task 2

    OpenAIRE

    REJMAN-GREENE Marek; BRZOZOWSKI Krzysztof; MANSFIELD Tony; SANCHEZ-REILLO Raul; WAGGETT Peter; WHITAKER Geoff

    2015-01-01

    Biometric technologies have advanced considerably over the past decade, and have paved the way for more widespread use by governments, commercial enterprises and, more recently, by the consumer through the introduction of sensors and apps on mobile phones. This report provides introductory information about the application of these technologies to achieve secure recognition of individuals by organisations which form part of critical infrastructures in the EU. As a specific example, it offers ...

  19. Security Technologies for Open Networking Environments (STONE)

    Energy Technology Data Exchange (ETDEWEB)

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi

  20. Research of Smart Grid Cyber Architecture and Standards Deployment with High Adaptability for Security Monitoring

    DEFF Research Database (Denmark)

    Hu, Rui; Hu, Weihao; Chen, Zhe

    2015-01-01

    Security Monitoring is a critical function for smart grid. As a consequence of strongly relying on communication, cyber security must be guaranteed by the specific system. Otherwise, the DR signals and bidding information can be easily forged or intercepted. Customers’ privacy and safety may suffer...... huge losses. Although OpenADR specificationsprovide continuous, secure and reliable two-way communications in application level defined in ISO model, which is also an open architecture for security is adopted by it and no specific or proprietary technologies is restricted to OpenADR itself....... It is significant to develop a security monitoring system. This paper discussed the cyber architecture of smart grid with high adaptability for security monitoring. An adaptable structure with Demilitarized Zone (DMZ) is proposed. Focusing on this network structure, the rational utilization of standards...

  1. The EULAR Scleroderma Trials and Research Group (EUSTAR): an international framework for accelerating scleroderma research.

    Science.gov (United States)

    Tyndall, Alan; Ladner, Ulf M; Matucci-Cerinic, Marco

    2008-11-01

    Systemic sclerosis has a complex pathogenesis and a multifaceted clinical spectrum without a specific treatment. Under the auspices of the European League Against Rheumatism, the European League Against Rheumatism Scleroderma Trials And Research group (EUSTAR) has been founded in Europe to foster the study of systemic sclerosis with the aim of achieving equality of assessment and care of systemic sclerosis patients throughout the world according to evidence-based principles. EUSTAR created the minimal essential data set, a simple two-page form with basic demographics and mostly yes/no answers to clinical and laboratory parameters, to track patients throughout Europe. Currently, over 7000 patients are registered from 150 centres in four continents, and several articles have been published with the data generated by the minimal essential data set. A commitment of EUSTAR is also to teaching and educating, and for this reason there are two teaching courses and a third is planned for early in 2009. These courses have built international networks among young investigators improving the quality of multicentre clinical trials. EUSTAR has organized several rounds of 'teach the teachers' to further standardize the skin scoring. EUSTAR activities have extended beyond European borders, and EUSTAR now includes experts from several nations. The growth of data and biomaterial might ensure many further fruitful multicentre studies, but the financial sustainability of EUSTAR remains an issue that may jeopardize the existence of this group as well as that of other organizations in the world.

  2. Discursive field of dissertation research on the state of information security of Ukraine

    OpenAIRE

    O. S. Zozulya

    2016-01-01

    The article analyzed the of dissertations for science «Public Administration» on the problems ensuring information security of Ukraine. According to the data system catalog Vernadsky National Library of Ukraine was found that within the limits of science «Public Administration» problems of ensuring information security were devoted only 4 work. In view of the small number of dissertations, which explored the problems of public-management of ensuring information security Ukraine, we have to ad...

  3. Global environmental security: Research and policy strategies for the 1990s

    International Nuclear Information System (INIS)

    Lazaro, M.A.; Wang, Hua.

    1992-01-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions

  4. Global environmental security: Research and policy strategies for the 1990s

    Energy Technology Data Exchange (ETDEWEB)

    Lazaro, M.A.; Wang, Hua

    1992-09-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions.

  5. Global environmental security: Research and policy strategies for the 1990s

    Energy Technology Data Exchange (ETDEWEB)

    Lazaro, M.A.; Wang, Hua.

    1992-01-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions.

  6. Medical Genetics at McGill: The History of a Pioneering Research Group.

    Science.gov (United States)

    Canning, Christopher; Weisz, George; Tone, Andrea; Cambrosio, Alberto

    2013-01-01

    The McGill Group in Medical Genetics was formed in 1972, supported by the Medical Research Council and successor Canadian Institutes for Health Research until September 2009, making it the longest active biomedical research group in the history of Canada. We document the history of the McGill Group and situate its research within a broader history of medical genetics. Drawing on original oral histories with the Group's members, surviving documents, and archival materials, we explore how the Group's development was structured around epistemological trends in medical genetics, policy choices made by research agencies, and the development of genetics at McGill University and its hospitals.

  7. Brazilian research groups in nursing: comparison of 2006 and 2016 profiles.

    Science.gov (United States)

    Erdmann, Alacoque Lorenzini; Peiter, Caroline Cechinel; Lanzoni, Gabriela Marcellino de Melo

    2017-07-13

    To compare the profile of nursing research groups registered at the CNPq Research Groups Directory in 2006 and 2016. Descriptive and documentary analysis, The data has been collected in 2006 and in 2016, with parameterized search with the term "nursing" at the CNPq Research Groups Directory. The selected variables have been organized in a Microsoft Office Exce spreadsheetl. The research groups have increased from 251 in 2006 to 617 in 2016, with important increase of the number of participants, among students and researchers. There was a decrease of the number of groups without students. However, 22% remain without undergraduate students' participation. It has been observed an important increase regarding the interest on research activities, when comparing both scenarios. The nursing research groups reflect structural and political advances in generation of science, technology and innovation, however, the undergraduate students' and the foreign researchers' participation should still be encouraged.

  8. A Research Study on Secure Attachment Using the Primary Caregiving Approach

    Science.gov (United States)

    Ebbeck, Marjory; Phoon, Dora Mei Yong; Tan-Chong, Elizabeth Chai Kim; Tan, Marilyn Ai Bee; Goh, Mandy Lian Mui

    2015-01-01

    A child's positive sense of well-being is central to their overall growth and development. With an increasing number of mothers in the workforce, many infants and toddlers spend much time in child care services. Hence it is crucial that caregivers provide a secure base for the child to develop secure attachment with educarers. Given multiple…

  9. Final report of the group research. Genome analysis on the biological effects of radiation. Second research group of NIRS

    International Nuclear Information System (INIS)

    2001-10-01

    This report concerns investigations on the title conducted by 5 subgroups of National Institute of Radiological Sciences (NIRS) during the period of 1993-2001. The report involves the organization of research teams and summary reports from the subgroups for Genome sequencing and informatics, Genome analysis on model organisms, The genome analysis on the specific chromosomal region related to radiation-sensitivity, Molecular analysis on the structure and function of particular regions of human genome, and Generation and characterization of DNA repair-deficient model mice. Significant results are as follows: Sequencing of the radiation sensitivity gene ATM, finding of a novel cell cycle regulator gene NPAT and regulation of gene expression of ATM/NPAT; Findings that the cause of the variability related to instability of human genome is derived from particular repeat structures of 5 and 35 bases and of the instability mutation, from the mutation of EPILS (mRNA synthase gene); Program development for novel human genome finding in the DNA sequences and making novel human gene as a resource by polymerase chain reaction (PCR) technique; and generation of the highly UV-sensitive mouse model for human xeroderma pigmentosum G. Conclusion is that findings will contribute for better understanding of the genes functioning radiation sensitivity and also biodefense mechanism against radiation and other environmental stress. (N.I.)

  10. The research on information security technology for the industrial control system of special equipment

    International Nuclear Information System (INIS)

    Chen Ligang; Liu Hongye; Zhang Wei; Sun Jianying; Lan Peng; Dai Sidan

    2014-01-01

    With the rapid development of information technology in enterprise application, industrial control network and management network is becoming more and more closely linked. Development and application of special equipment control system from the traditional industrial control system, not considered when designing communication security problem mainly, therefore, the industrial control system opened at the same time, isolation control system and the outside was weakened, the safety problems of industrial control system had become more and more serious. The practical application combined with the special equipment control system, analysis and elaboration in view of security problems for the control network, also, provide appropriate security solutions for professional characteristics of industrial control network, design on process control system specially, provide security partition protection scheme, in order to improve security ability of industrial control system information. (authors)

  11. Research on Quantum Authentication Methods for the Secure Access Control Among Three Elements of Cloud Computing

    Science.gov (United States)

    Dong, Yumin; Xiao, Shufen; Ma, Hongyang; Chen, Libo

    2016-12-01

    Cloud computing and big data have become the developing engine of current information technology (IT) as a result of the rapid development of IT. However, security protection has become increasingly important for cloud computing and big data, and has become a problem that must be solved to develop cloud computing. The theft of identity authentication information remains a serious threat to the security of cloud computing. In this process, attackers intrude into cloud computing services through identity authentication information, thereby threatening the security of data from multiple perspectives. Therefore, this study proposes a model for cloud computing protection and management based on quantum authentication, introduces the principle of quantum authentication, and deduces the quantum authentication process. In theory, quantum authentication technology can be applied in cloud computing for security protection. This technology cannot be cloned; thus, it is more secure and reliable than classical methods.

  12. Design and Research of a New secure Authentication Protocol in GSM networks

    Directory of Open Access Journals (Sweden)

    Qi Ai-qin

    2016-01-01

    Full Text Available As the first line of defense in the security application system, Authentication is an important security service. Its typical scheme is challenge/response mechanism and this scheme which is simple-structured and easy to realize has been used worldwide. But these protocols have many following problems In the GSM networks such as the leakage of user indentity privacy, no security protection between home registers and foreign registers and the vicious intruders’ information stealing and so on. This paper presents an authentication protocol in GSM networks based on maths operation and modular square root technique . The analysis of the security and performance has also been done. The results show that it is more robust and secure compared to the previous agreements.

  13. The Saskatchewan River Basin - a large scale observatory for water security research (Invited)

    Science.gov (United States)

    Wheater, H. S.

    2013-12-01

    The 336,000 km2 Saskatchewan River Basin (SaskRB) in Western Canada illustrates many of the issues of Water Security faced world-wide. It poses globally-important science challenges due to the diversity in its hydro-climate and ecological zones. With one of the world's more extreme climates, it embodies environments of global significance, including the Rocky Mountains (source of the major rivers in Western Canada), the Boreal Forest (representing 30% of Canada's land area) and the Prairies (home to 80% of Canada's agriculture). Management concerns include: provision of water resources to more than three million inhabitants, including indigenous communities; balancing competing needs for water between different uses, such as urban centres, industry, agriculture, hydropower and environmental flows; issues of water allocation between upstream and downstream users in the three prairie provinces; managing the risks of flood and droughts; and assessing water quality impacts of discharges from major cities and intensive agricultural production. Superimposed on these issues is the need to understand and manage uncertain water futures, including effects of economic growth and environmental change, in a highly fragmented water governance environment. Key science questions focus on understanding and predicting the effects of land and water management and environmental change on water quantity and quality. To address the science challenges, observational data are necessary across multiple scales. This requires focussed research at intensively monitored sites and small watersheds to improve process understanding and fine-scale models. To understand large-scale effects on river flows and quality, land-atmosphere feedbacks, and regional climate, integrated monitoring, modelling and analysis is needed at large basin scale. And to support water management, new tools are needed for operational management and scenario-based planning that can be implemented across multiple scales and

  14. The protocols for the 10/66 dementia research group population-based research programme.

    Science.gov (United States)

    Prince, Martin; Ferri, Cleusa P; Acosta, Daisy; Albanese, Emiliano; Arizaga, Raul; Dewey, Michael; Gavrilova, Svetlana I; Guerra, Mariella; Huang, Yueqin; Jacob, K S; Krishnamoorthy, E S; McKeigue, Paul; Rodriguez, Juan Llibre; Salas, Aquiles; Sosa, Ana Luisa; Sousa, Renata M M; Stewart, Robert; Uwakwe, Richard

    2007-07-20

    Latin America, China and India are experiencing unprecedentedly rapid demographic ageing with an increasing number of people with dementia. The 10/66 Dementia Research Group's title refers to the 66% of people with dementia that live in developing countries and the less than one tenth of population-based research carried out in those settings. This paper describes the protocols for the 10/66 population-based and intervention studies that aim to redress this imbalance. Cross-sectional comprehensive one phase surveys have been conducted of all residents aged 65 and over of geographically defined catchment areas in ten low and middle income countries (India, China, Nigeria, Cuba, Dominican Republic, Brazil, Venezuela, Mexico, Peru and Argentina), with a sample size of between 1000 and 3000 (generally 2000). Each of the studies uses the same core minimum data set with cross-culturally validated assessments (dementia diagnosis and subtypes, mental disorders, physical health, anthropometry, demographics, extensive non communicable disease risk factor questionnaires, disability/functioning, health service utilisation, care arrangements and caregiver strain). Nested within the population based studies is a randomised controlled trial of a caregiver intervention for people with dementia and their families (ISRCTN41039907; ISRCTN41062011; ISRCTN95135433; ISRCTN66355402; ISRCTN93378627; ISRCTN94921815). A follow up of 2.5 to 3.5 years will be conducted in 7 countries (China, Cuba, Dominican Republic, Venezuela, Mexico, Peru and Argentina) to assess risk factors for incident dementia, stroke and all cause and cause-specific mortality; verbal autopsy will be used to identify causes of death. The 10/66 DRG baseline population-based studies are nearly complete. The incidence phase will be completed in 2009. All investigators are committed to establish an anonymised file sharing archive with monitored public access. Our aim is to create an evidence base to empower advocacy, raise

  15. NATO Advanced Research Wokshop “Recent Trends in Energy Security: With Special Emphasis on Low-Dimensional Functional Materials”

    CERN Document Server

    Matrasulov, Davron; Rakhimov, Khamdam; Low-Dimensional F unctional Materials

    2013-01-01

    Maintaining and improving energy security is one of the biggest challenges worldwide.  The NATO ARW conference in Tashkent, October 2012, was devoted to discussing visions and concepts that are currently discussed in different research fields. Leading scientists have written concise contributions to introduce the reader to this exciting topic.  The present volume summarizes the discussions at the conference.

  16. Security careers skills, compensation, and career paths

    CERN Document Server

    Walker, Stephen W

    2014-01-01

    The third edition of Security Careers is the authoritative reference for current job descriptions and pay practices of security, compliance, ethics, environmental, health and safety occupations. The job descriptions and compensation ranges in this report are drawn from research from the Foushée Group, which has been conducting this research since 1980. Security Careers includes more than 75 job descriptions for security-related positions, which range from the entry-level security guard to the top global corporate executive. It also provides four years of compensation trend data to give a th

  17. Using Focus Groups to Research Sensitive Issues: Insights from Group Interviews on Nursing in the Northern Ireland “Troubles”

    Directory of Open Access Journals (Sweden)

    Joanne Jordan

    2007-12-01

    Full Text Available In this article the authors discuss the usefulness of focus groups for researching sensitive issues using evidence from a study examining the experiences of nurses providing care in the context of the Northern Ireland Troubles. They conducted three group interviews with nurses during which they asked about the issues the nurses face(d in providing nursing care amid enduring social division. Through a discursive analysis of within-group interaction, they demonstrate how participants employ a range of interpretive resources, the effect of which is to prioritize particular knowledge concerning the nature of nursing care. The identification of such patterned activity highlights the ethnographic value of focus groups to reveal social conventions guiding the production of accounts but also suggests that accounts cannot be divorced from the circumstances of their production. Consequently, the authors argue that focus groups should be considered most useful for illuminating locally sanctioned ways of talking about sensitive issues.

  18. Computer Security for Commercial Nuclear Power Plants - Literature Review for Korea Hydro Nuclear Power Central Research Institute

    Energy Technology Data Exchange (ETDEWEB)

    Duran, Felicia Angelica [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Security Systems Analysis Dept.; Waymire, Russell L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Security Systems Analysis Dept.

    2013-10-01

    Sandia National Laboratories (SNL) is providing training and consultation activities on security planning and design for the Korea Hydro and Nuclear Power Central Research Institute (KHNPCRI). As part of this effort, SNL performed a literature review on computer security requirements, guidance and best practices that are applicable to an advanced nuclear power plant. This report documents the review of reports generated by SNL and other organizations [U.S. Nuclear Regulatory Commission, Nuclear Energy Institute, and International Atomic Energy Agency] related to protection of information technology resources, primarily digital controls and computer resources and their data networks. Copies of the key documents have also been provided to KHNP-CRI.

  19. Current state in the research on electronic monitoring systems for the security and flow of objects and individuals

    Directory of Open Access Journals (Sweden)

    Man Dietrich Marcela

    2017-01-01

    Full Text Available This paper sets forth the current state of security systems in prisons from Romania and around the world, particularly aiming electronic systems of monitoring the flow of people, materials control and perimeter security, focusing on the research results concluded by motion detection tests and devices. The currently used systems were observed in order to put an analysis of the methodology together and implement and perfect these systems in protected areas. The protection of citizens must be performed to the extent that is allowed by the legislation.

  20. Computer Security for Commercial Nuclear Power Plants - Literature Review for Korea Hydro Nuclear Power Central Research Institute

    International Nuclear Information System (INIS)

    Duran, Felicia Angelica; Waymire, Russell L.

    2013-01-01

    Sandia National Laboratories (SNL) is providing training and consultation activities on security planning and design for the Korea Hydro and Nuclear Power Central Research Institute (KHNPCRI). As part of this effort, SNL performed a literature review on computer security requirements, guidance and best practices that are applicable to an advanced nuclear power plant. This report documents the review of reports generated by SNL and other organizations [U.S. Nuclear Regulatory Commission, Nuclear Energy Institute, and International Atomic Energy Agency] related to protection of information technology resources, primarily digital controls and computer resources and their data networks. Copies of the key documents have also been provided to KHNP-CRI.

  1. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  2. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    Directory of Open Access Journals (Sweden)

    Feng Tao

    2017-01-01

    Full Text Available Tor (The Second Onion Router is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was used to prevent the behaviors of attackers from inserting controlled nodes and conspiring to make DDos attacks. The integrated security of Tor system was enhanced in our scheme. In addition we have proved the scheme.

  3. The protocols for the 10/66 dementia research group population-based research programme

    Directory of Open Access Journals (Sweden)

    Salas Aquiles

    2007-07-01

    Full Text Available Abstract Background Latin America, China and India are experiencing unprecedentedly rapid demographic ageing with an increasing number of people with dementia. The 10/66 Dementia Research Group's title refers to the 66% of people with dementia that live in developing countries and the less than one tenth of population-based research carried out in those settings. This paper describes the protocols for the 10/66 population-based and intervention studies that aim to redress this imbalance. Methods/design Cross-sectional comprehensive one phase surveys have been conducted of all residents aged 65 and over of geographically defined catchment areas in ten low and middle income countries (India, China, Nigeria, Cuba, Dominican Republic, Brazil, Venezuela, Mexico, Peru and Argentina, with a sample size of between 1000 and 3000 (generally 2000. Each of the studies uses the same core minimum data set with cross-culturally validated assessments (dementia diagnosis and subtypes, mental disorders, physical health, anthropometry, demographics, extensive non communicable disease risk factor questionnaires, disability/functioning, health service utilisation, care arrangements and caregiver strain. Nested within the population based studies is a randomised controlled trial of a caregiver intervention for people with dementia and their families (ISRCTN41039907; ISRCTN41062011; ISRCTN95135433; ISRCTN66355402; ISRCTN93378627; ISRCTN94921815. A follow up of 2.5 to 3.5 years will be conducted in 7 countries (China, Cuba, Dominican Republic, Venezuela, Mexico, Peru and Argentina to assess risk factors for incident dementia, stroke and all cause and cause-specific mortality; verbal autopsy will be used to identify causes of death. Discussion The 10/66 DRG baseline population-based studies are nearly complete. The incidence phase will be completed in 2009. All investigators are committed to establish an anonymised file sharing archive with monitored public access. Our

  4. Towards Food Security and Livelihoods of Low-income Women in central Uganda: Policy Implications based on action research

    DEFF Research Database (Denmark)

    Nambuanyi, Lekunze Ransom; Midtvåge, Runa; Hiranandani, Vanmala Sunder

    2015-01-01

    Uganda is burdened with rising poverty, malnutrition and food insecurity. While most Ugandans depend on agriculture for their livelihoods, it is important to recognize that access to and control over resources by women and climate factors are central to the question of food security in Uganda....... However, a review of the literature demonstrates that policy options have poorly understood these interlinkages or tended to undermine them, especially the extent that these policies and programs put the necessary attention on the role of women farmers in food security. This paper presents part of a work...... in progress of a research project that seeks to investigate the interrelated effects of agricultural practices, access to and control over resources, as well as climate change on women’s food security in the urban and peri-urban areas of central Uganda. The paper not only considers how to turn...

  5. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  6. Security and privacy requirements for a multi-institutional cancer research data grid: an interview-based study.

    Science.gov (United States)

    Manion, Frank J; Robbins, Robert J; Weems, William A; Crowley, Rebecca S

    2009-06-15

    security officers and university legal counsel. Nineteen total interviews were conducted over a period of 16 weeks. Respondents provided answers for all four scenarios (a total of 87 questions). Results were grouped by broad themes, including among others: governance, legal and financial issues, partnership agreements, de-identification, institutional technical infrastructure for security and privacy protection, training, risk management, auditing, IRB issues, and patient/subject consent. The findings suggest that with additional work, large scale federated sharing of data within a regulated environment is possible. A key challenge is developing suitable models for authentication and authorization practices within a federated environment. Authentication--the recognition and validation of a person's identity--is in fact a global property of such systems, while authorization - the permission to access data or resources--mimics data sharing agreements in being best served at a local level. Nine specific recommendations result from the work and are discussed in detail. These include: (1) the necessity to construct separate legal or corporate entities for governance of federated sharing initiatives on this scale; (2) consensus on the treatment of foreign and commercial partnerships; (3) the development of risk models and risk management processes; (4) development of technical infrastructure to support the credentialing process associated with research including human subjects; (5) exploring the feasibility of developing large-scale, federated honest broker approaches; (6) the development of suitable, federated identity provisioning processes to support federated authentication and authorization; (7) community development of requisite HIPAA and research ethics training modules by federation members; (8) the recognition of the need for central auditing requirements and authority, and; (9) use of two-protocol data exchange models where possible in the federation.

  7. Security and privacy requirements for a multi-institutional cancer research data grid: an interview-based study

    Directory of Open Access Journals (Sweden)

    Weems William A

    2009-06-01

    security officers, directors of offices of research, information security officers and university legal counsel. Nineteen total interviews were conducted over a period of 16 weeks. Respondents provided answers for all four scenarios (a total of 87 questions. Results were grouped by broad themes, including among others: governance, legal and financial issues, partnership agreements, de-identification, institutional technical infrastructure for security and privacy protection, training, risk management, auditing, IRB issues, and patient/subject consent. Conclusion The findings suggest that with additional work, large scale federated sharing of data within a regulated environment is possible. A key challenge is developing suitable models for authentication and authorization practices within a federated environment. Authentication – the recognition and validation of a person's identity – is in fact a global property of such systems, while authorization – the permission to access data or resources – mimics data sharing agreements in being best served at a local level. Nine specific recommendations result from the work and are discussed in detail. These include: (1 the necessity to construct separate legal or corporate entities for governance of federated sharing initiatives on this scale; (2 consensus on the treatment of foreign and commercial partnerships; (3 the development of risk models and risk management processes; (4 development of technical infrastructure to support the credentialing process associated with research including human subjects; (5 exploring the feasibility of developing large-scale, federated honest broker approaches; (6 the development of suitable, federated identity provisioning processes to support federated authentication and authorization; (7 community development of requisite HIPAA and research ethics training modules by federation members; (8 the recognition of the need for central auditing requirements and authority, and; (9 use of two

  8. Security and privacy requirements for a multi-institutional cancer research data grid: an interview-based study

    Science.gov (United States)

    2009-01-01

    offices of research, information security officers and university legal counsel. Nineteen total interviews were conducted over a period of 16 weeks. Respondents provided answers for all four scenarios (a total of 87 questions). Results were grouped by broad themes, including among others: governance, legal and financial issues, partnership agreements, de-identification, institutional technical infrastructure for security and privacy protection, training, risk management, auditing, IRB issues, and patient/subject consent. Conclusion The findings suggest that with additional work, large scale federated sharing of data within a regulated environment is possible. A key challenge is developing suitable models for authentication and authorization practices within a federated environment. Authentication – the recognition and validation of a person's identity – is in fact a global property of such systems, while authorization – the permission to access data or resources – mimics data sharing agreements in being best served at a local level. Nine specific recommendations result from the work and are discussed in detail. These include: (1) the necessity to construct separate legal or corporate entities for governance of federated sharing initiatives on this scale; (2) consensus on the treatment of foreign and commercial partnerships; (3) the development of risk models and risk management processes; (4) development of technical infrastructure to support the credentialing process associated with research including human subjects; (5) exploring the feasibility of developing large-scale, federated honest broker approaches; (6) the development of suitable, federated identity provisioning processes to support federated authentication and authorization; (7) community development of requisite HIPAA and research ethics training modules by federation members; (8) the recognition of the need for central auditing requirements and authority, and; (9) use of two-protocol data exchange

  9. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    OpenAIRE

    Feng Tao; Zhao Ming-Tao

    2017-01-01

    Tor (The Second Onion Router) is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was use...

  10. E-commerce System Security Assessment based on Bayesian Network Algorithm Research

    OpenAIRE

    Ting Li; Xin Li

    2013-01-01

    Evaluation of e-commerce network security is based on assessment method Bayesian networks, and it first defines the vulnerability status of e-commerce system evaluation index and the vulnerability of the state model of e-commerce systems, and after the principle of the Bayesian network reliability of e-commerce system and the criticality of the vulnerabilities were analyzed, experiments show that the change method is a good evaluation of the security of e-commerce systems.

  11. Testbed diversity as a fundamental principle for effective ICS security research

    OpenAIRE

    Green, Benjamin; Frey, Sylvain Andre Francis; Rashid, Awais; Hutchison, David

    2016-01-01

    The implementation of diversity in testbeds is essential to understanding and improving the security and resilience of Industrial Control Systems (ICS). Employing a wide spec- trum of equipment, diverse networks, and business processes, as deployed in real-life infrastructures, is particularly diffi- cult in experimental conditions. However, this level of di- versity is key from a security perspective, as attackers can exploit system particularities and process intricacies to their advantage....

  12. Virtualization of open-source secure web services to support data exchange in a pediatric critical care research network.

    Science.gov (United States)

    Frey, Lewis J; Sward, Katherine A; Newth, Christopher J L; Khemani, Robinder G; Cryer, Martin E; Thelen, Julie L; Enriquez, Rene; Shaoyu, Su; Pollack, Murray M; Harrison, Rick E; Meert, Kathleen L; Berg, Robert A; Wessel, David L; Shanley, Thomas P; Dalton, Heidi; Carcillo, Joseph; Jenkins, Tammara L; Dean, J Michael

    2015-11-01

    To examine the feasibility of deploying a virtual web service for sharing data within a research network, and to evaluate the impact on data consistency and quality. Virtual machines (VMs) encapsulated an open-source, semantically and syntactically interoperable secure web service infrastructure along with a shadow database. The VMs were deployed to 8 Collaborative Pediatric Critical Care Research Network Clinical Centers. Virtual web services could be deployed in hours. The interoperability of the web services reduced format misalignment from 56% to 1% and demonstrated that 99% of the data consistently transferred using the data dictionary and 1% needed human curation. Use of virtualized open-source secure web service technology could enable direct electronic abstraction of data from hospital databases for research purposes. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  13. Factors affecting research productivity of production and operations management groups: An empirical study

    OpenAIRE

    George C. Hadjinicola; Andreas C. Soteriou

    2006-01-01

    This paper identifies factors that promote research productivity of production and operations management (POM) groups of researchers in US business schools. In this study, research productivity of a POM group is defined as the number of articles published per POM professor in a specific period of time. The paper also examines factors that affect research quality, as measured by the number of articles published per POM professor in journals, which have been recognized in the POM literature as ...

  14. Focus group interview: an underutilized research technique for improving theory and practice in health education.

    Science.gov (United States)

    Basch, C E

    1987-01-01

    The purpose of this article is to increase awareness about and stimulate interest in using focus group interviews, a qualitative research technique, to advance the state-of-the-art of education and learning about health. After a brief discussion of small group process in health education, features of focus group interviews are presented, and a theoretical framework for planning a focus group study is summarized. Then, literature describing traditional and health-related applications of focus group interviews is reviewed and a synthesis of methodological limitations and advantages of this technique is presented. Implications are discussed regarding: need for more inductive qualitative research in health education; utility of focus group interviews for research and for formative and summative evaluation of health education programs; applicability of marketing research to understanding and influencing consumer behavior, despite notable distinctions between educational initiatives and marketing; and need for professional preparation faculty to consider increasing emphasis on qualitative research methods.

  15. A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange

    Energy Technology Data Exchange (ETDEWEB)

    Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

    2005-10-01

    The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

  16. Household food security and nutritional status of vulnerable groups in Kenya : a seasonal study among low income smallholder rural households

    NARCIS (Netherlands)

    Kigutha, H.N.

    1994-01-01

    Climatic seasonality is now recognized as being a constraint to agricultural production and to household food security in many countries within the tropical regions of the world. This study investigated the extent to which a unimodal climatic pattern affects food production and food

  17. Transforming Catholic Education through Research: The American Educational Research Association Catholic Education Special Interest Group

    Science.gov (United States)

    Martin, Shane

    2014-01-01

    Catholic schools in the United States and abroad face numerous financial, cultural, and structural challenges due to contemporary education policies and economic trends. Within this climate, research about Catholic education is often conducted and leveraged in efforts to serve schools' most immediate needs. To be certain, research aimed at finding…

  18. The effect of excellence funding on academic research prac-tices: comparing 16 Dutch research groups

    NARCIS (Netherlands)

    Scholten, Wout; Hessels, Laurens; van Drooge, L.

    2017-01-01

    In the last 25 years academic research in The Netherlands has seen a rise of excellence oriented research policy instruments. These excellence funding schemes aim to selectively support high-performing and high-potential individuals or organizations, in order to increase differentiation within the

  19. Precincts and Prospects in the Use of Focus Groups in Social and Behavioral Science Research

    Science.gov (United States)

    Sagoe, Dominic

    2012-01-01

    Over the past few years, the focus group method has assumed a very important role as a method for collecting qualitative data in social and behavioural science research. This article elucidates theoretical and practical problems and prospects associated with the use of focus groups as a qualitative research method in social and behavioural science…

  20. 78 FR 67139 - Access to Confidential Business Information by Eastern Research Group and Its Identified...

    Science.gov (United States)

    2013-11-08

    ... Business Information by Eastern Research Group and Its Identified Subcontractor, Energy Services, Inc..., Eastern Research Group (ERG) of Chantilly, VA, and subcontractor Energy Services, Inc., of Tallahassee, FL... Control Act (TSCA). Some of the information may be claimed or determined to be Confidential Business...

  1. [Research and implementation of the TLS network transport security technology based on DICOM standard].

    Science.gov (United States)

    Lu, Xiaoqi; Wang, Lei; Zhao, Jianfeng

    2012-02-01

    With the development of medical information, Picture Archiving and Communications System (PACS), Hospital Information System/Radiology Information System(HIS/RIS) and other medical information management system become popular and developed, and interoperability between these systems becomes more frequent. So, these enclosed systems will be open and regionalized by means of network, and this is inevitable. If the trend becomes true, the security of information transmission may be the first problem to be solved. Based on the need for network security, we investigated the Digital Imaging and Communications in Medicine (DICOM) Standard and Transport Layer Security (TLS) Protocol, and implemented the TLS transmission of the DICOM medical information with OpenSSL toolkit and DCMTK toolkit.

  2. Research on the information security system in electrical gis system in mobile application

    Science.gov (United States)

    Zhou, Chao; Feng, Renjun; Jiang, Haitao; Huang, Wei; Zhu, Daohua

    2017-05-01

    With the rapid development of social informatization process, the demands of government, enterprise, and individuals for spatial information becomes larger. In addition, the combination of wireless network technology and spatial information technology promotes the generation and development of mobile technologies. In today’s rapidly developed information technology field, network technology and mobile communication have become the two pillar industries by leaps and bounds. They almost absorbed and adopted all the latest information, communication, computer, electronics and so on new technologies. Concomitantly, the network coverage is more and more big, the transmission rate is faster and faster, the volume of user’s terminal is smaller and smaller. What’s more, from LAN to WAN, from wired network to wireless network, from wired access to mobile wireless access, people’s demand for communication technology is increasingly higher. As a result, mobile communication technology is facing unprecedented challenges as well as unprecedented opportunities. When combined with the existing mobile communication network, it led to the development of leaps and bounds. However, due to the inherent dependence of the system on the existing computer communication network, information security problems cannot be ignored. Today’s information security has penetrated into all aspects of life. Information system is a complex computer system, and it’s physical, operational and management vulnerabilities constitute the security vulnerability of the system. Firstly, this paper analyzes the composition of mobile enterprise network and information security threat. Secondly, this paper puts forward the security planning and measures, and constructs the information security structure.

  3. Environmental security and sustainable development

    International Nuclear Information System (INIS)

    Kok, M.T.J.

    1996-01-01

    Environmental security has become an important problem area for the social sciences and is becoming a key concept in long-term environmental policy and global environmental change issues. In taking Environmental Security on board, the International Human Dimensions Programme (IHDP) intends to stimulate research on approaches to solve global environmental issues, responses to climate change, food and water security, extreme weather events, etc. Both the Netherlands and Canadian HDP committee have placed environmental security and sustainable development on their national agendas. However, a research agenda for the role of social sciences in environmental security and societal impacts of global change has not been sufficiently elaborated yet, except for economic research on the impacts of climate change. This was the main reason for holding the title workshop. The aims of the workshop were: (1) to define environmental security as a research theme; (2) to explore the research agenda on environmental security for the social sciences; and (3) to establish and reinforce (inter)national research networks in this field. Two papers served as input for the participants of the workshop. First, in the Scoping Report Global Environmental Change and Human Security a brief overview is given of research conducted so far, as well as a working plan for the recently formed ad hoc Working Group on Environmental Security and Global Environmental Change. Secondly, the preliminary results of a programming study on Environmental Security and the societal impacts of climate change are presented. Special attention was given to the involvement of policymakers in the workshop. figs., tabs., 3 appendices, refs

  4. Planning focus group interviews with asylum seekers: Factors related to the researcher, interpreter and asylum seekers.

    Science.gov (United States)

    Eklöf, Niina; Hupli, Maija; Leino-Kilpi, Helena

    2017-10-01

    The aim of this article was to discuss factors related to the researcher, interpreter and asylum seekers when planning focus group interviews with asylum seekers. Focus group interview is one of the basic data collection methods in descriptive nursing and health research. It has been used in multicultural research, allowing an opportunity to participate without literacy and to have linguistic and cultural support from other participants. Asylum seekers form a specific, vulnerable group, and the growing number of asylum seekers increases the need for research related to them. A culturally, methodologically and ethically high-quality focus group interview is based on the researcher's special knowledge and skills, acknowledgement of asylum seekers as both individuals and part of cultural and communal groups, and careful planning of the interpreter's role during the interviews. © 2017 John Wiley & Sons Ltd.

  5. Web-conferencing as a viable method for group decision research

    Directory of Open Access Journals (Sweden)

    Michel J. J. Handgraaf

    2012-09-01

    Full Text Available Studying group decision-making is challenging for multiple reasons. An important logistic difficulty is studying a sufficiently large number of groups, each with multiple participants. Assembling groups online could make this process easier and also provide access to group members more representative of real-world work groups than the sample of college students that typically comprise lab Face-to-Face (FtF groups. The main goal of this paper is to compare the decisions of online groups to those of FtF groups. We did so in a study that manipulated gain/loss framing of a risky decision between groups and examined the decisions of both individual group members and groups. All of these dependent measures are compared for an online and an FtF sample. Our results suggest that web-conferencing can be a substitute for FtF interaction in group decision-making research, as we found no moderation effects of communication medium on individual or group decision outcome variables. The effects of medium that were found suggest that the use of online groups may be the preferred method for group research. To wit, discussions among the online groups were shorter, but generated a greater number of thought units, i.e., they made more efficient use of time.

  6. Science Research Group Leader's Power and Members' Compliance and Satisfaction with Supervision

    Science.gov (United States)

    Meng, Yi; He, Jia; Luo, Changkun

    2014-01-01

    This study investigated the correlations between science research group members' perceptions of power bases used by their group (lab, team) leader (coercive, reward, legitimate, expert and referent) and the effect of those perceptions on group members' attitudinal compliance, behavioral compliance, and satisfaction with supervision. Participants…

  7. Academic Procrastination and the Performance of Graduate-Level Cooperative Groups in Research Methods Courses

    Science.gov (United States)

    Jiao, Qun G.; DaRos-Voseles, Denise A.; Collins, Kathleen M. T.; Onwuegbuzie, Anthony J.

    2011-01-01

    This study examined the extent to which academic procrastination predicted the performance of cooperative groups in graduate-level research methods courses. A total of 28 groups was examined (n = 83 students), ranging in size from 2 to 5 (M = 2.96, SD = 1.10). Multiple regression analyses revealed that neither within-group mean nor within-group…

  8. Teachers' Commitment To, and Experiences of, the Teaching Profession in Tanzania: Findings of Focus Group Research

    Science.gov (United States)

    Mkumbo, Kitila A. K.

    2012-01-01

    This qualitative study examined teachers' commitment to, and experiences of, the teaching profession in six regions of Tanzania. The study used focus group discussions as research method and data collection tool. Twenty four groups were conducted, with group membership ranging from five to nine participants. The results show that the teachers'…

  9. Proceedings of the seventh international food convention: nutritional security through sustainable development research and education for healthy foods - souvenir

    International Nuclear Information System (INIS)

    2013-12-01

    At present, the application of advanced technology during production, processing, storage and distribution of food with an ultimate aim of strengthening the socio-economic status of farmers, entrepreneurs and rural artisan community has paramount importance. The convention made an effort to touch upon the following areas: food and nutritional security and sustainability, food processing and engineering, food safety management systems, food health and nutrition, skill development and entrepreneurship, food science and technology research etc. Papers relevant to INIS are indexed separately

  10. What Really Happens in Quantitative Group Research? Results of a Content Analysis of Recent Quantitative Research in "JSGW"

    Science.gov (United States)

    Boyle, Lauren H.; Whittaker, Tiffany A.; Eyal, Maytal; McCarthy, Christopher J.

    2017-01-01

    The authors conducted a content analysis on quantitative studies published in "The Journal for Specialists in Group Work" ("JSGW") between 2012 and 2015. This brief report provides a general overview of the current practices of quantitative group research in counseling. The following study characteristics are reported and…

  11. An ethnographic study: Becoming a physics expert in a biophysics research group

    Science.gov (United States)

    Rodriguez, Idaykis

    Expertise in physics has been traditionally studied in cognitive science, where physics expertise is understood through the difference between novice and expert problem solving skills. The cognitive perspective of physics experts only create a partial model of physics expertise and does not take into account the development of physics experts in the natural context of research. This dissertation takes a social and cultural perspective of learning through apprenticeship to model the development of physics expertise of physics graduate students in a research group. I use a qualitative methodological approach of an ethnographic case study to observe and video record the common practices of graduate students in their biophysics weekly research group meetings. I recorded notes on observations and conduct interviews with all participants of the biophysics research group for a period of eight months. I apply the theoretical framework of Communities of Practice to distinguish the cultural norms of the group that cultivate physics expert practices. Results indicate that physics expertise is specific to a topic or subfield and it is established through effectively publishing research in the larger biophysics research community. The participant biophysics research group follows a learning trajectory for its students to contribute to research and learn to communicate their research in the larger biophysics community. In this learning trajectory students develop expert member competencies to learn to communicate their research and to learn the standards and trends of research in the larger research community. Findings from this dissertation expand the model of physics expertise beyond the cognitive realm and add the social and cultural nature of physics expertise development. This research also addresses ways to increase physics graduate student success towards their PhD. and decrease the 48% attrition rate of physics graduate students. Cultivating effective research

  12. The National Criticality Experiments Research Center at the Device Assembly Facility, Nevada National Security Site: Status and Capabilities, Summary Report

    International Nuclear Information System (INIS)

    Bragg-Sitton, S.; Bess, J.; Werner, J.

    2011-01-01

    The National Criticality Experiments Research Center (NCERC) was officially opened on August 29, 2011. Located within the Device Assembly Facility (DAF) at the Nevada National Security Site (NNSS), the NCERC has become a consolidation facility within the United States for critical configuration testing, particularly those involving highly enriched uranium (HEU). The DAF is a Department of Energy (DOE) owned facility that is operated by the National Nuclear Security Agency/Nevada Site Office (NNSA/NSO). User laboratories include the Lawrence Livermore National Laboratory (LLNL) and Los Alamos National Laboratory (LANL). Personnel bring their home lab qualifications and procedures with them to the DAF, such that non-site specific training need not be repeated to conduct work at DAF. The NNSS Management and Operating contractor is National Security Technologies, LLC (NSTec) and the NNSS Safeguards and Security contractor is Wackenhut Services. The complete report provides an overview and status of the available laboratories and test bays at NCERC, available test materials and test support configurations, and test requirements and limitations for performing sub-critical and critical tests. The current summary provides a brief summary of the facility status and the method by which experiments may be introduced to NCERC.

  13. Safeguards and security research and development: Progress report, October 1994--September 1995

    Energy Technology Data Exchange (ETDEWEB)

    Rutherford, D.R.; Henriksen, P.W. [comp.

    1997-03-01

    The primary goal of the Los Alamos Safeguards and Security Technology Development Program, International Safeguards, and other Safeguards and Security Programs is to continue to be the center of excellence in the field of Safeguards and Security. This annual report for 1995 describes those scientific and engineering projects that contribute to all of the aforementioned programs. The authors have presented the information in a different format from previous annual reports. Part I is devoted to Nuclear Material Measurement Systems. Part II contains projects that are specific to Integrated Safeguards Systems. Part III highlights Safeguards Systems Effectiveness Evaluations and Part IV is a compilation of highlights from Information Assurance projects. Finally Part V highlights work on the projects at Los Alamos for International Safeguards. The final part of this annual report lists titles and abstracts of Los Alamos Safeguards and Security Technology Development reports, technical journal articles, and conference papers that were presented and published in 1995. This is the last annual report in this format. The authors wish to thank all of the individuals who have contributed to this annual report and made it so successful over the years.

  14. Safeguards and security research and development: Progress report, October 1994--September 1995

    International Nuclear Information System (INIS)

    Rutherford, D.R.; Henriksen, P.W.

    1997-03-01

    The primary goal of the Los Alamos Safeguards and Security Technology Development Program, International Safeguards, and other Safeguards and Security Programs is to continue to be the center of excellence in the field of Safeguards and Security. This annual report for 1995 describes those scientific and engineering projects that contribute to all of the aforementioned programs. The authors have presented the information in a different format from previous annual reports. Part I is devoted to Nuclear Material Measurement Systems. Part II contains projects that are specific to Integrated Safeguards Systems. Part III highlights Safeguards Systems Effectiveness Evaluations and Part IV is a compilation of highlights from Information Assurance projects. Finally Part V highlights work on the projects at Los Alamos for International Safeguards. The final part of this annual report lists titles and abstracts of Los Alamos Safeguards and Security Technology Development reports, technical journal articles, and conference papers that were presented and published in 1995. This is the last annual report in this format. The authors wish to thank all of the individuals who have contributed to this annual report and made it so successful over the years

  15. Enhancing Research in Networking & System Security, and Forensics, in Puerto Rico

    Science.gov (United States)

    2015-03-03

    Conference 2014 – Seattle, WA – Travel Scholarship awarded by Google. Celedonio was able to meet Mr. Tony Baylis, a recruiter from the Lawrence...Microsoft, Encase, Avaya, McAfee, Cisco , Department of Homeland Security, Department of Defense, ISACA among others. International Conferences in

  16. From food production to food security: developing interdisciplinary, regional-level research

    NARCIS (Netherlands)

    Ingram, J.S.I.

    2011-01-01

    Food security is a condition whereby “all people, at all times, have physical and economic access to sufficient, safe, and nutritious food to meet their dietary needs and food preferences for an active and healthy life” (FAO World Food Summit, 1996). Globally, food production has kept

  17. Microstructuring of thermo-mechanically highly stressed surfaces final report of the DFG research group 576

    CERN Document Server

    Rienäcker, Adrian; Knoll, Gunter; Bach, Friedrich-Wilhelm; Maier, Hans; Reithmeier, Eduard; Dinkelacker, Friedrich

    2015-01-01

    This contributed volume presents the final research results of the DFG Research Group 576, which is a joint initiative of five different institutes of the Leibniz Universität Hannover and the Universität Kassel, Germany. The research of the DFG Research Group 576 focuses on improving the tribological behavior of thermomechanically highly stressed surfaces, particularly on cylinder liner for combustion engines. The target audience primarily comprises researchers and experts in the field but the book may also be beneficial for graduate students who want to specialize in the field.

  18. Group-Advantaged Training of Research (GATOR): A Metamorphosis of Mentorship

    Science.gov (United States)

    Edwards, Thea M.; Smith, Barbara K.; Watts, Danielle L.; Germain-Aubrey, Charlotte C.; Roark, Alison M.; Bybee, Seth M.; Cox, Clayton E.; Hamlin, Heather J.; Guillette, Louis J., Jr.

    2011-01-01

    We describe Group-Advantaged Training of Research (GATOR), a yearlong structured program at the University of Florida that guided graduate student mentors and their undergraduate mentees through the mentored research process. Using the national Survey of Undergraduate Research Experiences for an academic year, we found that outcomes for our…

  19. A Systematic Review of Research Studies Examining Telehealth Privacy and Security Practices Used By Healthcare Providers

    Directory of Open Access Journals (Sweden)

    Valerie J.M. Watzlaf

    2017-11-01

    Full Text Available The objective of this systematic review was to systematically review papers in the United States that examine current practices in privacy and security when telehealth technologies are used by healthcare providers. A literature search was conducted using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses Protocols (PRISMA-P. PubMed, CINAHL and INSPEC from 2003 – 2016 were searched and returned 25,404 papers (after duplications were removed. Inclusion and exclusion criteria were strictly followed to examine title, abstract, and full text for 21 published papers which reported on privacy and security practices used by healthcare providers using telehealth.  Data on confidentiality, integrity, privacy, informed consent, access control, availability, retention, encryption, and authentication were all searched and retrieved from the papers examined. Papers were selected by two independent reviewers, first per inclusion/exclusion criteria and, where there was disagreement, a third reviewer was consulted. The percentage of agreement and Cohen’s kappa was 99.04% and 0.7331 respectively. The papers reviewed ranged from 2004 to 2016 and included several types of telehealth specialties. Sixty-seven percent were policy type studies, and 14 percent were survey/interview studies. There were no randomized controlled trials. Based upon the results, we conclude that it is necessary to have more studies with specific information about the use of privacy and security practices when using telehealth technologies as well as studies that examine patient and provider preferences on how data is kept private and secure during and after telehealth sessions. Keywords: Computer security, Health personnel, Privacy, Systematic review, Telehealth

  20. KOSOVO FORCE (KFOR ORGANIZATION IMAGE: EMPIRICAL RESEARCH ON KOSOVO SECURITY FORCES (KSF

    Directory of Open Access Journals (Sweden)

    Korhan ARUN

    2014-10-01

    Full Text Available ABSTRACT: Comprehensive efforts to rebuild a society’s security and peace-enforcing have become an increasingly frequent activity of the NATO as KFOR (Kosovo Force, which is formed of many countries that its image results from these countries collateral relations. KFOR’s image has come to the fore because it affects the mission success and decisions about its existence in Kosovo. The image has two components, functional and emotional: Military symbols and uniforms of NATO (KFOR are functional and emotional relations of countries with Kosovo Security Forces (KSF members are emotional part. In this research; the main objective is finding out the effects that shape KFOR image. Sublevel objectives are the effects of Kosovo’s “connections”, KSF “personal links” and “perceived mission success” with KFOR member states in KFOR image. To study these effect 3 hypothesis are formed and empirical research is done with KSF members to get a foundation of emotional relationship which affects country image. Evaluating of questionnaires with linear regression, correlation and factor analysis, besides the important effects of ethnocentrism and patriotism, military personnel relations formed by countries military involvement and activities found as predictor factors in KFOR image. As a matter of course these base components of emotions about the image will enlighten future literature about building an organizational image. Keywords: Organizational Image, Country Image, Image, KFOR (Kosovo Force. ÖZ: Birçok ülkenin katkılarıyla oluşan ve imajı da bu ülkelerin tamamlayıcı ilişkileri sonucu ortaya çıkan NATO’nun uluslararası topluma yansıyan yüzü olarak Kosova Gücü (KFOR için toplumun güvenliğini yeniden tesis etmek ve barışı zorlama faaliyetleri gittikçe daha geniş kapsamlı bir çaba haline gelmektedir. KFOR’un imajının öne çıkmasının nedeni görevin başarılmasında ve Kosova’daki varlığıyla ilgili

  1. Wellness and multiple sclerosis: The National MS Society establishes a Wellness Research Working Group and research priorities.

    Science.gov (United States)

    Motl, Robert W; Mowry, Ellen M; Ehde, Dawn M; LaRocca, Nicholas G; Smith, Kathy E; Costello, Kathleen; Shinto, Lynne; Ng, Alexander V; Sullivan, Amy B; Giesser, Barbara; McCully, Kevin K; Fernhall, Bo; Bishop, Malachy; Plow, Matthew; Casaccia, Patrizia; Chiaravalloti, Nancy D

    2018-03-01

    People with multiple sclerosis (MS) have identified "wellness" and associated behaviors as a high priority based on "social media listening" undertaken by the National MS Society (i.e. the Society). The Society recently convened a group that consisted of researchers with experience in MS and wellness-related research, Society staff members, and an individual with MS for developing recommendations regarding a wellness research agenda. The members of the group engaged in focal reviews and discussions involving the state of science within three approaches for promoting wellness in MS, namely diet, exercise, and emotional wellness. That process informed a group-mediated activity for developing and prioritizing research goals for wellness in MS. This served as a background for articulating the mission and objectives of the Society's Wellness Research Working Group. The primary mission of the Wellness Research Working Group is the provision of scientific evidence supporting the application of lifestyle, behavioral, and psychosocial approaches for promoting optimal health of mind, body, and spirit (i.e. wellness) in people with MS as well as managing the disease and its consequences.

  2. Machine Learning for Security

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    Applied statistics, aka ‘Machine Learning’, offers a wealth of techniques for answering security questions. It’s a much hyped topic in the big data world, with many companies now providing machine learning as a service. This talk will demystify these techniques, explain the math, and demonstrate their application to security problems. The presentation will include how-to’s on classifying malware, looking into encrypted tunnels, and finding botnets in DNS data. About the speaker Josiah is a security researcher with HP TippingPoint DVLabs Research Group. He has over 15 years of professional software development experience. Josiah used to do AI, with work focused on graph theory, search, and deductive inference on large knowledge bases. As rules only get you so far, he moved from AI to using machine learning techniques identifying failure modes in email traffic. There followed digressions into clustered data storage and later integrated control systems. Current ...

  3. Editorial: introduction to group research projects developed within an intensive programme in railway and logistics

    Directory of Open Access Journals (Sweden)

    Marin MARINOV

    2014-10-01

    Full Text Available This paper introduces a special issue of the Journal Transport Problems on group research projects developed within the RailNewcastle summer school organised and held in Newcastle upon Tyne, North East England. The participants (both educators and students worked together in multinational and multidisciplinary groups to produce research projects. The topics of the group research projects were based around railway and logistics-related problems. As a result a collection of the best articles is produced for the purposes of this special issue.

  4. Perspectives of Community Co-Researchers About Group Dynamics and Equitable Partnership Within a Community-Academic Research Team.

    Science.gov (United States)

    Vaughn, Lisa M; Jacquez, Farrah; Zhen-Duan, Jenny

    2018-04-01

    Equitable partnership processes and group dynamics, including individual, relational, and structural factors, have been identified as key ingredients to successful community-based participatory research partnerships. The purpose of this qualitative study was to investigate the key aspects of group dynamics and partnership from the perspectives of community members serving as co-researchers. Semistructured, in-depth interviews were conducted with 15 Latino immigrant co-researchers from an intervention project with Latinos Unidos por la Salud (LU-Salud), a community research team composed of Latino immigrant community members and academic investigators working in a health research partnership. A deductive framework approach guided the interview process and qualitative data analysis. The LU-Salud co-researchers described relationships, personal growth, beliefs/identity motivation (individual dynamics), coexistence (relational dynamics), diversity, and power/resource sharing (structural dynamics) as key foundational aspects of the community-academic partnership. Building on existing CBPR and team science frameworks, these findings demonstrate that group dynamics and partnership processes are fundamental drivers of individual-level motivation and meaning making, which ultimately sustain efforts of community partners to engage with the research team and also contribute to the achievement of intended research outcomes.

  5. Anticipatory Cyber Security Research: An Ultimate Technique for the First-Move Advantage

    Directory of Open Access Journals (Sweden)

    Bharat S.Rawal

    2016-02-01

    Full Text Available Across all industry segments, 96 percent of systems could be breached on average. In the game of cyber security, every moment a new player (attacker is entering the game with new skill sets. An attacker only needs to be effective once while defenders of cyberspace have to be successful all of the time. There will be a first-mover advantage in such a chasing game, which means that the first move often wins. In this paper, in order to face the security challenges brought in by attacker’s first move advantage, we analyzed the past ten years of cyber-attacks, studied the immediate attack’s pattern and offer the tools to predict the next move of the cyber attacker.

  6. Golf Tourism: A Research Profile and Security Perceptions in Belek, Antalya, Turkey.

    Directory of Open Access Journals (Sweden)

    Akın Aksu

    2017-01-01

    Full Text Available Our study aim to determine the current profile of sampled golf tourists visiting Belek, Antalya in high season and their perceptions of security using questionnaires to survey golf tourists in the sample were evaluated separately. The sample consisted of a survey profile of 280 golf tourists and their responses regarding security perceptions for Belek, Antalya. Chi-square testing and descriptive statistics were used to analyze the data. Despite some negative developments in Turkey (such as terrorist attacks, the majority of golf tourists still remain satisfied and motivated to recommend the destination to others. The results of the study would be of help for tourism professionals, academicians and decision makers especially in developing future marketing strategies for Belek.

  7. Maritime Defense and Security Research Program: Final Report, 2004-2011

    Science.gov (United States)

    2011-11-01

    Security: airports, military bases, heads of state, Super Bowl Critical Project Management Most recently, CID completed an analysis of the Hawaiian...to link the results, i.e. discovered keywords, back to the original documents for validation. Also the big picture needs to be updated and enhanced...and Network Layers using OPNET,‖ Proc. TTCP TP-9 ASW Systems & Technologies Panel Annual Meeting, Dartmouth, Nova Scotia, Canada, September 21-25

  8. Environmental Assessment for the Air Force Research Laboratory Security Fence Project, Edwards Air Force Base, California

    Science.gov (United States)

    2012-11-26

    Pleistocene/Early-Holocene Prehistory (12,000 to 7,000 BP). The Lake Mojave Period in the southwestern Great Basin comprises a regional manifestation...adaptive patterns with focal exploitation of such habitats (Tetra Tech 2010). Middle-Holocene Prehistory (8,000 to 4,000 BP). Succeeding Lake Mojave in the...Security Fence at Edwards Air Force Base, California Late Holocene Prehistory (4,000 to Contact). With return to more “favorable” environmental

  9. Security of embedded automotive networks: state of the art and a research proposal

    OpenAIRE

    Studnia , Ivan; Nicomette , Vincent; Alata , Eric; Deswarte , Yves; Kaâniche , Mohamed; Laarouchi , Youssef

    2013-01-01

    International audience; Embedded electronic components are nowadays a prominent part of a car's architecture. Moreover, modern cars are now able to communicate with other devices through many wired or wireless interfaces. As a consequence, the security of embedded systems in cars has become a main concern for the manufacturers. This paper aims at 1) presenting a short overview of the current attacks already known and experimented against vehicles as well as the current state of the art of the...

  10. Information Security Monitoring Process Research in Russian Federation Banking System Organization

    Directory of Open Access Journals (Sweden)

    Anton Sergeevich Zaytsev

    2013-09-01

    Full Text Available In this article the author considers documents and scientific articles that should be used to configure monitoring and information security incident management process in an organization of banking system of Russia. Also key principles of monitoring configuration were marked up and a technique of monitoring configuration was proposed. Principles of monitoring system configuration were defined and a set of documents used to legitimate monitoring and information incident management process was considered.

  11. Privacy and security in the era of digital health: what should translational researchers know and do about it?

    Science.gov (United States)

    Filkins, Barbara L; Kim, Ju Young; Roberts, Bruce; Armstrong, Winston; Miller, Mark A; Hultner, Michael L; Castillo, Anthony P; Ducom, Jean-Christophe; Topol, Eric J; Steinhubl, Steven R

    2016-01-01

    The rapid growth in the availability and incorporation of digital technologies in almost every aspect of our lives creates extraordinary opportunities but brings with it unique challenges. This is especially true for the translational researcher, whose work has been markedly enhanced through the capabilities of big data aggregation and analytics, wireless sensors, online study enrollment, mobile engagement, and much more. At the same time each of these tools brings distinctive security and privacy issues that most translational researchers are inadequately prepared to deal with despite accepting overall responsibility for them. For the researcher, the solution for addressing these challenges is both simple and complex. Cyber-situational awareness is no longer a luxury-it is fundamental in combating both the elite and highly organized adversaries on the Internet as well as taking proactive steps to avoid a careless turn down the wrong digital dark alley. The researcher, now responsible for elements that may/may not be beyond his or her direct control, needs an additional level of cyber literacy to understand the responsibilities imposed on them as data owner. Responsibility lies with knowing what you can do about the things you can control and those you can't. The objective of this paper is to describe the data privacy and security concerns that translational researchers need to be aware of, and discuss the tools and techniques available to them to help minimize that risk.

  12. Privacy and security in the era of digital health: what should translational researchers know and do about it?

    Science.gov (United States)

    Filkins, Barbara L; Kim, Ju Young; Roberts, Bruce; Armstrong, Winston; Miller, Mark A; Hultner, Michael L; Castillo, Anthony P; Ducom, Jean-Christophe; Topol, Eric J; Steinhubl, Steven R

    2016-01-01

    The rapid growth in the availability and incorporation of digital technologies in almost every aspect of our lives creates extraordinary opportunities but brings with it unique challenges. This is especially true for the translational researcher, whose work has been markedly enhanced through the capabilities of big data aggregation and analytics, wireless sensors, online study enrollment, mobile engagement, and much more. At the same time each of these tools brings distinctive security and privacy issues that most translational researchers are inadequately prepared to deal with despite accepting overall responsibility for them. For the researcher, the solution for addressing these challenges is both simple and complex. Cyber-situational awareness is no longer a luxury-it is fundamental in combating both the elite and highly organized adversaries on the Internet as well as taking proactive steps to avoid a careless turn down the wrong digital dark alley. The researcher, now responsible for elements that may/may not be beyond his or her direct control, needs an additional level of cyber literacy to understand the responsibilities imposed on them as data owner. Responsibility lies with knowing what you can do about the things you can control and those you can’t. The objective of this paper is to describe the data privacy and security concerns that translational researchers need to be aware of, and discuss the tools and techniques available to them to help minimize that risk. PMID:27186282

  13. Control group design: enhancing rigor in research of mind-body therapies for depression.

    Science.gov (United States)

    Kinser, Patricia Anne; Robins, Jo Lynne

    2013-01-01

    Although a growing body of research suggests that mind-body therapies may be appropriate to integrate into the treatment of depression, studies consistently lack methodological sophistication particularly in the area of control groups. In order to better understand the relationship between control group selection and methodological rigor, we provide a brief review of the literature on control group design in yoga and tai chi studies for depression, and we discuss challenges we have faced in the design of control groups for our recent clinical trials of these mind-body complementary therapies for women with depression. To address the multiple challenges of research about mind-body therapies, we suggest that researchers should consider 4 key questions: whether the study design matches the research question; whether the control group addresses performance, expectation, and detection bias; whether the control group is ethical, feasible, and attractive; and whether the control group is designed to adequately control for nonspecific intervention effects. Based on these questions, we provide specific recommendations about control group design with the goal of minimizing bias and maximizing validity in future research.

  14. RESEARCH OF OPEN SYSTEMS INTERCONNECTION MODEL IN TERMS OF INFORMATION SECURITY

    OpenAIRE

    Корнієнко, Б.; Національний авіаційний університет

    2013-01-01

    In this article the OSI model in terms of information security classification of vulnerabilities and security measures at the level of model OSI. In order to build a comprehensive information security systems for information and communication systems and networks offer a model to extend the seven- nine levels — through eight levels — level politician and ninth — level users. Рассмотрены модель OSI с точки зрения информационной безопасности, классификация уязвимостей и мероприятий обеспечен...

  15. Research on the Food Security Condition and Food Supply Capacity of Egypt

    Directory of Open Access Journals (Sweden)

    Jian Deng

    2014-01-01

    Full Text Available Food security is chronically guaranteed in Egypt because of the food subsidy policy of the country. However, the increasing Egyptian population is straining the food supply. To study changes in Egyptian food security and future food supply capacity, we analysed the historical grain production, yield per unit, grain-cultivated area, and per capita grain possession of Egypt. The GM (1,1 model of the grey system was used to predict the future population. Thereafter, the result was combined with scenario analysis to forecast the grain possession and population carrying capacity of Egypt under different scenarios. Results show that the increasing population and limitations in cultivated land will strain Egyptian food security. Only in high cultivated areas and high grain yield scenarios before 2020, or in high cultivated areas and mid grain yield scenarios before 2015, can food supply be basically satisfied (assurance rate ≥ 80% under a standard of 400 kg per capita. Population carrying capacity in 2030 is between 51.45 and 89.35 million. Thus, we propose the use of advanced technologies in agriculture and the adjustment of plant structure and cropping systems to improve land utilization efficiency. Furthermore, urbanization and other uses of cultivated land should be strictly controlled to ensure the planting of grains.

  16. Research on the food security condition and food supply capacity of Egypt.

    Science.gov (United States)

    Deng, Jian; Xiang, Youzhen; Hao, Wenhui; Feng, Yongzhong; Yang, Gaihe; Ren, Guangxin; Han, Xinhui

    2014-01-01

    Food security is chronically guaranteed in Egypt because of the food subsidy policy of the country. However, the increasing Egyptian population is straining the food supply. To study changes in Egyptian food security and future food supply capacity, we analysed the historical grain production, yield per unit, grain-cultivated area, and per capita grain possession of Egypt. The GM (1,1) model of the grey system was used to predict the future population. Thereafter, the result was combined with scenario analysis to forecast the grain possession and population carrying capacity of Egypt under different scenarios. Results show that the increasing population and limitations in cultivated land will strain Egyptian food security. Only in high cultivated areas and high grain yield scenarios before 2020, or in high cultivated areas and mid grain yield scenarios before 2015, can food supply be basically satisfied (assurance rate ≥ 80%) under a standard of 400 kg per capita. Population carrying capacity in 2030 is between 51.45 and 89.35 million. Thus, we propose the use of advanced technologies in agriculture and the adjustment of plant structure and cropping systems to improve land utilization efficiency. Furthermore, urbanization and other uses of cultivated land should be strictly controlled to ensure the planting of grains.

  17. Solar photovoltaics for vernacular housing in rural malaysia: towards energy security and equitability of low income groups

    OpenAIRE

    Ahmad, Nur; Byrd, Hugh

    2011-01-01

    Since the 1970s, Malaysia’s economic expansion has been powered by cheap oil and gas making it dependent on and addicted to using large amounts of fossil fuels. As a country that is primarily reliant on fossil fuels for generating power supply, Malaysia needs to take account of long-term energy security due to fossil fuel depletion and peak oil which could threaten the development of the country. The ‘South China Sea Conflict’, concerning territorial rights to the oil and gas fields of t...

  18. Group X

    Energy Technology Data Exchange (ETDEWEB)

    Fields, Susannah

    2007-08-16

    This project is currently under contract for research through the Department of Homeland Security until 2011. The group I was responsible for studying has to remain confidential so as not to affect the current project. All dates, reference links and authors, and other distinguishing characteristics of the original group have been removed from this report. All references to the name of this group or the individual splinter groups has been changed to 'Group X'. I have been collecting texts from a variety of sources intended for the use of recruiting and radicalizing members for Group X splinter groups for the purpose of researching the motivation and intent of leaders of those groups and their influence over the likelihood of group radicalization. This work included visiting many Group X websites to find information on splinter group leaders and finding their statements to new and old members. This proved difficult because the splinter groups of Group X are united in beliefs, but differ in public opinion. They are eager to tear each other down, prove their superiority, and yet remain anonymous. After a few weeks of intense searching, a list of eight recruiting texts and eight radicalizing texts from a variety of Group X leaders were compiled.

  19. FAA and NASA UTM Research Transition Team: Communications and Navigation (CN) Working Group (WCG) Kickoff Meeting

    Science.gov (United States)

    Jung, Jaewoo; Larrow, Jarrett

    2017-01-01

    This is NASA FAA UTM Research Transition Team Communications and Navigation working group kick off meeting presentation that addresses the followings. Objectives overview Overall timeline and scope Outcomes and expectations Communication method and frequency of meetings Upcoming evaluation Next steps.

  20. 75 FR 8330 - Access to Confidential Business Information by Eastern Research Group

    Science.gov (United States)

    2010-02-24

    ... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OPPT-2003-0004; FRL-8812-4] Access to Confidential Business Information by Eastern Research Group AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. [[Page 8331

  1. Factors affecting research productivity of production and operations management groups: An empirical study

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available This paper identifies factors that promote research productivity of production and operations management (POM groups of researchers in US business schools. In this study, research productivity of a POM group is defined as the number of articles published per POM professor in a specific period of time. The paper also examines factors that affect research quality, as measured by the number of articles published per POM professor in journals, which have been recognized in the POM literature as an elite set. The results show that three factors increase both the research productivity and the quality of the articles published by professors of a POM group. These factors are (a the presence of a POM research center, (b funding received from external sources for research purposes, and (c better library facilities. Doctoral students do assist in improving research quality and productivity, but they are not the driving force. These results have important implications for establishing policy guidelines for business schools. For example, real-world problems are funded by external sources and have a higher probability of publication. Furthermore, schools could place more emphasis on external funding, as most engineering schools do, since groups receiving external funding are more productive in terms of research.

  2. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  3. Training Activities to Maintain Competences in Nuclear Safety and Security: A Case Study of the Belgian Nuclear Research Centre

    International Nuclear Information System (INIS)

    Kesteloot, N.; Clarijs, T.; Coeck, M.; Vermeersch, F.

    2016-01-01

    Full text: The Belgian Nuclear Research Centre, SCK•CEN, is one of the largest research centers in Belgium. More than 700 employees advance research into nuclear energy and ionizing radiation for civilian use, and develop nuclear technologies for socially valuable purposes. Next to independent fundamental and applied research SCK-CEN provides advice, training, services and products. This paper describes the general approach towards the continuous professional development of all SCK-CEN personnel. The objective of these training activities is to maintain and increase the required competences, in order to optimize the output and the wellbeing on the work floor. Given the nature of the SCK-CEN activities, special attention is given to themes like radiation protection, security and industrial safety. A combination of classical face-to-face training, e-learning and on-the-job training is offered during the onboarding and further career path of an SCK-CEN employee. (author

  4. The OMERACT MRI in Arthritis Working Group - Update on Status and Future Research Priorities

    DEFF Research Database (Denmark)

    Østergaard, Mikkel; Bird, Paul; Gandjbakhch, Frédérique

    2015-01-01

    OBJECTIVE: To provide an update on the status and future research priorities of the Outcome Measures in Rheumatology (OMERACT) magnetic resonance imaging (MRI) in arthritis working group. METHODS: A summary is provided of the activities of the group within rheumatoid arthritis (RA), psoriatic...

  5. "Spurring You on and Rooting for Each Other"--The Potential Value of Group Research Projects

    Science.gov (United States)

    Hebron, Clair L.; Morris, Dinah J.

    2012-01-01

    This qualitative study explored students' experience of collaborating to undertake a neuromusculoskeletal group research project which was conducted in partial fulfilment of their MSc course. A phenomenological approach was adopted to gain insight into participants' experience of learning and working in a group. Six participants who were all…

  6. The State of Group Support System Research through a Survey of Papers 1980 to 1991

    Science.gov (United States)

    1991-09-01

    and Beauclair (1990) develop the second point even further by introducing a scheme for codifying the "distance" between experiments based on their...repeatability. That is the apparent strength of the taxonomy proposed by Gray, Vogel and Beauclair (1990) in their Assessing GDSS Empirical Research... BEAUCLAIR RESEARCH MODEL (reproduced from Gray, et al., 1990) METAVARIABLES VARIABLES INDICATORS PERSONAL FACTORS (group member attitudes

  7. ORGANIC RESEARCH AND STAKEHOLDERS INVOLVEMENT: THE IFOAM EU REGIONAL GROUP CONTRIBUTION

    OpenAIRE

    Gonzalvez, Mr V; Schlueter, Mr M; Slabe, Ms A; Schmid, Mr O

    2006-01-01

    The paper presents the concepts, criteria, procedures and some methodologies to increase stakeholders involvement and participatioin in organic research Projects in the European Union, based on the experiencie and practise of the IFOAM EU Regional Group (IFOAM-EURG), in transnational Organic research Projects, enfatising in achivements, dificulties and trends for the future

  8. Report for Working Group 1: Design Research in Civil and Environmental Engineering

    DEFF Research Database (Denmark)

    Thompson, Mary Kathryn; Paradisi, Irene

    2013-01-01

    The first 2013 DCEE working group meeting focused on issues associated with design research in civil and environmental engineering. It addressed some of the motivation for establishing design as a research discipline in CEE and some of the challenges and outstanding questions about how to do so....

  9. Analytical Chemistry Section Chemistry Research Group, Winfrith. Report for 1982 and 1983

    International Nuclear Information System (INIS)

    Amey, M.D.H.; Capp, P.D.; James, H.

    1984-01-01

    This report reviews the principal activities of the Analytical Chemistry Section of Chemistry Research Group, Winfrith, during 1982 and 1983. The objectives of the report are to outline the range of chemical analysis support services available at Winfrith, indicate the research areas from which samples currently originate, and identify instrumental techniques where significant updating has occurred. (author)

  10. Supporting the Thesis Writing Process of International Research Students through an Ongoing Writing Group

    Science.gov (United States)

    Li, Linda Y.; Vandermensbrugghe, Joelle

    2011-01-01

    Evidence from research suggests writing support is particularly needed for international research students who have to tackle the challenges of thesis writing in English as their second language in Western academic settings. This article reports the development of an ongoing writing group to support the thesis writing process of international…

  11. Provincial Reconstruction Teams (PRTs) Negotiation Skill Requirements in Afghanistan: Afghanistan Security Issues Final Research Paper

    Science.gov (United States)

    2010-01-01

    culture shock” that soldiers experienced as “the anxiety and physical and emotional discomfort that can occur when a person moves to an unfa- miliar...Afghanistan. Don‟t Believe it.” Newsweek, 14 December 2009, 48. Jalali, Ali A. “The Future of Security Institutions.” In Warfare Studies AY10 Coursebook ...62-69. Rubin, Barnett R. “The Transformation of the Afghan State.” In Warfare Studies AY10 Coursebook , edited by Sharon McBride, 351-356. Maxwell

  12. NATO Advanced Research Workshop on Nanodevices and Nanomaterials for Ecological Security

    CERN Document Server

    Kiv, Arnold

    2012-01-01

      This book is devoted to a wide range of problems concerning applications of nanomaterials and nanodevices as effective solutions to modern ecological problems. Leading experts in nanoscience and nanotechnology present the key theoretical, experimental and implementation issues related to the creation and utilization of novel nanoscale devices to help ensure ecological security. The authors discuss appropriate nanotechnologies for minimizing various types of risk: to human life, technogenic risk, or indeed terrorist threats. Particular emphasis is placed on defining and studying the required materials properties, and – in the field – on nanoscale devices for sensors and monitoring.

  13. IGORR-IV - Proceedings of the fourth meeting of the International Group on Research Reactors

    International Nuclear Information System (INIS)

    Rosenbalm, K.F.

    1995-01-01

    The International Group on Research Reactors was formed to facilitate the sharing of knowledge and experience among those institutions and individuals who are actively working to design, build, and promote new research reactors or to make significant upgrades to existing facilities. Twenty-nine papers were presented in five sessions and written versions of the papers or hard copies of the vugraphs used are published in these proceedings. The five sessions were: (1) Operating Research Reactors and Facility Upgrades; (2) Research Reactors in Design and Construction; (3) ANS Closeout Activities; (4) and (5) Research, Development, and Analysis Results

  14. IGORR-IV -- Proceedings of the fourth meeting of the International Group on Research Reactors

    Energy Technology Data Exchange (ETDEWEB)

    Rosenbalm, K.F. [comp.

    1995-12-31

    The International Group on Research Reactors was formed to facilitate the sharing of knowledge and experience among those institutions and individuals who are actively working to design, build, and promote new research reactors or to make significant upgrades to existing facilities. Twenty-nine papers were presented in five sessions and written versions of the papers or hard copies of the vugraphs used are published in these proceedings. The five sessions were: (1) Operating Research Reactors and Facility Upgrades; (2) Research Reactors in Design and Construction; (3) ANS Closeout Activities; (4) and (5) Research, Development, and Analysis Results.

  15. The network researchers' network: A social network analysis of the IMP Group 1985-2006

    DEFF Research Database (Denmark)

    Henneberg, Stephan C. M.; Ziang, Zhizhong; Naudé, Peter

    The Industrial Marketing and Purchasing (IMP) Group is a network of academic researchers working in the area of business-to-business marketing. The group meets every year to discuss and exchange ideas, with a conference having been held every year since 1984 (there was no meeting in 1987......). In this paper, based upon the papers presented at the 22 conferences held to date, we undertake a Social Network Analysis in order to examine the degree of co-publishing that has taken place between this group of researchers. We identify the different components in this database, and examine the large main...

  16. Three-level multilevel growth models for nested change data: a guide for group treatment researchers.

    Science.gov (United States)

    Tasca, Giorgio A; Illing, Vanessa; Joyce, Anthony S; Ogrodniczuk, John S

    2009-07-01

    Researchers have known for years about the negative impact on Type I error rates caused by dependencies in hierarchically nested and longitudinal data. Despite this, group treatment researchers do not consistently use methods such as multilevel models (MLMs) to assess dependence and appropriately analyse their nested data. The goals of this study are to review some of the study design issues with regard to hierarchically nested and longitudinal data, discuss MLMs for assessing and handling dependence in data, and present a guide for developing a three-level growth MLM that is appropriate for group treatment data, design, and research questions. The authors present an example from group treatment research to illustrate these issues and methods.

  17. Facilitating practitioner research into strategies for improving communication in classroom groups: Action research and interaction analysis — A reconciliation?

    Science.gov (United States)

    Sadler, Jo; Fawns, Rod

    1993-12-01

    This study involved collaborative classroom-based observation of student communication and cognition in small groups after the implementation of two management strategies in science departments in several schools. The paper presents the data and provides insights into the conduct of research and teacher development in the midst of educational change.

  18. Diseases and their management strategies take top research priority in watermelon research and development group member’s survey

    Science.gov (United States)

    Watermelon is an important crop grown for its delicious fruit in the U.S. and in many countries across the world. A survey of members of Watermelon Research and Development Group (WRDG) was conducted via email and during WRDG meetings in 2014 and 2015 in an effort to identify and rank important rese...

  19. Corporate reporting, security regulation and trading on the Kuwaiti stock exchange (KSE – institutional implications for research

    Directory of Open Access Journals (Sweden)

    Eiman A. Algharaballi

    2012-06-01

    Full Text Available The regulation of equities trading in Kuwait over the period from 1983 to 2011 is documented in this paper. An eclectic approach has resulted in overlapping responsibilities for the three main regulatory and supervisory bodies. Regulation appears to be responsive to market crises. As a result, regulations have tended to change with market conditions. Kuwaiti accounting and auditing requirements are also reviewed. The institutional setting in Kuwait has a number of implications for capital market-based research. Informational inefficiency precludes research that relies on the assumption that security price reflects firm value. Other features (including the profit requirement, lock-up restrictions and the two auditor rule provide opportunities for capital market research in Kuwait.

  20. [Analysis of scientific production and bibliometric impact of a group of Spanish clinical researchers].

    Science.gov (United States)

    Miró, O; Burbano Santos, P; Trilla, A; Casademont, J; Fernandez Pérez, C; Martín-Sánchez, Fj

    2016-01-01

    To study the behaviour of several indicators of scientific production and repercussion in a group of Spanish clinical researchers and to evaluate their possible utility for interpreting individual or collective scientific pathways. We performed a unicentric, ecological pilot study involving a group of physicians with consolidated research experience. From the Science Citation Index Expanded (SCI-Expanded) database, we obtained the number of publications of each author (indicator of production) and the number of citations, impact factor and h index (indicators of repercussion). These indicators were calculated individually for each of the years of research experience and we assessed the relationship between the experience of the researcher and the value of the indicator achieved, the relationship between these indicators themselves, and their temporal evolution, both individually and for the entire group. We analysed 35 researchers with a research experience of 28.4 (9.6) years. The h index showed the lowest coefficient of variance. The relationship between the indicators and research experience was significant, albeit modest (R2 between 0.15-0.22). The 4 indicators showed good correlations. The temporal evolution of the indicators, both individual and collective, adjusted better to a second grade polynomial than a linear function: individually, all the authors obtained R2>0.90 in all the indicators; together the best adjustment was produced with the h index (R2=0.61). Based on the indicator used, substantial variations may be produced in the researchers' ranking. A model of the temporal evolution of the indicators of production and repercussion can be described in a relatively homogeneous sample of researchers and the h index seems to demonstrate certain advantages compared to the remaining indicators. This type of analysis could become a predictive tool of performance to be achieved not only for a particular researcher, but also for a homogeneous group of resear-chers

  1. Web-based management of research groups - using the right tools and an adequate integration strategy

    Energy Technology Data Exchange (ETDEWEB)

    Barroso, Antonio Carlos de Oliveira; Menezes, Mario Olimpio de, E-mail: barroso@ipen.b, E-mail: mario@ipen.b [Instituto de Pesquisas Energeticas e Nucleares (IPEN/CNEN-SP), Sao Paulo, SP (Brazil). Grupo de Pesquisa em Gestao do Conhecimento Aplicada a Area Nuclear

    2011-07-01

    Nowadays broad interest in a couple of inter linked subject areas can make the configuration of a research group to be much diversified both in terms of its components and of the binding relationships that glues the group together. That is the case of the research group for knowledge management and its applications to nuclear technology - KMANT at IPEN, a living entity born 7 years ago and that has sustainably attracted new collaborators. This paper describes the strategic planning of the group, its charter and credo, the present components of the group and the diversified nature of their relations with the group and with IPEN. Then the technical competencies and currently research lines (or programs) are described as well as the research projects, and the management scheme of the group. In the sequence the web-based management and collaboration tools are described as well our experience with their use. KMANT have experiment with over 20 systems and software in this area, but we will focus on those aimed at: (a) web-based project management (RedMine, ClockinIT, Who does, PhProjekt and Dotproject); (b) teaching platform (Moodle); (c) mapping and knowledge representation tools (Cmap, Freemind and VUE); (d) Simulation tools (Matlab, Vensim and NetLogo); (e) social network analysis tools (ORA, MultiNet and UciNet); (f) statistical analysis and modeling tools (R and SmartPLS). Special emphasis is given to the coupling of the group permanent activities like graduate courses and regular seminars and how newcomers are selected and trained to be able to enroll the group. A global assessment of the role the management strategy and available tool set for the group performance is presented. (author)

  2. Web-based management of research groups - using the right tools and an adequate integration strategy

    International Nuclear Information System (INIS)

    Barroso, Antonio Carlos de Oliveira; Menezes, Mario Olimpio de

    2011-01-01

    Nowadays broad interest in a couple of inter linked subject areas can make the configuration of a research group to be much diversified both in terms of its components and of the binding relationships that glues the group together. That is the case of the research group for knowledge management and its applications to nuclear technology - KMANT at IPEN, a living entity born 7 years ago and that has sustainably attracted new collaborators. This paper describes the strategic planning of the group, its charter and credo, the present components of the group and the diversified nature of their relations with the group and with IPEN. Then the technical competencies and currently research lines (or programs) are described as well as the research projects, and the management scheme of the group. In the sequence the web-based management and collaboration tools are described as well our experience with their use. KMANT have experiment with over 20 systems and software in this area, but we will focus on those aimed at: (a) web-based project management (RedMine, ClockinIT, Who does, PhProjekt and Dotproject); (b) teaching platform (Moodle); (c) mapping and knowledge representation tools (Cmap, Freemind and VUE); (d) Simulation tools (Matlab, Vensim and NetLogo); (e) social network analysis tools (ORA, MultiNet and UciNet); (f) statistical analysis and modeling tools (R and SmartPLS). Special emphasis is given to the coupling of the group permanent activities like graduate courses and regular seminars and how newcomers are selected and trained to be able to enroll the group. A global assessment of the role the management strategy and available tool set for the group performance is presented. (author)

  3. Developing an organizing framework to guide nursing research in the Children’s Oncology Group (COG)

    Science.gov (United States)

    Kelly, Katherine Patterson; Hooke, Mary C.; Ruccione, Kathleen; Landier, Wendy; Haase, Joan

    2014-01-01

    Objectives To describe the development and application of an organizing research framework to guide COG Nursing research. Data Sources Research articles, reports and meeting minutes Conclusion An organizing research framework helps to outline research focus and articulate the scientific knowledge being produced by nurses in the pediatric cooperative group. Implication for Nursing Practice The use of an organizing framework for COG nursing research can facilitate clinical nurses’ understanding of how children and families sustain or regain optimal health when faced with a pediatric cancer diagnosis through interventions designed to promote individual and family resilience. The Children’s Oncology Group (COG) is the sole National Cancer Institute (NCI)-supported cooperative pediatric oncology clinical trials group and the largest organization in the world devoted exclusively to pediatric cancer research. It was founded in 2000 following the merger of the four legacy NCI-supported pediatric clinical trials groups (Children’s Cancer Group [CCG], Pediatric Oncology Group [POG], National Wilms Tumor Study Group, and Intergroup Rhabdomyosarcoma Study Group). The COG currently has over 200 member institutions across North America, Australia, New Zealand and Europe and a multidisciplinary membership of over 8,000 pediatric, radiation, and surgical oncologists, nurses, clinical research associates, pharmacists, behavioral scientists, pathologists, laboratory scientists, patient/parent advocates and other pediatric cancer specialists. The COG Nursing Discipline was formed from the merger of the legacy CCG and POG Nursing Committees, and current membership exceeds 2000 registered nurses. The discipline has a well-developed infrastructure that promotes nursing involvement throughout all levels of the organization, including representation on disease, protocol, scientific, executive and other administrative committees (e.g., nominating committee, data safety monitoring

  4. Operations research, engineering, and cyber security trends in applied mathematics and technology

    CERN Document Server

    Rassias, Themistocles

    2017-01-01

    Mathematical methods and theories with interdisciplinary applications are presented in this book. The eighteen contributions presented in this Work have been written by eminent scientists; a few papers are based on talks which took place at the International Conference at the Hellenic Artillery School in May 2015. Each paper evaluates possible solutions to long-standing problems such as the solvability of the direct electromagnetic scattering problem, geometric approaches to cyber security, ellipsoid targeting with overlap, non-equilibrium solutions of dynamic networks, measuring ballistic dispersion, elliptic regularity theory for the numerical solution of variational problems, approximation theory for polynomials on the real line and the unit circle, complementarity and variational inequalities in electronics, new two-slope parameterized achievement scalarizing functions for nonlinear multiobjective optimization, and strong and weak convexity of closed sets in a Hilbert space. Graduate students, scientists,...

  5. Experience Exchange Group (EEG) Approach as a Means for Research to be rooted in Industry

    DEFF Research Database (Denmark)

    Bruun, Peter

    1997-01-01

    of preliminary studies found interesting to set up an EEG composed of representatives from industry and a researcher. In the paper some general research methods pertinent to the area industrial management are discussed. The EEG concept is introduced and characterised in comparison with the other methods. EEG...... activities are described and a tentative coupling to the phases in a research process is proposed. Following this is a discussion of methodological and quality requirements. It is considered how EEG activities could possibly contribute to an industrial rooted research. The paper ends up looking at future......The intention of this paper is to clarify if and how an Experience Exchange Group(EEG) can be involved in a research process in the area of industrial management. For exemplification of the topic an ongoing research in global manufacturing is referred to. In this research it was after a series...

  6. Safety research needs for Russian-designed reactors / report by an OECD Support Group

    International Nuclear Information System (INIS)

    1996-01-01

    Seven Task Teams were formed within the OECD Support Group, addressing the following topics: Thermal-Hydraulics/Plant Transients for VVERs, Integrity of Equipment and Structures for VVERs, Severe Accidents for VVERs, Operational Safety Issues, Thermal-Hydraulics/Plant Transients for RBMKs, Integrity of Equipment and Structures for RBMKs, Severe Accidents for RBMKs. Each Task Team prepared and presented its report to the Support Group as a whole for review and approval. Consequently, the report represents a consensus of the Support Group that outlines the arguments for the safely research needs with the focus on the main technical issues that justify the need and urgency. The written text addresses three basic questions: What is the safety concern? What are the open issues? What are the safety research needs? The safety research needs as identified by the seven Task Teams, and approved by the Support Group, are reflected in the structure of the report. The chapter on the Uses of Safety Research provides examples on how Western research has been applied to improve the safety of nuclear power plants. In addition, the chapter emphasises the need for a national safety research policy

  7. IGORR-IV: Proceedings of the fourth meeting of the International Group On Research Reactors

    International Nuclear Information System (INIS)

    Rosenbalm, K.F.

    1995-01-01

    The fourth meeting of the International Group on Research Reactors (IGORR-IV) was attended by was good 55 registered participants from 28 organizations in 13 countries, which compares well with the previous meetings. Twenty-nine papers were presented in five sessions over the two-day meeting. Session subjects were: Operating Research Reactors and Facility Upgrades; Research Reactors in Desin and Construction; Research, Development, and Analysis Results of Thermal Hydraulic Calculations, U 3 Si 2 Fuel Performance and Faibrication; Structural Materials Performance; Neutronics; Severe Accident analysis. Written versions of the papers or hard copies of the viewgraphs used are published in these Proceedings

  8. IGORR 2: Proceedings of the 2. meeting of the International Group On Research Reactors

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1992-07-01

    The International group on Research Reactors was formed to facilitate the sharing of knowledge and experience among those institutions and individuals who are actively working to design, build, and promote new research reactors or to make significant upgrades to existing facilities. Sessions during this second meeting were devoted to research reactor reports (GRENOBLE reactor, FRM-II, HIFAR, PIK, reactors at JAERI, MAPLE, ANS, NIST, MURR, TRIGA, BR-2, SIRIUS 2); other neutron sources; and two workshops were dealing with research and development results and needs and reports on progress in needed of R and D areas identified at IGORR 1.

  9. IGORR-IV: Proceedings of the fourth meeting of the International Group On Research Reactors

    Energy Technology Data Exchange (ETDEWEB)

    Rosenbalm, K F [comp.

    1995-07-01

    The fourth meeting of the International Group on Research Reactors (IGORR-IV) was attended by was good 55 registered participants from 28 organizations in 13 countries, which compares well with the previous meetings. Twenty-nine papers were presented in five sessions over the two-day meeting. Session subjects were: Operating Research Reactors and Facility Upgrades; Research Reactors in Desin and Construction; Research, Development, and Analysis Results of Thermal Hydraulic Calculations, U{sub 3}Si{sub 2} Fuel Performance and Faibrication; Structural Materials Performance; Neutronics; Severe Accident analysis. Written versions of the papers or hard copies of the viewgraphs used are published in these Proceedings.

  10. IGORR 2: Proceedings of the 2. meeting of the International Group On Research Reactors

    International Nuclear Information System (INIS)

    1992-01-01

    The International group on Research Reactors was formed to facilitate the sharing of knowledge and experience among those institutions and individuals who are actively working to design, build, and promote new research reactors or to make significant upgrades to existing facilities. Sessions during this second meeting were devoted to research reactor reports (GRENOBLE reactor, FRM-II, HIFAR, PIK, reactors at JAERI, MAPLE, ANS, NIST, MURR, TRIGA, BR-2, SIRIUS 2); other neutron sources; and two workshops were dealing with research and development results and needs and reports on progress in needed of R and D areas identified at IGORR 1

  11. Influence of benefits, results and obstacles’ perceptions by research groups on interactions with companies

    Directory of Open Access Journals (Sweden)

    Veneziano de Castro Araujo

    2015-02-01

    Full Text Available The aim of this paper is to investigate how expected perceptions of academic research groups about results, benefits and obstacles influence the number of interactions with firms, based on a survey of university-industry interactions in Brazil. For this purpose, by means of a nonparametric Item Response Theory (NIRT, non ad hoc clusters were created from patterns of survey answers related with the analyzed perceptions. Using these clusters, a model was estimated to identify how perceptions influence the number of interactions of research groups. The results indicate that research groups that perceive intangible benefits and knowledge results as more important tend to have more interactions with firms. In addition, transactional obstacles imply in less interactions with firms. Finally, some implications on public policies are presented.

  12. Report of short term research group on environment safety in nuclear fuel cycle, 1983

    International Nuclear Information System (INIS)

    1984-01-01

    The research group on environment safety in nuclear fuel cycle was organized in fiscal 1979 as the research group in the range of the common utilization of Yayoi, and this is the third year since it developed into the short term research group in the Nuclear Engineering Research Laboratory. The results obtained so far were summarized in three reports, UTNL-R110, 134 and 147. In this fiscal year, ''The chemistry of reprocessing'' is the subtheme, and this short term research is to be carried out. The meeting is held on March 23 and 24, 1984, in this Laboratory, and the following reports are presented. The conference on institutional stability and the disposal of nuclear and chemically toxic wastes held at MIT, the social scientific analysis of nuclear power development, the present status of reprocessing research in foreign countries, the problems based on the operation experience of actual plants, the chemistry of fuel dissolution, the chemistry of solvent extraction, reprocessing offgas treatment and problems, the chemistry of fixing Kr and I in zeolite, waste treatment in the Tokai Reprocessing Plant of Power Reactor and Nuclear Fuel Development Corp., the chemistry of actinoids, denitration process and the chemistry of MOX production, and future reprocessing research. (Kako, I.)

  13. Group Development and Integration in a Cross-Disciplinary and Intercultural Research Team

    Science.gov (United States)

    Kirk-Lawlor, Naomi; Allred, Shorna

    2017-04-01

    Cross-disciplinary research is necessary to solve many complex problems that affect society today, including problems involving linked social and environmental systems. Examples include natural resource management or scarcity problems, problematic effects of climate change, and environmental pollution issues. Intercultural research teams are needed to address many complex environmental matters as they often cross geographic and political boundaries, and involve people of different countries and cultures. It follows that disciplinarily and culturally diverse research teams have been organized to investigate and address environmental issues. This case study investigates a team composed of both monolingual and bilingual Chilean and US university researchers who are geoscientists, engineers and economists. The objective of this research team was to study both the natural and human parts of a hydrologic system in a hyper-arid region in northern Chile. Interviews ( n = 8) addressed research questions focusing on the interaction of cross-disciplinary diversity and cultural diversity during group integration and development within the team. The case study revealed that the group struggled more with cross-disciplinary challenges than with intercultural ones. Particularly challenging ones were instances the of disciplinary crosstalk, or hidden misunderstandings, where team members thought they understood their cross-disciplinary colleagues, when in reality they did not. Results showed that translation served as a facilitator to cross-disciplinary integration of the research team. The use of translation in group meetings as a strategy for effective cross-disciplinary integration can be extended to monolingual cross-disciplinary teams as well.

  14. Group Development and Integration in a Cross-Disciplinary and Intercultural Research Team.

    Science.gov (United States)

    Kirk-Lawlor, Naomi; Allred, Shorna

    2017-04-01

    Cross-disciplinary research is necessary to solve many complex problems that affect society today, including problems involving linked social and environmental systems. Examples include natural resource management or scarcity problems, problematic effects of climate change, and environmental pollution issues. Intercultural research teams are needed to address many complex environmental matters as they often cross geographic and political boundaries, and involve people of different countries and cultures. It follows that disciplinarily and culturally diverse research teams have been organized to investigate and address environmental issues. This case study investigates a team composed of both monolingual and bilingual Chilean and US university researchers who are geoscientists, engineers and economists. The objective of this research team was to study both the natural and human parts of a hydrologic system in a hyper-arid region in northern Chile. Interviews (n = 8) addressed research questions focusing on the interaction of cross-disciplinary diversity and cultural diversity during group integration and development within the team. The case study revealed that the group struggled more with cross-disciplinary challenges than with intercultural ones. Particularly challenging ones were instances the of disciplinary crosstalk, or hidden misunderstandings, where team members thought they understood their cross-disciplinary colleagues, when in reality they did not. Results showed that translation served as a facilitator to cross-disciplinary integration of the research team. The use of translation in group meetings as a strategy for effective cross-disciplinary integration can be extended to monolingual cross-disciplinary teams as well.

  15. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  16. Lin Receives 2010 Natural Hazards Focus Group Award for Graduate Research

    Science.gov (United States)

    2010-11-01

    Ning Lin has been awarded the Natural Hazards Focus Group Award for Graduate Research, given annually to a recent Ph.D. recipient for outstanding contributions to natural hazards research. Lin's thesis is entitled “Multi-hazard risk analysis related to hurricanes.” She is scheduled to present an invited talk in the Extreme Natural Events: Modeling, Prediction, and Mitigation session (NH20) during the 2010 AGU Fall Meeting, held 13-17 December in San Francisco, Calif. Lin will be formally presented with the award at the Natural Hazards focus group reception on 14 December 2010.

  17. Abstracts of the 15. annual workshop of the Peatland Ecology Research Group (PERG) : peatland event 2008

    International Nuclear Information System (INIS)

    2008-01-01

    The Peatland Ecology Research Group (PERG) deals with the integrated sustainable management of Canadian peatlands, with projects involving the development of ecological restoration of peatland ecosystems after peat mining; reclamation of abandoned peatlands; hydrology, geochemistry, microbiology of natural, harvested and restored peatlands; peatland conservation strategies; and Sphagnum moss ecology and productivity. The Group has established a method for the re-establishing vegetation on mined peatlands. Research by PERG has initiated the development of global peatland conservation strategies. This workshop featured 35 presentations, of which 9 have been catalogued separately for inclusion in this database

  18. Methodological Reflections on the Use of Asynchronous Online Focus Groups in Health Research

    Directory of Open Access Journals (Sweden)

    Sarah Williams PhD

    2012-09-01

    Full Text Available The Internet is increasingly used as a tool in qualitative research. In particular, asynchronous online focus groups are used when factors such as cost, time, or access to participants can make conducting face-to-face research difficult. In this article we consider key methodological issues involved in using asynchronous online focus groups to explore experiences of health and illness. The written nature of Internet communication, the lack of physical presence, and the asynchronous, longitudinal aspects enable participants who might not normally contribute to research studies to reflect on their personal stories before disclosing them to the researcher. Implications for study design, recruitment strategies, and ethics should be considered when deciding whether to use this method.

  19. Report of the Independent Expert Group on the Future of European Public Health Research

    DEFF Research Database (Denmark)

    Olsen, Jørn

    2013-01-01

    Directorate General has set up an independent expert group. Its task was to take stock of the impacts, challenges and limitations of EU-funded public health research under the current and previous research framework programmes, and to identify priorities for future research. The experts, who worked in two...... agendas and national policy agendas? How to improve the uptake of evidence generated from public health research in the development of public health policy? This report summarises the recommendations from Subgroup 2.......The next EU research and innovation framework programme 'Horizon 2020' will address a number of important societal challenges including health, demographic changes and well-being. To prepare the work in these areas, the Health Directorate of the European Commission's Research & Innovation...

  20. The energy market research of 1991. Method of segmenting households into ''life style groups''

    International Nuclear Information System (INIS)

    Ljones, A.; Doorman, G.

    1992-09-01

    The report discusses a method of classifying households into life style groups based on the individuals' needs, wishes and attitudes. Seven such groups have been defined based on nation-wide research among 1022 households in 1991. These groups are described with respect to a number of factors of attitude, housing conditions, socio-economic characteristics, use of media etc. This way of segmenting the households may give the power companies a better understanding of what kind of ''products'' and services their customers would like to have and how to market them efficiently. 5 refs., 3 figs., 5 tabs

  1. First epidemiological study of contact dermatitis in Spain - 1977. Spanish Contact Dermatitis Research Group.

    Science.gov (United States)

    Camarasa, J M

    1979-01-01

    The present work is the first epidemiological study carried out by the Spanish Contact Dermatitis Research Group during 1977. During this year 2806 patients were studied with patch test among 30873 dermatological patients. The 60-62% of the totality had reactivity to one or more patches. Four major groups of allergens were able to consider, following the incidence in their power of sensitize. First group with strong incidence include: Nickel, Chromate, Cobalt, T.M.T.D.,P.P.D.A., Mercapto mix., and Wood tars. Second and third groups with medium incidence contain: Caines, Carbonates, Neomycin, Balsam of Peru, Mercury, Lanolin, Naphtyl mix., Formaldehyde, Benzalkonium chloride, P. P. D. A. mix, and Turpentine. Four group show very low incidence substances, as: Epoxi, Sulfonamides, Etilendiamine, Parabens, Chinoform, Colophony and Cinnamon oil. Few comments about age and occupations are included.

  2. The Mela Study: exploring barriers to diabetes research in black and minority ethnic groups.

    Science.gov (United States)

    Hood, Gillian A; Chowdhury, Tahseen A; Griffiths, Christopher J; Hood, Rosie K E; Mathews, Christopher; Hitman, Graham A

    2015-01-01

    Black and minority ethnic (BME) groups are particularly susceptible to diabetes and its vascular complications in the United Kingdom and most western societies. To understand potential predisposition and tailor treatments accordingly, there is a real need to engage these groups in diabetes research. Despite this, BME participation in research studies continues to remain low in most countries and this may be a contributory factor to reduced health outcomes and poorer quality of life in these groups. This study explores the barriers BME groups may have towards participation in diabetes research in one area of East London, and includes local recommendations on how to improve this for the future. A questionnaire designed from previously reported exploratory work and piloted in several BME localities was distributed at the East London Bangladeshi Mela and similar cultural and religious events in London, UK. People were asked opportunistically to complete the survey themselves if they understood English, or discuss their responses with an advocate. The purpose of the questionnaire was to understand current local awareness with regards to diabetes, identify specific BME barriers and attitudes towards diabetes research by ethnicity, gender and age, and gain insight into how these barriers may be addressed. Of 1682 people surveyed (16-90 years; median age 40 years), 36.4% were South Asian, 25.9% White, and 11.1% Black and other ethnicities; 26.6% withheld their ethnicity. Over half cited language problems generally (54%) and lack of research awareness (56%) as main barriers to engaging in research. South Asian groups were more likely to cite research as too time consuming (42%) whereas Black groups were more concerned with potential drug side effects in research (39%). Participants expressed a general mistrust of research, and the need for researchers to be honest in their approach. Recommendations for increased participation in South Asian groups centred round both helping

  3. Safety Research Opportunities Post-Fukushima. Initial Report of the Senior Expert Group

    International Nuclear Information System (INIS)

    Baek, Won-Pil; Yang, Joon-Eon; Ball, Joanne; Glowa, Glenn; Bisconti, Giulia; Peko, Damian; Bolshov, Leonid; Burgazzi, Luciano; De Rosa, Felice; Conde, Jose M.; Cook, Gary; Evrard, Jean-Michel; Jacquemain, Didier; Funaki, Kentaro; Uematsu, Mari Marianne; Miyoshi, Katsumasa; Tatematsu, Atsushi; Hirano, Masashi; Hoshi, Harutaka; Kawaragi, Chie; Kobayashi, Youko; Sakamoto, Kazunobu; Journeau, Christophe; Kim, Han-Chul; Klein-Hessling, Walter; Sonnenkalb, Martin; Koganeya, Toshiyuki; White, Andrew; ); Lind, Terttaliisa; Zimmermann, Martin; Lindholm, Ilona; Castelo Lopez, Carlos; Nagase, Fumihisa; Washiya, Tadahiro; Oima, Hirofumi; Okada, Hiro; Richards, Stuart; West, Steven; Sandberg, Nils; Suzuki, Shunichi; Vitanza, Carlo; Yamanaka, Yasunori

    2017-02-01

    One of the imperatives following the accident at the Fukushima Daiichi nuclear power station is for the nuclear science and industry communities to ensure that knowledge gaps in nuclear safety are identified and that research programs to address these gaps are being instituted. In recognition of broad international interest in additional information that could be gained from post-accident examinations related to Fukushima Daiichi, Japan recommended to the Committee on the Safety of Nuclear Installations (CSNI) in June 2013 that a process be developed to identify and follow up on opportunities to address safety research gaps. Consequently, a Senior Expert Group (SEG) on Safety Research Opportunities post-Fukushima (SAREF) was formed. The members of the group are senior technical experts from technical support organisations, nuclear regulatory authorities and Japanese organisations responsible for planning and execution of Fukushima Daiichi decommissioning. The domain of interest for the group is activities that address safety research knowledge gaps and also the needs of Fukushima Daiichi decommissioning. SEG on SAREF identified areas where these two interests intersect or overlap, and activities that could be undertaken to generate information of common benefit. The group's output is documented in this report; Chapter 2 describes the current status of the damaged units at Fukushima Daiichi NPS; Chapter 3 summarises safety research areas of common interest; Chapter 4 summarises the safety research activities recommended as short-term projects; Chapter 5 summarises those as long-term considerations; Chapter 6 supplies conclusions and recommendations. The appendix contains detailed information compiled by the SEG members on all safety research areas of interest

  4. Federal Plan for Cyber Security and Information Assurance Research and Development

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — Powerful personal computers, high-bandwidth and wireless networking technologies, and the widespread use of the Internet have transformed stand-alone computing...

  5. The Effects of Ability Grouping: A Meta-Analysis of Research Findings.

    Science.gov (United States)

    Noland, Theresa Koontz; Taylor, Bob L.

    The study reported in this paper quantitatively integrated the recent research findings on ability grouping in order to generalize about these effects on student achievement and student self-concept. Meta-analysis was used to statistically integrate the empirical data. The relationships among various experimental variables including grade level,…

  6. Supervision of School and Youth Groups on Lift-Served Ski Slopes: A Research Perspective

    Science.gov (United States)

    Brookes, Andrew; Holmes, Peter

    2014-01-01

    Supervised practice is a common feature of many snow sports excursions to downhill ski resorts by school or youth groups, often in combination with lessons from a ski school. What is the role of supervision in preventing mishaps, injury, or fatalities? This article presents results of a search of published snow sports safety research for evidence…

  7. College Students' Interpretation of Research Reports on Group Differences: The Tall-Tale Effect

    Science.gov (United States)

    Hogan, Thomas P.; Zaboski, Brian A.; Perry, Tiffany R.

    2015-01-01

    How does the student untrained in advanced statistics interpret results of research that reports a group difference? In two studies, statistically untrained college students were presented with abstracts or professional associations' reports and asked for estimates of scores obtained by the original participants in the studies. These estimates…

  8. Collaborative translational research leading to multicenter clinical trials in Duchenne muscular dystrophy: the Cooperative International Neuromuscular Research Group (CINRG).

    Science.gov (United States)

    Escolar, Diana M; Henricson, Erik K; Pasquali, Livia; Gorni, Ksenija; Hoffman, Eric P

    2002-10-01

    Progress in the development of rationally based therapies for Duchenne muscular dystrophy has been accelerated by encouraging multidisciplinary, multi-institutional collaboration between basic science and clinical investigators in the Cooperative International Research Group. We combined existing research efforts in pathophysiology by a gene expression profiling laboratory with the efforts of animal facilities capable of conducting high-throughput drug screening and toxicity testing to identify safe and effective drug compounds that target different parts of the pathophysiologic cascade in a genome-wide drug discovery approach. Simultaneously, we developed a clinical trial coordinating center and an international network of collaborating physicians and clinics where those drugs could be tested in large-scale clinical trials. We hope that by bringing together investigators at these facilities and providing the infrastructure to support their research, we can rapidly move new bench discoveries through animal model screening and into therapeutic testing in humans in a safe, timely and cost-effective setting.

  9. Summary of the 2017 Alcohol and Immunology Research Interest Group (AIRIG) meeting.

    Science.gov (United States)

    Hulsebus, Holly J; Curtis, Brenda J; Molina, Patricia E; Afshar, Majid; Boule, Lisbeth A; Morris, Niya; Keshavarzian, Ali; Kolls, Jay K; Yeligar, Samantha M; Price, Michael E; Wyatt, Todd A; Choudhry, Mashkoor A; Kovacs, Elizabeth J

    2018-06-01

    On June 24, 2017, the 22nd annual Alcohol and Immunology Research Interest Group (AIRIG) meeting was held as a satellite conference during the annual Research Society on Alcoholism (RSA) Scientific Meeting in Denver, Colorado. The 2017 meeting focused broadly on mechanisms that link alcohol to tissue injury and inflammation, and how this research can be translated to improve human health. Two plenary sessions composed the meeting, which first explored the association between alcohol and trauma/tissue injury, and finished with a discussion of alcohol and mucosal inflammation. The presentations encompassed diverse areas of alcohol research, from effects on the brain, to airway and pulmonary systems, to gut barrier disruption. The discussions also thoughtfully highlighted how current laboratory and clinical research can be used to prevent or treat alcohol-related morbidity and mortality. Copyright © 2017 Elsevier Inc. All rights reserved.

  10. Comparison Groups in Yoga Research: A Systematic Review and Critical Evaluation of the Literature

    Science.gov (United States)

    Groessl, Erik; Maiya, Meghan; Sarkin, Andrew; Eisen, Susan V.; Riley, Kristen; Elwy, A. Rani

    2014-01-01

    Objectives Comparison groups are essential for accurate testing and interpretation of yoga intervention trials. However, selecting proper comparison groups is difficult because yoga comprises a very heterogeneous set of practices and its mechanisms of effect have not been conclusively established. Methods We conducted a systematic review of the control and comparison groups used in published randomized controlled trials (RCTs) of yoga. Results We located 128 RCTs that met our inclusion criteria; of these, 65 included only a passive control and 63 included at least one active comparison group. Primary comparison groups were physical exercise (43%), relaxation/meditation (20%), and education (16%). Studies rarely provided a strong rationale for choice of comparison. Considering year of publication, the use of active controls in yoga research appears to be slowly increasing over time. Conclusions Given that yoga has been established as a potentially powerful intervention, future research should use active control groups. Further, care is needed to select comparison conditions that help to isolate the specific mechanisms of yoga’s effects. PMID:25440384

  11. Return of individual research results and incidental findings in the clinical trials cooperative group setting.

    Science.gov (United States)

    Ferriere, Michael; Van Ness, Brian

    2012-04-01

    The National Cancer Institute (NCI)-funded cooperative group cancer clinical trial system develops experimental therapies and often collects samples from patients for correlative research. The cooperative group bank (CGB) system maintains biobanks with a current policy not to return research results to individuals. An online survey was created, and 10 directors of CGBs completed the surveys asking about understanding and attitudes in changing policies to consider return of incidental findings (IFs) and individual research results (IRRs) of health significance. The potential impact of the 10 consensus recommendations of Wolf et al. presented in this issue are examined. Reidentification of samples is often not problematic; however, changes to the current banking and clinical trial systems would require significant effort to fulfill an obligation of recontact of subjects. Additional resources, as well as a national advisory board would be required to standardize implementation.

  12. [Role of multicenter study groups for clinical research in hematology and oncology].

    Science.gov (United States)

    Gökbuget, N; Hoelzer, D

    2009-04-01

    During the past 25 years a highly effective infrastructure for clinical trials was developed in hematology. Following initial funding by the BMFT (Ministry for Research and Technology) a number of large multicenter study groups for leukemia and lymphoma were developed. Treatment results from these studies often represent the"gold standard". However, since no standard therapy is defined for these diseases, the study groups aim to treat all patients within treatment optimization trials (TOT) to combine research and care. They contribute considerably to quality control in therapy and diagnostics, e.g., by establishing central reference laboratories. The regulatory requirements for clinical trials were extended considerably after the activation of the 12th drug law and TOTs now have to fulfill requirements similar to registration trials in the pharmaceutical industry. Due to the considerable bureaucratic effort and increased costs, only few large multicenter trials could thereafter be initiated and a substantial disadvantage for independent academic research becomes clearly evident.

  13. Introduction to Hardware Security

    Directory of Open Access Journals (Sweden)

    Yier Jin

    2015-10-01

    Full Text Available Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain and to help both academia and industry investigate countermeasures and solutions to solve hardware security problems, we will introduce the key concepts of hardware security as well as its relations to related research topics in this survey paper. Emerging hardware security topics will also be clearly depicted through which the future trend will be elaborated, making this survey paper a good reference for the continuing research efforts in this area.

  14. X-ray fluorescence in Member States: Philippines. XRF activities at Analytical Measurements Research Group, Philippine Nuclear Research Institute

    International Nuclear Information System (INIS)

    Pabroa, Corazon B.; Castaneda, Soledad S.; Almoneda, Rosalina V.; Sucgang, Raymond J.; Racho, Joseph Michael D.; Morco, Ryan P.; Cuyco, Danilo; Jimenez, Gloria; Santos, Flora L.

    2008-01-01

    Full text: XRF analysis and activities of the Analytical Measurements Research (AMR) Group (see Fig.1) of the Philippine Nuclear Research Institute (PNRI) focus on both research and analytical services. Air pollution research, in particular source apportionment studies, requires multi-elemental data for a substantial number of samples. In the PNRI, energy-dispersive X-ray fluorescence (EDXRF) has been used as an effective tool for providing such multi-elemental data. With the latest acquisition of the Panalytical Epsilon 5 (E5) EDXRF system, the process of quantification has become easier and faster with the auto-quantify method. Other research involvements of the group are in the analysis of samples in relation to mineral explorations and the elemental characterization of water in support for isotope hydrology research. The AMR group, as part of its function to provide analytical services, offers qualitative or semi quantitative analysis of solid samples using the auto quantify method, quantitative analysis of environmental samples using the emission-transmission method and quantitative analysis of air particulate matter collected on filters. Telephone wire materials sold in junkshops (alleged to have been pilfered from installed telephone lines of a major telecommunications company in the country) and materials being assessed in relation to patent claims are other examples of samples submitted for analytical services. As mentioned, a useful feature of the E5 system is the use of the auto-quantify (AQ) method. Calibration lines used for this type of application are obtained using the fundamental parameter (FP) model. For AQ applications, accurate results are obtained for samples prepared as fused glass beads in which the whole matrix is known. However, only qualitative or semi quantitative analysis can be applied for other types of solid samples. The AQ method was adapted for the multi-elemental analysis of air particulates using the MicroMatter standards to set

  15. The role of multiple-group measurement invariance in family psychology research.

    Science.gov (United States)

    Kern, Justin L; McBride, Brent A; Laxman, Daniel J; Dyer, W Justin; Santos, Rosa M; Jeans, Laurie M

    2016-04-01

    Measurement invariance (MI) is a property of measurement that is often implicitly assumed, but in many cases, not tested. When the assumption of MI is tested, it generally involves determining if the measurement holds longitudinally or cross-culturally. A growing literature shows that other groupings can, and should, be considered as well. Additionally, it is noted that the standard techniques for investigating MI have been focused almost exclusively on the case of 2 groups, with very little work on the case of more than 2 groups, even though the need for such techniques is apparent in many fields of research. This paper introduces and illustrates a model building technique to investigating MI for more than 2 groups. This technique is an extension of the already-existing hierarchy for testing MI introduced by Meredith (1993). An example using data on father involvement in 5 different groups of families of children with and without developmental disabilities from the Early Childhood Longitudinal Study-Birth Cohort dataset will be given. We show that without considering the possible differential functioning of the measurements on multiple developmental groups, the differences present between the groups in terms of the measurements may be obscured. This could lead to incorrect conclusions. (c) 2016 APA, all rights reserved).

  16. "Cocoa and Chocolate: Science and  Gastronomy"-The Second Annual Workshop of the  Research Institute on Nutrition and Food Security  (INSA): 9 November 2016.

    Science.gov (United States)

    Massot-Cladera, Malen; Pérez-Cano, Francisco; Llorach, Rafael; Urpi-Sarda, Mireia

    2017-02-17

    The Research Institute on Nutrition and Food Security at the University of Barcelona (INSA-UB) was founded in 2005 by twenty-two research groups from the Faculties of Pharmacy and Food Science; Biology; Chemistry; and Geography and History, as well as other UB-affiliated centers and hospitals [...].

  17. “Cocoa and Chocolate: Science and  Gastronomy”—The Second Annual Workshop of the  Research Institute on Nutrition and Food Security  (INSA: 9 November 2016

    Directory of Open Access Journals (Sweden)

    Malen Massot‐Cladera

    2017-02-01

    Full Text Available The Research Institute on Nutrition and Food Security at the University of Barcelona (INSA‐UB was founded in 2005 by twenty‐two research groups from the Faculties of Pharmacy and Food Science; Biology; Chemistry; and Geography and History, as well as other UB‐affiliated centers and hospitals [...

  18. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  19. Group Supervision in Psychotherapy. Main Findings from a Swedish Research Project on Psychotherapy Supervision in a Group Format

    Science.gov (United States)

    Ogren, Marie-Louise; Sundin, Eva C.

    2009-01-01

    Psychotherapy supervision is considered crucial for psychotherapists in training. During the last decades, group supervision has been a frequently used format in many countries. Until recently, very few studies had evaluated the small-group format for training of beginner psychotherapists and psychotherapy supervisors. This article aims to…

  20. System Security Authorization Agreement (SSAA) for the WIRE Archive and Research Facility

    Science.gov (United States)

    2002-01-01

    The Wide-Field Infrared Explorer (WIRE) Archive and Research Facility (WARF) is operated and maintained by the Department of Physics, USAF Academy. The lab is located in Fairchild Hall, 2354 Fairchild Dr., Suite 2A103, USAF Academy, CO 80840. The WARF will be used for research and education in support of the NASA Wide Field Infrared Explorer (WIRE) satellite, and for related high-precision photometry missions and activities. The WARF will also contain the WIRE preliminary and final archives prior to their delivery to the National Space Science Data Center (NSSDC). The WARF consists of a suite of equipment purchased under several NASA grants in support of WIRE research. The core system consists of a Red Hat Linux workstation with twin 933 MHz PIII processors, 1 GB of RAM, 133 GB of hard disk space, and DAT and DLT tape drives. The WARF is also supported by several additional networked Linux workstations. Only one of these (an older 450 Mhz PIII computer running Red Hat Linux) is currently running, but the addition of several more is expected over the next year. In addition, a printer will soon be added. The WARF will serve as the primary research facility for the analysis and archiving of data from the WIRE satellite, together with limited quantities of other high-precision astronomical photometry data from both ground- and space-based facilities. However, the archive to be created here will not be the final archive; rather, the archive will be duplicated at the NSSDC and public access to the data will generally take place through that site.

  1. Ethics and equity in research priority-setting: stakeholder engagement and the needs of disadvantaged groups.

    Science.gov (United States)

    Bhaumik, Soumyadeep; Rana, Sangeeta; Karimkhani, Chante; Welch, Vivian; Armstrong, Rebecca; Pottie, Kevin; Dellavalle, Robert; Dhakal, Purushottam; Oliver, Sandy; Francis, Damian K; Nasser, Mona; Crowe, Sally; Aksut, Baran; Amico, Roberto D

    2015-01-01

    A transparent and evidence-based priority-setting process promotes the optimal use of resources to improve health outcomes. Decision-makers and funders have begun to increasingly engage representatives of patients and healthcare consumers to ensure that research becomes more relevant. However, disadvantaged groups and their needs may not be integrated into the priority-setting process since they do not have a "political voice" or are unable to organise into interest groups. Equitable priority-setting methods need to balance patient needs, values, experiences with population-level issues and issues related to the health system.

  2. Outlining and dictating scientific manuscripts is a useful method for health researchers: A focus group interview.

    Science.gov (United States)

    Andresen, Kristoffer; Laursen, Jannie; Rosenberg, Jacob

    2018-01-01

    Young researchers may experience difficulties when writing scientific articles for publication in biomedical journals. Various methods may facilitate the writing process including outlining the paper before the actual writing and using dictation instead of writing the first draft. The aim of this study was to investigate the experiences and difficulties for young, experienced researchers when writing articles using a detailed outline and dictation of the first draft. We used qualitative focus group interviews and the study was reported according to the COnsolidated criteria for REporting Qualitative research guideline. Participants were sampled from a group of researchers participating in a writing retreat/course. The interviews were recorded on a digital recorder and transcribed. The text was analyzed according to content analysis and coded and condensed into themes and subthemes. Groups of participants were added until data saturation was reached. A total of 14 researchers participated (9 women and 5 men). Their clinical experience was median (range) of 6 (1-11) years since graduation from medical school. Two themes arose during the analyses of the data: "Process guidance with the outline as the map" and "arrival at dictation." The outline was used in the preparation phase leading up to the day of dictation and was used in collaboration with co-authors and supervisors. The participants found it to be a useful tool for preparing the manuscript and dictating their initial first full draft. Experienced young researchers found beneficial effects of using a structured outline to prepare for dictation of scientific articles. The outline was a tool that would develop in close collaboration with co-authors and mentors. With dictation, a full first draft of a manuscript can be produced in a few hours. Participants positively evaluated this structured and reproducible way of producing scientific articles.

  3. A Pilot Examination of the Methods Used to Counteract Insider Threat Security Risks Associated with the Use of Radioactive Materials in the Research and Clinical Setting.

    Science.gov (United States)

    Tsenov, B G; Emery, R J; Whitehead, L W; Gonzalez, J Reingle; Gemeinhardt, G L

    2018-03-01

    While many organizations maintain multiple layers of security control methodologies to prevent outsiders from gaining unauthorized access, persons such as employees or contractors who have been granted legitimate access can represent an "insider threat" risk. Interestingly, some of the most notable radiological events involving the purposeful contamination or exposure of individuals appear to have been perpetrated by insiders. In the academic and medical settings, radiation safety professionals focus their security efforts on (1) ensuring controls are in place to prevent unauthorized access or removal of sources, and (2) increasing security controls for the unescorted accessing of large sources of radioactivity (known as "quantities of concern"). But these controls may not completely address the threat insiders represent when radioactive materials below these quantities are present. The goal of this research project was to characterize the methodologies currently employed to counteract the insider security threat for the misuse or purposeful divergence of radioactive materials used in the academic and medical settings. A web-based survey was used to assess how practicing radiation safety professionals in academic and medical settings anticipate, evaluate, and control insider threat security risks within their institutions. While all respondents indicated that radioactive sources are being used in amounts below quantities of concern, only 6 % consider insider threat security issues as part of the protocol review for the use of general radioactive materials. The results of this survey identify several opportunities for improvement for institutions to address security gaps.

  4. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  5. Research ethics in Canada: experience of a group operating a human embryo and fetal tissue bank.

    Science.gov (United States)

    Milos, N; Bamforth, S; Bagnall, K

    1999-04-01

    A Canadian research group is establishing a human embryo and fetal tissue bank. Its purpose is to provide researchers with frozen or fixed tissue specimens for use in protein and gene expression studies. Several legal and ethical issues have arisen, including questions about consent, use of these rare tissues, cost recovery, and profit-making. These issues are discussed here in light of the present lack of legislation in Canada. We make recommendations in these areas, and suggest that the bank's operations could legally fall under the jurisdiction of the Human Tissue Gift Act.

  6. The use of Facebook for virtual asynchronous focus groups in qualitative research.

    Science.gov (United States)

    Biedermann, Narelle

    2018-02-01

    The Internet and the development of more user-engaging applications have opened a whole new world for researchers as a means of recruitment and data collection source. This paper describes the methodological approach of a research study that explored the experiences of Australian military spouses who packed up their family and home to accompany their spouse on an overseas posting. The study used Facebook as a recruitment tool and then as a data source through the conduct of an asynchronous virtual focus group. This paper outlines the advantages and disadvantages of this unique data source as a means of capturing the voices of a hard-to-reach population.

  7. Research on Food Quality Security of China’s Food Import and Export

    Directory of Open Access Journals (Sweden)

    Pengling Liu

    2014-04-01

    Full Text Available This article researches quality and safety of food at home and abroad on the basis of present situation, cause and effect, from the point of import and export of food quality and safety in China, by combining with economic theories and empirical analysis, from a macro perspective study of China’s import and export food safety issues impact on economic and social development, and study the experience of other developed countries advanced management experience in the quality and safety of food imports and exports. Finally, after the combination of the analysis, make recommendations to protect China’s import and export food safety measures and provide policy proposals.

  8. The work of the 'Irradiation Damage' sub-group of the EURATOM Working Group on Research Reactor Dosimetry

    International Nuclear Information System (INIS)

    Genthon, J.P.

    1975-01-01

    The EURATOM Working Group on Reactor Dosimetry is investigating the problems of the dosimetry of radiation damage experiments. Papers have been published on the dosimetry of graphite and irradiation of metals: the model chosen, the quantities employed to express the fluences, numerical values, measurements, and measurement techniques. The ensuing work of the EURATOM Working Group of Reactor Dosimetry in these areas will deal with the measurement methods required for the dosimetry of radiation damage. (Auth.)

  9. Computer Support of Groups: Theory-Based Models for GDSS Research

    OpenAIRE

    V. Srinivasan Rao; Sirkka L. Jarvenpaa

    1991-01-01

    Empirical research in the area of computer support of groups is characterized by inconsistent results across studies. This paper attempts to reconcile the inconsistencies by linking the ad hoc reasoning in the studies to existing theories of communication, minority influence and human information processing. Contingency models are then presented based on the theories discussed. The paper concludes by discussing the linkages between the current work and other recently published integrations of...

  10. Supporting self-management by Community Matrons through a group intervention; an action research study.

    Science.gov (United States)

    Barkham, Abigail M; Ersser, Steven J

    2017-07-01

    The aim of this study was to examine the feasibility and impact of a group intervention by Community Matrons to support those living with multiple long-terms conditions. Little evidence exists as to how the role of the Community Matron (CM) should be delivered to effectively enhance disease self-management and levels of self-efficacy for the service users. This qualitative participatory action research study explored the use of group work as a method of intervention by CMs. A purposive sample of 29 participants was recruited. Each patient group had 8-10 participants, led by a CM working in both the researcher and practitioner role, operating over 12-month period. Data were collected by participant observation, researcher reflexive account and interviews. Grounded theory method was used to systematically analyse the data. Three main data categories emerged: (i) comparison by patients that leads to re-motivation of the self; (ii) learning, leading to enhanced self-management techniques, through storytelling and understanding of each other's experiences; and (iii) ownership that resulted in the self-awareness, cognisance and insight into the role of the support group they were based in and how it benefited them. The core category of 'Taking back the self - understanding the whole,' conveyed the impact that this care delivery method had upon readjusting the balance of power between health professional and service users and its consequence in refreshing and improving their self-management and the patients' self-efficacy. It was concluded that CM intervention using a model of group learning can lead to more effective and efficient support, through improving self-efficacy and patients' related self-management ability. © 2017 John Wiley & Sons Ltd.

  11. Report of the National Technical Planning Group on Uranium Tailings Research

    International Nuclear Information System (INIS)

    Lapp, P.A.

    1981-09-01

    The National Technical Planning Group on Uranium Tailings Research was formed in 1980 to review present activities and plan a research program on the management of wastes after a mine and mill have shut down. At present there are more than 100 million tonnes of uranium tailings on the surface in Canada. Most of these are under management; however, some 8 million tonnes have been abandoned completely. The group concluded that: 1) there has been no systematic attempt to collect and organize the results of measurements already made on tailings; 2) there is an inadequate understanding of the processes that take place in tailings and in the pathways to the biosphere; 3) there is insufficient evidence on the extent of the long-term problem in the closeout of a uranium tailings basin; 4) there is a need to establish standardized measurement methodologies to improve the quality of data taken at different sites across Canada; 5) generic research and development on tailings disposal technology should be within the scope of a national program, whereas site-specific work is the purview of the mines and regulatory agencies; and 6) the uranium producers' contribution to the national tailings program should be their research on site-specific disposal alternatives. The first of these conclusions leads to the proposal to establish a national uranium tailings research program. The second suggests the need for a modelling program, the third and fourth for a national measurement program, and the remaining conclusions refer to disposal technologies research. The conclusions form the basis for a set of recommendations on uranium tailings research

  12. Empirical research on financial capability evaluation of A-share listed companies in the securities industry based on principal component analysis

    Directory of Open Access Journals (Sweden)

    Xiuping Wang

    2017-11-01

    Full Text Available Based on the relevant financial data indicators of A-share markets of Shanghai and Shenzhen in 2009, with all of 29 listed companies in the securities industry as the research objects, this paper selects 10variables that can fully reflect the financial capability indicators and uses the principal component analysis to carry out the empirical research on the financial capability. The research results show that the comprehensive financial capability of listed companies in A-share securities industry must be focused on the following four capabilities, investment and income, profit, capital composition and debt repayment and cash flow indicators. In addition, the principal component analysis can effectively evaluate the financial capability of listed companies in A-share securities industry, and solve the problems in the previous analysis methods, such as excessive indicators, information overlapping and so on.

  13. A case study of the Secure Anonymous Information Linkage (SAIL) Gateway: A privacy-protecting remote access system for health-related research and evaluation☆

    Science.gov (United States)

    Jones, Kerina H.; Ford, David V.; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J.; Heaven, Martin L.; Thayer, Daniel S.; McNerney, Cynthia L.; Lyons, Ronan A.

    2014-01-01

    With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. PMID:24440148

  14. A case study of the Secure Anonymous Information Linkage (SAIL) Gateway: a privacy-protecting remote access system for health-related research and evaluation.

    Science.gov (United States)

    Jones, Kerina H; Ford, David V; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J; Heaven, Martin L; Thayer, Daniel S; McNerney, Cynthia L; Lyons, Ronan A

    2014-08-01

    With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. Copyright © 2014 The Aurthors. Published by Elsevier Inc. All rights reserved.

  15. The value of evaluating parenting groups: a new researcher's perspective on methods and results.

    Science.gov (United States)

    Cabral, Judy

    2013-06-01

    The aim of this research project was to evaluate the impact of the Solihull Approach Understanding Your Child's Behaviour (UYCB) parenting groups on the participants' parenting practice and their reported behaviour of their children. Validated tools that met both the Solihull Child and Adolescent Mental Health Service (CAMHS) and academic requirements were used to establish what changes, if any, in parenting practice and children's behaviour (as perceived by the parent) occur following attendance of a UYCB parenting group. Independent evidence of the efficacy of the Solihull Approach UYCB programme was collated. Results indicated significant increases in self-esteem and parenting sense of competence; improvement in the parental locus of control; a decrease in hyperactivity and conduct problems and an increase in pro-social behaviour, as measured by the 'Strength and Difficulties' questionnaire. The qualitative and quantitative findings corroborated each other, demonstrating the impact and effectiveness of the programme and supporting anecdotal feedback on the success of UYCB parenting groups.

  16. Initial experience with a group presentation of study results to research participants

    Directory of Open Access Journals (Sweden)

    Bent Stephen

    2008-03-01

    Full Text Available Abstract Background Despite ethical imperatives, informing research participants about the results of the studies in which they take part is not often performed. This is due, in part, to the costs and burdens of communicating with each participant after publication of the results. Methods Following the closeout and publication of a randomized clinical trial of saw palmetto for treatment of symptoms of benign prostatic hyperplasia, patients were invited back to the research center to participate in a group presentation of the study results. Results Approximately 10% of participants attended one of two presentation sessions. Reaction to the experience of the group presentation was very positive among the attendees. Conclusion A group presentation to research participants is an efficient method of communicating study results to those who desire to be informed and was highly valued by those who attended. Prospectively planning for such presentations and greater scheduling flexibility may result in higher attendance rates. Trial Registration Number Clinicaltrials.gov #NCT00037154

  17. Long-term program for research and development of group separation and disintegration techniques

    International Nuclear Information System (INIS)

    1988-01-01

    In Japan, the basic guidelines state that high-level radioactive wastes released from reprocessing of spent fuel should be processed into stable solid material, followed by storage for cooling for 30-50 years and disposal in the ground at a depth of several hundreds of meters. The Long-Term Program for Research and Development of Group Separation and Disintegration Techniques is aimed at efficient disposal of high-level wastes, reutilization of useful substances contained, and improved safety. Important processes include separation of nuclides (group separation, individual nuclide separation) and conversion (disintegration) of long-lived nuclides into short-lived or non-radioactive one. These processes can reduce the volume of high-level wastes to be left for final disposal. Research and development projects have been under way to provide techniques to separate high-level waste substances into four groups (transuranic elements, strontium/cesium, technetium/platinum group elements, and others). These projects also cover recovery of useful metals and efficient utilization of separated substances. For disintegration, conceptual studies have been carried out for the application of fast neutron beams to conversion of long half-life transuranium elements into short half-life or non-radioactive elements. (N.K.)

  18. Online Facebook Focus Group Research of Hard-to-Reach Participants

    Directory of Open Access Journals (Sweden)

    Anastasia Aldelina Lijadi

    2015-12-01

    Full Text Available Conducting discovery-oriented qualitative research about the life experiences of hard-to-reach individuals posed several challenges for recruiting participants and collecting rich textual data. In a study pertaining the experiences of Third Culture Kids (TCKs, we explored the benefits of the social media, such as Facebook as a platform to collect data. TCKs are individuals who define their sense of belonging to the third culture trailing their parents moving across borders during their developmental years. Adult TCKs live in many different countries, and accessing and interviewing respondents could be a difficult and costly endeavor. In this article, the authors share their experience conducting online, asynchronous focus groups using a Facebook platform. We reflect upon the process of setting up a secret Facebook focus group for research purposes, recruiting participants, rapport building between facilitator and participants, monitoring and keeping track of participants’ responses, and the dynamics emerging within an online focus group. We also discuss the novelty, limitations, and benefits of the Facebook focus group as an emerging mode for collecting qualitative data from hard-to-reach participants.

  19. Drug utilization research in primary health care as exemplified by physicians' quality assessment groups.

    Science.gov (United States)

    von Ferber, L; Luciano, A; Köster, I; Krappweis, J

    1992-11-01

    Drugs in primary health care are often prescribed for nonrational reasons. Drug utilization research investigates the prescription of drugs with an eye to medical, social and economic causes and consequences of the prescribed drug's utilization. The results of this research show distinct differences in drug utilization in different age groups and between men and women. Indication and dosage appear irrational from a textbook point of view. This indicates nonpharmacological causes of drug utilization. To advice successfully changes for the better quality assessment groups of primary health care physicians get information about their established behavior by analysis of their prescriptions. The discussion and the comparisons in the group allow them to recognize their irrational prescribing and the social, psychological and economic reasons behind it. Guidelines for treatment are worked out which take into account the primary health care physician's situation. After a year with 6 meetings of the quality assessment groups the education process is evaluated by another drug utilization analysis on the basis of the physicians prescription. The evaluation shows a remarkable improvement of quality and cost effectiveness of the drug therapy of the participating physicians.

  20. A scoping review of traditional food security in Alaska.

    Science.gov (United States)

    Walch, Amanda; Bersamin, Andrea; Loring, Philip; Johnson, Rhonda; Tholl, Melissa

    2018-12-01

    Food insecurity is a public health concern. Food security includes the pillars of food access, availability and utilisation. For some indigenous peoples, this may also include traditional foods. To conduct a scoping review on traditional foods and food security in Alaska. Google Scholar and the High North Research Documents were used to search for relevant primary research using the following terms: "traditional foods", "food security", "access", "availability", "utilisation", "Alaska", "Alaska Native" and "indigenous". Twenty four articles from Google Scholar and four articles from the High North Research Documents were selected. The articles revealed three types of research approaches, those that quantified traditional food intake (n=18), those that quantified food security (n=2), and qualitative articles that addressed at least one pillar of food security (n=8). Limited primary research is available on food security in Alaskan. Few studies directly measure food security while most provide a review of food security factors. Research investigating dietary intake of traditional foods is more prevalent, though many differences exist among participant age groups and geographical areas. Future research should include direct measurements of traditional food intake and food security to provide a more complete picture of traditional food security in Alaska.

  1. Academic research groups: evaluation of their quality and quality of their evaluation

    Science.gov (United States)

    Berche, Bertrand; Holovatch, Yuri; Kenna, Ralph; Mryglod, Olesya

    2016-02-01

    In recent years, evaluation of the quality of academic research has become an increasingly important and influential business. It determines, often to a large extent, the amount of research funding flowing into universities and similar institutes from governmental agencies and it impacts upon academic careers. Policy makers are becoming increasingly reliant upon, and influenced by, the outcomes of such evaluations. In response, university managers are increasingly attracted to simple metrics as guides to the dynamics of the positions of their various institutions in league tables. However, these league tables are invariably drawn up by inexpert bodies such as newspapers and magazines, using arbitrary measures and criteria. Terms such as “critical mass” and “h-index” are bandied about without understanding of what they actually mean. Rather than accepting the rise and fall of universities, departments and individuals on a turbulent sea of arbitrary measures, we suggest it is incumbent upon the scientific community itself to clarify their nature. Here we report on recent attempts to do that by properly defining critical mass and showing how group size influences research quality. We also examine currently predominant metrics and show that these fail as reliable indicators of group research quality.

  2. Technical Note: Harmonizing met-ocean model data via standard web services within small research groups

    Science.gov (United States)

    Signell, Richard; Camossi, E.

    2016-01-01

    Work over the last decade has resulted in standardised web services and tools that can significantly improve the efficiency and effectiveness of working with meteorological and ocean model data. While many operational modelling centres have enabled query and access to data via common web services, most small research groups have not. The penetration of this approach into the research community, where IT resources are limited, can be dramatically improved by (1) making it simple for providers to enable web service access to existing output files; (2) using free technologies that are easy to deploy and configure; and (3) providing standardised, service-based tools that work in existing research environments. We present a simple, local brokering approach that lets modellers continue to use their existing files and tools, while serving virtual data sets that can be used with standardised tools. The goal of this paper is to convince modellers that a standardised framework is not only useful but can be implemented with modest effort using free software components. We use NetCDF Markup language for data aggregation and standardisation, the THREDDS Data Server for data delivery, pycsw for data search, NCTOOLBOX (MATLAB®) and Iris (Python) for data access, and Open Geospatial Consortium Web Map Service for data preview. We illustrate the effectiveness of this approach with two use cases involving small research modelling groups at NATO and USGS.

  3. The Symposium Proceedings of the 1998 Air Transport Research Group (ATRG). Volume 2

    Science.gov (United States)

    Reynolds-Feighan, Aisling (Editor); Bowen, Brent D. (Editor)

    1998-01-01

    The Air Transport Research Group of the World Conference on Transportation Research (WCTR) Society was formally launched as a special interest group at the 7th Triennial WCTR in Sydney, Australia in 1995. Since then, our membership base has expanded rapidly, and now includes over 400 active transportation researchers, policy-makers, industry executives, major corporations and research institutes from 28 countries. It became a tradition that the ATRG would hold an international conference at least once a year. In 1998, the ATRG organized a consecutive stream of 14 aviation sessions at the 8th Triennial WCTR Conference (July 12-17: Antwerp). Again, on 19-21 July, 1998, the ATRG Symposium was organized and executed very successfully by Dr. Aisling Reynolds-Feighan of the University College of Dublin. The Aviation Institute at the University of Nebraska at Omaha has published the Proceedings of the 1998 ATRG Dublin Symposium (being co-edited by Dr. Aisling Reynolds-Feighan and Professor Brent Bowen), and the Proceedings of the 1998 WCTR-ATRG Conference (being co-edited by Professors Tae H. Oum and Brent Bowen).

  4. The Importance of Hurricane Research to Life, Property, the Economy, and National Security.

    Science.gov (United States)

    Busalacchi, A. J.

    2017-12-01

    The devastating 2017 Atlantic hurricane season has brought into stark relief how much hurricane forecasts have improved - and how important it is to make them even better. Whereas the error in 48-hour track forecasts has been reduced by more than half, according to the National Hurricane Center, intensity forecasts remain challenging, especially with storms such as Harvey that strengthened from a tropical depression to a Category 4 hurricane in less than three days. The unusually active season, with Hurricane Irma sustaining 185-mph winds for a record 36 hours and two Atlantic hurricanes reaching 150-mph winds simultaneously for the first time, also highlighted what we do, and do not, know about how tropical cyclones will change as the climate warms. The extraordinary toll of Hurricanes Harvey, Irma, and Maria - which may ultimately be responsible for hundreds of deaths and an estimated $200 billion or more in damages - underscores why investments into improved forecasting must be a national priority. At NCAR and UCAR, scientists are working with their colleagues at federal agencies, the private sector, and the university community to advance our understanding of these deadly storms. Among their many projects, NCAR researchers are making experimental tropical cyclone forecasts using an innovative Earth system model that allows for variable resolution. We are working with NOAA to issue flooding, inundation, and streamflow forecasts for areas hit by hurricanes, and we have used extremely high-resolution regional models to simulate successfully the rapid hurricane intensification that has proved so difficult to predict. We are assessing ways to better predict the damage potential of tropical cyclones by looking beyond wind speed to consider such important factors as the size and forward motion of the storm. On the important question of climate change, scientists have experimented with running coupled climate models at a high enough resolution to spin up a hurricane

  5. The OMERACT MRI in Arthritis Working Group - Update on Status and Future Research Priorities.

    Science.gov (United States)

    Østergaard, Mikkel; Bird, Paul; Gandjbakhch, Frédérique; Eshed, Iris; Haugen, Ida K; Haavardsholm, Espen A; Lillegraven, Siri; Foltz, Violaine; Glinatsi, Daniel; Peterfy, Charles; Ejbjerg, Bo; Bøyesen, Pernille; Mease, Philip J; Hermann, Kay-Geert; Emery, Paul; Genant, Harry K; Conaghan, Philip G

    2015-12-01

    To provide an update on the status and future research priorities of the Outcome Measures in Rheumatology (OMERACT) magnetic resonance imaging (MRI) in arthritis working group. A summary is provided of the activities of the group within rheumatoid arthritis (RA), psoriatic arthritis (PsA), and osteoarthritis (OA), and its research priorities. The OMERACT RA MRI score (RAMRIS) evaluating bone erosion, bone edema (osteitis), and synovitis is now the standard method of quantifying articular pathology in RA trials. Cartilage loss is another important part of joint damage, and at the OMERACT 12 conference, we provided longitudinal data demonstrating reliability and sensitivity to change of the RAMRIS JSN component score, supporting its use in future clinical trials. The MRI group has previously developed a PsA MRI score (PsAMRIS). At OMERACT 12, PsAMRIS was evaluated in a randomized placebo-controlled trial of patients with PsA, demonstrating the responsiveness and discriminatory ability of applying the PsAMRIS to hands and feet. A hand OA MRI score (HOAMRIS) was introduced at OMERACT 11, and has subsequently been further validated. At OMERACT 12, good cross-sectional interreader reliability, but variable reliability of change scores, were reported. Potential future research areas were identified at the MRI session at OMERACT 12 including assessment of tenosynovitis in RA and enthesitis in PsA and focusing on alternative MRI techniques. MRI has been further developed and validated as an outcome measure in RA, PsA, and OA. The group will continue its efforts to optimize the value of MRI as a robust biomarker in rheumatology clinical trials.

  6. The Use of the Delphi and Other Consensus Group Methods in Medical Education Research: A Review.

    Science.gov (United States)

    Humphrey-Murto, Susan; Varpio, Lara; Wood, Timothy J; Gonsalves, Carol; Ufholz, Lee-Anne; Mascioli, Kelly; Wang, Carol; Foth, Thomas

    2017-10-01

    Consensus group methods, such as the Delphi method and nominal group technique (NGT), are used to synthesize expert opinions when evidence is lacking. Despite their extensive use, these methods are inconsistently applied. Their use in medical education research has not been well studied. The authors set out to describe the use of consensus methods in medical education research and to assess the reporting quality of these methods and results. Using scoping review methods, the authors searched the Medline, Embase, PsycInfo, PubMed, Scopus, and ERIC databases for 2009-2016. Full-text articles that focused on medical education and the keywords Delphi, RAND, NGT, or other consensus group methods were included. A standardized extraction form was used to collect article demographic data and features reflecting methodological rigor. Of the articles reviewed, 257 met the inclusion criteria. The Modified Delphi (105/257; 40.8%), Delphi (91/257; 35.4%), and NGT (23/257; 8.9%) methods were most often used. The most common study purpose was curriculum development or reform (68/257; 26.5%), assessment tool development (55/257; 21.4%), and defining competencies (43/257; 16.7%). The reporting quality varied, with 70.0% (180/257) of articles reporting a literature review, 27.2% (70/257) reporting what background information was provided to participants, 66.1% (170/257) describing the number of participants, 40.1% (103/257) reporting if private decisions were collected, 37.7% (97/257) reporting if formal feedback of group ratings was shared, and 43.2% (111/257) defining consensus a priori. Consensus methods are poorly standardized and inconsistently used in medical education research. Improved criteria for reporting are needed.

  7. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  8. Refelctions on the security

    Directory of Open Access Journals (Sweden)

    Ladislav Hofreiter

    2013-07-01

    Full Text Available In this paper are presented the author‘s reflections about concept meaning of the security, about his systemic perception and actual scientific access to the security research. The author presented securitology paradigm for valuation security optional reference object.

  9. Association of complementation group and mutation type with clinical outcome in fanconi anemia. European Fanconi Anemia Research Group.

    Science.gov (United States)

    Faivre, L; Guardiola, P; Lewis, C; Dokal, I; Ebell, W; Zatterale, A; Altay, C; Poole, J; Stones, D; Kwee, M L; van Weel-Sipman, M; Havenga, C; Morgan, N; de Winter, J; Digweed, M; Savoia, A; Pronk, J; de Ravel, T; Jansen, S; Joenje, H; Gluckman, E; Mathew, C G

    2000-12-15

    Fanconi anemia (FA) is a clinically and genetically heterogeneous disorder. Clinical care is complicated by variable age at onset and severity of hematologic symptoms. Recent advances in the molecular biology of FA have allowed us to investigate the relationship between FA genotype and the nature and severity of the clinical phenotype. Two hundred forty-five patients from all 7 known complementation groups (FA-A to FA-G) were studied. Mutations were detected in one of the cloned FANC genes in 169 patients; in the remainder the complementation group was assigned by cell fusion or Western blotting. A range of qualitative and quantitative clinical parameters was compared for each complementation group and for different classes of mutation. Significant phenotypic differences were found. FA-G patients had more severe cytopenia and a higher incidence of leukemia. Somatic abnormalities were less prevalent in FA-C, but more common in the rare groups FA-D, FA-E, and FA-F. In FA-A, patients homozygous for null mutations had an earlier onset of anemia and a higher incidence of leukemia than those with mutations producing an altered protein. In FA-C, there was a later age of onset of aplastic anemia and fewer somatic abnormalities in patients with the 322delG mutation, but there were more somatic abnormalities in patients with IVS4 + 4A --> T. This study indicates that FA patients with mutations in the FANCG gene and patients homozygous for null mutations in FANCA are high-risk groups with a poor hematologic outcome and should be considered as candidates both for frequent monitoring and early therapeutic intervention. (Blood. 2000;96:4064-4070)

  10. The Supply of Medical Radioisotopes. Final Report of the Third Mandate of the High-level Group on the Security of Supply of Medical Radioisotopes (2013-2015)

    International Nuclear Information System (INIS)

    Charlton, Kevin; )

    2016-07-01

    At the request of its member countries, the Organisation for Economic Co-operation and Development (OECD) Nuclear Energy Agency (NEA) became involved in global efforts to ensure a secure supply of molybdenum-99 ( 99 Mo)/technetium-99m ( 99m Tc). In April 2009, the High-level Group on the Security of Supply of Medical Radioisotopes (HLG-MR) was created and received an initial, two-year mandate from the NEA Steering Committee for Nuclear Energy to examine the causes of supply shortages of 99 Mo/ 99m Tc and develop a policy approach to address them. In its first mandate, the HLG-MR conducted a comprehensive economic study of the 99 Mo/ 99m Tc supply chain, which identified the key areas of vulnerability and major issues to be addressed. The HLG-MR released a policy approach, including six principles (Appendix 1) and supporting recommendations to help resolve the issues in the 99 Mo/ 99m Tc market. In the second mandate (2011-2013), the HLG-MR worked to encourage the implementation of the six policy principles and promoted an industry transition away from the use of highly enriched uranium (HEU) targets for 99 Mo production. Projects were undertaken by the NEA that resulted in the publication of documents and reports to assist in implementing the HLG-MR policy approach. The second mandate showed that, while commendable progress had occurred in many areas, there were still major issues in the 99 Mo/ 99m Tc market, with some continued government subsidisation, insufficient ORC and inadequate reimbursement for 99 mTc. Potential future periods of supply shortage were identified, particularly concerning the likely loss of significant capacity around 2016. In the third mandate, the HLG-MR continued its efforts to help ensure the global security of supply of 99 Mo/ 99m Tc through implementation of the six policy principles. The NEA undertook a further self-assessment review of the 99 Mo/ 99m Tc supply chain, focusing again on progress with implementing FCR and paid ORC and

  11. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  12. Cloud security mechanisms

    OpenAIRE

    2014-01-01

    Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud...

  13. Finance/security/life.

    OpenAIRE

    Langley, P.

    2017-01-01

    What is the contemporary relation between finance and security? This essay encourages further research into the securitization of finance by developing the notion of ‘finance/security/life’. A focus on the intersections of finance/security/life will be shown to prompt a broadened range of critical, cross-disciplinary concerns with the various ways in which financial markets are positioned as vital to securing wealth, welfare and wellbeing.

  14. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  15. Measuring relational security in forensic mental health services.

    Science.gov (United States)

    Chester, Verity; Alexander, Regi T; Morgan, Wendy

    2017-12-01

    Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment.

  16. Measuring relational security in forensic mental health services

    Science.gov (United States)

    Chester, Verity; Alexander, Regi T.; Morgan, Wendy

    2017-01-01

    Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment. PMID:29234515

  17. On the Question of Methodological Support of Research on Relationships of Interpersonal Significance in Kindergarten Groups

    Directory of Open Access Journals (Sweden)

    Iliyn V.A.

    2016-03-01

    Full Text Available The paper focuses on the importance of in-depth research (in particular, employing an algorithm developed by M.Yu. Kondratyev for defining integral status of an individual on child-child interpersonal relationship in kindergarten groups. Although relationships with significant adults are by all means essential for preschool children, interpersonal relation- ships on the child-child level to a great extent shape the content of the social situation of development in general. Still, when it comes to revealing status and role position of the child in the structure of interpersonal relationships within the kindergarten group, there’s the challenge of defining informal intragroup structure of power in contact community (due to the age specifics. The paper suggests how this challenge may be addressed and provides a version of the technique suitable for preschoolers that helps overcome age restrictions implied by the original technique. Also, the paper reports on the outcomes of approbation of this version which proved its heuristic nature. For instance, the outcomes show a high degree of correlation between the results of kindergarten group members ranking in accordance with their influence upon peers carried out by teachers working in these groups.

  18. The American Oystercatcher (Haematopus palliatus) Working Group: 15 years of collaborative focal species research and management

    Science.gov (United States)

    Simons, Theodore R.

    2017-01-01

    The American Oystercatcher (Haematopus palliatus) Working Group formed spontaneously in 2001 as coastal waterbird biologists recognized the potential for American Oystercatchers to serve as focal species for collaborative research and management. Accomplishments over the past 15 years include the establishment of rangewide surveys, color-banding protocols, mark-resight studies, a revision of the Birds of North America species account, and new mechanisms for sharing ideas and data. Collaborations among State, Federal, and private sector scientists, natural resource managers, and dedicated volunteers have provided insights into the biology and conservation of American Oystercatchers in the United States and abroad that would not have been possible without the relationships formed through the Working Group. These accomplishments illustrate how broad collaborative approaches and the engagement of the public are key elements of effective shorebird conservation programs.

  19. The Alsep Data Recovery Focus Group of NASA's Solar System Exploration Research Virtual Institute

    Science.gov (United States)

    Nagihara, S.; Lewis, L. R.; Nakamura, Y.; Williams, D. R.; Taylor, P. T.; Hills, H. K.; Kiefer, W. S.; Neal, C. R.; Schmidt, G. K.

    2014-12-01

    Astronauts on Apollo 12, 14, 15, 16, and 17 deployed instruments on the Moon for 14 geophysical experiments (passive & active seismic, heat flow, magnetics, etc.) from 1969 to 1972. These instruments were called Apollo Lunar Surface Experiments Packages (ALSEPs). ALSEPs kept transmitting data to the Earth until September 1977. When the observation program ended in 1977, a large portion of these data were not delivered to the National Space Science Data Center for permanent archive. In 2010, for the purpose of searching, recovering, preserving, and analyzing the data that were not previously archived, NASA's then Lunar Science Institute formed the ALSEP Data Recovery Focus Group. The group consists of current lunar researchers and those involved in the ALSEP design and data analysis in the 1960s and 1970s. Among the data not previously archived were the 5000+ 7-track open-reel tapes that recorded raw data from all the ALSEP instruments from April 1973 to February 1976 ('ARCSAV tapes'). These tapes went missing in the decades after Apollo. One of the major achievements of the group so far is that we have found 450 ARCSAV tapes from April to June 1975 and that we are extracting data from them. There are 3 other major achievements by the group. First, we have established a web portal at the Lunar and Planetary Institute, where ~700 ALSEP-related documents, totaling ~40,000 pages, have been digitally scanned and cataloged. Researchers can search and download these documents at www.lpi.usra.edu/ lunar/ALSEP/. Second, we have been retrieving notes and reports left behind by the now deceased/retired ALSEP investigators at their home institutions. Third, we have been re-analyzing the ALSEP data using the information from the recently recovered metadata (instrument calibration data, operation logs, etc.). Efforts are ongoing to get these data permanently archived in the Planetary Data System (PDS).

  20. National Reachback Systems for Nuclear Security: State-of-play report: ERNCIP Thematic Group Radiological and Nuclear Threats to Critical Infrastructure: Deliverable of task 3.1b

    OpenAIRE

    TOIVONEN H.; HUBERT Schoech; REPPENHAGEN GRIM P.; PIBIDA Leticia; JAMES Mark; ZHANG Weihua; PERÄJÄRVI K.

    2015-01-01

    Operational systems for nuclear security in Finland, France, Denmark, UK, US and Canada were reviewed. The Finnish case is a holistic approach to Nuclear Security Detection Architecture, as defined by the International Atomic Energy Agency; reachback is only one component of the system, albeit an important crosscutting element of the detection architecture. The French and US studies concentrate on the reachback itself. The Danish nuclear security system is information-driven, relying on th...