WorldWideScience

Sample records for security research project

  1. CARONTE project: Creating an Agenda for Research on Transportation Security

    Energy Technology Data Exchange (ETDEWEB)

    Leon Bello, J.; Gonzalez Viosca, E.

    2016-07-01

    Europe’s prosperity relies on effective transport systems. Any attacks and disturbances to land freight and passenger transport would have significant impact on economic growth, territorial cohesion, social development and the environment. Unfortunately, there are weaknesses in the land transport security.The objective of CARONTE project is define a future research agenda for security in land transport that focuses on core gaps caused by emerging risks while avoiding any doubling-up of research elsewhere. Its research agenda will cover all threats, including cyber-crime, and security aspects across all modes of land transportation. At the same time, it will respect the fundamental human rights and privacy of European citizens. The step-by-step method of CARONTE’s consortium has analyzed the state of the art and emerging risks; has identified gaps, analyses and assessments of potential solutions; and has produced an overall research agenda for the future. CARONTE’s results will answer the following questions among others: Which existing research projects merit a follow up and extension? Where are the combinations or synergy effects to be attended? Which themes and topics should be elaborated in new research projects? Who should be involved and integrated in future research projects (stakeholders, authorities, etc.)? The CARONTE consortium includes universities and research institutes, companies, and end-users providing with experience in research and consultancy in transportation, logistics, infrastructure management, security and communications. ITENE - Instituto Tecnológico del Embalaje, Transporte y Logística-has been one of the Project partners among a total of 11 members from eight different countries in the European Union which have also been supported via a High Level Advisory Board. (Author)

  2. Final report for the protocol extensions for ATM Security Laboratory Directed Research and Development Project

    Energy Technology Data Exchange (ETDEWEB)

    Tarman, T.D.; Pierson, L.G.; Brenkosh, J.P. [and others

    1996-03-01

    This is the summary report for the Protocol Extensions for Asynchronous Transfer Mode project, funded under Sandia`s Laboratory Directed Research and Development program. During this one-year effort, techniques were examined for integrating security enhancements within standard ATM protocols, and mechanisms were developed to validate these techniques and to provide a basic set of ATM security assurances. Based on our experience during this project, recommendations were presented to the ATM Forum (a world-wide consortium of ATM product developers, service providers, and users) to assist with the development of security-related enhancements to their ATM specifications. As a result of this project, Sandia has taken a leading role in the formation of the ATM Forum`s Security Working Group, and has gained valuable alliances and leading-edge experience with emerging ATM security technologies and protocols.

  3. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  4. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  5. Project Management with IT Security Focus

    OpenAIRE

    Felician Alecu; Paul Pocatilu; Sergiu Capisizu

    2011-01-01

    The paper focus on the main key points related to the IT security project management. The most important lifecycle stages are identified: IT security project proposal definition, project organization, project planning, quality planning, project team organization, IT security project activities management and project closing. The most important success factors for IT security projects are the support of top-management, customer satisfaction, prevention over remediation and continuous progress....

  6. Performativity and the project: enacting urban transport security in Europe

    NARCIS (Netherlands)

    Hoijtink, M.

    2015-01-01

    In April 2011, a large consortium of European rail and security suppliers, transport operators and research organisations launched the Secured Urban Transportation - European Demonstration (SECUR-ED) project with the objective of providing public transport operators with the means to enhance urban

  7. IT Security Specialist | IDRC - International Development Research ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The IT Security Specialist takes a strategic role in the delivery of Infrastructure ... on IT Security to project managers, business clients and senior management. ... as a team member or a team leader by undertaking research, investigations, ...

  8. Final report for the Integrated and Robust Security Infrastructure (IRSI) laboratory directed research and development project

    Energy Technology Data Exchange (ETDEWEB)

    Hutchinson, R.L.; Hamilton, V.A.; Istrail, G.G.; Espinoza, J.; Murphy, M.D.

    1997-11-01

    This report describes the results of a Sandia-funded laboratory-directed research and development project titled {open_quotes}Integrated and Robust Security Infrastructure{close_quotes} (IRSI). IRSI was to provide a broad range of commercial-grade security services to any software application. IRSI has two primary goals: application transparency and manageable public key infrastructure. IRSI must provide its security services to any application without the need to modify the application to invoke the security services. Public key mechanisms are well suited for a network with many end users and systems. There are many issues that make it difficult to deploy and manage a public key infrastructure. IRSI addressed some of these issues to create a more manageable public key infrastructure.

  9. Why Phishing Works: Project for an Information Security Capstone Course

    Science.gov (United States)

    Pollacia, Lissa; Ding, Yan Zong; Yang, Seung

    2015-01-01

    This paper presents a project which was conducted in a capstone course in Information Security. The project focused on conducting research concerning the various aspects of phishing, such as why phishing works and who is more likely to be deceived by phishing. Students were guided through the process of conducting research: finding background and…

  10. The Nabucco Project and Communicating about Energy Security

    Directory of Open Access Journals (Sweden)

    Victor Negrescu

    2013-07-01

    Full Text Available Energy Security was considered by many of the Eastern European countries a priority in their fight for breaking the ties with the former Soviet Union. The dependence of the Eastern European countries to the Russian gas and petroleum generated for most of the local governments a feeling of inferiority that they were willing to replace if the opportunity will be offered. One of the main alternative projects to the Russian gas is the Nabucco Project designed to enable the access to Caspian gas for all the European countries. Knowing that a decision on the realization of the pipeline should be made by the end of June 2013, our article will try to illustrate the importance of the Nabucco Project for the regional and European energy security by studying the history of the project, the competing projects and the recent political evolutions of the project. This will enable researchers, decision makers and policy makers in the energy sector to better evaluate the Nabucco project and better act into promoting it.

  11. Factors Affecting Project Governance Of Arusha Archdiocesan Food Security And Livelihood Project In Monduli District Tanzania.

    Directory of Open Access Journals (Sweden)

    Kisame Deogratious

    2015-06-01

    Full Text Available Abstract This research project dealt with the factors affecting governance of Food security and livelihood projects a case study of the Food security and livelihood project that was implemented by AAIDRO in Monduli district and included 60 respondents all together. The specific objectives of this study intended to access the Leadership styles that are being used in project governance. The findings of the study indicated that 91.7 of the respondents were in favor of their leaders project governance styles it was portrayed that participative leadership style was being used by the leaders for project governance. Based on a sample of 60 project members this study had confirmed that a project leaders leadership roles like mentor facilitator innovator and coordinator are important in influencing project governance effectiveness which includes team mission goal achievement and empowerment open and honest communication

  12. Security Risk Assessment in Software Development Projects

    OpenAIRE

    Svendsen, Heidi

    2017-01-01

    Software security is increasing in importance, linearly with vulnerabilities caused by software flaws. It is not possible to spend all the project s resources on software security. To spend the resources given to security in an effective way, one should know what is most important to protect. By performing a risk analysis the project know which vulnerabilities they face. A risk analysis will prioritise the vulnerabilities, and when the vulnerabilities are prioritised the project know where th...

  13. Spins, Stalls, and Shutdowns: Pitfalls of Qualitative Policing and Security Research

    Directory of Open Access Journals (Sweden)

    Randy K. Lippert

    2015-11-01

    Full Text Available This article explores key elements of qualitative research on policing and security agencies, including barriers encountered and strategies to prevent them. While it is oft-assumed that policing/security agencies are difficult to access due to their clandestine or bureaucratic nature, this article demonstrates this is not necessarily the case, as access was gained for three distinct qualitative research projects. Yet, access and subsequent research were not without pitfalls, which we term security spins, security stalls, and security shutdowns. We illustrate how each was encountered and argue these pitfalls are akin to researchers falling into risk categories, not unlike those used by policing/security agents in their work. Before concluding we discuss methodological strategies for scholars to avoid these pitfalls and to advance research that critically interrogates the immense policing/security realm. URN: http://nbn-resolving.de/urn:nbn:de:0114-fqs1601108

  14. IAEA Nuclear Security Assessment Methodologies (NUSAM) Project for Regulated Facilities

    International Nuclear Information System (INIS)

    Jang, Sung Soon

    2016-01-01

    Nuclear Security Assessment Methodologies (NUSAM) is a coordinate research project. The objectives of the NUSAM project is to establish a risk informed, performance-based methodological framework in a systematic, structured, comprehensive and appropriately transparent manner; to provide an environment for the sharing and transfer of knowledge and experience; and to provide guidance on, and practical examples of good practices in assessing the security of nuclear and other radioactive materials, as well as associated facilities and activities. The author worked as an IAEA scientific secretary of the NUAM project from 2013 to 2015. IAEA launched this project in 2013 and performed many activities: meetings, document development, table-top exercises and computer simulations. Now the project is in the final stage and will be concluded in the late 2016. The project will produce documents on NUSAM assessment methods and case study documents on NPP, Irradiator Facility and Transport. South Korea as a main contributor to this project will get benefits from the NUSAM. In 2014, South Korea introduced force-on-force exercises, which could be used as the assessment of physical protection system by the methods of NUSAM

  15. IAEA Nuclear Security Assessment Methodologies (NUSAM) Project for Regulated Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Jang, Sung Soon [Korea Nuclear Non-proliferation and Control, Daejeon (Korea, Republic of)

    2016-05-15

    Nuclear Security Assessment Methodologies (NUSAM) is a coordinate research project. The objectives of the NUSAM project is to establish a risk informed, performance-based methodological framework in a systematic, structured, comprehensive and appropriately transparent manner; to provide an environment for the sharing and transfer of knowledge and experience; and to provide guidance on, and practical examples of good practices in assessing the security of nuclear and other radioactive materials, as well as associated facilities and activities. The author worked as an IAEA scientific secretary of the NUAM project from 2013 to 2015. IAEA launched this project in 2013 and performed many activities: meetings, document development, table-top exercises and computer simulations. Now the project is in the final stage and will be concluded in the late 2016. The project will produce documents on NUSAM assessment methods and case study documents on NPP, Irradiator Facility and Transport. South Korea as a main contributor to this project will get benefits from the NUSAM. In 2014, South Korea introduced force-on-force exercises, which could be used as the assessment of physical protection system by the methods of NUSAM.

  16. Research Market Gap in Law Enforcement Technology: Lessons from Czech Security Research Funding Programmes

    Directory of Open Access Journals (Sweden)

    Luděk Moravec

    2014-12-01

    Full Text Available While security research funding schemes are nothing new to the EU (Horizon 2020 and FP7, or to several Member States, their priorities and procedures are usually decided administratively or shaped by advisory groups of varying membership. Only recently did the EU shift its focus to the role of end users in security research programmes, seeking their input in order to maximise the utility of funded solutions. Such a hint to limited usefulness of some industrial solutions is not exactly inconspicuous. This paper discusses the gap between the stated needs of law enforcement agencies in terms of R&D funding and the grant project applications in the area of law enforcement. It aims to define and describe the gap, and consequently the market opportunities, between the supply and demand sides represented by industry-driven grant project applications and end-user-formulated calls. The study is based on empirical data from two Czech security research funding programmes that have been running since 2010 and should deliver their results by 2015. It seeks to contribute some preliminary observations about the structure of both end user needs and industry capabilities in such a particular area as law enforcement technology.

  17. National Security Technology Incubation Project Continuation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-09-30

    This document contains a project continuation plan for the National Security Technology Incubator (NSTI). The plan was developed as part of the National Security Preparedness Project (NSPP) funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This continuation plan describes the current status of NSTI (staffing and clients), long-term goals, strategies, and long-term financial solvency goals.The Arrowhead Center of New Mexico State University (NMSU) is the operator and manager of the NSTI. To realize the NSTI, Arrowhead Center must meet several performance objectives related to planning, development, execution, evaluation, and sustainability. This continuation plan is critical to the success of NSTI in its mission of incubating businesses with security technology products and services.

  18. webinos project deliverable: Phase 1 Security Framework

    OpenAIRE

    webinos consortium

    2011-01-01

    The webinos project aims to deliver a cross-device web application runtime environment, providing a unified development platform and standardized inter-device communication and interaction. This document contains the first iteration of the technical security and privacy framework designed for the webinos project. It accompanies two other documents - D3.1 System Specification and D3.2 API Specifications - and refers to concepts developed in them. The security and privacy architecture aims to p...

  19. Vision and Displays for Military and Security Applications The Advanced Deployable Day/Night Simulation Project

    CERN Document Server

    Niall, Keith K

    2010-01-01

    Vision and Displays for Military and Security Applications presents recent advances in projection technologies and associated simulation technologies for military and security applications. Specifically, this book covers night vision simulation, semi-automated methods in photogrammetry, and the development and evaluation of high-resolution laser projection technologies for simulation. Topics covered include: advances in high-resolution projection, advances in image generation, geographic modeling, and LIDAR imaging, as well as human factors research for daylight simulation and for night vision devices. This title is ideal for optical engineers, simulator users and manufacturers, geomatics specialists, human factors researchers, and for engineers working with high-resolution display systems. It describes leading-edge methods for human factors research, and it describes the manufacture and evaluation of ultra-high resolution displays to provide unprecedented pixel density in visual simulation.

  20. Security approaches in using tablet computers for primary data collection in clinical research.

    Science.gov (United States)

    Wilcox, Adam B; Gallagher, Kathleen; Bakken, Suzanne

    2013-01-01

    Next-generation tablets (iPads and Android tablets) may potentially improve the collection and management of clinical research data. The widespread adoption of tablets, coupled with decreased software and hardware costs, has led to increased consideration of tablets for primary research data collection. When using tablets for the Washington Heights/Inwood Infrastructure for Comparative Effectiveness Research (WICER) project, we found that the devices give rise to inherent security issues associated with the potential use of cloud-based data storage approaches. This paper identifies and describes major security considerations for primary data collection with tablets; proposes a set of architectural strategies for implementing data collection forms with tablet computers; and discusses the security, cost, and workflow of each strategy. The paper briefly reviews the strategies with respect to their implementation for three primary data collection activities for the WICER project.

  1. A secure communication scheme using projective chaos synchronization

    International Nuclear Information System (INIS)

    Li Zhigang; Xu Daolin

    2004-01-01

    Most secure communication schemes using chaotic dynamics are based on identical synchronization. In this paper, we show the possibility of secure communication using projective synchronization (PS). The unpredictability of the scaling factor in projective synchronization can additionally enhance the security of communication. It is also showed that the scaling factor can be employed to improve the robustness against noise contamination. The feasibility of the communication scheme in high-dimensional chaotic systems, such as the hyperchaotic Roessler system, is demonstrated. Numerical results show the success in transmitting a sound signal through chaotic systems

  2. Maritime Cyber Security University Research

    Science.gov (United States)

    2016-05-01

    i Classification | CG-926 RDC | author | audience | month year Maritime Cyber Security University Research Phase I - Final Report...Distribution Statement A: Approved for public release; distribution is unlimited. May 2016 Report No. CG-D-06-16 Maritime Cyber Security...Director United States Coast Guard Research & Development Center 1 Chelsea Street New London, CT 06320 Maritime Cyber Security University

  3. Final report for the Department of Energy funded cooperative agreement ''Electronic Research Demonstration Project'' [University electronic research administration demonstration project

    Energy Technology Data Exchange (ETDEWEB)

    Rodman, John

    1998-07-31

    This is the final report for the Department of Energy (DOE) funded cooperative agreement ''Electronic Research Demonstration Project (DE-FC02-92ER35180)'' for the period August 1994-July 1998. The goal of the project, referred to as NewERA, was to demonstrate the use of open standards for electronic commerce to support research administration, otherwise referred to as Electronic Research Administration (ERA). The NewERA demonstration project provided a means to test interagency standards developed within the Federal Grant Electronic Commerce Committee, a group comprised of federal granting agencies. The NewERA program was initiated by DOE. NewERA was comprised of three separate, but related, ERA activities in preaward administration, postaward administration, and secure Internet commerce. The goal of New ERA was to demonstrate an open standard implementation of ERA using electronic data interchange, e-mail and Internet transaction security between grant applicants and DOE, along with t h e other participating agencies.

  4. Optimisation of Critical Infrastructure Protection: The SiVe Project on Airport Security

    Science.gov (United States)

    Breiing, Marcus; Cole, Mara; D'Avanzo, John; Geiger, Gebhard; Goldner, Sascha; Kuhlmann, Andreas; Lorenz, Claudia; Papproth, Alf; Petzel, Erhard; Schwetje, Oliver

    This paper outlines the scientific goals, ongoing work and first results of the SiVe research project on critical infrastructure security. The methodology is generic while pilot studies are chosen from airport security. The outline proceeds in three major steps, (1) building a threat scenario, (2) development of simulation models as scenario refinements, and (3) assessment of alternatives. Advanced techniques of systems analysis and simulation are employed to model relevant airport structures and processes as well as offences. Computer experiments are carried out to compare and optimise alternative solutions. The optimality analyses draw on approaches to quantitative risk assessment recently developed in the operational sciences. To exploit the advantages of the various techniques, an integrated simulation workbench is build up in the project.

  5. NNSA Laboratory Directed Research and Development Program 2008 Symposium--Focus on Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Kotta, P R; Sketchley, J A

    2008-08-20

    The Laboratory Directed Research and Development (LDRD) Program was authorized by Congress in 1991 to fund leading-edge research and development central to the national laboratories core missions. LDRD anticipates and engages in projects on the forefront of science and engineering at the Department of Energy (DOE) national laboratories, and has a long history of addressing pressing national security needs at the National Nuclear Security Administration (NNSA) laboratories. LDRD has been a scientific success story, where projects continue to win national recognition for excellence through prestigious awards, papers published and cited in peer-reviewed journals, mainstream media coverage, and patents granted. The LDRD Program is also a powerful means to attract and retain top researchers from around the world, to foster collaborations with other prominent scientific and technological institutions, and to leverage some of the world's most technologically advanced assets. This enables the LDRD Program to invest in high-risk and potentially high-payoff research that creates innovative technical solutions for some of our nation's most difficult challenges. Worldwide energy demand is growing at an alarming rate, as developing nations continue to expand their industrial and economic base on the back of limited global resources. The resulting international conflicts and environmental consequences pose serious challenges not only to this nation, but to the international community as well. The NNSA and its national security laboratories have been increasingly called upon to devote their scientific and technological capabilities to help address issues that are not limited solely to the historic nuclear weapons core mission, but are more expansive and encompass a spectrum of national security missions, including energy security. This year's symposium highlights some of the exciting areas of research in alternative fuels and technology, nuclear power, carbon

  6. The Secure Information Exchange (SIX) Project at the OPCW

    International Nuclear Information System (INIS)

    Gulay, M.; Milenkovic, G.

    2015-01-01

    The Chemical Weapons Convention (CWC) entered into force in 1997 and the member states of the Organisation for the Prohibition of Chemical Weapons (OPCW) have obligations for making declarations under various articles of the convention. These declarations could contain confidential information and until recently the only mechanism to submit confidential information to the OPCW Technical Secretariat was through physical delivery by the permanent representatives of the member states which introduced delays in the exchange of information in general. In 2012, the Technical Secretariat initiated a strategic project to establish a secure electronic transmission channel that could be used as an alternative option for the exchange of information between the Technical Secretariat and the member states. The Secure Information Exchange (SIX) Project has been given priority by the Director-General and it received support from the member states. A core project team comprising representatives of the main business unit, the office of legal affairs, IT security and implementation teams were established. Following a feasibility study and with continuous communication with the representatives of the member states, the pilot phase of the project was completed successfully in 2013. In the near future, the project will go live and the member states and the Technical Secretariat will benefit from this key initiative. This paper aims to provide an overview of the project: the solution approach, data gathered in order to assess the delays in communication through traditional means, IT security and implementation issues as well as the legal considerations. (author)

  7. Verification of the existence of food security projects in Limpopo ...

    African Journals Online (AJOL)

    Frequency tables and charts were computed on a computer spreadsheet. The findings of this Study revealed that there are 347 food security projects in Limpopo Province with 338 declared functional. This Study will provide policy makers with policy directives on how a database of food security projects can be kept so that ...

  8. Water System Security and Resilience in Homeland Security Research

    Science.gov (United States)

    EPA's water security research provides tools needed to improve infrastructure security and to recover from an attack or contamination incident involving chemical, biological, or radiological (CBR) agents or weapons.

  9. Securing Distributed Research

    CERN Multimedia

    CERN. Geneva

    2018-01-01

    Global science calls for global infrastructure. A typical large-scale research group will use a suite of international services and involve hundreds of collaborating institutes and users from around the world. How can these users access those services securely? How can their digital identities be established, verified and maintained? We will explore the motivation for distributed authentication and the ways in which research communities are addressing the challenges. We will discuss security incident response in distributed environments - a particular challenge for the operators of these infrastructures. Through this course you should gain an overview of federated identity technologies and protocols, including x509 certificates, SAML and OIDC.

  10. A German Perspective on Security Research

    Science.gov (United States)

    Thoma, Klaus; Hiller, Daniel; Leismann, Tobias; Drees, Birgit

    Prior to 2007, there was no coherent federal approach to conceptualise and fund security research in Germany. This changed with the initiation of the national program for civil security research, managed by the German Ministry for Education and Research (BMBF). Over the course of only four years a continuous build-up of national capacities on civil security was established to better protect German citizens, commodities and infrastructures against terrorism, organised crime and the effects of man-made and natural disasters.

  11. Introduction to the Asian Energy Security project: Project organization and methodologies

    International Nuclear Information System (INIS)

    Hippel, David von; Savage, Timothy; Hayes, Peter

    2011-01-01

    The spectacular recent economic growth in the Asia-Pacific region in general, and in many of the economies of Northeast Asia in particular, has spurred a vast expansion in the need for energy services, and an expansion in the demand for the fuels that help to supply these services. Future projections suggest that the growth of fossil fuel use in Northeast Asia, especially in China, will have major consequences for financial and fuel markets and pollution both regionally and globally. Before the project described in this paper was initiated, there was no ongoing forum for energy experts from all of the countries of the region to meet, informally and in an unofficial capacity, to discuss openly and in a targeted fashion the energy situations in their countries, and to work together to evaluate the energy efficiency costs and benefits of different ways of meeting regional demand. The Asian Energy Security (AES) project provides such a forum, and as such constitutes a unique resource in the engagement of the countries of Northeast Asia on the topic of energy security.

  12. Bio-Security Proficiencies Project for Beginning Producers in 4-H

    Science.gov (United States)

    Smith, Martin H.; Meehan, Cheryl L.; Borba, John A.

    2014-01-01

    Improving bio-security practices among 4-H members who raise and show project animals is important. Bio-security measures can reduce the risk of disease spread and mitigate potential health and economic risks of disease outbreaks involving animal and zoonotic pathogens. Survey data provided statistical evidence that the Bio-Security Proficiencies…

  13. Research on image reconstruction of DR/SSCT security inspection system

    International Nuclear Information System (INIS)

    Li Jian; Cong Peng

    2008-01-01

    On the basis of DR (Digital Radiography)/CT security inspection system, DR/SSCT (single slice spiral CT) security inspection system was developed. This spiral CT system can improve the CT system's drawbacks. The research work includes in replacing the former data acquisition system by a new system which can acquire projection data of multi-slices and devising the SSCT reconstruction algorithms. Simulation experiments and practical experiments were devised to contrast several algorithms. Interpolation technique was operated in detectors data in order to improve the algorithms. In conclusion, the system exploits an algorithm of weighted average of 360 degree LI (Linear Interpolation) and JH-HI (Jiang Hsieh-Half scan Interpolation). (authors)

  14. Electric Power Infrastructure Reliability And Security Research And Development Initiative. Final report

    International Nuclear Information System (INIS)

    Dale, S.; Meeker, R.; Steurer, M.; Li, H.; Pamidi, S.; Rodrigo, H.; Suryanarayanan, S.; Cartes, D.; Ordonez, J.; Domijan, A.; Liu, W.; Cox, D.; McLaren, P.; Hovsapian, R.; Edwards, D.; Simmons, S.; Wilde, N.; Woodruff, S.; Kopriva, D.; Hussaini, Y.; Mohammed, O.; Zheng, J.; Baldwin, T.L.

    2008-01-01

    This is the final scientific/technical report for the Electric Power Infrastructure Reliability and Security R and D Initiative sponsored by the U.S. Department of Energy, Office of Electricity Delivery and Energy Reliability, under award number DE-FG02-05CH11292. This report covers results from the FSU-led, multi-institution effort conducted over the period 8/15/05 to 10/14/2007. Building upon existing infrastructure for power systems research, modeling, and simulation, the Center for Advanced Power Systems (CAPS) at Florida State University (FSU) is developing world-class programs in electric power systems research and education to support future electric power system needs and challenges. With U.S. Department of Energy Support, FSU CAPS has engaged in a multi-faceted effort to conduct basic and applied research towards understanding, developing, and deploying technologies and approaches that can lead to improved reliability and security of the North American electric power generation and delivery infrastructure. This wide-reaching project, through a number of carefully selected thrusts cutting across several research disciplines, set out to address key terrestrial electric utility power system issues and challenges. The challenges and the thrusts to address them were arrived at through analysis of a number of national reports and recommendations combined with input from an experienced multi-disciplined team of power systems research staff and faculty at FSU CAPS. The resulting project effort can be grouped into four major areas: - Power Systems and New Technology Insertion - Controls, Protection, and Security - Simulation Development - High Temperature Superconductivity (HTS)

  15. Inspection methods for physical protection Task III review of other agencies' physical security activities for research reactors

    International Nuclear Information System (INIS)

    In Task I of this project, the current Nuclear Regulatory Commission (NRC) position-on physical security practices and procedures at research reactors were reviewed. In the second task, a sampling of the physical security plans was presented and the three actual reactor sites described in the security plans were visited. The purpose of Task III is to review other agencies' physical security activities for research reactors. During this phase, the actions, procedures and policies of two domestic and two foreign agencies other than the NRC that relate to the research reactor community were examined. The agencies examined were: International Atomic Energy Agency; Canadian Atomic Energy Control Board; Department of Energy; and American Nuclear Insurers

  16. Safeguards and security benefits of project straight-line

    International Nuclear Information System (INIS)

    Jaeger, C.D.; Waddoups, I.G.

    1995-01-01

    As a result of a number of events the inventory of fissile materials no longer in nuclear weapons in the United States is increasing. This has led to a growing concern regarding the potential for theft and/or diversion and accountability of this material. Straight-Line is a project whose purpose is to demonstrate a site-independent system to monitor stored nuclear material (e.g. plutonium) and integrate the collection, processing and dissemination of information regarding this material. Safeguards and security (S ampersand S) goals of this project include data transfer of information on nuclear material to appropriate users to enhance S ampersand S, continuous on-line accountability, reduction of hands-on access to nuclear materials, incorporation of information security technologies, and early detection of tampering or unauthorized material movement. This paper addresses threat considerations, S ampersand S requirements, S ampersand S objectives, and issues for the Straight-Line project. S ampersand S features and benefits of this project are discussed with respect to existing item monitoring systems and/or other material tracking systems being developed

  17. Australian International Food Security Research Centre | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Australian International Food Security Research Centre. Australian International Food Security Research Centre. http://aciar.gov.au/AIFSC. Cultivate Africa's Future. The Cultivate Africa's Future research partnership is designed to support applied research to combat hunger in sub-Saharan Africa by harnessing the potential ...

  18. Security Economics in the European Context: Implications of the EUSECON Project

    OpenAIRE

    Michael Brzoska; Raphael Bossong; Eric van Um

    2011-01-01

    This paper presents key aspects and policy implications of a multi-annual research project on economic analyses of European security issues (EUSECON), with an emphasis on intentional threats of organised crime, piracy and terrorism. The first part argues that rational models can provide significant insights on the emergence and current patterns of terrorism and piracy. These findings could lead to new priorities or to more nuanced interventions in response to these threats. The second part fo...

  19. Investigating how everyday people experience security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg

    In this paper I propose a method for analyzing everyday people's experiences with IT-security. I furthermore report how I applied the method. The proposal is motivated by work of other researchers and their efforts to get beyond secure behavior, and to get an insight in secure or insecure...... experiences that everyday users of technology encounter. The background for introducing this method is a project under the heading of IT Security for Citizens, which bridges between research competencies in HCI and security. In this project we develop methods and concepts to analyze digital signature systems...... and security sensible systems in a broad sense, from the point of view of contemporary CHI. The project includes literature studies of usable security, as well as empirical investigations and design work. This paper reports on my method to target user experiences of and with security technology....

  20. Safeguards and security research and development: Program status report, February-July 1981

    International Nuclear Information System (INIS)

    Henry, C.N.; Walton, R.B.

    1982-04-01

    This report, one of a series of biannual progress reports, describes the status of research and development in the Safeguards and Security Program at Los Alamos from February-July 1981. Most work covered here is sponsored by the Office of Safeguards and Security of the Department of Energy; however, project activities that are technically closely related to nuclear safeguards and security also are included where appropriate for conveying information useful to the nuclear community. The report comprises four major subject areas: Security Development and Support; Nuclear Materials Measurement and Engineering; Nuclear Facility Safeguards Support; and International Safeguards, Technology Transfer, and Training. Some technical topics included in the subject areas are computer and informational security, chemical and nondestructive analysis of nuclear materials, process modeling and analysis, nuclear materials accounting systems, evaluation of prototype measurement instrumentation and procedures in nuclear facilities, design and consultation for facilities, technical exchange, training courses, and international safeguards

  1. Safeguards and security research and development: Program status report, February-July 1981

    Energy Technology Data Exchange (ETDEWEB)

    Henry, C.N.; Walton, R.B. (comps.)

    1982-04-01

    This report, one of a series of biannual progress reports, describes the status of research and development in the Safeguards and Security Program at Los Alamos from February-July 1981. Most work covered here is sponsored by the Office of Safeguards and Security of the Department of Energy; however, project activities that are technically closely related to nuclear safeguards and security also are included where appropriate for conveying information useful to the nuclear community. The report comprises four major subject areas: Security Development and Support; Nuclear Materials Measurement and Engineering; Nuclear Facility Safeguards Support; and International Safeguards, Technology Transfer, and Training. Some technical topics included in the subject areas are computer and informational security, chemical and nondestructive analysis of nuclear materials, process modeling and analysis, nuclear materials accounting systems, evaluation of prototype measurement instrumentation and procedures in nuclear facilities, design and consultation for facilities, technical exchange, training courses, and international safeguards.

  2. Security Approaches in Using Tablet Computers for Primary Data Collection in Clinical Research

    OpenAIRE

    Wilcox, Adam B.; Gallagher, Kathleen; Bakken, Suzanne

    2013-01-01

    Next-generation tablets (iPads and Android tablets) may potentially improve the collection and management of clinical research data. The widespread adoption of tablets, coupled with decreased software and hardware costs, has led to increased consideration of tablets for primary research data collection. When using tablets for the Washington Heights/Inwood Infrastructure for Comparative Effectiveness Research (WICER) project, we found that the devices give rise to inherent security issues asso...

  3. Timely integration of safeguards and security with projects at Los Alamos National Laboratory

    International Nuclear Information System (INIS)

    Price, R.; Blount, P.M.; Garcia, S.W.; Gonzales, R.L.; Salazar, J.B.; Campbell, C.H.

    2004-01-01

    The Safeguards and Security (S and S) Requirements Integration Team at Los Alamos National Laboratory (LANL) has developed and implemented an innovative management process that will be described in detail. This process systematically integrates S and S planning into construction, facility modifications or upgrades, mission changes, and operational projects. It extends and expands the opportunities provided by the DOE project management manual, DOE M 413.3-1. Through a series of LANL documents, a process is defined and implemented that formally identifies an S and S professional to oversee, coordinate, facilitate, and communicate among the identified S and S organizations and the project organizations over the life cycle of the project. The derived benefits, namely (1) elimination/reduction of re-work or costly retrofitting, (2) overall project cost savings because of timely and improved planning, (3) formal documentation, and (4) support of Integrated Safeguards and Security Management at LANL, will be discussed. How many times, during the construction of a new facility or the modification of an existing facility, have the persons responsible for the project waited until the last possible minute or until after construction is completed to approach the security organizations for their help in safeguarding and securing the facility? It's almost like, 'Oh, by the way, do we need access control and a fence around this building and just what are we going to do with our classified anyway?' Not only is it usually difficult; it's also typically expensive to retrofit or plan for safeguards and security after the fact. Safeguards and security organizations are often blamed for budget overruns and delays in facility occupancy and program startup, but these problems are usually due to poor front-end planning. In an effort to help projects engage safeguards and security in the pre-conceptual or conceptual stages, we implemented a high level formality of operations. We

  4. A lead for transvaluation of global nuclear energy research and funded projects in Japan

    International Nuclear Information System (INIS)

    Kiriyama, Eriko; Kajikawa, Yuya; Fujita, Katsuhide; Iwata, Shuichi

    2013-01-01

    Highlights: • Chernobyl accident had limited influence on basic research in nuclear energy. • Budget allocation to R and D and number of published papers have recently decreased. • Citation network analysis revealed reactor safety and fusion as current research trend. • Nuclear energy research policy will change after Fukushima disaster. - Abstract: The decision-making process that precedes the introduction of a new energy system should strive for a balance among human security, environmental safeguards, energy security, proliferation risk, economic risks, etc. For nuclear energy, the Fukushima Daiichi nuclear disaster (Fukushima disaster) has brought forth a strong need for transvaluation of the present technology. Here, we analyzed bibliographic records of publications in nuclear science and technology to illustrate an overview and trends in nuclear energy technology and related fields by using citation network analysis. We also analyzed funding data and keywords assigned for each project by co-occurrence network analysis. This research integrates citation network analysis and bibliometric keyword analysis to compare the global trends in nuclear energy research and characteristics of research conducted at universities and institutes in Japan. We show that the Chernobyl accident had only a limited influence on basic research. The results of papers are dispersed in diverse areas of nuclear energy technology research, and the results of KAKEN projects in Japan are highly influenced by national energy policy with a focus on nuclear fuel cycle for energy security, although KAKEN allows much freedom in the selection of research projects to academic community

  5. Case Study Application of the Biodiversity Security Index to Ranking Feasibility Studies for Ecosystem Restoration Projects of the U.S. Army Corps of Engineers

    Science.gov (United States)

    2016-04-01

    ER D C/ EL C R- 16 -1 Ecosystem Management and Restoration Research Program Case Study Application of the Biodiversity Security Index... Biodiversity Security Index to Ranking Feasibility Studies for Ecosystem Restoration Projects of the U.S. Army Corps of Engineers Richard A. Cole... Biodiversity Security Index (BSI) was applied to 23 project sites ranked for restoration feasibility study annual funding by the U. S. Army Corps of

  6. Nevada National Security Site: Site-Directed Research and Development (SDRD) Fiscal Year 2015 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Bender, Howard A. [National Security Technologies, LLC. (NSTec), Mercury, NV (United States). Site-Directed Research and Development Program

    2016-04-01

    This report presents results of multiple research projects, new and ongoing, funded under the Site-Directed Research and Development Program for the Nevada National Security Site during federal fiscal year 2015. The Site's legacy capabilities in remote sensing combined with new paradigms for emergency response and consequence management help drive the need to develop advanced aerial sensor platforms. Likewise, dynamic materials science is a critical area of scientific research for which basic physics issues are still unresolved. New methods of characterizing materials in extreme states are vitally needed, and these efforts are paving the way with new knowledge. Projects selected in FY 2015 for the Exploratory Research portfolio exhibit a strong balance of NNSS mission relevance. Geoscience, seismology, and techniques for detecting underground nuclear events are still essential focus areas. Many of the project reports in the second major section of this annual report are ongoing continuations in multi-year lifecycles. Diagnostic techniques for stockpile and nuclear security science figured prominently as well, with a few key efforts coming to fruition, such as phase transition detection. In other areas, modeling efforts toward better understanding plasma focus physics has also started to pay dividends for major program needs.

  7. A Research Agenda for Security Engineering

    Directory of Open Access Journals (Sweden)

    Rich Goyette

    2013-08-01

    Full Text Available Despite nearly 30 years of research and application, the practice of information system security engineering has not yet begun to exhibit the traits of a rigorous scientific discipline. As cyberadversaries have become more mature, sophisticated, and disciplined in their tradecraft, the science of security engineering has not kept pace. The evidence of the erosion of our digital security – upon which society is increasingly dependent – appears in the news almost daily. In this article, we outline a research agenda designed to begin addressing this deficit and to move information system security engineering toward a mature engineering discipline. Our experience suggests that there are two key areas in which this movement should begin. First, a threat model that is actionable from the perspectives of risk management and security engineering should be developed. Second, a practical and relevant security-measurement framework should be developed to adequately inform security-engineering and risk-management processes. Advances in these areas will particularly benefit business/government risk assessors as well as security engineers performing security design work, leading to more accurate, meaningful, and quantitative risk analyses and more consistent and coherent security design decisions. Threat modelling and security measurement are challenging activities to get right – especially when they need to be applied in a general context. However, these are decisive starting points because they constitute the foundation of a scientific security-engineering practice. Addressing these challenges will require stronger and more coherent integration between the sub-disciplines of risk assessment and security engineering, including new tools to facilitate that integration. More generally, changes will be required in the way security engineering is both taught and practiced to take into account the holistic approach necessary from a mature, scientific

  8. Physical security at research reactors

    International Nuclear Information System (INIS)

    Clark, R.A.

    1977-01-01

    Of the 84 non-power research facilities licensed under 10 CFR Part 50, 73 are active (two test reactors, 68 research reactors and three critical facilities) and are required by 10 CFR Part 73.40 to provide physical protection against theft of SNM and against industrial sabotage. Each licensee has developed a security plan required by 10 CFR Part 50.34(c) to demonstrate the means of compliance with the applicable requirements of 10 CFR Part 73. In 1974, the Commission provided interim guidance for the organization and content of security plans for (a) test reactors, (b) medium power research and training reactors, and (c) low power research and training reactors. Eleven TRIGA reactors, with power levels greater than 250 kW and all other research and training reactors with power levels greater than 100 kW and less than or equal to 5,000 kW are designated as medium power research and training reactors. Thirteen TRIGA reactors with authorized power levels less than 250 kW are considered to be low power research and training reactors. Additional guidance for complying with the requirements of 73.50 and 73.60, if applicable, is provided in the Commission's Regulatory Guides. The Commission's Office of Inspection and Enforcement inspects each licensed facility to assure that an approved security plan is properly implemented with appropriate procedures and physical protection systems

  9. Public key infrastructure for DOE security research

    Energy Technology Data Exchange (ETDEWEB)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  10. Secure Interoperable Open Smart Grid Demonstration Project

    Energy Technology Data Exchange (ETDEWEB)

    Magee, Thoman [Consolidated Edison Company Of New York, Inc., NY (United States)

    2014-12-28

    The Consolidated Edison, Inc., of New York (Con Edison) Secure Interoperable Open Smart Grid Demonstration Project (SGDP), sponsored by the United States (US) Department of Energy (DOE), demonstrated that the reliability, efficiency, and flexibility of the grid can be improved through a combination of enhanced monitoring and control capabilities using systems and resources that interoperate within a secure services framework. The project demonstrated the capability to shift, balance, and reduce load where and when needed in response to system contingencies or emergencies by leveraging controllable field assets. The range of field assets includes curtailable customer loads, distributed generation (DG), battery storage, electric vehicle (EV) charging stations, building management systems (BMS), home area networks (HANs), high-voltage monitoring, and advanced metering infrastructure (AMI). The SGDP enables the seamless integration and control of these field assets through a common, cyber-secure, interoperable control platform, which integrates a number of existing legacy control and data systems, as well as new smart grid (SG) systems and applications. By integrating advanced technologies for monitoring and control, the SGDP helps target and reduce peak load growth, improves the reliability and efficiency of Con Edison’s grid, and increases the ability to accommodate the growing use of distributed resources. Con Edison is dedicated to lowering costs, improving reliability and customer service, and reducing its impact on the environment for its customers. These objectives also align with the policy objectives of New York State as a whole. To help meet these objectives, Con Edison’s long-term vision for the distribution grid relies on the successful integration and control of a growing penetration of distributed resources, including demand response (DR) resources, battery storage units, and DG. For example, Con Edison is expecting significant long-term growth of DG

  11. [Principles and methodology for ecological rehabilitation and security pattern design in key project construction].

    Science.gov (United States)

    Chen, Li-Ding; Lu, Yi-He; Tian, Hui-Ying; Shi, Qian

    2007-03-01

    Global ecological security becomes increasingly important with the intensive human activities. The function of ecological security is influenced by human activities, and in return, the efficiency of human activities will also be affected by the patterns of regional ecological security. Since the 1990s, China has initiated the construction of key projects "Yangtze Three Gorges Dam", "Qinghai-Tibet Railway", "West-to-East Gas Pipeline", "West-to-East Electricity Transmission" and "South-to-North Water Transfer" , etc. The interaction between these projects and regional ecological security has particularly attracted the attention of Chinese government. It is not only important for the regional environmental protection, but also of significance for the smoothly implementation of various projects aimed to develop an ecological rehabilitation system and to design a regional ecological security pattern. This paper made a systematic analysis on the types and characteristics of key project construction and their effects on the environment, and on the basis of this, brought forward the basic principles and methodology for ecological rehabilitation and security pattern design in this construction. It was considered that the following issues should be addressed in the implementation of a key project: 1) analysis and evaluation of current regional ecological environment, 2) evaluation of anthropogenic disturbances and their ecological risk, 3) regional ecological rehabilitation and security pattern design, 4) scenario analysis of environmental benefits of regional ecological security pattern, 5) re-optimization of regional ecological system framework, and 6) establishment of regional ecosystem management plan.

  12. A secure communication system using projective-lag and/or projective-anticipating synchronizations of coupled multidelay feedback systems

    International Nuclear Information System (INIS)

    Thang Manh Hoang; Nakagawa, Masahiro

    2008-01-01

    In this paper, a chaotic secure communication system is proposed by using the schemes of projective-lag and/or projective-anticipating synchronizations of coupled multidelay feedback systems and the modulation technique of synchronization-manifold shift keying. Further, the security of the proposed system is enhanced by using non-stationary dynamics in the master and/or non-stationary synchronization manifolds. The specific examples using modified Ikeda systems demonstrate and verify the effectiveness of the proposed system

  13. Secure coprocessing applications and research issues

    Energy Technology Data Exchange (ETDEWEB)

    Smith, S.W.

    1996-08-01

    The potential of secure coprocessing to address many emerging security challenges and to enable new applications has been a long-standing interest of many members of the Computer Research and Applications Group, including this author. The purpose of this paper is to summarize this thinking, by presenting a taxonomy of some potential applications and by summarizing what we regard as some particularly interesting research questions.

  14. An analysis of the impact of the thermonuclear pilot project ITER on industry and research in Austria

    International Nuclear Information System (INIS)

    Hangel, G.

    2007-03-01

    An analysis of the influence of the thermonuclear pilot project ITER on Austrian research and industrial activities is presented in terms of the following subjects: fusion research history, ITER technique, security, nuclear fusion, ITER (reactor, project specifications for quotations), possibilities for Austrian companies and fusion research in Austria. (nevyjel)

  15. Payment card industry data security standard : readiness project

    OpenAIRE

    Βεργέτης, Μιχαήλ

    2015-01-01

    This paper is my thesis as part of my studies at the Department of Informatics, at University of Piraeus for the Postgraduate Programme in “Techno-economic Management & Security of Digital Systems”. Scope of this paper is to introduce to the reader with the basics of PCI DSS and to guide and provide any sort of assistance to organizations willing to achieve compliance with the Payment Card Industry Data Security Standard (PCI DSS). As for its practical section, a PCI DSS readiness project has...

  16. SecurityCom: A Multi-Player Game for Researching and Teaching Information Security Teams

    Directory of Open Access Journals (Sweden)

    Douglas P. Twitchell

    2007-12-01

    Full Text Available A major portion of government and business organizations’ attempts to counteract information security threats is teams of security personnel.  These teams often consist of personnel of diverse backgrounds in specific specialties such as network administration, application development, and business administration, resulting in possible conflicts between security, functionality, and availability.  This paper discusses the use of games to teach and research information security teams and outlines research to design and build a simple, team-oriented, configurable, information security game. It will be used to study how information security teams work together to defend against attacks using a multi-player game, and to study the use of games in training security teams.  Studying how information security teams work, especially considering the topic of shared-situational awareness, could lead to better ways of forming, managing, and training teams.  Studying the effectiveness of the game as a training tool could lead to better training for security teams. 

  17. Western Australian food security project

    Directory of Open Access Journals (Sweden)

    Maycock Bruce

    2007-08-01

    Full Text Available Abstract Background The aim of the Western Australian (WA Food Security Project was to conduct a preliminary investigation into issues relating to food security in one region within the Perth metropolitan area in Western Australia. The first phase of the project involved a food audit in one lower income area that was typical of the region, to identify the range, variety and availability of foods in the region. Methods A comprehensive food audit survey was provided to all food outlet owners/operators in one lower socio-economic region within the City of Mandurah (n = 132 outlets. The purpose of the survey was to investigate the range, variety and availability of foods in the Mandurah region as well as examining specific in-store characteristics such as the types of clientele and in-store promotions offered. Surveys were competed for 99 outlets (response rate = 75%. Results The range of foods available were predominantly pre-prepared with more than half of the outlets pre-preparing the majority of their food. Sandwiches and rolls were the most popular items sold in the outlets surveyed (n = 51 outlets followed by pastries such as pies, sausage rolls and pasties (n = 33 outlets. Outlets considered their healthiest food options were sandwiches or rolls (n = 51 outlets, salads (n- = 50 outlets, fruit and vegetables (n = 40 outlets, seafood (n = 27 outlets, meats such as chicken (n = 26 outlets and hot foods such as curries, soups or quiches (n = 23 outlets. The majority of outlets surveyed considered pre-prepared food including sandwiches, rolls and salads, as healthy food options regardless of the content of the filling or dressings used. Few outlets (n = 28% offered a choice of bread type other than white or wholemeal. High fat pastries and dressings were popular client choices (n = 77% as were carbonated drinks (n = 88% and flavoured milks (n = 46%. Conclusion These findings clearly indicate the need for further investigation of the impact of

  18. Improving food security and nutrition through research | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Informing policy through agriculture and food security research. Improving the uptake of agricultural and food security research into policy and practice is a central objective of IDRC's Agriculture and Food Security program. To maximize the impact of proven solutions, the program set out to inform and engage both Canadian ...

  19. A Critical assesment of IS Security Research Between 1990-2004

    DEFF Research Database (Denmark)

    Willison, Robert Andrew; Siponen, Mikko

    This paper reviews the IS security literature for the period 1990-2004. More specifically three security journals and the top twenty IS journals were examined. In total 1280 papers were analysed in terms of theories, research methods and research topics. Our research found that 1043 of the papers...... with fourteen of these topics totaling 71.05% of the articles. This papers offers implications for future research directions on IS security, scholars to publish IS security research, tenure practice, and IS security classification schemas....

  20. Canadian International Food Security Research Fund (CIFSRF ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Canadian International Food Security Research Fund (CIFSRF). The Canadian International Food Security Research Fund (CIFS-RF) is a collaborative program of the Canadian International Development Agency (CIDA) and IDRC valued at CA $61 654 707 (CIDA: CA $50 000 000; IDRC: CA $11 654 707). The program ...

  1. Improving Control System Security through the Evaluation of Current Trends in Computer Security Research

    Energy Technology Data Exchange (ETDEWEB)

    Rolston

    2005-03-01

    At present, control system security efforts are primarily technical and reactive in nature. What has been overlooked is the need for proactive efforts, focused on the IT security research community from which new threats might emerge. Evaluating cutting edge IT security research and how it is evolving can provide defenders with valuable information regarding what new threats and tools they can anticipate in the future. Only known attack methodologies can be blocked, and there is a gap between what is known to the general security community and what is being done by cutting edge researchers --both those trying to protect systems and those trying to compromise them. The best security researchers communicate with others in their field; they know what cutting edge research is being done; what software can be penetrated via this research; and what new attack techniques and methodologies are being circulated in the black hat community. Standardization of control system applications, operating systems, and networking protocols is occurring at a rapid rate, following a path similar to the standardization of modern IT networks. Many attack methodologies used on IT systems can be ported over to the control system environment with little difficulty. It is extremely important to take advantage of the lag time between new research, its use on traditional IT networks, and the time it takes to port the research over for use on a control system network. Analyzing nascent trends in IT security and determining their applicability to control system networks provides significant information regarding defense mechanisms needed to secure critical infrastructure more effectively. This work provides the critical infrastructure community with a better understanding of how new attacks might be launched, what layers of defense will be needed to deter them, how the attacks could be detected, and how their impact could be limited.

  2. Landscape ecological security assessment based on projection pursuit in Pearl River Delta.

    Science.gov (United States)

    Gao, Yang; Wu, Zhifeng; Lou, Quansheng; Huang, Huamei; Cheng, Jiong; Chen, Zhangli

    2012-04-01

    Regional landscape ecological security is an important issue for ecological security, and has a great influence on national security and social sustainable development. The Pearl River Delta (PRD) in southern China has experienced rapid economic development and intensive human activities in recent years. This study, based on landscape analysis, provides a method to discover the alteration of character among different landscape types and to understand the landscape ecological security status. Based on remotely sensed products of the Landsat 5 TM images in 1990 and the Landsat 7 ETM+ images in 2005, landscape classification maps of nine cities in the PRD were compiled by implementing Remote Sensing and Geographic Information System technology. Several indices, including aggregation, crush index, landscape shape index, Shannon's diversity index, landscape fragile index, and landscape security adjacent index, were applied to analyze spatial-temporal characteristics of landscape patterns in the PRD. A landscape ecological security index based on these outcomes was calculated by projection pursuit using genetic algorithm. The landscape ecological security of nine cities in the PRD was thus evaluated. The main results of this research are listed as follows: (1) from 1990 to 2005, the aggregation index, crush index, landscape shape index, and Shannon's diversity index of nine cities changed little in the PRD, while the landscape fragile index and landscape security adjacent index changed obviously. The landscape fragile index of nine cities showed a decreasing trend; however, the landscape security adjacent index has been increasing; (2) from 1990 to 2005, landscape ecology of the cities of Zhuhai and Huizhou maintained a good security situation. However, there was a relatively low value of ecological security in the cities of Dongguan and Foshan. Except for Foshan and Guangzhou, whose landscape ecological security situation were slightly improved, the cities had reduced

  3. Breaking projective chaos synchronization secure communication using filtering and generalized synchronization

    International Nuclear Information System (INIS)

    Alvarez, G.; Li Shujun; Montoya, F.; Pastor, G.; Romera, M.

    2005-01-01

    This paper describes the security weaknesses of a recently proposed secure communication method based on chaotic masking using projective synchronization of two chaotic systems. We show that the system is insecure and how to break it in two different ways, by high-pass filtering and by generalized synchronization

  4. Maritime Cyber Security University Research: Phase 1

    Science.gov (United States)

    2016-05-01

    i Classification | CG-926 RDC | author | audience | month year Maritime Cyber Security University Research Phase I - Final Report...Appendices Distribution Statement A: Approved for public release; distribution is unlimited. May 2016 Report No. CG-D-07-16 Maritime ...Macesker Executive Director United States Coast Guard Research & Development Center 1 Chelsea Street New London, CT 06320 Maritime Cyber Security

  5. Involvement of the Private Security Sector in African Conflicts ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    In 2006, the Institute for Security Studies (ISS) undertook a project entitled Regulation of the Private Security Sector in Africa that was supported by IDRC under project 103396. The project focused on the private security sector in South Africa, the Democratic Republic of Congo and Uganda. The research reports were ...

  6. Secure Learning and Learning for Security: Research in the Intersection

    OpenAIRE

    Rubinstein, Benjamin

    2010-01-01

    Statistical Machine Learning is used in many real-world systems, such as web search, network and power management, online advertising, finance and health services, in which adversaries are incentivized to attack the learner, motivating the urgent need for a better understanding of the security vulnerabilities of adaptive systems. Conversely, research in Computer Security stands to reap great benefits by leveraging learning for building adaptive defenses and even designing intelligent attacks ...

  7. Project on National Security Reform: Forging a New Shield

    Science.gov (United States)

    2008-11-01

    quoted by Joseph Nye in ―Leaders and Managers,‖ Project Syndicate , 1 May 2008, 30 September 2008 < http://www.project-syndicate.org/commentary/nye56...Bulletin of the Atomic Scientists, 18 Sept 2007, 30 Sept 2008 < http://www.thebulletin.org/web-edition/ columnists / gordon-adams/ when-national-security... Syndication ) 1179 tagging, ambient awareness, 1180 message boards, virtual social networking, document storage, and virtual meetings. Heavy emphasis is

  8. Metrics, models and foresight for European sustainable food and nutrition security: the vision of the SUSFANS project

    NARCIS (Netherlands)

    Rutten, M.M.; Achterbosch, T.J.; Boer, de I.J.M.; Cuaresma, Jesus Crespo; Geleijnse, J.M.; Havlik, P.; Heckelei, T.; Ingram, John; Leip, Adrian; Marette, Stephan; Meijl, van J.C.M.; Soler, L.G.; Swinnen, J.; Veer, van 't P.; Vervoort, J.M.; Zimmermann, A.; Zimmermann, K.L.; Zurek, M.

    2018-01-01

    This paper defines the research agenda of the SUSFANS project, describes its history and its potential societal impacts. It contributes to balanced and encompassing views on how to strengthen food and nutrition security outcomes in the EU and how to improve the performance of the food system in the

  9. National Strategy to Secure Cyberspace

    National Research Council Canada - National Science Library

    Schwalm, Keith T

    2006-01-01

    ... of a national strategy for securing cyberspace. The approach explored the development of cyber technology strategies and programs related to the mission and roles of Homeland Security Advanced Research Projects Agency...

  10. The QUANTGRID Project (RO)—Quantum Security in GRID Computing Applications

    Science.gov (United States)

    Dima, M.; Dulea, M.; Petre, M.; Petre, C.; Mitrica, B.; Stoica, M.; Udrea, M.; Sterian, R.; Sterian, P.

    2010-01-01

    The QUANTGRID Project, financed through the National Center for Programme Management (CNMP-Romania), is the first attempt at using Quantum Crypted Communications (QCC) in large scale operations, such as GRID Computing, and conceivably in the years ahead in the banking sector and other security tight communications. In relation with the GRID activities of the Center for Computing & Communications (Nat.'l Inst. Nucl. Phys.—IFIN-HH), the Quantum Optics Lab. (Nat.'l Inst. Plasma and Lasers—INFLPR) and the Physics Dept. (University Polytechnica—UPB) the project will build a demonstrator infrastructure for this technology. The status of the project in its incipient phase is reported, featuring tests for communications in classical security mode: socket level communications under AES (Advanced Encryption Std.), both proprietary code in C++ technology. An outline of the planned undertaking of the project is communicated, highlighting its impact in quantum physics, coherent optics and information technology.

  11. Research Advances of Social Security Problems in China —Visualization Research based on Bibliometrics

    Institute of Scientific and Technical Information of China (English)

    赵琳

    2016-01-01

    This article summarized the research progress and characteristics of Chinese social security issues from 2000 papers, which record in CNKI. We find that, the topic in the field of social security is board and dispersion. Due to the huge system and complex problem of social security, there is no central theme. Through cluster analysis, multi dimensional scaling analysis and social network analysis, we got the high frequency keywords atlas. Then, we summarized the research topic to six parts. They are rural social security, urban and rural social security co-ordination, vulnerable group social security, social security fund management, the social insurance system, and social security system and government responsibility. It summed up the theme of the module, meanwhile, combined the practice analysis.

  12. Research and development project report for FY 1996

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-09-01

    This report summarizes results of research and development projects administered by NEDO for FY 1996. Overview of new energy projects and twelve chapters for individual projects are provided in the report. The new energy technology development projects administered by NEDO are classified into twelve categories, i.e., Development of technologies for solar energy utilization, Development of geothermal resources, Development of technologies for exploration and utilization of geothermal energy, Development of coal energy utilization technologies, Development of coal resources, Development of energy conversion and storage technologies, Development of hydrogen, alcohol and biomass technologies, Development of other oil-alternative energy technologies, Introduction and promotion of new energy sources, International energy-promotion activities, Promotion of development and introduction, and Activities of the NEDO Information Center. To ensure energy security and actively cope with environmental problems such as by taking carbon dioxide emission control measures, NEDO has stepped up its efforts to develop new energy- and energy saving-related technologies and introduce and diffuse them. 79 figs., 37 tabs.

  13. Research Award: Agriculture and Food Security

    International Development Research Centre (IDRC) Digital Library (Canada)

    Corey Piccioni

    2013-08-07

    Aug 7, 2013 ... research awards providing a unique opportunity to enhance research skills and gain a fresh perspecve on crucial development issues. These one‐year, paid, ... programming through a research acvity focusing on agriculture and food security, specifically on the gender and social (equity) dimensions of ...

  14. Smart Grid Communications Security Project, U.S. Department of Energy

    Energy Technology Data Exchange (ETDEWEB)

    Barnes, Frank [Univ. of Colorado, Boulder, CO (United States)

    2012-09-01

    There were four groups that worked on this project in different areas related to Smart Girds and Security. They included faculty and students from electric computer and energy engineering, law, business and sociology. The results of the work are summarized in a verity of reports, papers and thesis. A major report to the Governor of Colorado’s energy office with contributions from all the groups working on this project is given bellow. Smart Grid Deployment in Colorado: Challenges and Opportunities, Report to Colorado Governor’s Energy Office and Colorado Smart Grid Task Force(2010) (Kevin Doran, Frank Barnes, and Puneet Pasrich, eds.) This report includes information on the state of the grid cyber security, privacy, energy storage and grid stability, workforce development, consumer behavior with respect to the smart grid and safety issues.

  15. Critical infrastructure protection research results of the first critical infrastructure protection research project in Hungary

    CERN Document Server

    Padányi, József

    2016-01-01

    This book presents recent research in the recognition of vulnerabilities of national systems and assets which gained special attention for the Critical Infrastructures in the last two decades. The book concentrates on R&D activities in the relation of Critical Infrastructures focusing on enhancing the performance of services as well as the level of security. The objectives of the book are based on a project entitled "Critical Infrastructure Protection Researches" (TÁMOP-4.2.1.B-11/2/KMR-2011-0001) which concentrated on innovative UAV solutions, robotics, cybersecurity, surface engineering, and mechatrinics and technologies providing safe operations of essential assets. This report is summarizing the methodologies and efforts taken to fulfill the goals defined. The project has been performed by the consortium of the Óbuda University and the National University of Public Service.

  16. The ESPRIT project CAFE : high security digital payment systems

    NARCIS (Netherlands)

    Boly, J.P.; Bosselaers, A.; Cramer, R.; Michelsen, R.; Mjølsnes, S.F.; Muller, F.; Pedersen, T.P.; Pfitzmann, B.; Rooij, de P.; Schoenmakers, B.; Schunter, M.; Vallée, L.; Waidner, M.; Gollmann, D.

    1994-01-01

    CAFE (“Conditional Access for Europe”) is an ongoing project in the European Community's ESPRIT program. The goal of CAFE is to develop innovative systems for conditional access, and in particular, digital payment systems. An important aspect of CAFE is high security of all parties concerned, with

  17. Seven layers of security to help protect biomedical research facilities.

    Science.gov (United States)

    Mortell, Norman

    2010-04-01

    In addition to risks such as theft and fire that can confront any type of business, the biomedical research community often faces additional concerns over animal rights extremists, infiltrations, data security and intellectual property rights. Given these concerns, it is not surprising that the industry gives a high priority to security. This article identifies security threats faced by biomedical research companies and shows how these threats are ranked in importance by industry stakeholders. The author then goes on to discuss seven key 'layers' of security, from the external environment to the research facility itself, and how these layers all contribute to the creation of a successfully secured facility.

  18. Nevada Natonal Security Site-Directed Research and Development FY 2010 Annual Report

    International Nuclear Information System (INIS)

    Bender, Howard

    2011-01-01

    This annual report of the Site-Directed Research and Development (SDRD) program represents the highly significant R and D accomplishments conducted during fiscal year 2010. This year was noteworthy historically, as the Nevada Test Site was renamed to the Nevada National Security Site (NNSS). This change not only recognizes how the site's mission has evolved, but also heralds a future of new challenges and opportunities for the NNSS. In many ways, since its inception in 2002, the SDRD program has helped shape that evolving mission. As we approach 2012, SDRD will also mark a milestone, having completed its first full decade of innovative R and D in support of the site and national security. The program continues to fund advanced science and technology development across traditional Department of Energy (DOE) nuclear security areas such as stockpile stewardship and non-proliferation while also supporting Department of Homeland Security (DHS) needs, and specialized work for government agencies like the Department of Defense (DoD) and others. The NNSS will also contribute technologies in the areas of treaty verification and monitoring, two areas of increasing importance to national security. Keyed to the NNSS's broadened scope, the SDRD program will continue to anticipate and advance R and D projects that will help the NNSS meet forthcoming challenges.

  19. A European Perspective on Security Research

    Science.gov (United States)

    Liem, Khoen; Hiller, Daniel; Castex, Christoph

    Tackling the complexity and interdependence of today's security environment in the globalized world of the 21st century is an everlasting challenge. Whereas the end of the Cold War presented a caesura of global dimension for the political and economic architecture and a realignment of power distribution and international relations between former adversaries, September 11th of 2001 may be seen as another caesura. Since then, specifically among countries of the Western hemisphere, traditional security paradigms and theories have been critically questioned and the different security cultures and perceptions have resulted in diverse security and defence policies as well as in security research efforts of individual countries. Consensus, it seems, exists on the question of what the threats are that our modern interconnected societies are facing. Whether looking at international terrorism, organized crime, climate change, the illegal trafficking of goods and people or naturally caused catastrophes, these phenomena all have in common that they are in most cases of transnational nature. Formerly existing dividing lines between internal and external security continue to fade, presenting an enormous challenge for those in charge of designing security policy and even more so for the various institutions safeguarding European security. That is why dissent often revolves around the question on how to get hold of these complex problems. Geographic location, cultural background, ethical make-up of society as well as relations with neighbouring countries are all important aspects to be considered when assessing the security culture and policy of individual countries.

  20. Safeguards and security research and development: Progress report, October 1994--September 1995

    Energy Technology Data Exchange (ETDEWEB)

    Rutherford, D.R.; Henriksen, P.W. [comp.

    1997-03-01

    The primary goal of the Los Alamos Safeguards and Security Technology Development Program, International Safeguards, and other Safeguards and Security Programs is to continue to be the center of excellence in the field of Safeguards and Security. This annual report for 1995 describes those scientific and engineering projects that contribute to all of the aforementioned programs. The authors have presented the information in a different format from previous annual reports. Part I is devoted to Nuclear Material Measurement Systems. Part II contains projects that are specific to Integrated Safeguards Systems. Part III highlights Safeguards Systems Effectiveness Evaluations and Part IV is a compilation of highlights from Information Assurance projects. Finally Part V highlights work on the projects at Los Alamos for International Safeguards. The final part of this annual report lists titles and abstracts of Los Alamos Safeguards and Security Technology Development reports, technical journal articles, and conference papers that were presented and published in 1995. This is the last annual report in this format. The authors wish to thank all of the individuals who have contributed to this annual report and made it so successful over the years.

  1. Safeguards and security research and development: Progress report, October 1994--September 1995

    International Nuclear Information System (INIS)

    Rutherford, D.R.; Henriksen, P.W.

    1997-03-01

    The primary goal of the Los Alamos Safeguards and Security Technology Development Program, International Safeguards, and other Safeguards and Security Programs is to continue to be the center of excellence in the field of Safeguards and Security. This annual report for 1995 describes those scientific and engineering projects that contribute to all of the aforementioned programs. The authors have presented the information in a different format from previous annual reports. Part I is devoted to Nuclear Material Measurement Systems. Part II contains projects that are specific to Integrated Safeguards Systems. Part III highlights Safeguards Systems Effectiveness Evaluations and Part IV is a compilation of highlights from Information Assurance projects. Finally Part V highlights work on the projects at Los Alamos for International Safeguards. The final part of this annual report lists titles and abstracts of Los Alamos Safeguards and Security Technology Development reports, technical journal articles, and conference papers that were presented and published in 1995. This is the last annual report in this format. The authors wish to thank all of the individuals who have contributed to this annual report and made it so successful over the years

  2. Securing medical research: a cybersecurity point of view.

    Science.gov (United States)

    Schneier, Bruce

    2012-06-22

    The problem of securing biological research data is a difficult and complicated one. Our ability to secure data on computers is not robust enough to ensure the security of existing data sets. Lessons from cryptography illustrate that neither secrecy measures, such as deleting technical details, nor national solutions, such as export controls, will work.

  3. The analysis of the public support, results, and the research field structure of the Czech security R

    Directory of Open Access Journals (Sweden)

    Faťun Martin

    2017-07-01

    Full Text Available The article is devoted to an analysis of the public support and results of the security oriented R&D in Czechia in the years 2011–2015. The aim is to provide a knowledge base for active participation of users of results and existing and potential beneficiaries of public support in the development of the system and programs of the security research after 2017. The introductory part of the text describes the national environment of the security R&D, and the methodology of the data analysis of projects and programs and the bibliometric analyses of results of the security research. The analysis is focused in particular upon the distribution of the public funding, and the results obtained in R&D programs financed by the Ministry of the interior (MoI. The existing overlaps between R&D activities sponsored by MoI and by other governmental bodies are also examined.

  4. Smart grid security

    Energy Technology Data Exchange (ETDEWEB)

    Cuellar, Jorge (ed.) [Siemens AG, Muenchen (Germany). Corporate Technology

    2013-11-01

    The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus of many stakeholders with different views on the security and privacy requirements, not to mention methods and solutions. The fragmentation of research agendas and proposed approaches or solutions for securing the future smart grid becomes apparent observing the results from different projects, standards, committees, etc, in different countries. The different approaches and views of the papers in this collection also witness this fragmentation. This book contains the following papers: 1. IT Security Architecture Approaches for Smart Metering and Smart Grid. 2. Smart Grid Information Exchange - Securing the Smart Grid from the Ground. 3. A Tool Set for the Evaluation of Security and Reliability in Smart Grids. 4. A Holistic View of Security and Privacy Issues in Smart Grids. 5. Hardware Security for Device Authentication in the Smart Grid. 6. Maintaining Privacy in Data Rich Demand Response Applications. 7. Data Protection in a Cloud-Enabled Smart Grid. 8. Formal Analysis of a Privacy-Preserving Billing Protocol. 9. Privacy in Smart Metering Ecosystems. 10. Energy rate at home Leveraging ZigBee to Enable Smart Grid in Residential Environment.

  5. DEVELOPMENT OF A METADATA MANAGEMENT SYSTEM FOR AN INTERDISCIPLINARY RESEARCH PROJECT

    Directory of Open Access Journals (Sweden)

    C. Curdt

    2012-07-01

    Full Text Available In every interdisciplinary, long-term research project it is essential to manage and archive all heterogeneous research data, produced by the project participants during the project funding. This has to include sustainable storage, description with metadata, easy and secure provision, back up, and visualisation of all data. To ensure the accurate description of all project data with corresponding metadata, the design and implementation of a metadata management system is a significant duty. Thus, the sustainable use and search of all research results during and after the end of the project is particularly dependent on the implementation of a metadata management system. Therefore, this paper will describe the practical experiences gained during the development of a scientific research data management system (called the TR32DB including the corresponding metadata management system for the multidisciplinary research project Transregional Collaborative Research Centre 32 (CRC/TR32 'Patterns in Soil-Vegetation-Atmosphere Systems'. The entire system was developed according to the requirements of the funding agency, the user and project requirements, as well as according to recent standards and principles. The TR32DB is basically a combination of data storage, database, and web-interface. The metadata management system was designed, realized, and implemented to describe and access all project data via accurate metadata. Since the quantity and sort of descriptive metadata depends on the kind of data, a user-friendly multi-level approach was chosen to cover these requirements. Thus, the self-developed CRC/TR32 metadata framework is designed. It is a combination of general, CRC/TR32 specific, as well as data type specific properties.

  6. Nuclear Security Management for Research Reactors and Related Facilities

    International Nuclear Information System (INIS)

    2016-03-01

    This publication provides a single source guidance to assist those responsible for the implementation of nuclear security measures at research reactors and associated facilities in developing and maintaining an effective and comprehensive programme covering all aspects of nuclear security on the site. It is based on national experience and practices as well as on publications in the field of nuclear management and security. The scope includes security operations, security processes, and security forces and their relationship with the State’s nuclear security regime. The guidance is provided for consideration by States, competent authorities and operators

  7. Adapting Project Management Practices to Research-Based Projects

    Science.gov (United States)

    Bahr, P.; Baker, T.; Corbin, B.; Keith, L.; Loerch, L.; Mullenax, C.; Myers, R.; Rhodes, B.; Skytland, N.

    2007-01-01

    From dealing with the inherent uncertainties in outcomes of scientific research to the lack of applicability of current NASA Procedural Requirements guidance documentation, research-based projects present challenges that require unique application of classical project management techniques. If additionally challenged by the creation of a new program transitioning from basic to applied research in a technical environment often unfamiliar with the cost and schedule constraints addressed by project management practices, such projects can find themselves struggling throughout their life cycles. Finally, supplying deliverables to a prime vehicle customer, also in the formative stage, adds further complexity to the development and management of research-based projects. The Biomedical Research and Countermeasures Projects Branch at NASA Johnson Space Center encompasses several diverse applied research-based or research-enabling projects within the newly-formed Human Research Program. This presentation will provide a brief overview of the organizational structure and environment in which these projects operate and how the projects coordinate to address and manage technical requirements. We will identify several of the challenges (cost, technical, schedule, and personnel) encountered by projects across the Branch, present case reports of actions taken and techniques implemented to deal with these challenges, and then close the session with an open forum discussion of remaining challenges and potential mitigations.

  8. Generalized projective synchronization via the state observer and its application in secure communication

    International Nuclear Information System (INIS)

    Wu Di; Li Juan-Juan

    2010-01-01

    Based on the improved state observer and the pole placement technique, by adding a constant which extends the scope of use of the original system, a new design method of generalized projective synchronization is proposed. With this method, by changing the projective synchronization scale factor, one can achieve not only complete synchronization, but also anti-synchronization, as well as arbitrary percentage of projective synchronization, so that the system may attain arbitrary synchronization in a relatively short period of time, which makes this study more meaningful. By numerical simulation, and choosing appropriate scale factor, the results of repeated experiments verify that this method is highly effective and satisfactory. Finally, based on this method and the relevant feedback concept, a novel secure communication project is designed. Numerical simulation verifies that this secure communication project is very valid, and moreover, the experimental result has been greatly improved in decryption time. (general)

  9. FORMATION OF THE CONTENT OF THE PROJECT OF ORGANIZATION OF SECURITY SYSTEMS IN HOTEL BUSINESS

    Directory of Open Access Journals (Sweden)

    Антон Іванович РОГОВИЙ

    2015-05-01

    Full Text Available The article identified and analyzed features of the project management in systems of creating security systems for security systems for the enterprise of hotel business. We have identified the main technical means, which should provide maximum protection of people and infrastructure of hotels. In the article revealed the criteria that should guide the manager in the selection of one or other technical means. In summery we highlighted works, which have to be included in the content of the project of organization of complex security system of companies in the hotel business.

  10. Canadian International Food Security Research Fund (CIFSRF)

    International Development Research Centre (IDRC) Digital Library (Canada)

    . The Canadian International Food Security Research Fund(CIFSRF) is a program of Canada's International Development Research. Centre (IDRC) undertaken with the financial support of the. Government of Canada provided through Foreign ...

  11. Integrating a flexible modeling framework (FMF) with the network security assessment instrument to reduce software security risk

    Science.gov (United States)

    Gilliam, D. P.; Powell, J. D.

    2002-01-01

    This paper presents a portion of an overall research project on the generation of the network security assessment instrument to aid developers in assessing and assuring the security of software in the development and maintenance lifecycles.

  12. Enhancing Food Security through Information and Communication ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... national food security, and prior approval of the government's National Food Security and Nutrition Policy 2006-2015. In alignment with these governmental commitments, this project will enable researchers to provide policymakers with practical and sustainable solutions that directly respond to national food security goals ...

  13. European perspectives on security research

    CERN Document Server

    2011-01-01

    Europe’s networked societies of today are shaped by a growing interconnection in almost all areas of life. The complexity of our infrastructures and the concurrent accessibility to means of destruction by terrorist groups and individual perpetrators call for innovative security solutions. However, such evolving innovations inevitably raise fundamental questions of concern in our societies. How do we balance the imperatives of securing our citizens and infrastructures on the one hand, and of protecting of our sacredly held civil liberties on the other? The topical network ‘Safety and Security’ of acatech – the German Academy of Science and Engineering – invited experts from the science academies of various European countries to share their perspectives on security research and the aspect of safety during a two-day workshop hosted by the Fraunhofer Institute for High-Speed Dynamics, Ernst-Mach-Institut in March 2010. This publication is a compilation of contributions made during the workshop.

  14. Information security of remote-reading energy meters

    International Nuclear Information System (INIS)

    Jacobson, J.

    1994-01-01

    This report presents basic concepts within the field of IT security. The ITSEC security and the ITSEM methods given by the European Community are used as a base. The EC INFOSEC research programme has included the project 'PER DOMUM' which focuses on remote reading of energy meters. The project is a co-operation between TACS (U.K.), GPP (Germany), CESI (Italy) and ENEL (Italy). SP has during the spring and summer of 1994 participated in the concluding of the project. Threats, security functions and security mechanisms are given for remote reading of energy meters. All of the listed functions and mechanisms do not origin from the 'PER DOMUM' project, but are the experiences of SP. The security evaluation is explained in two ways. One description of the required by ITSEM is given. Another description is given of which deliverables are required to perform the evaluation

  15. Regulatory research and support program for 1993/1994 - project descriptions

    International Nuclear Information System (INIS)

    1993-01-01

    The Regulatory Research and Support Program (RSP) is intended to augment and extend the Atomic Energy Control Board's regulatory program beyond the capability of in-house resources. The overall objective of the research and support program is to produce pertinent and independent information that will assist the Board and its staff in making sound, timely and credible decisions on regulating nuclear facilities and materials. The program is divided into nine main areas of research (mission objects) covering the safety of nuclear facilities, radioactive waste management, health physics, physical security, the development of regulatory processes, and special services. In addition, for the first time in this year's program, sub-programs (collections of related projects) have been organized in some areas of study; these sub-programs may cut across several mission objects. More sub-programs will be introduced in future years. A total of 96 projects are planned for 1993/94, including a number which are ongoing from the previous fiscal year. Projects that are held in reserve in case funding becomes available are also listed and provisionally ranked. The spending estimates for the RSP were calculated on the basis of an expected budget of $3.85 M

  16. Regulatory research and support program for 1993/1994 - project descriptions

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1993-03-01

    The Regulatory Research and Support Program (RSP) is intended to augment and extend the Atomic Energy Control Board`s regulatory program beyond the capability of in-house resources. The overall objective of the research and support program is to produce pertinent and independent information that will assist the Board and its staff in making sound, timely and credible decisions on regulating nuclear facilities and materials. The program is divided into nine main areas of research (mission objects) covering the safety of nuclear facilities, radioactive waste management, health physics, physical security, the development of regulatory processes, and special services. In addition, for the first time in this year`s program, sub-programs (collections of related projects) have been organized in some areas of study; these sub-programs may cut across several mission objects. More sub-programs will be introduced in future years. A total of 96 projects are planned for 1993/94, including a number which are ongoing from the previous fiscal year. Projects that are held in reserve in case funding becomes available are also listed and provisionally ranked. The spending estimates for the RSP were calculated on the basis of an expected budget of $3.85 M.

  17. Contribution of food security projects on poverty alleviation to the ...

    African Journals Online (AJOL)

    Despite South Africa's economic growth having been accelerated considerably in the country, poverty levels have not decreased as one would have experienced. Food Security Projects initiated by the government of South Africa in order to help alleviate poverty within Limpopo Province have proved unsustainable and ...

  18. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  19. 24 CFR 5.661 - Section 8 project-based assistance programs: Approval for police or other security personnel to...

    Science.gov (United States)

    2010-04-01

    ... personnel who will reside in the project, and the period of residence by such personnel. How owner proposes... purpose, “owner” includes a principal or other interested party. (iv) How residence by security personnel in a project unit will increase security for Section 8 assisted families residing in the project. (v...

  20. Research on the security of nuclear power equipment

    International Nuclear Information System (INIS)

    Zhao Jiong; Wu Jinzong

    2008-06-01

    Recently, the rapidly growing economy in conflict with the lack of power in the whole country become more and more seriously in our country. In other hand, there is also various kind of problems such as greenhouse effect and the oil price rising conditions. It greatly promote our country's development of Nuclear power project. As forecast, the number of Nuclear Power Plant will increase greatly in the future. However, the security of the Nuclear Power Plant is one of the topics that people always pay more attention to. Combining with the practice experience of Nuclear Power Plant in Japanese, the security of Nuclear Power Plant in multi-angles is discussed. It is pointed that the risk assesment and management system of nuclear power plant are effective measure for security of the development of nuclear power. (authors)

  1. Researchers' experience with project management in health and medical research: Results from a post-project review

    Science.gov (United States)

    2011-01-01

    Background Project management is widely used to deliver projects on time, within budget and of defined quality. However, there is little published information describing its use in managing health and medical research projects. We used project management in the Alcohol and Pregnancy Project (2006-2008) http://www.ichr.uwa.edu.au/alcoholandpregnancy and in this paper report researchers' opinions on project management and whether it made a difference to the project. Methods A national interdisciplinary group of 20 researchers, one of whom was the project manager, formed the Steering Committee for the project. We used project management to ensure project outputs and outcomes were achieved and all aspects of the project were planned, implemented, monitored and controlled. Sixteen of the researchers were asked to complete a self administered questionnaire for a post-project review. Results The project was delivered according to the project protocol within the allocated budget and time frame. Fifteen researchers (93.8%) completed a questionnaire. They reported that project management increased the effectiveness of the project, communication, teamwork, and application of the interdisciplinary group of researchers' expertise. They would recommend this type of project management for future projects. Conclusions Our post-project review showed that researchers comprehensively endorsed project management in the Alcohol and Pregnancy Project and agreed that project management had contributed substantially to the research. In future, we will project manage new projects and conduct post-project reviews. The results will be used to encourage continuous learning and continuous improvement of project management, and provide greater transparency and accountability of health and medical research. The use of project management can benefit both management and scientific outcomes of health and medical research projects. PMID:21635721

  2. Partners in projects: preparing for public involvement in health and social care research.

    Science.gov (United States)

    Parkes, Jacqueline H; Pyer, Michelle; Wray, Paula; Taylor, Jane

    2014-09-01

    In recent years, several UK and, international funders of health and social care related research have adopted the policy of requiring explicit evidence of the 'public' voice in all aspects of project design. For many academic researchers engaged within research, evaluations or audit projects, this formal requirement to actively engage members of the public will present them with both benefits and challenges to securing knowledgeable, skilled, and confident lay representation onto project teams. This could potentially lead to the exploitation of those individuals who are available, appropriately informed, and adequately prepared for such activities. Currently, much of the preparation of patients or members of the public for research involvement tends to be aligned to specific projects; however, with the call for greater active and meaningful involvement of lay representatives in future national and international funding applications, there is clearly a growing need to 'train' sufficient numbers of confident and competent representatives to meet this growing demand. This paper describes the development of a specifically designed research awareness training programme and underpinning theoretical model, which has been specifically designed to support active and meaningful lay involvement in research, evaluations and audit projects. Developed over a four year period, the course is a culmination of learning extracted from a series of four completed research projects, which have incorporated an element of public and patient involvement (PPI) training in their overall design. Crown Copyright © 2014. Published by Elsevier Ireland Ltd. All rights reserved.

  3. The joint European TEMPUS project 'Human Security (environment, quality of food, public health, and society) on territories contaminated by radioactive agents'

    International Nuclear Information System (INIS)

    Goncharova, N.; Butchenkow, I.; Maestri, E.

    2016-01-01

    Full text: The Joint European TEMPUS Project 'Human Security (environment, quality of food, public health, and society) on Territories Contaminated by Radioactive Agents', started in 2012. The EU project participants are the following: University of Cordoba (Spain) - Project Coordinator, University of Parma (Italy), University of Florence (Italy), Swedish University of Agricultural Sciences (Sweden) and Riga Technical University (Latvia). The project involves three partner countries - Belarus, Russia, Ukraine, represented by the following institutions: Belarusian State University, International Sakharov Environmental University, Grodno State Medical University, Grodno State Agrarian University, Voronezh State University, Tyumen State Medical Academy, Ural Federal University (Yekaterinburg), Chelyabinsk State University, Nuclear Cities Information-Education Centre, Vinnitsa National Medical University, Zhytomyr State Technological University, Kyiv International University, Sevastopol National University of Nuclear Energy and Industry, Polissya branch of G.M. Vysotsky Ukrainian Research Institute of Forestry and Forest Melioration. The main objectives of the project are: to develop interdisciplinary Master and Doctoral (PhD) programs in the field of Human Security of people living in areas affected by accidents at nuclear power plants / plant for processing nuclear fuel within the following specialties: Ecology and Environment Sciences - 'Human Security and Environment'; Food quality control - 'Human Security and Quality of Food'; Medicine - 'Human Security and Public Health'; Political and Social Sciences - 'Human Security and Society'. These programs will be implemented at 12 universities, 4 from each partner country. During the project implementation it is expected to achieve the following main results: modified interdisciplinary Master and Doctoral (PhD) programs taking into account the studied European experience and practice; joint system of upgrade of

  4. Cyber Security Research Frameworks For Coevolutionary Network Defense

    Energy Technology Data Exchange (ETDEWEB)

    Rush, George D. [Missouri Univ. of Science and Technology, Rolla, MO (United States); Tauritz, Daniel Remy [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-12-03

    Several architectures have been created for developing and testing systems used in network security, but most are meant to provide a platform for running cyber security experiments as opposed to automating experiment processes. In the first paper, we propose a framework termed Distributed Cyber Security Automation Framework for Experiments (DCAFE) that enables experiment automation and control in a distributed environment. Predictive analysis of adversaries is another thorny issue in cyber security. Game theory can be used to mathematically analyze adversary models, but its scalability limitations restrict its use. Computational game theory allows us to scale classical game theory to larger, more complex systems. In the second paper, we propose a framework termed Coevolutionary Agent-based Network Defense Lightweight Event System (CANDLES) that can coevolve attacker and defender agent strategies and capabilities and evaluate potential solutions with a custom network defense simulation. The third paper is a continuation of the CANDLES project in which we rewrote key parts of the framework. Attackers and defenders have been redesigned to evolve pure strategy, and a new network security simulation is devised which specifies network architecture and adds a temporal aspect. We also add a hill climber algorithm to evaluate the search space and justify the use of a coevolutionary algorithm.

  5. Secured web-based video repository for multicenter studies.

    Science.gov (United States)

    Yan, Ling; Hicks, Matt; Winslow, Korey; Comella, Cynthia; Ludlow, Christy; Jinnah, H A; Rosen, Ami R; Wright, Laura; Galpern, Wendy R; Perlmutter, Joel S

    2015-04-01

    We developed a novel secured web-based dystonia video repository for the Dystonia Coalition, part of the Rare Disease Clinical Research network funded by the Office of Rare Diseases Research and the National Institute of Neurological Disorders and Stroke. A critical component of phenotypic data collection for all projects of the Dystonia Coalition includes a standardized video of each participant. We now describe our method for collecting, serving and securing these videos that is widely applicable to other studies. Each recruiting site uploads standardized videos to a centralized secured server for processing to permit website posting. The streaming technology used to view the videos from the website does not allow downloading of video files. With appropriate institutional review board approval and agreement with the hosting institution, users can search and view selected videos on the website using customizable, permissions-based access that maintains security yet facilitates research and quality control. This approach provides a convenient platform for researchers across institutions to evaluate and analyze shared video data. We have applied this methodology for quality control, confirmation of diagnoses, validation of rating scales, and implementation of new research projects. We believe our system can be a model for similar projects that require access to common video resources. Copyright © 2015 Elsevier Ltd. All rights reserved.

  6. Security and health research databases: the stakeholders and questions to be addressed.

    Science.gov (United States)

    Stewart, Sara

    2006-01-01

    Health research database security issues abound. Issues include subject confidentiality, data ownership, data integrity and data accessibility. There are also various stakeholders in database security. Each of these stakeholders has a different set of concerns and responsibilities when dealing with security issues. There is an obvious need for training in security issues, so that these issues may be addressed and health research will move on without added obstacles based on misunderstanding security methods and technologies.

  7. The Common Body of Knowledge: A Framework to Promote Relevant Information Security Research

    Directory of Open Access Journals (Sweden)

    Kenneth J. Knapp

    2007-03-01

    Full Text Available This study proposes using an established common body of knowledge (CBK as one means of organizing information security literature.  Consistent with calls for more relevant information systems (IS research, this industry-developed framework can motivate future research towards topics that are important to the security practitioner.  In this review, forty-eight articles from ten IS journals from 1995 to 2004 are selected and cross-referenced to the ten domains of the information security CBK.  Further, we distinguish articles as empirical research, frameworks, or tutorials.  Generally, this study identified a need for additional empirical research in every CBK domain including topics related to legal aspects of information security.  Specifically, this study identified a need for additional IS security research relating to applications development, physical security, operations security, and business continuity.  The CBK framework is inherently practitioner oriented and using it will promote relevancy by steering IS research towards topics important to practitioners.  This is important considering the frequent calls by prominent information systems scholars for more relevant research.  Few research frameworks have emerged from the literature that specifically classify the diversity of security threats and range of problems that businesses today face.  With the recent surge of interest in security, the need for a comprehensive framework that also promotes relevant research can be of great value.

  8. Eduroam: Secure WiFi roaming for education and research

    CSIR Research Space (South Africa)

    Miteff, S

    2012-10-01

    Full Text Available In this presentation the author introduces the Eduroam initiative, and explains how it combines existing wireless security technologies in a novel way, to enable secure global roaming for end users at university campuses and research institutions....

  9. Research award: Agriculture and Food Security | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Research shows that appropriate food security interventions can improve ... sector within the context of increased productivity and reduction of post-harvest loss, rural ... The successful candidate will allocate 50% of his/her time for a research ... with a focus on agriculture;; Business administration and/or management, with a ...

  10. TOWARD HIGHLY SECURE AND AUTONOMIC COMPUTING SYSTEMS: A HIERARCHICAL APPROACH

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Hsien-Hsin S

    2010-05-11

    The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniques and system software for achieving a robust, secure, and reliable computing system toward our goal.

  11. Theory, Demonstration and Methods: Research on Social Security of Migrant Workers by Domestic Scholar

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Social security of migrant workers has been significant in dissolving social contradictions and achieving the economic and social development in China during the transitional period. The researches of domestic scholar on social security of migrant workers can be classified into three categories. Firstly, theoretical analysis on social security of migrant workers, including researches on the appeal of social security and misunderstanding of recognition, theory-construction of rural worker social security, policy defects and equity construction in social security system of migrant workers. Secondly, real studies on social security of migrant workers, including researches on sequence of demand and influencing factors of social security of migrant workers as well as intrinsic motivation forming the perspective on social security. Lastly, road exploration of establishing social security system, including researches on the multi-level development of rural worker social security system, comparison of "Double-low method", "Guangdong Method" and "Shanghai Method" of the social security of migrant workers in Zhejiang Province and establishing multi-level social security system according to the hierarchy after the internal differentiation.

  12. Regulatory research program for 1986/87 project descriptions. Information bulletin 86-1

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1986-07-08

    The regulatory research program is intended to augment and extend the Atomic Energy Control Board`s regulatory program beyond the capability of in-house resources. The overall objective of the research program is to produce pertinent and independent information that will assist the Board and its staff in making correct, timely and credible decisions on regulating nuclear energy. The program is divided into ten main areas of research covering the safety of nuclear facilities, radioactive waste management, health physics, physical security and the development of regulatory processes. A total of 92 projects are planned for 1986/87, including a number which are ongoing from the previous fiscal year.

  13. Regulatory research program for 1986/87 project descriptions. Information bulletin 86-1

    International Nuclear Information System (INIS)

    1986-01-01

    The regulatory research program is intended to augment and extend the Atomic Energy Control Board's regulatory program beyond the capability of in-house resources. The overall objective of the research program is to produce pertinent and independent information that will assist the Board and its staff in making correct, timely and credible decisions on regulating nuclear energy. The program is divided into ten main areas of research covering the safety of nuclear facilities, radioactive waste management, health physics, physical security and the development of regulatory processes. A total of 92 projects are planned for 1986/87, including a number which are ongoing from the previous fiscal year

  14. SecureCore Software Architecture: Trusted Path Application (TPA) Requirements

    National Research Council Canada - National Science Library

    Clark, Paul C; Irvine, Cynthia E; Levin, Timothy E; Nguyen, Thuy D; Vidas, Timothy M

    2007-01-01

    .... The purpose of the SecureCore research project is to investigate fundamental architectural features required for the trusted operation of mobile computing devices so the security is built-in, transparent and flexible...

  15. Canadian International Food Security Research Fund | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Canadian International Food Security Research Fund (CIFSRF) invests in scaling up ... for farming families, and improve nutrition throughout the Global South. ... universities, civil society organizations, governments, and the private sector, ...

  16. Security and Health Research Databases: The Stakeholders and Questions to Be Addressed

    OpenAIRE

    Stewart, Sara

    2006-01-01

    Health research database security issues abound. Issues include subject confidentiality, data ownership, data integrity and data accessibility. There are also various stakeholders in database security. Each of these stakeholders has a different set of concerns and responsibilities when dealing with security issues. There is an obvious need for training in security issues, so that these issues may be addressed and health research will move on without added obstacles based on misunderstanding s...

  17. Research Projects at Chulalongkorn University for the Master Degree Programme in Nuclear Security and Safeguard

    International Nuclear Information System (INIS)

    Nilsuwankosit, S.

    2015-01-01

    The Department of Nuclear Engineering, Faculty of Engineering, Chulalongkorn University, Thailand, began its master degree programme in nuclear security and safeguard in November 2013 with the support from the CBRN-Center of Excellence, European Union. This programme was planned as a way to raise the awareness of various local agencies in ASEAN countries regarding the threat of CBRN events. In the long run, the programme will also serve as the platform to develop the human resource and to provide the professional assistance required to counter such threat in the region. The programme closely follows the guideline as given by the IAEA and employs its materials as the main source of references. The first batch of 20 students came from countries in the ASEAN community. Due to the nature of the program, each student is required to conduct the research and a thesis based on such research is to be submitted as part of the requirement for the graduation. Currently, the research subjects that are readily available to the students can be classified into 5 categories: 1. subjects with neutron generator, 2. subjects with nuclear electronics and instruments, 3. subjects with industrial applications, 4. subjects with computer simulations, and 5. subjects with policy research. (author)

  18. Bypassing Russia: Nabucco project and its implications for the European gas security

    International Nuclear Information System (INIS)

    Erdogdu, Erkan

    2010-01-01

    Restrictions on CO 2 emissions, the nuclear phase-out announced by some member states, high emissions from coal-fired power plants, and barriers to rapid development of renewable generation are factors that make the European Union (EU) highly dependent on natural gas. With three non-EU countries (Russia, Algeria and Norway) currently supplying more than half the gas consumed within the EU and with projections pointing out that by 2030 internal sources will only be able to meet 25% of demand, the EU desperately looks for means to secure new sources of gas supply. In this context, the Nabucco pipeline is planned to deliver gas from Caspian and Middle East regions to the EU market. It runs across Turkey and then through Bulgaria, Romania and Hungary before connecting with a major gas hub in Austria. On paper, Nabucco project makes perfect sense, offering a new export route to the EU markets for Caspian gas producers (Azerbaijan, Turkmenistan and Kazakhstan) as well as Iran and, in time, Iraq. The project is backed by the EU and strongly supported by the United States. Perhaps most importantly, Nabucco would completely bypass Russia. This paper addresses issues surrounding Nabucco project and their implications for the European gas security. (author)

  19. National register of research projects

    Energy Technology Data Exchange (ETDEWEB)

    1985-03-01

    This Register is intended to serve as a source of information on research which is being conducted in all fields (both natural and human sciences) in the Republic of South Africa. New research projects commenced during 1983 or 1984, and significantly changed research projects, as well as project that were completed or terminated during this period, on which information was received by the compilers before December 1984, are included, with the exception of confidential projects.

  20. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  1. Security in cloud computing

    OpenAIRE

    Moreno Martín, Oriol

    2016-01-01

    Security in Cloud Computing is becoming a challenge for next generation Data Centers. This project will focus on investigating new security strategies for Cloud Computing systems. Cloud Computingisarecent paradigmto deliver services over Internet. Businesses grow drastically because of it. Researchers focus their work on it. The rapid access to exible and low cost IT resources on an on-demand fashion, allows the users to avoid planning ahead for provisioning, and enterprises to save money ...

  2. Externally Funded Research and ‎Development ‎‎Projects in Perspective of Learning

    Directory of Open Access Journals (Sweden)

    Rauno Ilmari Pirinen

    2011-10-01

    Full Text Available The focus of this study is on stunted-centered learning activity ‎which ‎collaborates ‎learning ‎and research in an interoperative ‎way ‎and shares the regional-national ‎research ‎and development ‎‎(R&D capabilities, interests and agenda.‎ The study is addressed ‎to ‎the cooperation model and factors of learning within R&D ‎projects that develop ‎academic knowledge, competences and ‎regional—national capabilities for all ‎participants by ‎contributing ‎authentic R&D scopes or problems in real-life ‎situations. The study includes analysis of the ‎research data regarding ‎the R&D project, namely SATERISK (SATEllite ‎positioning ‎‎RISKs, which was initiated by two security ‎management students at Laurea University of ‎Applied ‎Sciences ‎and that has evolved into a substantial three-year R&D ‎project ‎between 2008 and 2011 and is funded by the ‎Finnish ‎Funding Agency for ‎Technology and Innovations (TEKES.‎

  3. Secure it now or secure it later: the benefits of addressing cyber-security from the outset

    Science.gov (United States)

    Olama, Mohammed M.; Nutaro, James

    2013-05-01

    The majority of funding for research and development (R&D) in cyber-security is focused on the end of the software lifecycle where systems have been deployed or are nearing deployment. Recruiting of cyber-security personnel is similarly focused on end-of-life expertise. By emphasizing cyber-security at these late stages, security problems are found and corrected when it is most expensive to do so, thus increasing the cost of owning and operating complex software systems. Worse, expenditures on expensive security measures often mean less money for innovative developments. These unwanted increases in cost and potential slowing of innovation are unavoidable consequences of an approach to security that finds and remediate faults after software has been implemented. We argue that software security can be improved and the total cost of a software system can be substantially reduced by an appropriate allocation of resources to the early stages of a software project. By adopting a similar allocation of R&D funds to the early stages of the software lifecycle, we propose that the costs of cyber-security can be better controlled and, consequently, the positive effects of this R&D on industry will be much more pronounced.

  4. Information Security Issues in Higher Education and Institutional Research

    Science.gov (United States)

    Custer, William L.

    2010-01-01

    Information security threats to educational institutions and their data assets have worsened significantly over the past few years. The rich data stores of institutional research are especially vulnerable, and threats from security breaches represent no small risk. New genres of threat require new kinds of controls if the institution is to prevent…

  5. Privacy and Security in Mobile Health (mHealth) Research.

    Science.gov (United States)

    Arora, Shifali; Yttri, Jennifer; Nilse, Wendy

    2014-01-01

    Research on the use of mobile technologies for alcohol use problems is a developing field. Rapid technological advances in mobile health (or mHealth) research generate both opportunities and challenges, including how to create scalable systems capable of collecting unprecedented amounts of data and conducting interventions-some in real time-while at the same time protecting the privacy and safety of research participants. Although the research literature in this area is sparse, lessons can be borrowed from other communities, such as cybersecurity or Internet security, which offer many techniques to reduce the potential risk of data breaches or tampering in mHealth. More research into measures to minimize risk to privacy and security effectively in mHealth is needed. Even so, progress in mHealth research should not stop while the field waits for perfect solutions.

  6. Regulatory Framework for Controlling the Research Reactor Decommissioning Project

    International Nuclear Information System (INIS)

    Melani, Ai; Chang, Soon Heung

    2009-01-01

    Decommissioning is one of important stages in construction and operation of research reactors. Currently, there are three research reactors operating in Indonesia. These reactors are operated by the National Nuclear Energy Agency (BATAN). The age of the three research reactors varies from 22 to 45 years since the reactors reached their first criticality. Regulatory control of the three reactors is conducted by the Nuclear Energy Regulatory Agency (BAPETEN). Controlling the reactors is carried out based on the Act No. 10/1997 on Nuclear Energy, Government Regulations and BAPETEN Chairman Decrees concerning the nuclear safety, security and safeguards. Nevertheless, BAPETEN still lack of the regulation, especially for controlling the decommissioning project. Therefore, in the near future BAPETEN has to prepare the regulations for decommissioning, particularly to anticipate the decommissioning of the oldest research reactors, which probably will be done in the next ten years. In this papers author give a list of regulations should be prepared by BAPETEN for the decommissioning stage of research reactor in Indonesia based on the international regulatory practice

  7. Scintilla European project, the successful research results

    Energy Technology Data Exchange (ETDEWEB)

    Sannie, G.; Kondrasov, V.; Corre, G.; Boudergui, K.; Perot, B.; Carasco, C.; Montemont, G. [Commissariat a l' energie atomique et aux energies alternatives, Saclay, Cadarache, Grenoble (France); Peerani, P.; Carrapico, C.; Tomanin, A.; Rosas, F.; Caviglia, M.; Eklund, G.; Tagziria, H. [European Commission, Joint Research Centre, ITU, Nuclear Security Unit, Ispra (Italy); Friedrich, H.; Chmel, S. [Fraunhofer-Institut fuer Naturwissenschaftlich - Technische Trendanalysen - INT, Euskirchen (Germany); De Vita, R.; Manchini, E.; Pavan, M. [Istituto Nazionale di Fisica Nucleare, Sezione di Genova, Genova (Italy); Grattarola, M.; Botta, E. [Ansaldo Nucleare S.P.A, Genova (Italy); Kovacs, A.; Lakosi, L. [Hungarian Academy of Sciences, Centre for Energy Research, Budapest (Hungary); Baumhauer, C.; Deheuninck, T.; Haddad, E. [ARTTIC, Paris (France); Petrossian, G.; Ferragut, A. [SAPHYMO, Massy (France); Dermody, G.; Crossingham, G. [Symetrica Security Ltd, Southampton (United Kingdom)

    2015-07-01

    The Scintilla FP7 project is ended in December 2014, the fruitful results of 3 years development and tests will be presented. SCINTILLA offers the capacity to finding a reliable alternative to Helium-3 based detection systems since the gas which is predominantly used in nuclear safeguards and security applications has now become very expensive, rare and nearly unavailable. SCINTILLA benchmarks results are based on international standards. Radiation Portal tests were carried out at the Joint Research Centre (JRC) in Ispra (Italy). The scintilla project addresses few mains issues. The first is to develop neutron detectors for Radiation Portal Monitor (RPM) and the second is the need of new wearable integrated solutions for Spectrometric Personal Radiation Monitor (SPRM). The partners which provide technical systems of the scintilla project are INFN-ANSALDO, CEA, SYMETRICA and SAPHYMO. For RPM, the objective is to find reliable alternatives to Helium-3 historical neutron detector and provide technical solutions which cope with tests for reliable mobile and cost effective. For Spectrometric Personal Radiation Monitor (SPRM), SCINTILLA is innovating in technology areas that offer complementary capabilities for detecting and identifying gamma, Two CZT (Cadmium Zinc Telluride) addressing contexts of used by first responder technologies, one is a wearable detector and the second is a gamma camera complemented by advanced image processing technologies. (authors)

  8. Student Research Projects

    Science.gov (United States)

    Yeske, Lanny A.

    1998-01-01

    Numerous FY1998 student research projects were sponsored by the Mississippi State University Center for Air Sea Technology. This technical note describes these projects which include research on: (1) Graphical User Interfaces, (2) Master Environmental Library, (3) Database Management Systems, (4) Naval Interactive Data Analysis System, (5) Relocatable Modeling Environment, (6) Tidal Models, (7) Book Inventories, (8) System Analysis, (9) World Wide Web Development, (10) Virtual Data Warehouse, (11) Enterprise Information Explorer, (12) Equipment Inventories, (13) COADS, and (14) JavaScript Technology.

  9. Indicators for energy security

    International Nuclear Information System (INIS)

    Kruyt, Bert; Van Vuuren, D.P.; De Vries, H.J.M.; Groenenberg, H.

    2009-01-01

    The concept of energy security is widely used, yet there is no consensus on its precise interpretation. In this research, we have provided an overview of available indicators for long-term security of supply (SOS). We distinguished four dimensions of energy security that relate to the availability, accessibility, affordability and acceptability of energy and classified indicators for energy security according to this taxonomy. There is no one ideal indicator, as the notion of energy security is highly context dependent. Rather, applying multiple indicators leads to a broader understanding. Incorporating these indicators in model-based scenario analysis showed accelerated depletion of currently known fossil resources due to increasing global demand. Coupled with increasing spatial discrepancy between consumption and production, international trade in energy carriers is projected to have increased by 142% in 2050 compared to 2008. Oil production is projected to become increasingly concentrated in a few countries up to 2030, after which production from other regions diversifies the market. Under stringent climate policies, this diversification may not occur due to reduced demand for oil. Possible benefits of climate policy include increased fuel diversity and slower depletion of fossil resources. (author)

  10. Thinking Big for 25 Years: Astronomy Camp Research Projects

    Science.gov (United States)

    Hooper, Eric Jon; McCarthy, D. W.; Benecchi, S. D.; Henry, T. J.; Kirkpatrick, J. D.; Kulesa, C.; Oey, M. S.; Regester, J.; Schlingman, W. M.; Camp Staff, Astronomy

    2013-01-01

    Astronomy Camp is a deep immersion educational adventure for teenagers and adults in southern Arizona that is entering its 25th year of existence. The Camp Director (McCarthy) is the winner of the 2012 AAS Education Prize. A general overview of the program is given in an accompanying contribution (McCarthy et al.). In this presentation we describe some of the research projects conducted by Astronomy Camp participants over the years. Many of the Camps contain a strong project-oriented emphasis, which reaches its pinnacle in the Advanced Camps for teenagers. High school students from around the world participate in a microcosm of the full arc of astronomy research. They plan their own projects before the start of Camp, and the staff provide a series of "key projects." Early in the Camp the students submit observing proposals to utilize time on telescopes. (The block of observing time is secured in advance by the staff.) The participants collect, reduce and analyze astronomical data with the help of staff, and they present the results to their peers on the last night of Camp, all in a span of eight days. The Camps provide research grade telescopes and instruments, in addition to amateur telescopes. Some of the Camps occur on Kitt Peak, where we use an ensemble of telescopes: the 2.3-meter (University of Arizona) with a spectrograph; the WIYN 0.9-meter; the McMath-Pierce Solar Telescope; and the 12-meter millimeter wave telescope. Additionally the Camp has one night on the 10-meter Submillimeter Telescope on Mt. Graham. Campers use these resources to study stars, galaxies, AGN, transiting planets, molecular clouds, etc. Some of the camper-initiated projects have led to very high level performances in prestigious international competitions, such as the Intel International Science and Engineering Fair. The key projects often contribute to published astronomical research (e.g., Benecchi et al. 2010, Icarus, 207, 978). Many former Campers have received Ph.D. degrees in

  11. A roadmap for security challenges in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Arbia Riahi Sfar

    2018-04-01

    Full Text Available Unquestionably, communicating entities (object, or things in the Internet of Things (IoT context are playing an active role in human activities, systems and processes. The high connectivity of intelligent objects and their severe constraints lead to many security challenges, which are not included in the classical formulation of security problems and solutions. The Security Shield for IoT has been identified by DARPA (Defense Advanced Research Projects Agency as one of the four projects with a potential impact broader than the Internet itself. To help interested researchers contribute to this research area, an overview of the IoT security roadmap overview is presented in this paper based on a novel cognitive and systemic approach. The role of each component of the approach is explained, we also study its interactions with the other main components, and their impact on the overall. A case study is presented to highlight the components and interactions of the systemic and cognitive approach. Then, security questions about privacy, trust, identification, and access control are discussed. According to the novel taxonomy of the IoT framework, different research challenges are highlighted, important solutions and research activities are revealed, and interesting research directions are proposed. In addition, current standardization activities are surveyed and discussed to the ensure the security of IoT components and applications. Keywords: Internet of Things, Systemic and cognitive approach, Security, Privacy, Trust, Identification, Access control

  12. Project management of life-science research projects: project characteristics, challenges and training needs.

    Science.gov (United States)

    Beukers, Margot W

    2011-02-01

    Thirty-four project managers of life-science research projects were interviewed to investigate the characteristics of their projects, the challenges they faced and their training requirements. A set of ten discriminating parameters were identified based on four project categories: contract research, development, discovery and call-based projects--projects set up to address research questions defined in a call for proposals. The major challenges these project managers are faced with relate to project members, leadership without authority and a lack of commitment from the respective organization. Two-thirds of the project managers indicated that they would be interested in receiving additional training, mostly on people-oriented, soft skills. The training programs that are currently on offer, however, do not meet their needs. Copyright © 2010 Elsevier Ltd. All rights reserved.

  13. Experimental Plasma Research project summaries

    International Nuclear Information System (INIS)

    1980-09-01

    This report contains descriptions of the activities supported by the Experimental Plasma Research Branch of APP. The individual project summaries were prepared by the principal investigators and include objectives and milestones for each project. The projects are arranged in six research categories: Plasma Properties; Plasma Heating; Plasma Diagnostics; Atomic, Molecular and Nuclear Physics; Advanced Superconducting Materials; and the Fusion Plasma Research Facility (FPRF). Each category is introduced with a statement of objectives and recent progress and followed by descriptions of individual projects. An overall budget summary is provided at the beginning of the report

  14. Experimental Plasma Research project summaries

    Energy Technology Data Exchange (ETDEWEB)

    None

    1980-09-01

    This report contains descriptions of the activities supported by the Experimental Plasma Research Branch of APP. The individual project summaries were prepared by the principal investigators and include objectives and milestones for each project. The projects are arranged in six research categories: Plasma Properties; Plasma Heating; Plasma Diagnostics; Atomic, Molecular and Nuclear Physics; Advanced Superconducting Materials; and the Fusion Plasma Research Facility (FPRF). Each category is introduced with a statement of objectives and recent progress and followed by descriptions of individual projects. An overall budget summary is provided at the beginning of the report.

  15. Information security management: a proposal to improve the effectiveness of information security in the scientific research environment

    International Nuclear Information System (INIS)

    Alexandria, Joao Carlos Soares de

    2009-01-01

    The increase of the connectivity in the business environment, combined with the growing dependency of information systems, has become the information security management an important governance tool. Information security has as main goal to protect the business transactions in order to work normally. In this way, It will be safeguarding the business continuity. The threats of information come from hackers' attacks, electronic frauds and spying, as well as fire, electrical energy interruption and humans fault. Information security is made by implementation of a set of controls, including of the others politics, processes, procedures, organizational structures, software and hardware, which require a continuous management and a well established structure to be able to face such challenges. This work tried to search the reasons why the organizations have difficulties to make a practice of information security management. Many of them just limit to adopt points measures, sometimes they are not consistent with their realities. The market counts on enough quantity of standards and regulations related to information security issues, for example, ISO/IEC 27002, American Sarbanes-Oxley act, Basel capital accord, regulations from regulatory agency (such as the Brazilians ones ANATEL, ANVISA and CVM). The market researches have showed that the information security implementation is concentrated on a well-defined group of organization mainly formed by large companies and from specifics sectors of economy, for example, financial and telecommunication. However, information security must be done by all organizations that use information systems to carry out their activities, independently of its size or economic area that it belongs. The situation of information security in the governmental sector of Brazil, and inside its research institutions, is considered worrying by the Brazilian Court of Accounts (TCU). This research work presents an assessment and diagnostic proposal of

  16. Report on Department of Homeland Security Sponsored Research Project at Lawrence Livermore National Laboratory on Preparation for an Improvised Nuclear Device Event

    Energy Technology Data Exchange (ETDEWEB)

    A., B

    2008-07-31

    Following the events of September 11th, a litany of imaginable horribles was trotted out before an anxious and concerned public. To date, government agencies and academics are still grappling with how to best respond to such catastrophes, and as Senator Lieberman's quote says above, now is the time to plan and prepare for such events. One of the nation's worst fears is that terrorists might detonate an improvised nuclear device (IND) in an American city. With 9/11 serving as the catalyst, the government and many NGOs have invested money into research and development of response capabilities throughout the country. Yet, there is still much to learn about how to best respond to an IND event. My summer 2008 internship at Lawrence Livermore National Laboratory afforded me the opportunity to look in depth at the preparedness process and the research that has been conducted on this issue. While at the laboratory I was tasked to collect, combine, and process research on how cities and the federal government can best prepare for the horrific prospect of an IND event. Specific projects that I was involved with were meeting reports, research reviews, and a full project report. Working directly with Brooke Buddemeier and his support team at the National Atmospheric Release Advisory Center, I was able to witness first hand, preparation for meetings with response planners to inform them of the challenges that an IND event would pose to the affected communities. In addition, I supported the Homeland Security Institute team (HSI), which was looking at IND preparation and preparing a Congressional report. I participated in meetings at which local responders expressed their concerns and contributed valuable information to the response plan. I specialized in the psycho-social aspects of an IND event and served as a technical advisor to some of the research groups. Alongside attending and supporting these meetings, I worked on an independent research project which collected

  17. Report on Department of Homeland Security Sponsored Research Project at Lawrence Livermore National Laboratory on Preparation for an Improvised Nuclear Device Event

    International Nuclear Information System (INIS)

    Bentz, A.

    2008-01-01

    Following the events of September 11th, a litany of imaginable horribles was trotted out before an anxious and concerned public. To date, government agencies and academics are still grappling with how to best respond to such catastrophes, and as Senator Lieberman's quote says above, now is the time to plan and prepare for such events. One of the nation's worst fears is that terrorists might detonate an improvised nuclear device (IND) in an American city. With 9/11 serving as the catalyst, the government and many NGOs have invested money into research and development of response capabilities throughout the country. Yet, there is still much to learn about how to best respond to an IND event. My summer 2008 internship at Lawrence Livermore National Laboratory afforded me the opportunity to look in depth at the preparedness process and the research that has been conducted on this issue. While at the laboratory I was tasked to collect, combine, and process research on how cities and the federal government can best prepare for the horrific prospect of an IND event. Specific projects that I was involved with were meeting reports, research reviews, and a full project report. Working directly with Brooke Buddemeier and his support team at the National Atmospheric Release Advisory Center, I was able to witness first hand, preparation for meetings with response planners to inform them of the challenges that an IND event would pose to the affected communities. In addition, I supported the Homeland Security Institute team (HSI), which was looking at IND preparation and preparing a Congressional report. I participated in meetings at which local responders expressed their concerns and contributed valuable information to the response plan. I specialized in the psycho-social aspects of an IND event and served as a technical advisor to some of the research groups. Alongside attending and supporting these meetings, I worked on an independent research project which collected

  18. Colombia: security and conflict 2000-2014. Two political projects in dispute

    Directory of Open Access Journals (Sweden)

    Fernando Galindo Rodriguez

    2016-12-01

    Full Text Available This paper analyzes, from a multi-dimensional point of view, the elements on which the concept of security in Colombia has been articulated in the last decade. Study the policy of Democratic Security of Alvaro Uribe Velez (2002-2010 and the policy of Democratic Prosperity of Juan Manuel Santos (2010-2014 from a socio-political perspective. Although both policies share military elements, each one aims to consolidate a different political country project. The first one relates to rebuild a country based on a Security State and on an authoritarian praxis. The second one aims to stop the consolidation of the first one and take up again the liberal foundations of the Political Constitution of 1991 that, in addition, allow them continued exercise of the historical hegemony of national political power that was interrupted in 2002. Elements that contribute to broaden understanding of the current national context and the peace process.

  19. Ethical Guidelines for Computer Security Researchers: "Be Reasonable"

    Science.gov (United States)

    Sassaman, Len

    For most of its existence, the field of computer science has been lucky enough to avoid ethical dilemmas by virtue of its relatively benign nature. The subdisciplines of programming methodology research, microprocessor design, and so forth have little room for the greater questions of human harm. Other, more recently developed sub-disciplines, such as data mining, social network analysis, behavioral profiling, and general computer security, however, open the door to abuse of users by practitioners and researchers. It is therefore the duty of the men and women who chart the course of these fields to set rules for themselves regarding what sorts of actions on their part are to be considered acceptable and what should be avoided or handled with caution out of ethical concerns. This paper deals solely with the issues faced by computer security researchers, be they vulnerability analysts, privacy system designers, malware experts, or reverse engineers.

  20. Computer science security research and human subjects: emerging considerations for research ethics boards.

    Science.gov (United States)

    Buchanan, Elizabeth; Aycock, John; Dexter, Scott; Dittrich, David; Hvizdak, Erin

    2011-06-01

    This paper explores the growing concerns with computer science research, and in particular, computer security research and its relationship with the committees that review human subjects research. It offers cases that review boards are likely to confront, and provides a context for appropriate consideration of such research, as issues of bots, clouds, and worms enter the discourse of human subjects review.

  1. Addressing the security of a future sustainable power system: The Danish SOSPO project

    DEFF Research Database (Denmark)

    Yang, Guangya; Jóhannsson, Hjörtur; Lind, Morten

    2012-01-01

    evaluated to secure the operation from both transmission and distribution levels. The Danish SOSPO project is launched from 2012 targeting at the system security assessment in the control room for the future scenarios. Methods will be developed in this project to counteract with the future challenges......Current power systems have been undergoing in depth changes by the increasing use of renewable generations. At one hand, the grid is progressively more interconnected in order to collect the renewable generation from geographically dispersed places meanwhile reduce the risks of intermittency......; on the other, the power is increasingly generated at relative low voltage networks which in turn gives rise to new challenges in the conventional system design. The high governmental objective of greenhouse gas reduction provokes accelerating adoptation of the renewables. The effect of this has to be carefully...

  2. Experimental plasma research project summaries

    International Nuclear Information System (INIS)

    1978-08-01

    This report contans descriptions of the activities supported by the Experimental Plasma Research Branch of APP. The individual project summaries were prepared by the principal investigators and include objectives and milestones for each project. The projects are arranged in six research categories: Plasma Properties; Plasma Heating; Plasma Measurements and Instrumentation; Atomic, Molecular and Nuclear Physics; Advanced Superconducting Materials; and the Fusion Plasma Research Facility (FPRF). Each category is introduced with a statement of objectives and recent progress and followed by descriptions of individual projects. An overall budget summary is provided at the beginning of the report

  3. STUK research projects 1998-2000

    International Nuclear Information System (INIS)

    Salomaa, S.; Eloranta, E.; Heimbuerger, H.; Jokela, K.; Jaervinen, H.

    1998-07-01

    The primary goal of STUK, the Finnish Radiation and Nuclear Safety Authority, is to prevent and limit the harmful effects of radiation. The research conducted by STUK yields new information related to the use, occurrence and effects of radiation and promotes the supervision of nuclear safety. STUK research projects 1998 - 2000 summarizes STUK's own research projects and commissioned research designed to promote the supervision of nuclear safety. Information on the research projects and related publications is also available on STUK's WWW pages at www.stuk.fi. The work done on the safe use of nuclear power and nuclear waste management mainly comprises commissioned research projects which derive from the needs of authorities, and are funded and directed by STUK. This research is conducted by organizations outside STUK, but supervised by STUK experts. In some cases, STUK personnel are also involved. The goal of this research work is to produce the information needed for decision-making, to develop supervisory methods and to ensure that recent developments in science and technology are taken into account in action to promote safe use of nuclear power. STUK's own research focuses on radiation protection and the health effects of radiation. During 1998 - 2000, the main emphasis will be on projects supporting the Finnish national environmental health action plan, the health risks of radiation, emergency preparedness and cooperation with neighbouring CEE areas. EU directives on radiation protection and medical exposure to radiation also influence the course taken by research carried out at STUK. STUK's research activities are now more international than ever; the institute is involved in more then 20 research projects funded by EU. Apart from the EU and the Nordic countries, STUK's main partners are to be found in Russia, Estonia and the USA. (orig.)

  4. Organisational Information Security Strategy: Review, Discussion and Future Research

    Directory of Open Access Journals (Sweden)

    Craig A. Horne

    2017-05-01

    Full Text Available Dependence on information, including for some of the world’s largest organisations such as governments and multi-national corporations, has grown rapidly in recent years. However, reports of information security breaches and their associated consequences indicate that attacks are escalating on organisations conducting these information-based activities. Organisations need to formulate strategy to secure their information, however gaps exist in knowledge. Through a thematic review of academic security literature, (1 we analyse the antecedent conditions that motivate the adoption of a comprehensive information security strategy, (2 the conceptual elements of strategy and (3 the benefits that are enjoyed post-adoption. Our contributions include a definition of information security strategy that moves from an internally-focussed protection of information towards a strategic view that considers the organisation, its resources and capabilities, and its external environment. Our findings are then used to suggest future research directions.

  5. While working around security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg; Bødker, Susanne; Petersen, Marianne Graves

    This paper describes our work at two levels. First of all the paper discusses how users of IT deal with issues of IT security in their everyday life. Secondly, we discuss how the kind of understanding of IT security that comes out of careful analyses of use confronts the ways in which usable...... IT security is established in the literature. Recent literature has called for better conceptual models as a starting point for improving IT security. In contrast to such models we propose to dress up designers by helping them better understand the work that goes into everyday security. The result...... is a methodological toolbox that helps address and design for usable and useful IT security. We deploy examples of analyses and design, carried out by ourselves and by others to fine-tune our design perspective; in particular we use examples from three current research projects....

  6. The Nuclear Safeguards and Security Activities under Euratom Research and Training Programme

    International Nuclear Information System (INIS)

    Abousahl, S.; Palajova, Z.; Janssens, W.A.M.; Luetzenkirchen, K.; Goncalves, J.G.M.; Aregbe, Y.; )

    2015-01-01

    Nuclear safeguards and security are absolute priorities for the EU. At technical level, the Joint Research Centre (JRC) as the European Commission's in-house science service plays an important role in the field of nuclear research, training and education that include nuclear safety, safeguards and security. The JRC's nuclear research activities are defined in a Council Regulation on the research and training programme of the European Atomic Energy Community. The JRC works closely with EC safeguards authority, whose mission is to ensure that nuclear material within the EU is not diverted from its intended use according to Euratom treaty. Technologies, methodologies and trainings are developed according to the Euratom Safeguards inspectorate's needs. In the area of nuclear security, the JRC contributes to the development of specific expertise in the field of nuclear forensics and border security detection as well as related training efforts for first front-line responders and national experts. The JRC provides its expert support for the implementation of internal EU action plans mainly in the field of radiological and nuclear security. At an international level, the JRC cooperates with the IAEA mainly through the EC support programme on the control of nuclear materials and facilities in order to avoid proliferation or diversion. Close cooperation with IAEA nuclear security is developed through the recent signature of a dedicated practical arrangement. Key partnerships have also been developed in the field of safeguards and security with the US-DoE, Russia, Japan and China. In addition, JRC contributes significantly to the EU nuclear safeguards and security outreach activities implemented under the Instrument for Nuclear Safety Cooperation and Instrument contributing to Stability and Peace. In this paper we will highlight some of the JRC contributions to the enhancement of nuclear safeguards and security at EU and international levels. (author)

  7. Research on food security makes a difference for African women ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-05-05

    May 5, 2016 ... There is ample evidence that addressing gender inequalities and empowering women are vital to meeting the challenges of improving food and nutrition security, and enabling poor rural people to overcome poverty. A central objective of the Canadian International Food Security Research Fund (CIFSRF) is ...

  8. Research on food security makes a difference for African women ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    17 avr. 2014 ... There is ample evidence that addressing gender inequalities and empowering women are vital to meeting the challenges of improving food and nutrition security, and enabling poor rural people to overcome poverty. A central objective of the Canadian International Food Security Research Fund (CIFSRF) is ...

  9. Management of research and development project

    International Nuclear Information System (INIS)

    Go, Seok Hwa; Hong Jeong Yu; Hyun, Byeong Hwan

    2010-12-01

    This book introduces summary on management of research and development project, prepare of research and development with investigation and analysis of paper, patent and trend of technology, structure of project, management model, management of project, management of project range, management of project time, management of project cost, management of project goods, management of project manpower, management of communication, management of project risk, management of project supply, management of outcome of R and D, management of apply and enroll of patent and management of technology transfer.

  10. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  11. Teaching Network Security with IP Darkspace Data

    Science.gov (United States)

    Zseby, Tanja; Iglesias Vázquez, Félix; King, Alistair; Claffy, K. C.

    2016-01-01

    This paper presents a network security laboratory project for teaching network traffic anomaly detection methods to electrical engineering students. The project design follows a research-oriented teaching principle, enabling students to make their own discoveries in real network traffic, using data captured from a large IP darkspace monitor…

  12. Mizunami Underground Research Project. Annual report in the 2003 fiscal year

    International Nuclear Information System (INIS)

    Nakama, Shigeo; Takeuchi, Shinji; Amano, Kenji

    2004-12-01

    The current geoscientific research of the Mizunami Underground Research Laboratory (MIU) Project have been carried out since the 1996 fiscal year at the Shobasama Site in Akeyo-cho, Mizunami City, Gifu Prefecture. The main goals of MIU Project are to establish appropriate methodologies for reliably investigation and assessing a deep subsurface, and to develop a range of engineering techniques for deep underground application in granite. The surface-based investigations at city-owned land (MIU Construction Site) have started since the 2001 fiscal year. In 2003 fiscal year, deep borehole investigations were continued in the MIU Construction Site. To understand the state of the deep geological environment before shaft sinking based on these investigations and research, a geological environmental model in/around the MIU Construction Site was constructed. In addition to there groundwater monitoring was carried out using shallow boreholes. As a research on the engineering technology, the review of the design and construction plan of the shafts and galleries and the outbreak event measures and security measures were provided. In Shobasama site, the analysis of an uncertain factor was executed based on the results of the underground water flow analysis. The hydraulic pressure monitoring and surface hydraulic observation were continued. (author)

  13. Coordinated research projects (CRP). Coordinated research project (CRP)

    International Nuclear Information System (INIS)

    Takagi, Hidekazu; Koike, Fumihiro; Nakamura, Nobuyuki

    2013-01-01

    In the present paper, the contribution of Japanese scientists in coordinated research projects on thermonuclear fusion. Representative subjects taken in seven projects are the precise computation of theoretical data on electron-molecule collisions in the peripheral plasma, the computation of spectroscopic data of multi-charged tungsten ions, the spectroscopic measurement of multi-charged tungsten ions using an ion trap device, the development of collisional-radiative model for plasmas including hydrogen and helium, the computational and theoretical studies on the behavior of tungsten and beryllium in the plasma-wall interaction, the study on the property of dusts generated in fusion devices. These subjects are those of most important issues in ITER. (author)

  14. Cloud Computing Security in Openstack Architecture: General Overview

    Directory of Open Access Journals (Sweden)

    Gleb Igorevich Shakulo

    2015-10-01

    Full Text Available The subject of article is cloud computing security. Article begins with author analyzing cloud computing advantages and disadvantages, factors of growth, both positive and negative. Among latter, security is deemed one of the most prominent. Furthermore, author takes architecture of OpenStack project as an example for study: describes its essential components and their interconnection. As conclusion, author raises series of questions as possible areas of further research to resolve security concerns, thus making cloud computing more secure technology.

  15. Improving food security and nutrition through research | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-10-06

    Oct 6, 2016 ... In Canada, the 2012 federal budget highlighted CIFSRF's success, noting how the ... New animal vaccines could keep more African farmers in business ... Research on food security makes a difference for African women.

  16. On Business-Driven IT Security Management and Mismatches between Security Requirements in Firms, Industry Standards and Research Work

    Science.gov (United States)

    Frühwirth, Christian

    Industry managers have long recognized the vital importance of information security for their businesses, but at the same time they perceived security as a technology-driven rather then a business-driven field. Today, this notion is changing and security management is shifting from technology- to business-oriented approaches. Whereas there is evidence of this shift in the literature, this paper argues that security standards and academic work have not yet taken it fully into account. We examine whether this disconnect has lead to a misalignment of IT security requirements in businesses versus industry standards and academic research. We conducted 13 interviews with practitioners from 9 different firms to investigate this question. The results present evidence for a significant gap between security requirements in industry standards and actually reported security vulnerabilities. We further find mismatches between the prioritization of security factors in businesses, standards and real-world threats. We conclude that security in companies serves the business need of protecting information availability to keep the business running at all times.

  17. Solar Market Research and Analysis Projects | Solar Research | NREL

    Science.gov (United States)

    Market Research and Analysis Projects Solar Market Research and Analysis Projects Solar market research and analysis efforts at NREL seek to further solar technologies' role in supporting a more . Midscale Commercial Market Solar Analysis NREL experts are providing analysis to expand the midscale solar

  18. Theory, Demonstration and Methods Research on Social Security of Migrant Workers by Domestic Scholar

    OpenAIRE

    Yang, Zhen; Wang, Weifang

    2011-01-01

    Social security of migrant workers has been significant in dissolving social contradictions and achieving the economic and social development in China during the transitional period. The researches of domestic scholar on social security of migrant workers can be classified into three categories. Firstly, theoretical analysis on social security of migrant workers, including researches on the appeal of social security and misunderstanding of recognition, theory-construction of rural worker soci...

  19. International University Research Ventures: Implications for U.S. Economic Competitiveness National Security

    Science.gov (United States)

    2018-03-31

    NTERNATIONAL UNIVERSITY RESEARCH VENTURES: IMPLICATIONS FOR US ECONOMIC COMPETITIVENESS AND NATIONAL SECURITY The views, opinions and/or findings...UNIVERSITY RESEARCH VENTURES: IMPLICATIONS FOR US ECONOMIC COMPETITIVENESS AND NATIONAL SECURITY Report Term: 0-Other Email: mzak@gatech.edu...expected to inform political and economic theories about technology transfer, innovation, economic competitiveness, and democratization/civil

  20. Towards Food Security and Livelihoods of Low-income Women in central Uganda: Policy Implications based on action research

    DEFF Research Database (Denmark)

    Nambuanyi, Lekunze Ransom; Midtvåge, Runa; Hiranandani, Vanmala Sunder

    2015-01-01

    Uganda is burdened with rising poverty, malnutrition and food insecurity. While most Ugandans depend on agriculture for their livelihoods, it is important to recognize that access to and control over resources by women and climate factors are central to the question of food security in Uganda....... However, a review of the literature demonstrates that policy options have poorly understood these interlinkages or tended to undermine them, especially the extent that these policies and programs put the necessary attention on the role of women farmers in food security. This paper presents part of a work...... in progress of a research project that seeks to investigate the interrelated effects of agricultural practices, access to and control over resources, as well as climate change on women’s food security in the urban and peri-urban areas of central Uganda. The paper not only considers how to turn...

  1. Results of a project on development of agro-forestry systems for food security in Carrefour region, Republic of Haiti

    Directory of Open Access Journals (Sweden)

    Furio Massolino

    2011-11-01

    Full Text Available Haity has a notable problem of food security, 48% of people have not sufficient food availability, food prices has doubled from 1980 and 1990 and further increased 5 times between 1991 and 2000. Water availability and quality is another problems to be added to food insufficiency. Food deficiency is mitigated by natural food resources in rural areas where many different species are cultivated together but it can be extreme in the towns. Agricultural systems are not efficient and, at the same time, enhance soil and genetic erosion. A development project has been implemented to increase food security over the long term in the geographical area of Carrefour rural area, this comprises a research aimed to increase national food production introducing complex agro-forestry systems. The project has investigated problems and solutions, actions have been started to increase food production, including agronomic training of local farmers, organization of small farmers including legal protection on land tenure, introduction of low input modern agroforestry systems that can diversify food production through the year and reduce soil and genetic erosion. After these results, an intervention project has been approved and funded by EU, then delayed due to the recent civil war, finally it is giving positive results now. The same approach used for this project can be spread in the rest of the Republic of Haiti and, hopefully, to other world regions that have similar problems.

  2. Significance of Hemispheric Security for Mexico

    Science.gov (United States)

    2003-04-07

    La Seguridad Internacional, la Nueva Geopolitica Continental y Mexico ,” Seminario Internacional sobre Misiones de Paz, Seguridad y Defensa, Rio de...USAWC STRATEGY RESEARCH PROJECT SIGNIFICANCE OF HEMISPHERIC SECURITY FOR MEXICO by LTC Enrique Garcia Jaramillo Cavalry, Mexican Army COL Joseph R...xx-xx-2002 to xx-xx-2003 4. TITLE AND SUBTITLE Significance of Hemispheric Security for Mexico Unclassified 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c

  3. Cloud Computing Security in Openstack Architecture: General Overview

    OpenAIRE

    Gleb Igorevich Shakulo

    2015-01-01

    The subject of article is cloud computing security. Article begins with author analyzing cloud computing advantages and disadvantages, factors of growth, both positive and negative. Among latter, security is deemed one of the most prominent. Furthermore, author takes architecture of OpenStack project as an example for study: describes its essential components and their interconnection. As conclusion, author raises series of questions as possible areas of further research to resolve security c...

  4. Research Awards: Agriculture and Food Security program Deadline ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Jean-Claude Dumais

    2012-09-12

    Sep 12, 2012 ... HEAD OFFICE / SIÈGE : 150 Kent Street / 150, rue Kent PO Box ... to pursue their research goals in a dynamic team environment in ... You should have an interest in agriculture, food security, nutrition, rural livelihoods, and.

  5. Impact of Inter‐Basin Water Transfer Projects on Regional Ecological Security from a Telecoupling Perspective

    Directory of Open Access Journals (Sweden)

    Yuan Quan

    2016-02-01

    Full Text Available Inter‐basin water transfer projects (IBWTPs offer one of the most important means to solve the mismatch between supply and demand of regional water resources. IBWTPs have impacts on the complex ecosystems of the areas from which water is diverted and to which water is received. These impacts increase damage or risk to regional ecological security and human wellbeing. However, current methods make it difficult to achieve comprehensive analysis of the impacts of whole ecosystems, because of the long distance between ecosystems and the inconsistency of impact events. In this study, a model was proposed for the analysis of the impacts of IBWTPs on regional ecological security. It is based on the telecoupling framework, and the Driver‐Pressure‐State‐ Impact‐Response (DPSIR model was used to improve the analysis procedure within the telecoupling framework. The Middle Line of the South‐to‐North Water Diversion Project was selected as a case study to illustrate the specific analysis procedure. We realized that information sharing is a key issue in the management of regional security, and that the ecological water requirement, in the form of a single index, could be used to quantitatively assess the impacts on ecological security from IBWTPs.

  6. Advanced research in data privacy

    CERN Document Server

    Torra, Vicenç

    2015-01-01

    This book provides an overview of the research work on data privacy and privacy enhancing technologies carried by the participants of the ARES project. ARES (Advanced Research in Privacy an Security, CSD2007-00004) has been one of the most important research projects funded by the Spanish Government in the fields of computer security and privacy. It is part of the now extinct CONSOLIDER INGENIO 2010 program, a highly competitive program which aimed to advance knowledge and open new research lines among top Spanish research groups. The project started in 2007 and will finish this 2014. Composed by 6 research groups from 6 different institutions, it has gathered an important number of researchers during its lifetime. Among the work produced by the ARES project, one specific work package has been related to privacy. This books gathers works produced by members of the project related to data privacy and privacy enhancing technologies. The presented works not only summarize important research carried in the proje...

  7. Underground Test Area Quality Assurance Project Plan Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Irene Farnham

    2011-05-01

    This Quality Assurance Project Plan (QAPP) provides the overall quality assurance (QA) program requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Underground Test Area (UGTA) Sub-Project (hereafter the Sub-Project) activities. The requirements in this QAPP are consistent with DOE Order 414.1C, Quality Assurance (DOE, 2005); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). The QAPP Revision 0 supersedes DOE--341, Underground Test Area Quality Assurance Project Plan, Nevada Test Site, Nevada, Revision 4.

  8. Model-Based Security Testing

    Directory of Open Access Journals (Sweden)

    Ina Schieferdecker

    2012-02-01

    Full Text Available Security testing aims at validating software system requirements related to security properties like confidentiality, integrity, authentication, authorization, availability, and non-repudiation. Although security testing techniques are available for many years, there has been little approaches that allow for specification of test cases at a higher level of abstraction, for enabling guidance on test identification and specification as well as for automated test generation. Model-based security testing (MBST is a relatively new field and especially dedicated to the systematic and efficient specification and documentation of security test objectives, security test cases and test suites, as well as to their automated or semi-automated generation. In particular, the combination of security modelling and test generation approaches is still a challenge in research and of high interest for industrial applications. MBST includes e.g. security functional testing, model-based fuzzing, risk- and threat-oriented testing, and the usage of security test patterns. This paper provides a survey on MBST techniques and the related models as well as samples of new methods and tools that are under development in the European ITEA2-project DIAMONDS.

  9. Information Governance: A Model for Security in Medical Practice

    Directory of Open Access Journals (Sweden)

    Patricia A.H. Williams

    2007-03-01

    Full Text Available Information governance is becoming an important aspect of organisational accountability. In consideration that information is an integral asset of most organisations, the protection of this asset will increasingly rely on organisational capabilities in security.  In the medical arena this information is primarily sensitive patient-based information. Previous research has shown that application of security measures is a low priority for primary care medical practice and that awareness of the risks are seriously underestimated. Consequently, information security governance will be a key issue for medical practice in the future. Information security governance is a relatively new term and there is little existing research into how to meet governance requirements. The limited research that exists describes information security governance frameworks at a strategic level. However, since medical practice is already lagging in the implementation of appropriate security, such definition may not be practical although it is obviously desirable. This paper describes an on-going action research project undertaken in the area of medical information security, and presents a tactical approach model aimed at addressing information security governance and the protection of medical data. 

  10. Secure Intra-Body Wireless Communications (SIWiC) System Project

    Science.gov (United States)

    Ahmad, Aftab; Doggett, Terrence P.

    2011-01-01

    SIWiC System is a project to investigate, design and implement future wireless networks of implantable sensors in the body. This futuristic project is designed to make use of the emerging and yet-to-emerge technologies, including ultra-wide band (UWB) for wireless communications, smart implantable sensors, ultra low power networking protocols, security and privacy for bandwidth and power deficient devices and quantum computing. Progress in each of these fronts is hindered by the needs of breakthrough. But, as we will see in this paper, these major challenges are being met or will be met in near future. SIWiC system is a network of in-situ wireless devices that are implanted to coordinate sensed data inside the body, such as symptoms monitoring collected internally, or biometric data collected of an outside object from within the intra-body network. One node has the capability of communicating outside the body to send data or alarm to a relevant authority, e.g., a remote physician.

  11. Securing Cyberspace: Towards an Agenda for Research and Practice

    Directory of Open Access Journals (Sweden)

    Renaud Levesque

    2015-11-01

    Full Text Available In this article, we seek to identify the important challenges preventing security in cyberspace and to identify the key questions that nations should set out to answer to play a leading role in securing cyberspace. An important assertion is that the challenge of securing cyberspace transcends the abilities of any single entity and requires a radical shift in our approach in how: i research is conducted, ii cybersecurity researchers are educated, iii new defendable systems are developed, and iv effective defensive countermeasures are deployed. Our response draws upon extensive source material and our personal experiences as cybersecurity professionals contributing to the establishment of the VENUS Cybersecurity Corporation, a not-for-profit corporation that aims to make Canada a global leader in cybersecurity. We view the challenge to be global and transdisciplinary in nature and this article to be of relevance world-wide to senior decision makers, policy makers, managers, educators, strategists, futurists, scientists, technologists, and others interested in shaping the online world of the future.

  12. TR32DB - Management of Research Data in a Collaborative, Interdisciplinary Research Project

    Science.gov (United States)

    Curdt, Constanze; Hoffmeister, Dirk; Waldhoff, Guido; Lang, Ulrich; Bareth, Georg

    2015-04-01

    The management of research data in a well-structured and documented manner is essential in the context of collaborative, interdisciplinary research environments (e.g. across various institutions). Consequently, set-up and use of a research data management (RDM) system like a data repository or project database is necessary. These systems should accompany and support scientists during the entire research life cycle (e.g. data collection, documentation, storage, archiving, sharing, publishing) and operate cross-disciplinary in interdisciplinary research projects. Challenges and problems of RDM are well-know. Consequently, the set-up of a user-friendly, well-documented, sustainable RDM system is essential, as well as user support and further assistance. In the framework of the Transregio Collaborative Research Centre 32 'Patterns in Soil-Vegetation-Atmosphere Systems: Monitoring, Modelling, and Data Assimilation' (CRC/TR32), funded by the German Research Foundation (DFG), a RDM system was self-designed and implemented. The CRC/TR32 project database (TR32DB, www.tr32db.de) is operating online since early 2008. The TR32DB handles all data, which are created by the involved project participants from several institutions (e.g. Universities of Cologne, Bonn, Aachen, and the Research Centre Jülich) and research fields (e.g. soil and plant sciences, hydrology, geography, geophysics, meteorology, remote sensing). Very heterogeneous research data are considered, which are resulting from field measurement campaigns, meteorological monitoring, remote sensing, laboratory studies and modelling approaches. Furthermore, outcomes like publications, conference contributions, PhD reports and corresponding images are regarded. The TR32DB project database is set-up in cooperation with the Regional Computing Centre of the University of Cologne (RRZK) and also located in this hardware environment. The TR32DB system architecture is composed of three main components: (i) a file-based data

  13. Research Planning and Evaluation Project

    International Nuclear Information System (INIS)

    Song, Seunghyun; Kim, Doyang; Ryu, Byunghoon; Lim, Chaeyoung; Song, Leeyoung; Lee, Youngchul; Han, Changsun; Kim, Hackchoon

    2011-12-01

    - To activate R and D through a systematic and impartial evaluation by using information on efficient distribution of research resource, setting project priorities, and measuring achievement against goals produced after research on planning and evaluation system for the government-funded project for KAERI was conducted. - Nuclear R and D project is the representative national R and D project which has been implemented in Korea. For the sustainable development of nuclear energy which supplies about 40% of total electricity generation and the enhancement of it innovative ability in the future, a systematic and efficient strategy in the planning stage is required

  14. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices)

    National Research Council Canada - National Science Library

    Ganger, Gregory R

    2007-01-01

    This report summarizes the results of the work on the AFOSR's Critical Infrastructure Protection Program project, entitled Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security...

  15. A Perspective on Research Challenges in Information Security

    Science.gov (United States)

    2011-11-01

    UNCLASSIFIED A Perspective on Research Challenges in Information Security Tamas Abraham, David Adie, Angela Billard, Paul Buckland, Michael Frangos ...Abstract (U) 4. AUTHORS Tamas Abraham, David Adie, Angela Billard, Paul Buckland, Michael Frangos , Ben Long, Mar- tin Lucas, Paul Montague, Dean Philp

  16. Research projects of STUK 2000-2002

    International Nuclear Information System (INIS)

    Salomaa, S.

    2000-06-01

    The primary goal of STUK, the Finnish Radiation and Nuclear Safety Authority, is to prevent and limit the harmful effects of radiation. The research conducted by STUK yields new information related to the use, occurrence and effects of radiation. STUK research projects 2000 - 2002 summarises STUK's own research activities on radiation protection. In addition to these, STUK also supervises and funds research projects related to safety of nuclear energy and nuclear waste and materials that are carried out in other research institutes. Information on the research projects and related publications is also available on STUK's WWW pages at www.stuk.fi. STUK's research focuses on radiation protection and the health effects of radiation. During 2000 - 2002, the main emphasis will be on projects supporting the Finnish national environmental health action plan, the health risks of radiation, emergency preparedness and cooperation with neighbouring CEE areas. EU directives on radiation protection and medical exposure to radiation also influence the course taken by research carried out at STUK. New research priorities also include studies on non-ionising radiation, especially the effects of mobile phone frequency radiation. STUK's research activities are now more international than ever; the institute is involved in about 20 research projects funded by EC. Apart from the European Union and the Nordic countries, STUK's main partners are to be found in Russia, Estonia and the USA. (author)

  17. Researches on the Security of Cluster-based Communication Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yanhong Sun

    2014-08-01

    Full Text Available Along with the in-depth application of sensor networks, the security issues have gradually become the bottleneck of wireless sensor applications. To provide a solution for security scheme is a common concern not only of researchers but also of providers, integrators and users of wireless sensor networks. Based on this demand, this paper focuses on the research of strengthening the security of cluster-based wireless sensor networks. Based on the systematic analysis of the clustering protocol and its security enhancement scheme, the paper introduces the broadcast authentication scheme, and proposes an SA-LEACH network security enhancement protocol. The performance analysis and simulation experiments prove that the protocol consumes less energy with the same security requirements, and when the base station is comparatively far from the network deployment area, it is more advantageous in terms of energy consumption and t more suitable for wireless sensor networks.

  18. Development of a virtual research environment in ITBL project

    Energy Technology Data Exchange (ETDEWEB)

    Kenji, Higuchi; Takayuki, Otani; Yukihiro, Hasegawa; Yoshio, Suzuki; Nobuhiro, Yamagishi; Kazuyuki, Kimura; Tetsuo, Aoyagi; Norihiro, Nakajima; Masahiro, Fukuda [Japan Atomic Energy Research Institute (Japan); Toshiyuki, Imamura [University of Electro-Communications (Japan); Genki, Yagawa [Tokyo University (Japan)

    2003-07-01

    With the progress of computers and high-speed networks, it becomes possible to perform research work efficiently by combining computing, data and experimental resources which are widely distributed over multi-sites, or by sharing information among collaborators who belong to different organizations. An experimental application of Grid computing was executed in ITBL (information technology based laboratory) project promoted by six member institutes of MEXT (ministry of education, culture, sports, sciences and technology). Key technologies that are indispensable for construction of virtual organization were implemented onto ITBL Middle-ware and examined in the experiment from a view point of availability. It seems that successful result in the implementation and examination of those technologies such as security infrastructure, component programming and collaborative visualization in practical computer/network systems means significant progress in Science Grid in Japan.

  19. Development of a virtual research environment in ITBL project

    International Nuclear Information System (INIS)

    Kenji, Higuchi; Takayuki, Otani; Yukihiro, Hasegawa; Yoshio, Suzuki; Nobuhiro, Yamagishi; Kazuyuki, Kimura; Tetsuo, Aoyagi; Norihiro, Nakajima; Masahiro, Fukuda; Toshiyuki, Imamura; Genki, Yagawa

    2003-01-01

    With the progress of computers and high-speed networks, it becomes possible to perform research work efficiently by combining computing, data and experimental resources which are widely distributed over multi-sites, or by sharing information among collaborators who belong to different organizations. An experimental application of Grid computing was executed in ITBL (information technology based laboratory) project promoted by six member institutes of MEXT (ministry of education, culture, sports, sciences and technology). Key technologies that are indispensable for construction of virtual organization were implemented onto ITBL Middle-ware and examined in the experiment from a view point of availability. It seems that successful result in the implementation and examination of those technologies such as security infrastructure, component programming and collaborative visualization in practical computer/network systems means significant progress in Science Grid in Japan

  20. US Food Security and Climate Change: Mid-Century Projections of Commodity Crop Production by the IMPACT Model

    Science.gov (United States)

    Takle, E. S.; Gustafson, D. I.; Beachy, R.; Nelson, G. C.; Mason-D'Croz, D.; Palazzo, A.

    2013-12-01

    Agreement is developing among agricultural scientists on the emerging inability of agriculture to meet growing global food demands. The lack of additional arable land and availability of freshwater have long been constraints on agriculture. Changes in trends of weather conditions that challenge physiological limits of crops, as projected by global climate models, are expected to exacerbate the global food challenge toward the middle of the 21st century. These climate- and constraint-driven crop production challenges are interconnected within a complex global economy, where diverse factors add to price volatility and food scarcity. We use the DSSAT crop modeling suite, together with mid-century projections of four AR4 global models, as input to the International Food Policy Research Institute IMPACT model to project the impact of climate change on food security through the year 2050 for internationally traded crops. IMPACT is an iterative model that responds to endogenous and exogenous drivers to dynamically solve for the world prices that ensure global supply equals global demand. The modeling methodology reconciles the limited spatial resolution of macro-level economic models that operate through equilibrium-driven relationships at a national level with detailed models of biophysical processes at high spatial resolution. The analysis presented here suggests that climate change in the first half of the 21st century does not represent a near-term threat to food security in the US due to the availability of adaptation strategies (e.g., loss of current growing regions is balanced by gain of new growing regions). However, as climate continues to trend away from 20th century norms current adaptation measures will not be sufficient to enable agriculture to meet growing food demand. Climate scenarios from higher-level carbon emissions exacerbate the food shortfall, although uncertainty in climate model projections (particularly precipitation) is a limitation to impact

  1. Towards Shibboleth-based security in the e-infrastructure for social sciences

    OpenAIRE

    Jie, Wei; Daw, Michael; Procter, Rob; Voss, Alex

    2007-01-01

    The e-Infrastructure for e-Social Sciences project leverages Grid computing technology to provide an integrated platform which enables social science researchers to securely access a variety of e-Science resources. Security underpins the e-Infrastructure and a security framework with authentication and authorization functionality is a core component of the e-Infrastructure for social sciences. To build the security framework, we adopt Shibboleth as the basic authentication and authorization i...

  2. All projects related to | Page 310 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Strengthening Evidence-based Policy Research and Advocacy for an African Green Revolution. Project. The Alliance for a Green Revolution in Africa (AGRA) has launched a vast program for increasing agricultural productivity and improving food security in Africa. Topic: AGRICULTURAL RESEARCH, Food security, ...

  3. Via generalized function projective synchronization in nonlinear Schrödinger equation for secure communication

    Science.gov (United States)

    Zhao, L. W.; Du, J. G.; Yin, J. L.

    2018-05-01

    This paper proposes a novel secured communication scheme in a chaotic system by applying generalized function projective synchronization of the nonlinear Schrödinger equation. This phenomenal approach guarantees a secured and convenient communication. Our study applied the Melnikov theorem with an active control strategy to suppress chaos in the system. The transmitted information signal is modulated into the parameter of the nonlinear Schrödinger equation in the transmitter and it is assumed that the parameter of the receiver system is unknown. Based on the Lyapunov stability theory and the adaptive control technique, the controllers are designed to make two identical nonlinear Schrödinger equation with the unknown parameter asymptotically synchronized. The numerical simulation results of our study confirmed the validity, effectiveness and the feasibility of the proposed novel synchronization method and error estimate for a secure communication. The Chaos masking signals of the information communication scheme, further guaranteed a safer and secured information communicated via this approach.

  4. A multilayered analysis of energy security research and the energy supply process

    International Nuclear Information System (INIS)

    Kiriyama, Eriko; Kajikawa, Yuya

    2014-01-01

    Highlights: • The analysis reveals that energy security research is highly multidisciplinary. • Diversification is important for ensuring security in the energy supply process. • A multilayered overview of the energy supply process is important for energy risk management. • Consumer lifestyle innovation will be a part of energy security in the future. - Abstract: After the Fukushima nuclear disaster, a reassessment of the energy system is needed in order to include such aspects as human security and resilience. More open and careful discussions are needed concerning the various risks and uncertainties of future energy options, both in Japan and globally. In this paper, we aim to offer a fundamental basis for discourse on energy security by analyzing the status and trends in academic publications on that issue. Our bibliometrics analysis indicates that research has shifted from promoting strategies for ensuring the self-sufficiency of the primary energy to diversification of the secondary energy supply chain by introducing energy networks consisting of an infrastructure established through international coordination. In the literature, the concept of energy security is ambiguous and allows for multiple interpretations. Our results illustrate the existence of highly multidisciplinary topics within energy security, which can be categorized into four perspectives: geopolitical, economic, policy related, and technological

  5. Using Social Media for Research Dissemination: The Digital Research Video Project

    Directory of Open Access Journals (Sweden)

    Suzanne Pilaar Birch

    2013-09-01

    Full Text Available This article discusses the outcomes of the Digital Research Video Project, which was part of the larger Social Media Knowledge Exchange program at the Centre for Research in the Arts, Social Sciences, and Humanities (CRASSH at the University of Cambridge and funded by the Arts & Humanities Research Council (UK. The project was founded on the premise that open access publication of research, while important, does not necessarily make research accessible. Often, PhD students and post-doctoral scholars lack the skills needed to communicate their research to a broader audience. The goal of the project was, first, to provide communication training to early career researchers (achieved through a workshop held in autumn 2012 and second, to create illustrated videos highlighting projects by early career researchers that would help them engage with their work using multimedia and share their results with a larger audience. This article considers the methods of dissemination and impact of the project.

  6. The CAMI Project - Weather and Climate Services for Caribbean Food Security

    Science.gov (United States)

    Trotman, Adrian; Van Meerbeeck, Cedric

    2013-04-01

    Food security is major focus of Caribbean governments, with production being of particular concern. For the past three decades, Caribbean agriculture has been declining in relative importance, both in terms of its contribution to GDP and its share of the labour force. One of the problems Caribbean agriculture faces is the destructive impacts from weather and climate extremes. These include flood, drought, extreme temperatures, and strong winds from tropical cyclones. Other potential disasters, such as from pests and diseases attacks, are also weather and climate driven. These make weather and climate information critically important to decision-making in agriculture in the Caribbean region. In an effort to help reduce weather and climate related risks to the food security sector, The Caribbean Institute for Meteorology and Hydrology, along with its partners the Caribbean Agricultural Research and Development Institute, the World Meteorological Organization (WMO) and ten National Meteorological Services from within the Caribbean Community launched and implemented the Caribbean Agrometeorological Initiative (CAMI). From 2010 to 2013, CAMI set out to provide relevant information to farmers, and the industry in general, for decision and policy making. The project is funded by the European Union through the Science and Technology Programme of the African, Caribbean and Pacific Group of Countries' (ACP). The overarching objective of CAMI was to increase and sustain agricultural productivity at the farm level in the Caribbean region through improved applications of weather and climate information, using an integrated and coordinated approach. Currently, this is done through (i) provision of relevant climate information appropriately disseminated, (ii) predictions on seasonal rainfall and temperature, (iii) support for improved irrigation management, (iv) the development of strategically selected weather-driven pest and disease models, (v) use of crop simulation models

  7. Research projects of STUK 2000-2002

    Energy Technology Data Exchange (ETDEWEB)

    Salomaa, S. [ed.

    2000-06-01

    The primary goal of STUK, the Finnish Radiation and Nuclear Safety Authority, is to prevent and limit the harmful effects of radiation. The research conducted by STUK yields new information related to the use, occurrence and effects of radiation. STUK research projects 2000 - 2002 summarises STUK's own research activities on radiation protection. In addition to these, STUK also supervises and funds research projects related to safety of nuclear energy and nuclear waste and materials that are carried out in other research institutes. Information on the research projects and related publications is also available on STUK's WWW pages at www.stuk.fi. STUK's research focuses on radiation protection and the health effects of radiation. During 2000 - 2002, the main emphasis will be on projects supporting the Finnish national environmental health action plan, the health risks of radiation, emergency preparedness and cooperation with neighbouring CEE areas. EU directives on radiation protection and medical exposure to radiation also influence the course taken by research carried out at STUK. New research priorities also include studies on non-ionising radiation, especially the effects of mobile phone frequency radiation. STUK's research activities are now more international than ever; the institute is involved in about 20 research projects funded by EC. Apart from the European Union and the Nordic countries, STUK's main partners are to be found in Russia, Estonia and the USA. (author)

  8. Geothermal Reservoir Technology Research Program: Abstracts of selected research projects

    Energy Technology Data Exchange (ETDEWEB)

    Reed, M.J. (ed.)

    1993-03-01

    Research projects are described in the following areas: geothermal exploration, mapping reservoir properties and reservoir monitoring, and well testing, simulation, and predicting reservoir performance. The objectives, technical approach, and project status of each project are presented. The background, research results, and future plans for each project are discussed. The names, addresses, and telephone and telefax numbers are given for the DOE program manager and the principal investigators. (MHR)

  9. Research projects of STUK 2003-2005

    International Nuclear Information System (INIS)

    Salomaa, S.

    2004-01-01

    The primary goal of STUK, Finnish Radiation and Nuclear Safety Authority, is to protect man, society, environment and future generations from the harmful effects of radiation. The research conducted by STUK yields new information related to the use, occurrence and effects of radiation. STUK research projects 2003 - 2005 summarizes STUK's own research activities on radiation protection. In addition to these, STUK also supervises and funds research projects related to safety of nuclear energy, and nuclear waste and materials that are carried out in other research institutes. Information on the research projects and related publications is also available on STUK's WWW pages at www.stuk.fi. STUK's research focuses on radiation protection and health effects of radiation. During 2003 - 2005 the main emphasis will be on research supporting the Finnish national environmental health action plan, and projects concerning the health risks of radiation, nuclear emergency preparedness and protection of biota. EU directives on radiation protection and medical radiation exposure also influence the course taken by the research carried out at STUK. New research priorities also include studies on non-ionising radiation, especially the effects of mobile phone frequency radiation. STUK's research networks involve well over 100 national and international partners. During 2003 - 2005 STUK is actively participating in the 6th framework research programmes of EC

  10. Vulnerabilities as monsters: the cultural foundations of computer security (extended abstract)

    NARCIS (Netherlands)

    Pieters, Wolter; Consoli, L.

    2006-01-01

    This paper is part of a project to investigate the philosophical aspects of the scientific discipline of information security. This eld of research investigates the means to protect information systems against attacks, typically by modelling the system according to a certain security model, and

  11. Privacy, security, and the public health researcher in the era of electronic health record research.

    Science.gov (United States)

    Goldstein, Neal D; Sarwate, Anand D

    2016-01-01

    Health data derived from electronic health records are increasingly utilized in large-scale population health analyses. Going hand in hand with this increase in data is an increasing number of data breaches. Ensuring privacy and security of these data is a shared responsibility between the public health researcher, collaborators, and their institutions. In this article, we review the requirements of data privacy and security and discuss epidemiologic implications of emerging technologies from the computer science community that can be used for health data. In order to ensure that our needs as researchers are captured in these technologies, we must engage in the dialogue surrounding the development of these tools.

  12. Probing strategy-project alignment: The case of the South African Social Security Agency

    Directory of Open Access Journals (Sweden)

    Gerrit Van Der Waldt

    2016-12-01

    Full Text Available Public institutions, such as the South African Social Security Agency (SASSA increasingly function in multi-project environments to translate strategies successfully into service-delivery initiatives. However, this ‘projectification’ often causes projects to be designed and executed haphazardly. This can lead to budget and schedule overruns, and the general wastage of an organisation’s resources. Project failures often occur where organisations do not ensure that specific projects are aligned with their core strategies. The purpose of this article is to combine the theories and principles of organisation, management, strategic management, and project management in an effort to pinpoint core determinants that can help establish the extent to which an organisation manages the alignment of its strategic projects. In the present study, the author applied the principles of interdisciplinarity, systems thinking, and organisational integration. The combined core determinants that were uncovered were then used in an empirical investigation of SASSA. The purpose of this investigation is to identify particular challenges the organisation faces in aligning their strategies and projects successfully. Thereafter, a number of recommendations follow to address these challenges.

  13. 20 CFR 401.165 - Statistical and research activities.

    Science.gov (United States)

    2010-04-01

    ...-maintenance or health-maintenance programs; or is used for research that is of importance to the Social Security program or the Social Security beneficiaries; or an epidemiological research project that relates... Section 401.165 Employees' Benefits SOCIAL SECURITY ADMINISTRATION PRIVACY AND DISCLOSURE OF OFFICIAL...

  14. Securing personnel in nuclear fuel cycle research and development in Japan

    International Nuclear Information System (INIS)

    Sekino, H.

    1993-01-01

    The PNC, a japanese governmental research and development organization, is concerned with research and development into building and operating advanced power reactors and R and D into the whole cycle of the nuclear fuel. PNC promotes international cooperation with the USA and European countries as well as technical cooperation with the private sectors in uranium enrichment, reprocessing and advanced reactor development. This report discusses the current situation and problems in securing PNC personnel, in securing 'loan' staff for PNC, and in personnel exchanges for technical transfer and international cooperation. 5 figs

  15. Managing security and privacy concerns over data storage in healthcare research.

    Science.gov (United States)

    Mackenzie, Isla S; Mantay, Brian J; McDonnell, Patrick G; Wei, Li; MacDonald, Thomas M

    2011-08-01

    Issues surrounding data security and privacy are of great importance when handling sensitive health-related data for research. The emphasis in the past has been on balancing the risks to individuals with the benefit to society of the use of databases for research. However, a new way of looking at such issues is that by optimising procedures and policies regarding security and privacy of data to the extent that there is no appreciable risk to the privacy of individuals, we can create a 'win-win' situation in which everyone benefits, and pharmacoepidemiological research can flourish with public support. We discuss holistic measures, involving both information technology and people, taken to improve the security and privacy of data storage. After an internal review, we commissioned an external audit by an independent consultant with a view to optimising our data storage and handling procedures. Improvements to our policies and procedures were implemented as a result of the audit. By optimising our storage of data, we hope to inspire public confidence and hence cooperation with the use of health care data in research. Copyright © 2011 John Wiley & Sons, Ltd.

  16. The importance of project networking for the replacement research reactor

    International Nuclear Information System (INIS)

    Whitbourn, G.

    2003-01-01

    When the HIFAR research reactor was commissioned in 1958 it was both constructed and regulated by the then Australian Atomic Energy Commission. The situation now is much more complicated, with an independent regulator, The Australian Radiation Protection and Nuclear Safety Agency (ARPANSA) and oversight by national security agencies and the Australian Safeguards and Non proliferation Organisation (ASNO). In July 2000 ANSTO contracted INVAP SE a suitably qualified and experienced nuclear organisation based in Argentina to provide the Replacement Research Reactor (RRR). INVAP subcontracted an Australian entity, a joint venture between John Holland and Evans Deakin Industries (JHEDI) to provide resources in Australia. There is an international network of over 100 subcontractors providing services, products and materials to INVAP and JHEDI and a significant number of contractors providing project support services to ANSTO. The interaction of all these entities to provide the RRR is a significant networking challenge, involving a complex network of legal, contractual and functional relationships and communication processes

  17. Research Project Evaluation-Learnings from the PATHWAYS Project Experience.

    Science.gov (United States)

    Galas, Aleksander; Pilat, Aleksandra; Leonardi, Matilde; Tobiasz-Adamczyk, Beata

    2018-05-25

    Every research project faces challenges regarding how to achieve its goals in a timely and effective manner. The purpose of this paper is to present a project evaluation methodology gathered during the implementation of the Participation to Healthy Workplaces and Inclusive Strategies in the Work Sector (the EU PATHWAYS Project). The PATHWAYS project involved multiple countries and multi-cultural aspects of re/integrating chronically ill patients into labor markets in different countries. This paper describes key project's evaluation issues including: (1) purposes, (2) advisability, (3) tools, (4) implementation, and (5) possible benefits and presents the advantages of a continuous monitoring. Project evaluation tool to assess structure and resources, process, management and communication, achievements, and outcomes. The project used a mixed evaluation approach and included Strengths (S), Weaknesses (W), Opportunities (O), and Threats (SWOT) analysis. A methodology for longitudinal EU projects' evaluation is described. The evaluation process allowed to highlight strengths and weaknesses and highlighted good coordination and communication between project partners as well as some key issues such as: the need for a shared glossary covering areas investigated by the project, problematic issues related to the involvement of stakeholders from outside the project, and issues with timing. Numerical SWOT analysis showed improvement in project performance over time. The proportion of participating project partners in the evaluation varied from 100% to 83.3%. There is a need for the implementation of a structured evaluation process in multidisciplinary projects involving different stakeholders in diverse socio-environmental and political conditions. Based on the PATHWAYS experience, a clear monitoring methodology is suggested as essential in every multidisciplinary research projects.

  18. Maritime Defense and Security Research Program: Final Report, 2004-2011

    Science.gov (United States)

    2011-11-01

    Security: airports, military bases, heads of state, Super Bowl Critical Project Management Most recently, CID completed an analysis of the Hawaiian...to link the results, i.e. discovered keywords, back to the original documents for validation. Also the big picture needs to be updated and enhanced...and Network Layers using OPNET,‖ Proc. TTCP TP-9 ASW Systems & Technologies Panel Annual Meeting, Dartmouth, Nova Scotia, Canada, September 21-25

  19. Experimental plasma research project summaries

    International Nuclear Information System (INIS)

    1982-10-01

    The experimental plasma Research Branch has responsibility for developing a broad range of experimental data and new experimental techniques that are required for operating and interpreting present large-scale confinement experiments, and for designing future deuterium-tritium burining facilities. The Branch pursued these objectives by supporting research in DOE laboratories, other Federal laboratories, other Federal laboratories, universities, and private industry. Initiation and renewal of research projects are primarily through submission of unsolicited proposals by these institutions to DOE. Summaries of these projects are given

  20. 20% Research & Design Science Project

    Science.gov (United States)

    Spear, Beth A.

    2015-04-01

    A project allowing employees to use 15 % of their time on independent projects was established at 3M in the 1950's. The result of this project included products like post it notes and masking tape. Google allows its employees to use 20% of their time on independently pursued projects. The company values creativity and innovation. Employees are allowed to explore projects of interest to them one day out of the week, 20 % of their work week. Products like AdSense, Gmail, Google Transit, Google News, and Google Talk are the result of this 20 % program. My school is implementing the Next Generation Science Standards (NGSS) as part of our regularly scheduled curriculum review. These new standards focus on the process of learning by doing and designing. The NGSS are very hands on and active. The new standards emphasize learning how to define, understand and solve problems in science and technology. In today's society everyone needs to be familiar with science and technology. This project allows students to develop and practice skills to help them be more comfortable and confident with science and technology while exploring something of interest to them. This project includes three major parts: research, design, and presentation. Students will spend approximately 2-4 weeks defining a project proposal and educating themselves by researching a science and technology topic that is of interest to them. In the next phase, 2-4 weeks, students design a product or plan to collect data for something related to their topic. The time spent on research and design will be dependant on the topic students select. Projects should be ambitious enough to encompass about six weeks. Lastly a presentation or demonstration incorporating the research and design of the project is created, peer reviewed and presented to the class. There are some problems anticipated or already experienced with this project. It is difficult for all students to choose a unique topic when you have large class sizes

  1. An O-"fish"-ial Research Project

    Science.gov (United States)

    Newman, James; Krustchinsky, Rick; Vanek, Karen; Nguyen, Kim-Thoa

    2009-01-01

    In this "O-"fish"-ial" research project, third-grade students use multiple resources to research several fish species, write a research paper and develop a PowerPoint presentation to communicate their findings. In addition, students actually examine these species up close with samples from the local market, and then conclude the project with a…

  2. [The research project: financing and management].

    Science.gov (United States)

    Schena, F P

    2003-01-01

    Basic and clinical research is accomplished by projects. The design of a project is not only based on the scientific content but also on its financing and management. This article wants to illustrate the correct modalities for project financing and project management in a scientific project.

  3. Technology Base Research Project for electrochemical energy storage

    Science.gov (United States)

    Kinoshita, K.

    1985-06-01

    The DOE Electrochemical Energy Storage Program is divided into two projects: (1) the exploratory technology development and testing (ETD) project and (2) the technology base research (TBR) project. The role of the TBR Project is to perform supporting research for the advanced battery systems under development by the ETD Project, and to evaluate new systems with potentially superior performance, durability and/or cost characteristics. The specific goal of the TBR Project is to identify the most promising electrochemical technologies and transfer them to industry and/or the ETD Project for further development and scale-up. This report summarizes the research, financial, and management activities relevant to the TBR Project in CY 1984. General problem areas addressed by the project include identification of new electrochemical couples for advanced batteries, determination of technical feasibility of the new couples, improvements in battery components and materials, establishment of engineering principles applicable to electrochemical energy storage and conversion, and the assessment of fuel-cell technology for transportation applications. Major emphasis is given to applied research which will lead to superior performance and lower life-cycle costs. The TBR Project is divided into three major project elements: exploratory research, applied science research, and air systems research.

  4. Laboratory research irradiators with enhanced security features

    International Nuclear Information System (INIS)

    Srivastava, Piyush

    2016-01-01

    Over the years BRIT has developed state of art technology for laboratory research irradiators which are suited most for carrying out research and development works in the fields of radiation processing. These equipment which house radioactive sources up to 14 kCi are having a number of features to meet users requirements. They are manufactured as per the national and International standards of safety codes. The paper deals with design, development and application aspects of laboratory research irradiator called Gamma Chamber and also the new security features planned for incorporation in the equipment. Equipment are being regularly manufactured, supplied and installed by BRIT in India and Abroad. There is a number of such equipment in use at different institutions and are found to be very useful. (author)

  5. Laboratory research irradiators with enhanced security features

    International Nuclear Information System (INIS)

    Srivastava, Piyush

    2014-01-01

    Over the years BRIT has developed state of art technology for laboratory research irradiators which are suited most for carrying out research and development works in the fields of radiation processing. These equipment which house radioactive sources up to 14 kCi are having a number of features to meet users requirements. They are manufactured as per the national and International standards of safety codes. The paper deals with design, development and application aspects of laboratory research irradiator called Gamma Chamber and also the new security features planned for incorporation in the equipment. Equipment are being regularly manufactured, supplied and installed by BRIT in India and Abroad. There are a number of such equipment in use at different institutions and are found to be very useful. (author)

  6. Comparative Study on Cyber Securities between Power Reactor and Research Reactor with Bayesian Update

    International Nuclear Information System (INIS)

    Shin, Jinsoo; Heo, Gyunyoung; Son, Han Seong

    2016-01-01

    The Stuxnet has shown that nuclear facilities are no more safe from cyber-attack. Due to practical experiences and concerns on increasing of digital system application, cyber security has become the important issue in nuclear industry. Korea Institute of Nuclear Nonproliferation and control (KINAC) published a regulatory standard (KINAC/RS-015) to establish cyber security framework for nuclear facilities. However, it is difficult to research about cyber security. It is hard to quantify cyber-attack which has malicious activity which is different from existing design basis accidents (DBAs). We previously proposed a methodology on development of a cyber security risk model with BBN. However, the methodology had a limitation in which the input data as prior information was solely on expert opinions. In this study, we propose a cyber security risk model for instrumentation and control (I and C) system of nuclear facilities with some equation for quantification by using Bayesian Belief Network (BBN) in order to overcome the limitation of previous research. The proposed model has been used for comparative study on cyber securities between large-sized nuclear power plants (NPPs) and small-sized Research Reactors (RR). In this study, we proposed the cyber security risk evaluation model with BBN. It includes I and C architecture, which is a target system of cyber-attack, malicious activity, which causes cyber-attack from attacker, and mitigation measure, which mitigates the cyber-attack risk. Likelihood and consequence as prior information are evaluated by considering characteristics of I and C architecture and malicious activity. The BBN model provides posterior information with Bayesian update by adding any of assumed cyber-attack scenarios as evidence. Cyber security risk for nuclear facilities is analyzed by comparing between prior information and posterior information of each node. In this study, we conducted comparative study on cyber securities between power reactor

  7. Comparative Study on Cyber Securities between Power Reactor and Research Reactor with Bayesian Update

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Jinsoo; Heo, Gyunyoung [Kyung Hee University, Yongin (Korea, Republic of); Son, Han Seong [Joongbu Univiersity, Geumsan (Korea, Republic of)

    2016-10-15

    The Stuxnet has shown that nuclear facilities are no more safe from cyber-attack. Due to practical experiences and concerns on increasing of digital system application, cyber security has become the important issue in nuclear industry. Korea Institute of Nuclear Nonproliferation and control (KINAC) published a regulatory standard (KINAC/RS-015) to establish cyber security framework for nuclear facilities. However, it is difficult to research about cyber security. It is hard to quantify cyber-attack which has malicious activity which is different from existing design basis accidents (DBAs). We previously proposed a methodology on development of a cyber security risk model with BBN. However, the methodology had a limitation in which the input data as prior information was solely on expert opinions. In this study, we propose a cyber security risk model for instrumentation and control (I and C) system of nuclear facilities with some equation for quantification by using Bayesian Belief Network (BBN) in order to overcome the limitation of previous research. The proposed model has been used for comparative study on cyber securities between large-sized nuclear power plants (NPPs) and small-sized Research Reactors (RR). In this study, we proposed the cyber security risk evaluation model with BBN. It includes I and C architecture, which is a target system of cyber-attack, malicious activity, which causes cyber-attack from attacker, and mitigation measure, which mitigates the cyber-attack risk. Likelihood and consequence as prior information are evaluated by considering characteristics of I and C architecture and malicious activity. The BBN model provides posterior information with Bayesian update by adding any of assumed cyber-attack scenarios as evidence. Cyber security risk for nuclear facilities is analyzed by comparing between prior information and posterior information of each node. In this study, we conducted comparative study on cyber securities between power reactor

  8. All projects related to | Page 525 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Networks : Empowering Communities through Telecentre Networking. Project ... IDRC institutional support over the period 2003-2006 (project 102095) enabled the Educational Research Network for West and Central Africa (ERNWACA) to carry out research that made an important ... Program: Agriculture and Food Security.

  9. Secure and Robust Iris Recognition Using Random Projections and Sparse Representations.

    Science.gov (United States)

    Pillai, Jaishanker K; Patel, Vishal M; Chellappa, Rama; Ratha, Nalini K

    2011-09-01

    Noncontact biometrics such as face and iris have additional benefits over contact-based biometrics such as fingerprint and hand geometry. However, three important challenges need to be addressed in a noncontact biometrics-based authentication system: ability to handle unconstrained acquisition, robust and accurate matching, and privacy enhancement without compromising security. In this paper, we propose a unified framework based on random projections and sparse representations, that can simultaneously address all three issues mentioned above in relation to iris biometrics. Our proposed quality measure can handle segmentation errors and a wide variety of possible artifacts during iris acquisition. We demonstrate how the proposed approach can be easily extended to handle alignment variations and recognition from iris videos, resulting in a robust and accurate system. The proposed approach includes enhancements to privacy and security by providing ways to create cancelable iris templates. Results on public data sets show significant benefits of the proposed approach.

  10. Research Project Evaluation—Learnings from the PATHWAYS Project Experience

    Directory of Open Access Journals (Sweden)

    Aleksander Galas

    2018-05-01

    Full Text Available Background: Every research project faces challenges regarding how to achieve its goals in a timely and effective manner. The purpose of this paper is to present a project evaluation methodology gathered during the implementation of the Participation to Healthy Workplaces and Inclusive Strategies in the Work Sector (the EU PATHWAYS Project. The PATHWAYS project involved multiple countries and multi-cultural aspects of re/integrating chronically ill patients into labor markets in different countries. This paper describes key project’s evaluation issues including: (1 purposes, (2 advisability, (3 tools, (4 implementation, and (5 possible benefits and presents the advantages of a continuous monitoring. Methods: Project evaluation tool to assess structure and resources, process, management and communication, achievements, and outcomes. The project used a mixed evaluation approach and included Strengths (S, Weaknesses (W, Opportunities (O, and Threats (SWOT analysis. Results: A methodology for longitudinal EU projects’ evaluation is described. The evaluation process allowed to highlight strengths and weaknesses and highlighted good coordination and communication between project partners as well as some key issues such as: the need for a shared glossary covering areas investigated by the project, problematic issues related to the involvement of stakeholders from outside the project, and issues with timing. Numerical SWOT analysis showed improvement in project performance over time. The proportion of participating project partners in the evaluation varied from 100% to 83.3%. Conclusions: There is a need for the implementation of a structured evaluation process in multidisciplinary projects involving different stakeholders in diverse socio-environmental and political conditions. Based on the PATHWAYS experience, a clear monitoring methodology is suggested as essential in every multidisciplinary research projects.

  11. 30 CFR 402.10 - Research-project applications.

    Science.gov (United States)

    2010-07-01

    ... project title, project objectives, background information, research tasks, methodology to conduct the... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Research-project applications. 402.10 Section... PROGRAM AND THE WATER-RESOURCES TECHNOLOGY DEVELOPMENT PROGRAM Application, Evaluation, and Management...

  12. Metrology network: a case study on the metrology network of defense and security from SIBRATEC

    International Nuclear Information System (INIS)

    Pereira, Marisa Ferraz Figueira

    2016-01-01

    This study is focused on understanding the effects of the infrastructure improvement of these laboratories and the role of network management in offering support and metrological services to the defense and security sector enterprises, within the project purposes. It is also aimed identify gaps on offering calibration and, or testing services to supply demands of the defense and security industries, and analyze adequacy of RDS project to demands of defense and security industries, with the purpose to contribute with information for future actions. The experimental research is qualitative type, with exploratory research characteristics, based on case study. It was structured in two parts, involving primary data collection and secondary data. In order to collect the primary data two questionnaires were prepared, one (Questionnaire A) to the five RDS laboratories representatives and other (Questionnaire B) to the contacts of 63 defense and security enterprises which need calibration and test services, possible customers of RDS laboratories. Answers from four representatives of RDS laboratories and from 26 defense and security enterprises were obtained. The collection of secondary data was obtained from documentary research. The analysis was made based on five dimensions defined in order to organize and improve the understanding of the research setting. They are RDS project coverage, regional, network management, metrological traceability and importance and visibility of RDS. The results indicated that the performance of RDS does not interfere, by that time, in the metrological traceability of the products of the defense and security enterprises that participated in the research. (author)

  13. Open Empowerment: Digital Natives, Democracy, and Security in ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Led by the SecDev Group, this research project will examine such issues in Latin America, where the contest between securitization and preservation of openness in cyberspace is driven by criminal activity. Researchers will combine a general panorama of organized crime and cyber-security with in-depth regional cases, ...

  14. Impact of water scarcity on food security at micro level in Pakistan

    OpenAIRE

    Fahim, Muhammad Amir

    2011-01-01

    Pakistan is confronting the problem of water scarcity which is rendering an adverse impact on food security. The study examines the impact of water scarcity on food security in an era of climate change. It further focuses on projecting the future trends of water and food stock. The research effort probes the links among water scarcity, climate change, food security, water security, food inflation, poverty and management of water resources. Data on food security was collected from the FSA (Foo...

  15. Impact of water scarcity on food security at macro level in Pakistan

    OpenAIRE

    Fahim, Muhammad Amir

    2011-01-01

    Pakistan is confronting the problem of water scarcity which is rendering an adverse impact on food security. The study examines the impact of water scarcity on food security in an era of climate change. It further focuses on projecting the future trends of water and food stock. The research effort probes the links among water scarcity, climate change, food security, water security, food inflation, poverty and management of water resources. Data on food security was collected from the FSA (Foo...

  16. Impact of water scarcity on food security at meso level in Pakistan

    OpenAIRE

    Fahim, Muhammad Amir

    2011-01-01

    Pakistan is confronting the problem of water scarcity which is rendering an adverse impact on food security. The study examines the impact of water scarcity on food security in an era of climate change. It further focuses on projecting the future trends of water and food stock. The research effort probes the links among water scarcity, climate change, food security, water security, food inflation, poverty and management of water resources. Data on food security was collected from the FSA (Foo...

  17. The relation between project management education and newer streams in project management research

    DEFF Research Database (Denmark)

    Leimbach, Timo; Goodall, Julie Bladt

    2017-01-01

    In the last decades, research in project management (PM) has experienced significant new inputs from a range of new PM methodologies and critical research streams. As a consequence, members of the more critical streams have called for the education of project managers to advance from that of trai......In the last decades, research in project management (PM) has experienced significant new inputs from a range of new PM methodologies and critical research streams. As a consequence, members of the more critical streams have called for the education of project managers to advance from...... that of training technicians, to fostering reflective practitioners that are better equipped to handle the increasing complexity of the profession. This paper is based on a recently commenced re-search project titled "Rethinking Project Management Education – the Role of Universities" that is aimed at analysing...... how the development of PM research is reflected in the education of project managers. On the basis of a short overview of the state of the art of PM education research and practices, the possible challenges for the development of PM education are discussed, and, finding that there is a lack...

  18. USAF Institute for National Security Studies 1998 Research Results Conference

    National Research Council Canada - National Science Library

    1998-01-01

    The USAF Institute for National Security Studies (INSS), in cooperation with HQ USAF Nuclear and Counterproliferation Directorate, sponsored its 6th annual Research Results Conference on 19 - 20 November 1998...

  19. Advanced energy projects FY 1992 research summaries

    International Nuclear Information System (INIS)

    1992-09-01

    The Division of Advanced Energy Projects (AEP) provides support to explore the feasibility of novel, energy-related concepts that evolve from advances in basic research. These concepts are typically at an early stage of scientific definition and, therefore, are beyond the scope of ongoing applied research or technology development programs. The Division provides a mechanism for converting basic research findings to applications that eventually could impact the Nation's energy economy. Technical topics include physical, chemical, materials, engineering, and biotechnologies. Projects can involve interdisciplinary approaches to solve energy-related problems. Projects are supported for a finite period of time, which is typically three years. Annual funding levels for projects are usually about $300,000 but can vary from approximately $50,000 to $500,000. It is expected that, following AEP support, each concept will be sufficiently developed and promising to attract further funding from other sources in order to realize its full potential. There were 39 research projects in the Division of Advanced Energy Projects during Fiscal Year 1992 (October 1, 1991 -- September 30, 1992). The abstracts of those projects are provided to introduce the overall program in Advanced Energy Projects. Further information on a specific project may be obtained by contacting the principal investigator, who is listed below the project title. Projects completed during FY 1992 are indicated

  20. Toxicology research projects directory, 1978. Monthly repts

    International Nuclear Information System (INIS)

    1978-01-01

    The Toxicology Research Projects Directory is a monthly publication of ongoing research projects in toxicology and related fields selected from the files of the Smithsonian Science Information Exchange (SSIE). Each issue lists toxicology-related research projects reported to SSIE during the one-month period preceding that issue. Each of the summaries is categorized by scientific discipline and assigned a unique identification number for cross-referencing from the Directory Indexes--Subject, Investigator, Performing Organization, Supporting Agency, and Master Grant Number. The thirteenth issue consists of Cumulative Indexes for the entire volume with referencing to projects in all of the previous twelve issues. The emphasis of the Directory is on the manifestations of the exposure of man and animals to toxic substances. Projects are classified by toxic agents, research orientation, and areas of environmental concern

  1. Internationalization Measures in Large Scale Research Projects

    Science.gov (United States)

    Soeding, Emanuel; Smith, Nancy

    2017-04-01

    Internationalization measures in Large Scale Research Projects Large scale research projects (LSRP) often serve as flagships used by universities or research institutions to demonstrate their performance and capability to stakeholders and other interested parties. As the global competition among universities for the recruitment of the brightest brains has increased, effective internationalization measures have become hot topics for universities and LSRP alike. Nevertheless, most projects and universities are challenged with little experience on how to conduct these measures and make internationalization an cost efficient and useful activity. Furthermore, those undertakings permanently have to be justified with the Project PIs as important, valuable tools to improve the capacity of the project and the research location. There are a variety of measures, suited to support universities in international recruitment. These include e.g. institutional partnerships, research marketing, a welcome culture, support for science mobility and an effective alumni strategy. These activities, although often conducted by different university entities, are interlocked and can be very powerful measures if interfaced in an effective way. On this poster we display a number of internationalization measures for various target groups, identify interfaces between project management, university administration, researchers and international partners to work together, exchange information and improve processes in order to be able to recruit, support and keep the brightest heads to your project.

  2. Advanced energy projects FY 1997 research summaries

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-09-01

    The mission of the Advanced Energy Projects (AEP) program is to explore the scientific feasibility of novel energy-related concepts that are high risk, in terms of scientific feasibility, yet have a realistic potential for a high technological payoff. The concepts supported by the AEP are typically at an early stage of scientific development. They often arise from advances in basic research and are premature for consideration by applied research or technology development programs. Some are based on discoveries of new scientific phenomena or involve exploratory ideas that span multiple scientific and technical disciplines which do not fit into an existing DOE program area. In all cases, the objective is to support evaluation of the scientific or technical feasibility of the novel concepts involved. Following AEP support, it is expected that each concept will be sufficiently developed to attract further funding from other sources to realize its full potential. Projects that involve evolutionary research or technology development and demonstration are not supported by AEP. Furthermore, research projects more appropriate for another existing DOE research program are not encouraged. There were 65 projects in the AEP research portfolio during Fiscal Year 1997. Eigheen projects were initiated during that fiscal year. This document consists of short summaries of projects active in FY 1997. Further information of a specific project may be obtained by contacting the principal investigator.

  3. Nucleus: A pilot project

    Energy Technology Data Exchange (ETDEWEB)

    Finnell, Joshua Eugene [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Klein, Martin [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Cain, Brian J. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-05-09

    The proposal is to provide institutional infrastructure that facilitates management of research projects, research collaboration, and management, preservation, and discovery of data. Deploying such infrastructure will amplify the effectiveness, efficiency, and impact of research, as well as assist researchers in regards to compliance with both data management mandates and LANL security policy. This will facilitate discoverability of LANL research both within the lab and external to LANL.

  4. Using gender research in development: food security in practice

    OpenAIRE

    Quisumbing, Agnes R.; McClafferty, Bonnie

    2006-01-01

    Metadata only record This guide presents research from several countries in IFPRI's research program on gender and intrahousehold relations, using quantitative and qualitative methods. It examines the implications of these issues in the success of development initiatives and suggestions for integrating gender research in projects and policy. The guide is divided into the following sections: the importance of using gender and intrahousehold research to inform projects and policies; gender a...

  5. Perspectives on Energy Security

    International Nuclear Information System (INIS)

    Carlsson-Kanyama, Annika; Holmgren, Aake J.; Joensson, Thomas; Larsson, Robert L.

    2007-05-01

    A common notion of 'Energy Security' is that it includes access to energy resources without risking the the survival of the state. 'Security of supply' is most often the concept emphasized in the political discourse on energy security and it includes both production as well as secure and safe delivery of energy to the end consumers. Another aspect of energy security is the need for reducing energy consumption by improving energy efficiency. In this report, eight chapters covering these and other perspectives on energy security are presented. Six of the chapters deal with the supply perspective. Included topics cover power politics and geopolitical perspectives regarding large infrastructure projects and the ambitions of the EU in this regard. Further, methods and approaches for conducting risk analyses of electricity supply systems as well as for improving the security of digital control systems are discussed. As climate change will affect the supply and distribution of energy, one chapter presents an overview of this topic. The consumption perspective is discussed against the backdrop of research about household consumption practices and the role of climate change for future consumption levels. Finally, the role of armed forces as a large energy users is touched upon, as well as how so-called 'future studies' have dealt with energy as a topic

  6. Room-Temperature Single-Photon Source for Secure Quantum Communication

    Data.gov (United States)

    National Aeronautics and Space Administration — We are asking for four years of support for PhD student Justin Winkler's work on a research project entitled "Room temperature single photon source for secure...

  7. Modeling and simulation for cyber-physical system security research, development and applications.

    Energy Technology Data Exchange (ETDEWEB)

    Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.

    2010-02-01

    This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.

  8. Research of ios operating system security and the abuse of its exploits

    OpenAIRE

    Jucius, Mindaugas

    2017-01-01

    iOS operating system, which is developed by Apple Inc., is claimed to be the most secure product in the market. In the light of worsening human rights conditions, mainly concerning data privacy breaches performed on governmental level, the need to be reassured about the security of software that runs in our pockets is strengthened. This thesis is focused on researching on potential iOS security exploits and their abuse to access private information or perform malicious actions without user’s ...

  9. Nuclear security education and training at Naif Arab University for Security Sciences

    International Nuclear Information System (INIS)

    Amjad Fataftah

    2009-01-01

    Naif Arab University for Security Sciences (NAUSS) was established in 1978 as an Arab institution specialized in security sciences to fulfill the needs of the Arab law enforcement agencies for an academic institution that promotes research in security sciences, offers graduate education programs and conduct short-term training courses, which should contribute to the prevention and control of crimes in the Arab world. NAUSS and the IAEA organized the first workshop on nuclear security on November, 2006, which aimed to explore and improve the nuclear security culture awareness through the definitions of the nuclear security main pillars, Prevention, Detection and Response. In addition, NAUSS and IAEA organized a very important training course on April, 2008 on combating nuclear terrorism titled P rotection against nuclear terrorism: Protection of radioactive sources . In the past two years, IAEA has put tremendous efforts to develop an education program in nuclear security, which may lead into Master's degree in nuclear security, where NAUSS helped in this project through the participation in the IAEA organized consultancy and technical meetings for the development of this program along with many other academic, security and law enfacement experts and lawyers from many different institution in the world. NAUSS and IAEA drafted a work plan for the next coming two years which should lead into the gradual implementation of these educational programs at NAUSS. NAUSS also continues to participate in several local conferences and symposiums related to the peaceful application of nuclear power in the gulf region, and the need for a human resources development programs to fulfill the scientific and security needs which will arise from building nuclear power plants. NAUSS participated in the International Symposium on the Peaceful Application of Nuclear Technology in the GCC countries, organized by King Abdulaziz University in the city of Jeddah, Saudi Arabia. Also NAUSS

  10. 'Ethiopia-Netherlands AIDS research project'

    NARCIS (Netherlands)

    Sanders, E. J.; Rinke de Wit, T. F.; Fontanet, A. L.; Goudsmit, J.; Miedema, F.; Coutinho, R. A.

    2001-01-01

    The 'Ethiopia-Netherlands AIDS Research Project' (ENARP), started in 1994, is a long-term collaboration between AIDS researchers in Amsterdam and the Ethiopian Health and Nutrition Research Institute in Addis Ababa. The ENARP's primary objectives include conducting studies on HIV and AIDS in

  11. Masters in Nuclear Security

    International Nuclear Information System (INIS)

    Rickwood, Peter

    2013-01-01

    Continuing global efforts to improve the security of nuclear and other radioactive material against the threat of malicious acts are being assisted by a new initiative, the development of a corps of professional experts to strengthen nuclear security. The IAEA, the European Commission, universities, research institutions and other bodies working in collaboration have established an International Nuclear Security Education Network (INSEN). In 2011, six European academic institutions, the Vienna University of Technology, the Brandenburg University of Applied Sciences, the Demokritos National Centre for Scientific Research in Greece, the Reactor Institute Delft of the Delft University of Technology in the Netherlands, the University of Oslo, and the University of Manchester Dalton Nuclear Institute, started developing a European Master of Science Programme in Nuclear Security Management. In March 2013, the masters project was inaugurated when ten students commenced studies at the Brandenburg University of Applied Sciences in Germany for two weeks. In April, they moved to the Delft University of Technology in the Netherlands for a further two weeks of studies. The pilot programme consists of six teaching sessions in different academic institutions. At the inauguration in Delft, IAEA Director General Yukiya Amano commended this effort to train a new generation of experts who can help to improve global nuclear security. ''It is clear that we will need a new generation of policy-makers and nuclear professionals - people like you - who will have a proper understanding of the importance of nuclear security,'' Mr. Amano told students and faculty members. ''The IAEA's goal is to support the development of such programmes on a global basis,'' said David Lambert, Senior Training Officer in the IAEA's Office of Nuclear Security. ''An existing postgraduate degree programme focused on nuclear security at Naif Arab University for Security Sciences (NAUSS) is currently supported by

  12. Making the world more secure, one research reactor at a time

    International Nuclear Information System (INIS)

    Mutluer, Adem; Rickwood, Peter

    2015-01-01

    During the night of 29 September 2014, a heavy transport plane took off from an air base in Kazakhstan after an operation to remove fuel and increase the security of a research reactor. In its cargo bay sat four massive containers, provided by the IAEA, that had been filled with a total of 10.2 kilograms of highly enriched uranium (HEU), on its way to be diluted to a safe substance or securely stored at the flight’s destination in Russia. The operation represented the latest achievement in a global programme involving the IAEA, the Russian Federation and the United States to assist several countries, including Kazakhstan, in eliminating the risks associated with HEU, while still maintaining the important scientific research conducted at the reactor. HEU is a security risk, as it is an ingredient that can be used to create a nuclear device intended for malicious use. It is not encouraged to use HEU in a research reactor as safer low enriched uranium (LEU) can be used instead (see box). In the 1960s and 1970s, when many of the world’s research reactors were built, technology using LEU was not yet available, so in order to perform experiments HEU fuel was required. As of next year, less proliferation sensitive LEU will be used to fuel the light water research reactor in Alatau near Almaty, the largest city in Kazakhstan.

  13. Making the world more secure, one research reactor at a time

    International Nuclear Information System (INIS)

    Mutluer, Adem; Rickwood, Peter

    2015-01-01

    During the night of 29 September 2014, a heavy transport plane took off from an air base in Kazakhstan after an operation to remove fuel and increase the security of a research reactor. In its cargo bay sat four massive containers, provided by the IAEA, that had been filled with a total of 10.2 kilograms of highly enriched uranium (HEU), on its way to be diluted to a safe substance or securely stored at the flight’s destination in Russia. The operation represented the latest achievement in a global programme involving the IAEA, the Russian Federation and the United States to assist several countries, including Kazakhstan, in eliminating the risks associated with HEU, while still maintaining the important scientific research conducted at the reactor. HEU is a security risk, as it is an ingredient that can be used to create a nuclear device intended for malicious use. It is not encouraged to use HEU in a research reactor as safer low enriched uranium (LEU) can be used instead (see box). In the 1960s and 1970s, when many of the world’s research reactors were built, technology using LEU was not yet available, so in order to perform experiments HEU fuel was required. As of next year, less proliferation sensitive LEU will be used to fuel the light water research reactor in Alatau near Almaty, the largest city in Kazakhstan. .

  14. Supporting non proliferation and global security efforts

    International Nuclear Information System (INIS)

    Pochon, E.

    2013-01-01

    CEA contributes as a major actor of France's action against nuclear proliferation and to the strengthening of nuclear security at national level as European and International levels, in particular through the support of the IAEA activities in nuclear non proliferation with the French Support Programme for the IAEA safeguards system and security with the contribution to the IAEA Nuclear Security Plan and cooperation projects with the European Commission. The CEA is a French government funded technological research organization, organized around 5 branches: Nuclear Energy, Technological Researches, Defence (DAM), Material Sciences and Life Sciences. Within the scope of its activities, CEA covers most of the research areas and techniques in nuclear non-proliferation and security. The CEA is also the advisor of the French Government on nuclear policy. Treaty monitoring and the development and implementation of non proliferation and global security programs is an important mission of DAM which rely on nuclear weapons manufacture and past testing experience. The programmes on non proliferation and global security carried out to fulfil DAM's mission cover the following areas: development of monitoring and detection methods and equipments, country profiles and nuclear stockpiles assessment, arms control instruments, proliferation resistance of nuclear fuel cycle, monitoring of nuclear tests, operation and maintenance of national detection capabilities and contribution to CTBT verification systems. (A.C.)

  15. IT Security Vulnerability and Incident Response Management

    NARCIS (Netherlands)

    Hafkamp, W.H.M.; Paulus, S.; Pohlman, N.; Reimer, H.

    2006-01-01

    This paper summarises the results of a Dutch PhD research project on IT security vulnerability and incident response management, which is supervised by the University of Twente in the Netherlands and which is currently in its final stage. Vulnerabilities are ‘failures or weaknesses in computer

  16. Integration of EGA secure data access into Galaxy.

    Science.gov (United States)

    Hoogstrate, Youri; Zhang, Chao; Senf, Alexander; Bijlard, Jochem; Hiltemann, Saskia; van Enckevort, David; Repo, Susanna; Heringa, Jaap; Jenster, Guido; J A Fijneman, Remond; Boiten, Jan-Willem; A Meijer, Gerrit; Stubbs, Andrew; Rambla, Jordi; Spalding, Dylan; Abeln, Sanne

    2016-01-01

    High-throughput molecular profiling techniques are routinely generating vast amounts of data for translational medicine studies. Secure access controlled systems are needed to manage, store, transfer and distribute these data due to its personally identifiable nature. The European Genome-phenome Archive (EGA) was created to facilitate access and management to long-term archival of bio-molecular data. Each data provider is responsible for ensuring a Data Access Committee is in place to grant access to data stored in the EGA. Moreover, the transfer of data during upload and download is encrypted. ELIXIR, a European research infrastructure for life-science data, initiated a project (2016 Human Data Implementation Study) to understand and document the ELIXIR requirements for secure management of controlled-access data. As part of this project, a full ecosystem was designed to connect archived raw experimental molecular profiling data with interpreted data and the computational workflows, using the CTMM Translational Research IT (CTMM-TraIT) infrastructure http://www.ctmm-trait.nl as an example. Here we present the first outcomes of this project, a framework to enable the download of EGA data to a Galaxy server in a secure way. Galaxy provides an intuitive user interface for molecular biologists and bioinformaticians to run and design data analysis workflows. More specifically, we developed a tool -- ega_download_streamer - that can download data securely from EGA into a Galaxy server, which can subsequently be further processed. This tool will allow a user within the browser to run an entire analysis containing sensitive data from EGA, and to make this analysis available for other researchers in a reproducible manner, as shown with a proof of concept study.  The tool ega_download_streamer is available in the Galaxy tool shed: https://toolshed.g2.bx.psu.edu/view/yhoogstrate/ega_download_streamer.

  17. Integrated Project Delivery (IPD Research Trends.

    Directory of Open Access Journals (Sweden)

    Kahvandi, Z.

    2017-07-01

    Full Text Available Integrated Project Delivery (IPD is introduced as a vibrant approach to enhance project implementation, having particular position in recent studies among construction researchers. This study analyzes the research trends on the field of IPD to provide an appropriate vision for future researchers in this specialized field. While so far no comprehensive research has been done in this field, this study provides a comprehensive review of existing studies through in-depth literature review method. This research evaluates studies conducted in the field of IPD, which is a basis for future researchers to improve conditions of IPD implementation in different countries. For that this study Using library studies, the trend of researches conducted on various concepts and domains during various years, has been investigated. Future studies can simply use the outputs of this research to shape their research flow on establishing continuing progress of IPD. The data obtained from descriptive analyses are illustrated quantitatively, followed by comprehensive analyses and discussion of the results. Moreover, this study concluded that during recent years, the trend of studies conducted about IPD has increased, particularly articles examined challenges. In the next step, more studies have been performed in the field of construction. Those articles are preferred that have evaluated principles, challenges, and solutions for resolving barriers. Proper IPD implementation facilitates enhanced share of information and early identification of stakeholders through a proper timing as vital keys to realize objectives of the construction projects, reduce risks, and increase the chance of project success.

  18. Assessing the Need for an On-Line Educational Module for Volunteer Leaders on Bio-Security in Washington State 4-H Livestock Projects

    Science.gov (United States)

    Stevenson, Jill L.; Moore, Dale A.; Newman, Jerry; Schmidt, Janet L.; Smith, Sarah M.; Smith, Jean; Kerr, Susan; Wallace, Michael; BoyEs, Pat

    2011-01-01

    4-H livestock projects present disease transmission risks that can be reduced by the use of bio-security practices. The responsibility of teaching bio-security to youth belongs primarily to volunteer leaders, who may not be aware of the importance of these practices. A needs assessment for an online educational module about bio-security revealed…

  19. Advanced energy projects FY 1994 research summaries

    International Nuclear Information System (INIS)

    1994-09-01

    The Division of Advanced Energy Projects (AEP) provides support to explore the feasibility of novel, energy-related concepts that evolve from advances in basic research. These concepts are typically at an early stage of scientific definition and, therefore, are premature for consideration by applied research or technology development programs. The AEP also supports high-risk, exploratory concepts that do not readily fit into a program area but could have several applications that may span scientific disciplines or technical areas. Projects supported by the Division arise from unsolicited ideas and concepts submitted by researchers. The portfolio of projects is dynamic and reflects the broad role of the Department in supporting research and development for improving the Nation's energy outlook. FY 1994 projects include the following topical areas: novel materials for energy technology; renewable and biodegradable materials; exploring uses of new scientific discoveries; alternate pathways to energy efficiency; alternative energy sources; and innovative approaches to waste treatment and reduction. Summaries are given for 66 projects

  20. Low Emissions Alternative Power (LEAP) Project Office Business Team of the Aeropropulsion Research Program Office (ARPO) Org. 0140

    Science.gov (United States)

    Buttler, Jennifer A.

    2004-01-01

    The program for which I am working at this summer is Propulsion and Power/Low Emissions Alternative Power (P&P/LEAP). It invests in a fundamental TRL 1-6 research and technology portfolio that will enable the future of: Alternative fuels and/or alternative propulsion systems, non-combustion (electric) propulsion systems. P&P/LEAP will identify and capitalize on the highest potential concepts generated both internal and external to the Agency. During my 2004 summer at NASA Glenn Research Center, I worked with my mentor Barbara Mader, in the Project Office with the Business Team completing various tasks for the project and personnel. The LEAP project is a highly matrixed organization. The Project Office is responsible for the goals advocacy and dollar (budget) of the LEAP project. The objectives of the LEAP Project are to discover new energy sources and develop unconventional engines and power systems directed towards greatly reduced emissions, enable new vehicle concepts for public mobility, new science missions and national security. The Propulsion and PowerLow Emissions Alternative Power directly supports the environmental, mobility, national security objectives of the Vehicle Systems Program and the Aeronautics Technology Theme. Technology deliverables include the demonstration through integrated ground tests, a constant volume combustor in an engine system, and UAV/small transport aircraft all electric power system. My mentor serves as a key member of the management team for the Aeropropulsion Research Program Office (ARPO). She has represented the office on numerous occasions, and is a member of a number of center-wide panels/teams, such as the Space management Committee and is chair to the Business Process Consolidation Team. She is responsible for the overall coordination of resources for the Propulsion and Power Project - from advocacy to implementation. The goal for my summer at NASA was to document processes and archive program documents from the past

  1. Focusing Information Systems Post-Graduate Research Projects

    Directory of Open Access Journals (Sweden)

    Gail Ridley

    1996-11-01

    Full Text Available This paper reports on an investigation of mechanisms that assist Information Systems post-graduate research students to focus their projects. An evaluation is presented of the experiences of Information Systems research students in focussing their research projects based on a survey conducted of students who participated in two of the first three Information Systems doctoral consortia to be held in Australia. The survey sought to determine whether a doctoral consortium or 'systematic expert review' is the most valuable mechanism for focussing a research proposal. Systematic expert review was considered by the students to be more effective than the doctoral consortium process for the purpose of focussing their research project proposals.

  2. Implementing an Information Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Glantz, Clifford S.; Lenaeus, Joseph D.; Landine, Guy P.; O' Neil, Lori Ross; Leitch, Rosalyn; Johnson, Christopher; Lewis, John G.; Rodger, Robert M.

    2017-11-01

    The threats to information security have dramatically increased with the proliferation of information systems and the internet. Chemical, biological, radiological, nuclear, and explosives (CBRNe) facilities need to address these threats in order to protect themselves from the loss of intellectual property, theft of valuable or hazardous materials, and sabotage. Project 19 of the European Union CBRN Risk Mitigation Centres of Excellence Initiative is designed to help CBRN security managers, information technology/cybersecurity managers, and other decision-makers deal with these threats through the application of cost-effective information security programs. Project 19 has developed three guidance documents that are publically available to cover information security best practices, planning for an information security management system, and implementing security controls for information security.

  3. Safety and Security in Schools in KwaZulu-Natal

    Science.gov (United States)

    White, C. J.; Gina, J. M.; Coetzee, I. E. M.

    2015-01-01

    This article is based on research conducted on the topic: "Safety and security in schools: The case of KwaZulu-Natal." For the research project a purposive sample consisting of secondary school learners, teachers, school governing body chairpersons and principals were selected from the rural and township schools used in this study to…

  4. Diversity in research projects - A key to success?

    Science.gov (United States)

    Henkel, Daniela; Eisenhauer, Anton; Taubner, Isabelle

    2017-04-01

    According to demographers, psychologists, sociologists and economists diverse groups, which are groups of different race, ethnicity, gender and sexual orientation, are more innovative than homogeneous groups. This is also true for groups working together in research collaborations and international cooperation involving a culturally and functionally diverse mix of individuals who have to be integrated into an effective unit - a project team. If the goal is scientific excellence, diversity should be an essential ingredient to conduct science on high level productivity, quality and innovation. Effective teamwork is a key to project success and prime responsibilities of the project manager. Therefore, the project manager has to take into consideration different characteristics such as cultures, languages, and different values related to individual project partners. Here we show how diversity can affect the performance of a research project. Furthermore, the presentation indicates skills and abilities which are required for the management in order to deal also with the challenges of diversity in research projects. The presentation is based on insights experienced in the context of an Innovative Training Network (ITN) project within Marie Skłodowska-Curie Actions of the European HORIZON 2020 program and TRION a Collaborative Research Project in the Framework of the Trilateral Program of the German Research Foundation.

  5. Security Research on Engineering Database System

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database management system (EDBMS). Through studying and analyzing the database security, to draw a series of securi ty rules, which reach B1, level security standard. Which includes discretionary access control (DAC), mandatory access control (MAC) and audit. The EDBMS implem ents functions of DAC, ...

  6. Trends in Research on the Security of Medical Information in Korea: Focused on Information Privacy Security in Hospitals.

    Science.gov (United States)

    Kim, Yong-Woon; Cho, Namin; Jang, Hye-Jung

    2018-01-01

    Information technology involves a risk of privacy violation in providing easy access to confidential information,such as personal information and medical information through the Internet. In this study, we investigated medical information security to gain a better understanding of trends in research related to medical information security. We researched papers published on '의료정보' and 'medical information' in various Korean journals during a 10-year period from 2005 to 2015. We also analyzed these journal papers for each fiscal year; these papers were categorized into the areas of literature research and empirical research, and were further subdivided according to themes and subjects. It was confirmed that 48 papers were submitted to 35 academic journals. There were 33 (68.8%) literature review articles, and analysis of secondary data was not carried out at all. In terms of empirical research, 8 (16.7%) surveys and 7 (14.6%) program developments were studied. As a result of analyzing these papers according to the research theme by research method, 17 (35.4%) papers on laws, systems, and policies were the most numerous. It was found that among the literature research papers on medical personnel were the most common, and among the empirical research papers, research on experts in information protection and medical personnel were the most common. We suggest that further research should be done in terms of social perception, human resource development, and technology development to improve risk management in medical information systems.

  7. Marketing Strategy Research

    Energy Technology Data Exchange (ETDEWEB)

    None

    2010-03-31

    This report documents the research that has been undertaken as background for preparation of a marketing campaign for middle and high school students to increase interest in national security careers at the National Nuclear Security Administration. This work is a part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. Previous research on the development of a properly trained and skilled national security workforce has identified a lack of interest by k-12 students in the STEM (Science, Technology, Engineering, and Mathematics) fields. Further, participation in these careers by women and minority populations is limited and is not increasing. Added to this are low educational achievement levels in New Mexico, where the marketing campaign will be deployed.

  8. What do medical students understand by research and research skills? Identifying research opportunities within undergraduate projects.

    Science.gov (United States)

    Murdoch-Eaton, Deborah; Drewery, Sarah; Elton, Sarah; Emmerson, Catherine; Marshall, Michelle; Smith, John A; Stark, Patsy; Whittle, Sue

    2010-01-01

    Undergraduate research exposure leads to increased recruitment into academic medicine, enhanced employability and improved postgraduate research productivity. Uptake of undergraduate research opportunities is reported to be disappointing, and little is known about how students perceive research. To investigate opportunities for undergraduate participation in research, recognition of such opportunities, and associated skills development. A mixed method approach, incorporating student focus and study groups, and documentary analysis at five UK medical schools. Undergraduates recognised the benefits of acquiring research skills, but identified practical difficulties and disadvantages of participating. Analysis of 905 projects in four main research skill areas - (1) research methods; (2) information gathering; (3) critical analysis and review; (4) data processing - indicated 52% of projects provided opportunities for students to develop one or more skills, only 13% offered development in all areas. In 17%, project descriptions provided insufficient information to determine opportunities. Supplied with information from a representative sample of projects (n = 80), there was little consensus in identifying skills among students or between students and researchers. Consensus improved dramatically following guidance on how to identify skills. Undergraduates recognise the benefits of research experience but need a realistic understanding of the research process. Opportunities for research skill development may not be obvious. Undergraduates require training to recognise the skills required for research and enhanced transparency in potential project outcomes.

  9. EMI Security Architecture

    CERN Document Server

    White, J.; Schuller, B.; Qiang, W.; Groep, D.; Koeroo, O.; Salle, M.; Sustr, Z.; Kouril, D.; Millar, P.; Benedyczak, K.; Ceccanti, A.; Leinen, S.; Tschopp, V.; Fuhrmann, P.; Heyman, E.; Konstantinov, A.

    2013-01-01

    This document describes the various architectures of the three middlewares that comprise the EMI software stack. It also outlines the common efforts in the security area that allow interoperability between these middlewares. The assessment of the EMI Security presented in this document was performed internally by members of the Security Area of the EMI project.

  10. Security Sector Reform in Albania

    OpenAIRE

    Abazi, Enika; Bumci, Aldo; Hide, Enri; Rakipi, Albert

    2009-01-01

    International audience; This paper analyses security sector reform (SSR) in Albania. In all its enterprises in reforming the security sector,Albania is assisted by different initiatives and projects that provide expertise and financial support. To assesswhether reforms improved the overall security environment (national and human) of the country, it is necessaryto measure the effectiveness of the various initiatives and projects. This is gauged by how well the initiatives andprojects achieved...

  11. Security in Brazilian Universities: Compared Prospects of Public Institutions

    Directory of Open Access Journals (Sweden)

    Christiane de Holanda Camilo

    2016-12-01

    Full Text Available This article is a presentation of preliminary results of the data collected in the "Research Project Violence, Conflict and Crime: Subsidies for the Formulation of UFG Security Policy" held between 2014-2015. The objective is to analyze policies to prevent violence in universities. The methodology used was an exploratory and documental research and are based public information available on institutional websites. The five universities surveyed were: UFSC, USP, UFMT, UFMG and UNILA. The results allowed certain approximation and divergence on the concepts of security on campuses, as the statistical record and the presence of military police at the university.

  12. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  13. Using Trust for Secure Collaboration in Uncertain Environments

    DEFF Research Database (Denmark)

    Cahill, Vinny; Gray, Elizabeth; Seigneur, Jean-Marc

    2003-01-01

    The SECURE project investigates the design of security mechanisms for pervasive computing based on trust. It addresses how entities in unfamiliar pervasive computing environments can overcome initial suspicion to provide secure collaboration.......The SECURE project investigates the design of security mechanisms for pervasive computing based on trust. It addresses how entities in unfamiliar pervasive computing environments can overcome initial suspicion to provide secure collaboration....

  14. Threats to economic security of the region

    Directory of Open Access Journals (Sweden)

    Y. A. Salikov

    2017-01-01

    Full Text Available Various aspects of economic security are in sight of the researchers for more than two decades. Today in the economic literature widely presents the conceptual aspects of economic safety of the state. Theoretical and methodological foundations of the study of this multifaceted problem lies in the researches of many domestic and foreign scientists, which are the basic levels of economic security. Among the priority levels include, in our view, the regional level (meso-level and actual problems of economic security studied to date lack detail. Economic development regions of the country has its own specifics, which is projected to the achieving of regional and national economic security. The article summarizes the approaches to definition of essence of the category “economic security of the region” and was given its author’s interpretation, considers the reasons of appearance and development of crisis situations causing threats to the economic security of the region. Given that the prevention of threats and reduction of their consequences is the basis of regional economic security, the article identifies the main threats to economic security, as well as the peculiarities of their manifestations (for example, the most significant threats to economic security of the Voronezh region, as well as the proposed activities in support of regional economic security and stated objectives of regional economic policy, the solution of which is aimed at ensuring the economic security of the region. In addition, it is proved that the actual problems of economic security must be constantly in sight of the regional leadership and find its solution in government documents and policy programmes promising socio-economic development of the region.

  15. Threats or threads: from usable security to secure experience

    DEFF Research Database (Denmark)

    Bødker, Susanne; Mathiasen, Niels Raabjerg

    2008-01-01

    While the domain of security dependent technologies brings new challenges to HCI research it seems that the results and breakthroughs of HCI have not been used in design of security dependent technologies. With exceptions, work in the research field of usable security may be criticized for focusing...... mainly on adjusting user behavior to behave securely. With our background in newer HCI perspectives we address secure interaction from the perspective of security technology as experience. We analyze a number of collected user stories to understand what happens when everyday users encounter security...... dependent technologies. We apply McCarthy & Wright's [12] experience framework to the security domain and our collected stories. We point out that there are significant differences between being secure and having a secure experience, and conclude that classical usable security, focus on people's immediate...

  16. Research reactor job analysis - A project description

    International Nuclear Information System (INIS)

    Yoder, John; Bessler, Nancy J.

    1988-01-01

    Addressing the need of the improved training in nuclear industry, nuclear utilities established training program guidelines based on Performance-Based Training (PBT) concepts. The comparison of commercial nuclear power facilities with research and test reactors owned by the U.S. Department of Energy (DOE), made in an independent review of personnel selection, training, and qualification requirements for DOE-owned reactors pointed out that the complexity of the most critical tasks in research reactors is less than that in power reactors. The U.S. Department of Energy (DOE) started a project by commissioning Oak Ridge Associated Universities (ORAU) to conduct a job analysis survey of representative research reactor facilities. The output of the project consists of two publications: Volume 1 - Research Reactor Job Analysis: Overview, which contains an Introduction, Project Description, Project Methodology,, and. An Overview of Performance-Based Training (PBT); and Volume 2 - Research Reactor Job Analysis: Implementation, which contains Guidelines for Application of Preliminary Task Lists and Preliminary Task Lists for Reactor Operators and Supervisory Reactor Operators

  17. A Complex Systems Approach to More Resilient Multi-Layered Security Systems

    Energy Technology Data Exchange (ETDEWEB)

    Brown, Nathanael J. K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Katherine A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Bandlow, Alisa [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nozick, Linda Karen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Waddell, Lucas [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Levin, Drew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Whetzel, Jonathan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-09-01

    In July 2012, protestors cut through security fences and gained access to the Y-12 National Security Complex. This was believed to be a highly reliable, multi-layered security system. This report documents the results of a Laboratory Directed Research and Development (LDRD) project that created a consistent, robust mathematical framework using complex systems analysis algorithms and techniques to better understand the emergent behavior, vulnerabilities and resiliency of multi-layered security systems subject to budget constraints and competing security priorities. Because there are several dimensions to security system performance and a range of attacks that might occur, the framework is multi-objective for a performance frontier to be estimated. This research explicitly uses probability of intruder interruption given detection (PI) as the primary resilience metric. We demonstrate the utility of this framework with both notional as well as real-world examples of Physical Protection Systems (PPSs) and validate using a well-established force-on-force simulation tool, Umbra.

  18. On projective synchronization of hyperchaotic complex nonlinear systems based on passive theory for secure communications

    International Nuclear Information System (INIS)

    Mahmoud, Gamal M; Mahmoud, Emad E; Arafa, Ayman A

    2013-01-01

    In this paper we deal with the projective synchronization (PS) of hyperchaotic complex nonlinear systems and its application in secure communications based on passive theory. The unpredictability of the scaling factor in PS can additionally enhance the security of communications. In this paper, a scheme for secure message transmission is proposed, and we try to transmit more than one large or bounded message from the transmitter to the receiver. The new hyperchaotic complex Lorenz system is employed to encrypt these messages. In the transmitter, the original messages are modulated into its parameter. In the receiver, we assume that the parameter of the receiver system is uncertain. The controllers and corresponding parameter update law are constructed to achieve PS between the transmitter and receiver system with an uncertain parameter, and identify the unknown parameter via passive theory. The original messages can be recovered successfully through some simple operations by the estimated parameter. Numerical results have verified the effectiveness and feasibility of the presented method. (paper)

  19. Smart Grid Demonstration Project

    Energy Technology Data Exchange (ETDEWEB)

    Miller, Craig [National Rural Electric Cooperative Association, Arlington, VA (United States); Carroll, Paul [National Rural Electric Cooperative Association, Arlington, VA (United States); Bell, Abigail [National Rural Electric Cooperative Association, Arlington, VA (United States)

    2015-03-11

    The National Rural Electric Cooperative Association (NRECA) organized the NRECA-U.S. Department of Energy (DOE) Smart Grid Demonstration Project (DE-OE0000222) to install and study a broad range of advanced smart grid technologies in a demonstration that spanned 23 electric cooperatives in 12 states. More than 205,444 pieces of electronic equipment and more than 100,000 minor items (bracket, labels, mounting hardware, fiber optic cable, etc.) were installed to upgrade and enhance the efficiency, reliability, and resiliency of the power networks at the participating co-ops. The objective of this project was to build a path for other electric utilities, and particularly electrical cooperatives, to adopt emerging smart grid technology when it can improve utility operations, thus advancing the co-ops’ familiarity and comfort with such technology. Specifically, the project executed multiple subprojects employing a range of emerging smart grid technologies to test their cost-effectiveness and, where the technology demonstrated value, provided case studies that will enable other electric utilities—particularly electric cooperatives— to use these technologies. NRECA structured the project according to the following three areas: Demonstration of smart grid technology; Advancement of standards to enable the interoperability of components; and Improvement of grid cyber security. We termed these three areas Technology Deployment Study, Interoperability, and Cyber Security. Although the deployment of technology and studying the demonstration projects at coops accounted for the largest portion of the project budget by far, we see our accomplishments in each of the areas as critical to advancing the smart grid. All project deliverables have been published. Technology Deployment Study: The deliverable was a set of 11 single-topic technical reports in areas related to the listed technologies. Each of these reports has already been submitted to DOE, distributed to co-ops, and

  20. Linguistic analysis of project ownership for undergraduate research experiences.

    Science.gov (United States)

    Hanauer, D I; Frederick, J; Fotinakes, B; Strobel, S A

    2012-01-01

    We used computational linguistic and content analyses to explore the concept of project ownership for undergraduate research. We used linguistic analysis of student interview data to develop a quantitative methodology for assessing project ownership and applied this method to measure degrees of project ownership expressed by students in relation to different types of educational research experiences. The results of the study suggest that the design of a research experience significantly influences the degree of project ownership expressed by students when they describe those experiences. The analysis identified both positive and negative aspects of project ownership and provided a working definition for how a student experiences his or her research opportunity. These elements suggest several features that could be incorporated into an undergraduate research experience to foster a student's sense of project ownership.

  1. NGA-West2 Research Project

    Science.gov (United States)

    Bozorgnia, Yousef; Abrahamson, Norman A.; Al Atik, Linda; Ancheta, Timothy D.; Atkinson, Gail M.; Baker, Jack W.; Baltay, Annemarie S.; Boore, David M.; Campbell, Kenneth W.; Chiou, Brian S.J.; Darragh, Robert B.; Day, Steve; Donahue, Jennifer; Graves, Robert W.; Gregor, Nick; Hanks, Thomas C.; Idriss, I. M.; Kamai, Ronnie; Kishida, Tadahiro; Kottke, Albert; Mahin, Stephen A.; Rezaeian, Sanaz; Rowshandel, Badie; Seyhan, Emel; Shahi, Shrey; Shantz, Tom; Silva, Walter; Spudich, Paul A.; Stewart, Jonathan P.; Watson-Lamprey, Jennie; Wooddell, Kathryn; Youngs, Robert

    2014-01-01

    The NGA-West2 project is a large multidisciplinary, multi-year research program on the Next Generation Attenuation (NGA) models for shallow crustal earthquakes in active tectonic regions. The research project has been coordinated by the Pacific Earthquake Engineering Research Center (PEER), with extensive technical interactions among many individuals and organizations. NGA-West2 addresses several key issues in ground-motion seismic hazard, including updating the NGA database for a magnitude range of 3.0–7.9; updating NGA ground-motion prediction equations (GMPEs) for the “average” horizontal component; scaling response spectra for damping values other than 5%; quantifying the effects of directivity and directionality for horizontal ground motion; resolving discrepancies between the NGA and the National Earthquake Hazards Reduction Program (NEHRP) site amplification factors; analysis of epistemic uncertainty for NGA GMPEs; and developing GMPEs for vertical ground motion. This paper presents an overview of the NGA-West2 research program and its subprojects.

  2. Promoting Agricultural Research and Development to Strengthen Food Security in South Asia

    Directory of Open Access Journals (Sweden)

    Ghose Bishwajit

    2014-01-01

    Full Text Available This study aims to highlight the status of agricultural R&D in South Asia and contends that creating an effective agricultural research and innovation systems is a vital element to ensure food security in this region. South Asia is home to around one-fourth of mankind and houses the largest proportion of undernourished people in the world. Despite a period of marked economic growth averaging 6% a year over the past two decades, it remains the world's second poorest region contributing a mere 2.2% in global annual GDP. Agriculture is the mainstay of South Asian economy employing around 60% of the total workforce and generating around 20% of total GDP. South Asia has the recognition of being the second most food-insecure region next only to sub-Saharan Africa. Though there is growing evidence that technological innovation has a key role to play in increasing agricultural production and strengthening food security, agricultural research and development (R&D sector has failed to garner sufficient attention till now. This study also depicts the current situation of food security in South Asia and illustrates how agricultural education and innovation hold the master key to solve the food security issues for the world's most densely populated region.

  3. The IT project manager competencies that impact project success – A qualitative research

    Directory of Open Access Journals (Sweden)

    Cíntia Cristina Silva de Araújo

    2015-07-01

    Full Text Available Since there is a lack of studies about the relationship of IT project manager competencies and project success, this paper will address the following research question: Which competencies should IT project managers develop in order to achieve success in IT projects? To answer this question, we conducted a qualitative research with an exploratory approach. To collect data, twelve (12 in-depth interviews were done with Brazilian project managers from different companies from several business sectors. The analysis results pointed out that for our respondents the most needed category of competencies are team management, business domain knowledge,  communication, project management and people skills. As other authors have affirmed, technical skills were considered to be less relevant to project success than interpersonal and intrapersonal competencies.

  4. Detecting security attacks with SIEM : SERCO project report

    NARCIS (Netherlands)

    Paassen R.J.G. van; Hut, D.H.; Boltjes, B.; Trichias, K.

    2012-01-01

    The ‘Critical ICT Infrastructures’ program managed by prof. dr. ir. Rob Kooij is a strategic research program that aims to improve the quality of ICT infrastructures. The red line for all projects within this program is quality and dependability for all information and communication technology.

  5. Jmol-Enhanced Biochemistry Research Projects

    Science.gov (United States)

    Saderholm, Matthew; Reynolds, Anthony

    2011-01-01

    We developed a protein research project for a one-semester biochemistry lecture class to enhance learning and more effectively train students to understand protein structure and function. During this semester-long process, students select a protein with known structure and then research its structure, sequence, and function. This project…

  6. Teaching/Research Project "Wheelmap"

    Science.gov (United States)

    Gollenstede, Andreas

    2018-05-01

    In recent years new didactic concepts and approaches have been developed and evaluated at the universities. The concept for cartography lectures presented in this article is based on the close link of research and teaching/learning. The students are involved in all essential steps of a scientific project taking place during a series of lectures - beginning with the development of the scientific issues, followed by the choice and execution of the research methods and finally the presentation of the achieved outcomes. The specific project introduced here is based on self-experiments in which students took the perspective of wheelchair users entrusted with the task to map places, which are accessible for people with impairments. Among others, the goal set for the students was to develop an appropriate concept for the mobile acquisition of data and to visualise the final results by different methods of cartography.

  7. Evaluating and projecting the European security system

    International Nuclear Information System (INIS)

    Dean, J.

    1991-01-01

    Components of the new European security system are described taking into account the new policy making and possibilities to resolve conflicts. Programmes for political and economic integration and co-operation managed by the European Community will provide main positive content of the new European security system. An insight of the future of nuclear armaments in Europe is included together with confidence building measure and the role of NATO

  8. Bio Diesel Cellulosic Ethanol Research Project

    Energy Technology Data Exchange (ETDEWEB)

    Hanlon, Edward A. [County of Hendry, FL (United States); Capece, John C. [County of Hendry, FL (United States); McAvoy, Eugene [County of Hendry, FL (United States); Hodges, Alan Wayne [County of Hendry, FL (United States); Shukla, Sanjay [County of Hendry, FL (United States); Ozores-Hamilton, Monica [County of Hendry, FL (United States); Gilbert, Rob [County of Hendry, FL (United States); Wright, Alan [County of Hendry, FL (United States); Baucum, L. [County of Hendry, FL (United States)

    2017-02-07

    The objective of the project is to create the Hendry County Sustainable Biofuels Center and initiate its research, development, and education programs. The mission is to develop engineering and economic assessment methods to evaluate the natural resources impacts of biomass farming and fuel conversion systems; provide sustainability assessments of specific biofuels productions proposals; develop biomass farming and fuel conversion systems that are compatible with south Florida ecosystem restoration priorities; create ecosystem services opportunities and structures to diversify farm income; monitor the range of research and development activities necessary to the creation of sutstainable biofuels production systems in south Florida, identify gaps in the regional research, and assist in the development and coordination of additional projects to fill out the required knowledge base; prepare the workforce of southwest Florida for employment in biofuels related professions; and assist businesses & governmental design and realize sustainable biofuels projects.

  9. Security Technologies for Open Networking Environments (STONE)

    Energy Technology Data Exchange (ETDEWEB)

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi

  10. A flexible privacy enhanced and secured ICT architecture for a smart grid project with active cosumers in the city of Zwolle-NL

    NARCIS (Netherlands)

    Montes Portela, C.; Rooden, H.; Kohlmann, J.; Leersum, van D.; Geldtmeijer, D.A.M.; Slootweg, J.G.; van Eekelen, Marko

    2013-01-01

    This paper presents the ICT architecture for a Smart Grid project with consumer interaction in the city of Zwolle, the Netherlands. It describes the privacy and security enhancing measures applied to ensure a positive sum of necessary functionality and respect for consumer’s privacy and secure

  11. Academic Information Security Researchers: Hackers or Specialists?

    Science.gov (United States)

    Dadkhah, Mehdi; Lagzian, Mohammad; Borchardt, Glenn

    2018-04-01

    In this opinion piece, we present a synopsis of our findings from the last 2 years concerning cyber-attacks on web-based academia. We also present some of problems that we have faced and try to resolve any misunderstandings about our work. We are academic information security specialists, not hackers. Finally, we present a brief overview of our methods for detecting cyber fraud in an attempt to present general guidelines for researchers who would like to continue our work. We believe that our work is necessary for protecting the integrity of scholarly publishing against emerging cybercrime.

  12. The role of research in global food and nutrition security - Discussion paper

    NARCIS (Netherlands)

    Fischler, F.; Wilkinson, D.; Benton, T.; Daniel, H.; Darcy-Vrillon, B.; Hedlund, K.; Heffernan, P.; Kok, E.J.; Saarela, M.; Jakubczyk, E.; Sorlini, C.; Swinnen, J.; Braun, von J.; Ash, K.; Rojas Briales, E.; Buckwell, A.; Frewen, M.; Karlsson, M.

    2015-01-01

    The present discussion document gives an overview of where European research can add the most value in relation to tackling food and nutrition security challenges and points to areas where we can expand our research potential. Moreover, it highlights the need to develop a governance structure that

  13. Tools for Monitoring Social Media: A Marketing Research Project

    Science.gov (United States)

    Veeck, Ann; Hoger, Beth

    2014-01-01

    Knowledge of how to effectively monitor social media is an increasingly valued marketing research skill. This study tests an approach for adding social media content to an undergraduate marketing research class team project. The revised project maintains the expected objectives and parameters of a traditional research project, while integrating…

  14. The Personal Information Security Assistant

    NARCIS (Netherlands)

    Kegel, Roeland Hendrik,Pieter

    The human element is often found to be the weakest link in the information security chain. The Personal Information Security Assistant project aims to address this by improving the privacy and security awareness of end-users and by aligning the user's personal IT environment to the user's security

  15. Needs assessment in health research projects: a new approach to project management in iran.

    Science.gov (United States)

    Peykari, Niloofar; Owlia, Parviz; Malekafzali, Hossein; Ghanei, Mostafa; Babamahmoodi, Abdolreza; Djalalinia, Shirin

    2013-01-01

    The science and technology health plan has defined the outline of health research to the national vision of Iran by 2025. The aim of this study was to focus on the process of needs assessment of health research projects also health research priority setting in Iran. THE PROJECT MANAGEMENT LIFE CYCLE HAS FOUR PHASES: Initiation, Planning, Execution and Closure. Based on abovementioned points we conducted the study. Focusing on the needs assessment led to systematic implementation of needs assessment of health project in all of the medical sciences universities. Parallel with this achieved strategies health research priority setting was followed through specific process from empowerment to implementation. We should adopt with more systematic progressive methods of health project managements for both our national convenience as well as our international health research programs.

  16. The KINDRA H2020 Project: a knowledge inventory for hydrogeology research

    Science.gov (United States)

    Petitta, Marco; Bodo, Balazs; Caschetto, Mariachiara; Correia, Victor; Cseko, Adrienn; Fernandez, Isabel; Hartai, Eva; Hinsby, Klaus; Madarasz, Tamas; Garcia Padilla, Mercedes; Szucs, Peter

    2015-04-01

    Hydrogeology-related research activities cover a wide spectrum of research areas at EU and national levels. This fact is due to the intrinsic nature of the "water" topic, representing a key-aspect of the modern society: water is not only necessary for human, biological and environmental requirements, but it is one basic "engine" of several interconnected research topics, including energy, health, climate, food, security and others as exemplified by the water-food-energy-climate nexus described by e.g. the World Economic Forum. With respect to the water cycle, the management of groundwater brings additional challenges to the implementation of the Water Framework Directive (WFD) and climate change adaptation (such as integrated transboundary management of groundwater resources). This fact is related to the nature of groundwater, which represents the "hidden" part of the water cycle, difficult to evaluate, communicate and appreciate, although it sustains the health of both humans and ecosystems as well as industrial and agricultural production. In general, groundwater has been considered mainly for its relationships with surface waters, influencing river flow, e-flows, GDE (groundwater-dependent ecosystems), pollutant fate, agricultural practices, water scarcity and others. In this framework, the importance of groundwater inside the WFD has been reinforced by the daughter directive on groundwater. In the last years, particular insights have been developed on surface waters/groundwater interactions and several related research projects have been carried out. Nevertheless, a specific focus on hydrogeology, the science branch studying groundwater, has not looked into until now, despite of its utmost importance as renewable, high-quality, naturally protected (but still vulnerable) resource. At the same time the European knowledge-base that has been acquired on this important topic is widespread into several projects, plans, actions, realized at national and fragmented

  17. Methodology of impact assessment of research projects

    International Nuclear Information System (INIS)

    Rodriguez Cardona, R.; Cobas Aranda, M.

    2014-01-01

    In the context of the management of research projects development it is necessary to have tools to monitor and evaluate progress and the performance of the projects, as well as their results and the impact on society (international agencies of the United Nations and the States 2002 and 2005 Paris Declaration), with the objective of to ensure their contribution to the social and economic development of countries. Many organizations, agencies and Governments apply different methodologies (IDB, World Bank, UNDP, ECLAC, UNESCO; UNICEF, Canada, Japan, other) for these purposes. In the results-based project management system not only paramount is the process or product itself, but also the result or impact of the project (if the program/project produced the effects desired persons, households and institutions and whether those effects are attributable to the intervention of the program / project). The work shows a methodology that allows for a qualitative and quantitative evaluation of impact of research projects and has been result of experience in project management of international collaboration with the International Agency for Atomic Energy (IAEA) and the Cuban Nuclear programme. (author)

  18. Impact of a community gardening project on vegetable intake, food security and family relationships: a community-based participatory research study.

    Science.gov (United States)

    Carney, Patricia A; Hamada, Janet L; Rdesinski, Rebecca; Sprager, Lorena; Nichols, Katelyn R; Liu, Betty Y; Pelayo, Joel; Sanchez, Maria Antonia; Shannon, Jacklien

    2012-08-01

    This community-based participatory research project used popular education techniques to support and educate Hispanic farmworker families in planting and maintaining organic gardens. Measures included a pre- post gardening survey, key informant interviews and observations made at community-based gardening meetings to assess food security, safety and family relationships. Thirty-eight families enrolled in the study during the pre-garden time period, and four more families enrolled in the study during the post-garden period, for a total of 42 families enrolled in the 2009 gardening season. Of the families enrolled during the pre-gardening time period there were 163 household members. The mean age of the interviewee was 44.0, ranging from 21 to 78 years of age. The median number of occupants in a household was 4.0 (range: 2-8), Frequency of adult vegetable intake of "Several time a day" increased from 18.2 to 84.8%, (P gardening season, the sum of the frequencies of "Sometimes" and "Frequently" worrying in the past month that food would run out before money was available to buy more was 31.2% and the sum of these frequencies dropped to 3.1% during the post garden period, (P = 0.006). The frequency of skipping meals due to lack of money was not statistically significantly different before and after the gardening season for either adults or children. Analysis of text responses and key informant interviews revealed that physical and mental health benefits were reported as well as economic and family health benefits from the gardening study, primarily because the families often worked in their gardens together. A community gardening program can reduce food insecurity, improve dietary intake and strengthen family relationships.

  19. AMISS - Active and passive MIcrowaves for Security and Subsurface imaging

    Science.gov (United States)

    Soldovieri, Francesco; Slob, Evert; Turk, Ahmet Serdar; Crocco, Lorenzo; Catapano, Ilaria; Di Matteo, Francesca

    2013-04-01

    The FP7-IRSES project AMISS - Active and passive MIcrowaves for Security and Subsurface imaging is based on a well-combined network among research institutions of EU, Associate and Third Countries (National Research Council of Italy - Italy, Technische Universiteit Delft - The Netherlands, Yildiz Technical University - Turkey, Bauman Moscow State Technical University - Russia, Usikov Institute for Radio-physics and Electronics and State Research Centre of Superconductive Radioelectronics "Iceberg" - Ukraine and University of Sao Paulo - Brazil) with the aims of achieving scientific advances in the framework of microwave and millimeter imaging systems and techniques for security and safety social issues. In particular, the involved partners are leaders in the scientific areas of passive and active imaging and are sharing their complementary knowledge to address two main research lines. The first one regards the design, characterization and performance evaluation of new passive and active microwave devices, sensors and measurement set-ups able to mitigate clutter and increase information content. The second line faces the requirements to make State-of-the-Art processing tools compliant with the instrumentations developed in the first line, suitable to work in electromagnetically complex scenarios and able to exploit the unexplored possibilities offered by new instrumentations. The main goals of the project are: 1) Development/improvement and characterization of new sensors and systems for active and passive microwave imaging; 2) Set up, analysis and validation of state of art/novel data processing approach for GPR in critical infrastructure and subsurface imaging; 3) Integration of state of art and novel imaging hardware and characterization approaches to tackle realistic situations in security, safety and subsurface prospecting applications; 4) Development and feasibility study of bio-radar technology (system and data processing) for vital signs detection and

  20. Basic research projects

    International Nuclear Information System (INIS)

    1979-04-01

    The research programs under the cognizance of the Office of Energy Research (OER) are directed toward discovery of natural laws and new knowledge, and to improved understanding of the physical and biological sciences as related to the development, use, and control of energy. The ultimate goal is to develop a scientific underlay for the overall DOE effort and the fundamental principles of natural phenomena so that these phenomena may be understood, and new principles, formulated. The DOE-OER outlay activities include three major programs: High Energy Physics, Nuclear Physics, and Basic Energy Sciences. Taken together, these programs represent some 30 percent of the Nation's Federal support of basic research in the energy sciences. The research activities of OER involve more than 6,000 scientists and engineers working in some 17 major Federal Research Centers and at more than 135 different universities and industrial firms throughout the United States. Contract holders in the areas of high-energy physics, nuclear physics, materials sciences, nuclear science, chemical sciences, engineering, mathematics geosciences, advanced energy projects, and biological energy research are listed. Funding trends for recent years are outlined

  1. Modeling Research Project Risks with Fuzzy Maps

    Science.gov (United States)

    Bodea, Constanta Nicoleta; Dascalu, Mariana Iuliana

    2009-01-01

    The authors propose a risks evaluation model for research projects. The model is based on fuzzy inference. The knowledge base for fuzzy process is built with a causal and cognitive map of risks. The map was especially developed for research projects, taken into account their typical lifecycle. The model was applied to an e-testing research…

  2. SecureCore Software Architecture: Trusted Management Layer (TML) Kernel Extension Module Integration Guide

    National Research Council Canada - National Science Library

    Shifflett, David J; Clark, Paul C; Irvine, Cynthia E; Nguyen, Thuy D; Vidas, Timothy M; Levin, Timothy E

    2007-01-01

    .... The purpose of the SecureCore research project is to investigate fundamental architectural features required for the trusted operation of mobile computing devices such as smart cards, embedded...

  3. SecureCore Software Architecture: Trusted Management Layer (TML) Kernel Extension Module Interface Specification

    National Research Council Canada - National Science Library

    Shifflett, David J; Clark, Paul C; Irvine, Cynthia E; Nguyen, Thuy D; Vidas, Timothy M; Levin, Timothy E

    2008-01-01

    .... The purpose of the SecureCore research project is to investigate fundamental architectural features required for the trusted operation of mobile computing devices such as smart cards, embedded...

  4. 28 CFR 512.20 - Publication of results of research project.

    Science.gov (United States)

    2010-07-01

    ... project. 512.20 Section 512.20 Judicial Administration BUREAU OF PRISONS, DEPARTMENT OF JUSTICE GENERAL MANAGEMENT AND ADMINISTRATION RESEARCH Research § 512.20 Publication of results of research project. (a) A researcher may publish in book form and professional journals the results of any research project conducted...

  5. Secure Environments for Collaboration among Ubiquitous Roaming Entities

    DEFF Research Database (Denmark)

    Jensen, Christian D.

    2002-01-01

    SECURE is a newly started IST project, which addresses secure collaboration among computational entities in emerging global computing systems. The properties of these systems introduce new security challenges that are not adequately addressed by existing security models and mechanisms. The scale ...... and uncertainty of this global computing environment invalidates existing security models. Instead, new security models have to be developed along with new security mechanisms that control access to protected resources.......SECURE is a newly started IST project, which addresses secure collaboration among computational entities in emerging global computing systems. The properties of these systems introduce new security challenges that are not adequately addressed by existing security models and mechanisms. The scale...

  6. Math Fact Strategies Research Project

    Science.gov (United States)

    Boso, Annie

    2011-01-01

    An action research project was conducted in order to determine effective math fact strategies for first graders. The traditional way of teaching math facts included using timed tests and flashcards, with most students counting on their fingers or a number line. Six new research-based strategies were taught and analyzed to decide which methods…

  7. Subjective Security in a Volatile Geopolitical Situation: Does Lithuanian Society Feel Safe?

    Directory of Open Access Journals (Sweden)

    Vileikienė Eglė

    2016-12-01

    Full Text Available The geopolitical situation of Lithuania has deteriorated since the annexation of Crimea and the military conflict in Eastern Ukraine. It has affected the objective security of the state as well as subjective security of the Lithuanian population. This article analyses subjective security and deals with the subjective perception of geopolitical and military threats, mainly social attitudes towards national security and the willingness to defend the country. Article is based on theories of securitisation and human security and holds that individuals are the primary referents of security. Empirically, the article relies on the original data of the research project “Subjective Security in a Volatile Geopolitical Context: Traits, Factors and Individual Strategies”, funded by the Research Council of Lithuania. Article shows the dynamics of social attitudes towards security. Over the last 15 years, a clear shift towards the understanding of potential military threats has occurred. Nevertheless, the predominant concern about individual security, overshadowing security of the state and security of the global order, found in previous studies, has persisted. An individual, as a rule, feels most secure in his/her “closest” environment, e.g. family and friends, and least secure in the “farthest” environment, e.g. other continents.

  8. Twitter, Facebook, and Ten Red Balloons: Social Network Problem Solving and Homeland Security

    OpenAIRE

    Ford, Christopher M.

    2011-01-01

    This article appeared in Homeland Security Affairs (February 2011), v.7 no.1 This essay, the winner of the Center for Homeland Defense and Security (CHDS) Essay Contest in 2010, looks at how homeland security could benefit from crowd-sourced applications accessed through social networking tools such as Twitter and Facebook. Christopher M. Ford looks at the apparent efficacy of two such endeavors: the Defense Advanced Research Projects Agency'۪s (DARPA) competition to find ten 8-foot balloo...

  9. Security on the US Fusion Grid

    Energy Technology Data Exchange (ETDEWEB)

    Burruss, Justin R.; Fredian, Tom W.; Thompson, Mary R.

    2005-06-01

    The National Fusion Collaboratory project is developing and deploying new distributed computing and remote collaboration technologies with the goal of advancing magnetic fusion energy research. This work has led to the development of the US Fusion Grid (FusionGrid), a computational grid composed of collaborative, compute, and data resources from the three large US fusion research facilities and with users both in the US and in Europe. Critical to the development of FusionGrid was the creation and deployment of technologies to ensure security in a heterogeneous environment. These solutions to the problems of authentication, authorization, data transfer, and secure data storage, as well as the lessons learned during the development of these solutions, may be applied outside of FusionGrid and scale to future computing infrastructures such as those for next-generation devices like ITER.

  10. Security on the US Fusion Grid

    International Nuclear Information System (INIS)

    Burruss, Justin R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    The National Fusion Collaboratory project is developing and deploying new distributed computing and remote collaboration technologies with the goal of advancing magnetic fusion energy research. This work has led to the development of the US Fusion Grid (FusionGrid), a computational grid composed of collaborative, compute, and data resources from the three large US fusion research facilities and with users both in the US and in Europe. Critical to the development of FusionGrid was the creation and deployment of technologies to ensure security in a heterogeneous environment. These solutions to the problems of authentication, authorization, data transfer, and secure data storage, as well as the lessons learned during the development of these solutions, may be applied outside of FusionGrid and scale to future computing infrastructures such as those for next-generation devices like ITER

  11. Security on the US fusion grid

    International Nuclear Information System (INIS)

    Burruss, J.R.; Fredian, T.W.; Thompson, M.R.

    2006-01-01

    The National Fusion Collaboratory project is developing and deploying new distributed computing and remote collaboration technologies with the goal of advancing magnetic fusion energy research. This has led to the development of the U.S. fusion grid (FusionGrid), a computational grid composed of collaborative, compute, and data resources from the three large U.S. fusion research facilities and with users both in the U.S. and in Europe. Critical to the development of FusionGrid was the creation and deployment of technologies to ensure security in a heterogeneous environment. These solutions to the problems of authentication, authorization, data transfer, and secure data storage, as well as the lessons learned during the development of these solutions, may be applied outside of FusionGrid and scale to future computing infrastructures such as those for next-generation devices like ITER

  12. Using Project Complexity Determinations to Establish Required Levels of Project Rigor

    Energy Technology Data Exchange (ETDEWEB)

    Andrews, Thomas D.

    2015-10-01

    This presentation discusses the project complexity determination process that was developed by National Security Technologies, LLC, for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office for implementation at the Nevada National Security Site (NNSS). The complexity determination process was developed to address the diversity of NNSS project types, size, and complexity; to fill the need for one procedure but with provision for tailoring the level of rigor to the project type, size, and complexity; and to provide consistent, repeatable, effective application of project management processes across the enterprise; and to achieve higher levels of efficiency in project delivery. These needs are illustrated by the wide diversity of NNSS projects: Defense Experimentation, Global Security, weapons tests, military training areas, sensor development and testing, training in realistic environments, intelligence community support, sensor development, environmental restoration/waste management, and disposal of radioactive waste, among others.

  13. Overview of research in the ADVANTAGE project

    DEFF Research Database (Denmark)

    Angjelichinoski, Marko; Cosovic, Mirsad; Kalalas, Charalampos

    2016-01-01

    The European Marie Curie Project ADVANTAGE (Advanced Communications and Information processing in smart grid systems) was launched in 2014. It represents a major inter-disciplinary research project into the topic of Smart Grid technology. A key aspect of the project is to bring together and train...

  14. Basic Project Management Methodologies for Survey Researchers.

    Science.gov (United States)

    Beach, Robert H.

    To be effective, project management requires a heavy dependence on the document, list, and computational capability of a computerized environment. Now that microcomputers are readily available, only the rediscovery of classic project management methodology is required for improved resource allocation in small research projects. This paper provides…

  15. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  16. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  17. New York State Energy Research and Development Authority. Research projects` update project status as of March 31, 1997

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-07-01

    This report provides an update of the New York State Energy Research and Development Authority (NYSERDA) program. The NYSERDA research and development program has five major areas: industry, buildings, energy resources, transportation, and environment. NYSERDA organizes projects within these five major areas based on energy use and supply, and end-use sectors. Therefore, issues such as waste management, energy products and renewable energy technologies are addressed in several areas of the program. The project descriptions presented are organized within the five program areas. Descriptions of projects completed between the period April 1, 1996, and March 31, 1997, including technology-transfer activities, are at the end of each subprogram section.

  18. Simple Tools to Facilitate Project Management of a Nursing Research Project.

    Science.gov (United States)

    Aycock, Dawn M; Clark, Patricia C; Thomas-Seaton, LaTeshia; Lee, Shih-Yu; Moloney, Margaret

    2016-07-01

    Highly organized project management facilitates rigorous study implementation. Research involves gathering large amounts of information that can be overwhelming when organizational strategies are not used. We describe a variety of project management and organizational tools used in different studies that may be particularly useful for novice researchers. The studies were a multisite study of caregivers of stroke survivors, an Internet-based diary study of women with migraines, and a pilot study testing a sleep intervention in mothers of low-birth-weight infants. Project management tools were used to facilitate enrollment, data collection, and access to results. The tools included protocol and eligibility checklists, event calendars, screening and enrollment logs, instrument scoring tables, and data summary sheets. These tools created efficiency, promoted a positive image, minimized errors, and provided researchers with a sense of control. For the studies described, there were no protocol violations, there were minimal missing data, and the integrity of data collection was maintained. © The Author(s) 2016.

  19. Introduction to Hardware Security

    Directory of Open Access Journals (Sweden)

    Yier Jin

    2015-10-01

    Full Text Available Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain and to help both academia and industry investigate countermeasures and solutions to solve hardware security problems, we will introduce the key concepts of hardware security as well as its relations to related research topics in this survey paper. Emerging hardware security topics will also be clearly depicted through which the future trend will be elaborated, making this survey paper a good reference for the continuing research efforts in this area.

  20. The Saskatchewan River Basin - a large scale observatory for water security research (Invited)

    Science.gov (United States)

    Wheater, H. S.

    2013-12-01

    multiple jurisdictions. The SaskRB has therefore been developed as a large scale observatory, now a Regional Hydroclimate Project of the World Climate Research Programme's GEWEX project, and is available to contribute to the emerging North American Water Program. State-of-the-art hydro-ecological experimental sites have been developed for the key biomes, and a river and lake biogeochemical research facility, focussed on impacts of nutrients and exotic chemicals. Data are integrated at SaskRB scale to support the development of improved large scale climate and hydrological modelling products, the development of DSS systems for local, provincial and basin-scale management, and the development of related social science research, engaging stakeholders in the research and exploring their values and priorities for water security. The observatory provides multiple scales of observation and modelling required to develop: a) new climate, hydrological and ecological science and modelling tools to address environmental change in key environments, and their integrated effects and feedbacks at large catchment scale, b) new tools needed to support river basin management under uncertainty, including anthropogenic controls on land and water management and c) the place-based focus for the development of new transdisciplinary science.

  1. Notification: Follow-up Review of EPA’s Classification of National Security Information

    Science.gov (United States)

    Project #OPE-FY15-0057, July 20, 2015. The EPA OIG plans to begin preliminary research on the OARM actions taken to improve policies and procedures related to the classification of national security information.

  2. Understanding the selection processes of public research projects

    NARCIS (Netherlands)

    Materia, V.C.; Pascucci, S.; Kolympiris, C.

    2015-01-01

    This paper analyses factors that affect the funding of agricultural research projects by regional governments and other regional public authorities. We study the selection process of agricultural research projects funded by the emilia Romagna regional government in Italy, which follows funding

  3. Policy Paper 39: Power and Prosperity: Linkages Between Security and Economics in U.S-Japanese Relations Since 1960

    OpenAIRE

    Wampler, Robert A.

    1998-01-01

    How do Japan and the United States fit into each other’s grand strategies? A grand strategy is one that relates means and ends, resources and objectives, economics and national security. The National Security Archive’s Project on U.S.–Japanese Relations Since 1960 is probing these issues through a major program of research and study into policymaking by both governments across a wide spectrum of diplomatic, security, and economic issues. This project has brought together scholars and of...

  4. Regional Integrated Tenets to Reinforce the Safety and Security of Radioactive Sources (ClearZone)

    International Nuclear Information System (INIS)

    Salzer, P.

    2003-01-01

    The EURATOM Research and Training Programme on Nuclear Energy includes 2 main fields - fusion energy research and management of radioactive waste, radiation protection and other activities of nuclear technology and safety.Seven instruments (mechanisms) for projects management are used - 'Network of Excellence' (NOE); 'Integrated Project' (IP); 'Specific Targeted Research Project' or 'Specific Targeted Training Project' (STREP); 'Co-ordination Action' (CA); Actions to Promote and Develop Human Resources and Mobility Specific Support Actions; Integrated Infrastructure Initiatives. Two consecutive sub-projects are proposed: 'small' - countries of the Visegrad four + Austrian participant -within the 6th FP 'Specific Supported Actions' and 'large' - participation of more countries in the region - more oriented to practical implementation of the 'small' project findings - intention to use the 6th Framework Programme resources to co-financing the implementation activities. The main objectives are: to create effective lines of defense (prevention -detection - categorization - transport - storage) against malicious use of radioactive sources; to achieve and maintain a high level of safety and security of radioactive sources; to arise the radioactive sources management safety and security culture at the Central European region. Consortium of 11 organisations from Czech Republic, Slovak Republic, Austria, Hungary and Poland is established for the Project implementation. The Project task are grouped in the following areas: legislation, infrastructure, practices; metallurgical industry, cross border control; instrumentation and metrology; information system

  5. Security and dependability for Ambient Intelligence: Informative but busy

    NARCIS (Netherlands)

    Law, Y.W.; Havinga, Paul J.M.

    2011-01-01

    The edited volume “Security and Dependability for Ambient Intelligence‿ is a comprehensive compilation of the research outcomes of the 3 year-long 7.8 million Euro European Framework Programme 6 project SERENITY (FP6-IST-2006-27587). At a time when Stuxnet and large scale data breaches at

  6. Evolution of project management research: a bibliometric study of International Journal of Project Management

    Directory of Open Access Journals (Sweden)

    Fábio Cocchi da Silva Eiras

    2017-03-01

    Full Text Available Over the past decades, the project management field has evolved and consolidated. Facing this growth, this research aims to identify the main trends of research in the area, as well as providing an overview of publications, identifying new issues, changes in approaches and the development of knowledge areas. To do so, a systematic review of the literature was performed with the use of bibliometric study in the papers of the International Journal of Project Management (IJPM, included in SCOPUS, from its first volume to 2015, covering a period of more than 30 years. It was found that developing countries are increasingly concerned in developing research into the field of project management, especially in mega infrastructure projects and public-private partnerships. The risk is a central topic in all periods of analysis, however, the strategic topics such as success in project and portfolio management are among the fastest growing. Issues related to the soft side of project management as skills, culture, and knowledge management have emerged in recent periods. According to the industry, construction projects and projects in information technology are the most studied along the period analysed.

  7. A ProCoS II Project Final Report: ESPRIT Basic Research project 707

    DEFF Research Database (Denmark)

    Bowen, J. P.; Hoare, C. A. R.; Langmaack, Hans

    1996-01-01

    An overview of the research and associated activities of the Europeancollaborative ESPRIT Basic Research ProCoS II project (no. 7071) on``Provably Correct Systems'' which ran from 1992 to 1995 is presented.This was a follow-on project to ProCoS (no. 3104) and ran inparallel with the ProCoS Working...

  8. A Qualitative Meta-Analysis of the Diffusion of Mandated and Subsidized Technology: United States Energy Security and Independence

    Science.gov (United States)

    Noah, Philip D., Jr.

    2013-01-01

    The purpose of this research project was to explore what the core factors are that play a role in the development of the smart-grid. This research study examined The Energy Independence and Security Act (EISA) of 2007 as it pertains to the smart-grid, the economic and security effects of the smart grid, and key factors for its success. The…

  9. The Research of Stakeholder Power Impact on Project Implementation

    Directory of Open Access Journals (Sweden)

    Artur Biskupek

    2016-12-01

    Full Text Available Purpose of the article: The article show summarized information about stakeholders and their role in project implementation based on literature review. The second part of the article is dedicated for the research about stakeholder influence on project implementation. The only condition to participate in the survey was managing projects. Although the respondents are employed in the area of south Poland, they implement projects all over Poland. The research tool was a questionnaire which was sent by e-mail to the respondents. 90 project managers from the area of south Poland were invited to join the project, and 62 people sent back a completed questionnaire. Methodology/methods: The research was done by a questionnaire with twenty two question, which was divided into three parts. The first part was the imprint, which consisted of three questions. The second part consisted of two questions, which concerned the way of defining the word “stakeholder”. The third part concerned the topic of the research and consisted of seventeen questions. Scientific aim: The aim of the article is presenting the results of the research which was done, to show the research results of project stakeholder influence on the project implementation. Findings: The results received from the survey in the process of analysis and interpretation allow to put forward a thesis that stakeholders as a whole group are significant for the implementation of the whole project. Their impact is so important that it is possible to tell that they decide also about the project success or failure. Conclusions: The respondents show that stakeholders affect every area in large extent or very big extent. The fact has been proved in table 1 which shows the most frequently chosen answers by responders. However, by conducted analysis by the standard deviation it is possible to see a large dispersion of the results.

  10. Computer Security: Competing Concepts

    OpenAIRE

    Nissenbaum, Helen; Friedman, Batya; Felten, Edward

    2001-01-01

    This paper focuses on a tension we discovered in the philosophical part of our multidisciplinary project on values in web-browser security. Our project draws on the methods and perspectives of empirical social science, computer science, and philosophy to identify values embodied in existing web-browser security and also to prescribe changes to existing systems (in particular, Mozilla) so that values relevant to web-browser systems are better served than presently they are. The tension, which ...

  11. Privacy and Security Research Group workshop on network and distributed system security: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    1993-05-01

    This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System. Selected papers were processed separately for inclusion in the Energy Science and Technology Database.

  12. An Overview of Computer Network security and Research Technology

    OpenAIRE

    Rathore, Vandana

    2016-01-01

    The rapid development in the field of computer networks and systems brings both convenience and security threats for users. Security threats include network security and data security. Network security refers to the reliability, confidentiality, integrity and availability of the information in the system. The main objective of network security is to maintain the authenticity, integrity, confidentiality, availability of the network. This paper introduces the details of the technologies used in...

  13. AVST Morphing Project Research Summaries in Fiscal Year 2001

    Science.gov (United States)

    McGowan, Anna-Maria R.

    2002-01-01

    The Morphing project at the National Aeronautics and Space Agency's Langley Research Center is part of the Aerospace Vehicle Systems Program Office that conducts fundamental research on advanced technologies for future flight vehicles. The objectives of the Morphing project are to develop and assess advanced technologies and integrated component concepts to enable efficient, multi-point adaptability in air and space vehicles. In the context of the project, the word "morphing" is defined as "efficient, multi-point adaptability" and may include micro or macro, structural or fluidic approaches. The current document on the Morphing project is a compilation of research summaries and other information on the project from fiscal year 2001. The focus of this document is to provide a brief overview of the project content, technical results and lessons learned from fiscal year 2001.

  14. Watchdog Project

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Rhett [Schweitzer Engineering Laboratories, Inc., Pullman, WA (United States); Campbell, Jack [CenterPoint Energy Houston Electric, TX (United States); Hadley, Mark [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-12-30

    The Watchdog Project completed 100% of the project Statement of Project Objective (SOPO). The Watchdog project was a very aggressive project looking to accomplish commercialization of technology that had never been commercialized, as a result it took six years to complete not the original three that were planned. No additional federal funds were requested from the original proposal and SEL contributed the additional cost share required to complete the project. The result of the Watchdog Project is the world’s first industrial rated Software Defined Network (SDN) switch commercially available. This technology achieved the SOPOO and DOE Roadmap goals to have strong network access control, improve reliability and network performance, and give the asset owner the ability to minimize attack surface before and during an attack. The Watchdog project is an alliance between CenterPoint Energy Houston Electric, Pacific Northwest National Laboratories (PNNL), and Schweitzer Engineering Laboratories, Inc. (SEL). SEL is the world’s leader in microprocessor-based electronic equipment for protecting electric power systems. PNNL performs basic and applied research to deliver energy, environmental, and national security for our nation. CenterPoint Energy is the third largest publicly traded natural gas delivery company in the U.S and third largest combined electricity and natural gas delivery company. The Watchdog Project efforts were combined with the SDN Project efforts to produce the entire SDN system solution for the critical infrastructure. The Watchdog project addresses Topic Area of Interest 5: Secure Communications, for the DEFOA- 0000359 by protecting the control system local area network itself and the communications coming from and going to the electronic devices on the local network. Local area networks usually are not routed and have little or no filtering capabilities. Combine this with the fact control system protocols are designed with inherent trust the control

  15. Poverty Mapping Project: Poverty and Food Security Case Studies

    Data.gov (United States)

    National Aeronautics and Space Administration — The Poverty and Food Security Case Studies dataset consists of small area estimates of poverty, inequality, food security and related measures for subnational...

  16. All projects related to | Page 85 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Project. This multinational study analyzes the career decisions and research ... Building successful fishing and aquaculture businesses in the Bolivian Amazon ... Topic: Food security, FISHERY MANAGEMENT, PRIVATE SECTOR, WOMEN ...

  17. Study for Action Plan proposal on some issues of the national nuclear infrastructure for the new research reactor project in phase 1&2

    International Nuclear Information System (INIS)

    Cao Hong Lan; Bui Dang Hanh; Nguyen Nhi Dien

    2017-01-01

    The Project on construction for a new research reactor in Vietnam is under preparation. At the same time, it is necessary to prepare a firm and comprehensive national nuclear infrastructure which is aimed to implement smoothly and ensure safety and security for the project. How is the status of the nuclear infrastructure for research reactor project in Vietnam, how can it be assessed, what is the assessment used for and what are we going to do with that? So, all of these things are the goals set out to address in this Task. However, due to time constraints and conformity with requirement of project progress, this Task assessed only 8 critical issues in infrastructure in phase 1&2, including National position; Management; Legislative framework; Regulatory framework; Human resource development; Radioactive waste; Site survey, site selection and evaluation; and Environmental protection. Conditions and criteria in the documents on milestones and assessment of the national nuclear infrastructure to support a new research reactor project of the International Atomic Energy Agency (IAEA) were used as bases for assessing the Vietnam's infrastructure status. The results of the Task are assessment and identification for gaps which need to be addressed and proposing for a plan on completing the national nuclear infrastructure for the research reactor project on 8 issues in stages 1&2. (author)

  18. Managing environmental enhancement plans for individual research projects at a national primate research center.

    Science.gov (United States)

    Thom, Jinhee P; Crockett, Carolyn M

    2008-05-01

    We describe a method for managing environmental enhancement plans for individual research projects at a national primate research center where most monkeys are assigned to active research projects. The Psychological Well-being Program (PWB) at the University of Washington National Primate Research Center developed an Environmental Enhancement Plan form (EEPL) that allows PWB to quantify and track changes in enrichment allowances over time while ensuring that each animal is provided with as much enrichment as possible without compromising research. Very few projects involve restrictions on toys or perches. Some projects have restrictions on food treats and foraging, primarily involving the provision of these enrichments by research staff instead of husbandry staff. Restrictions are not considered exemptions unless they entirely prohibit an element of the University of Washington Environmental Enhancement Plan (UW EE Plan). All exemptions must be formally reviewed and approved by the institutional animal care and use committee. Most exemptions from elements of the UW EE Plan involve social housing. Between 2004 and 2006, the percentage of projects with no social contact restrictions increased by 1%, but those prohibiting any tactile social contact declined by 7%, and projects permitting tactile social contact during part of the study increased by 9%. The EEPL form has facilitated informing investigators about the enrichment their monkeys will receive if no restrictions or exemptions are requested and approved. The EEPL form also greatly enhances PWB's ability to coordinate the specific enrichment requirements of a project.

  19. All projects related to | Page 154 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2013-01-16

    This research project will help the Sri Lanka-based Social Scientists' Association (SSA) contribute to Phase II of the State of Democracy and Human Security in South Asia (SDSA) project. Start Date: January 16, 2013. End Date: August 5, 2014. Topic: SOCIAL CONFLICTS, Governance, PEACE KEEPING, SAFETY, ETHNIC ...

  20. Risk Based Security Management at Research Reactors

    Energy Technology Data Exchange (ETDEWEB)

    Ek, David R. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)

    2015-09-01

    This presentation provides a background of what led to the international emphasis on nuclear security and describes how nuclear security is effectively implemented so as to preserve the societal benefits of nuclear and radioactive materials.

  1. Advanced Energy Projects FY 1990 research summaries

    International Nuclear Information System (INIS)

    1990-09-01

    This report serves as a guide to prepare proposals and provides summaries of the research projects active in FY 1990, sponsored by the Office of Basic Energy Sciences Division of Advanced Energy Projects, Department of Energy. (JF)

  2. 7 CFR 932.45 - Production research and marketing research and development projects.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Production research and marketing research and....45 Production research and marketing research and development projects. (a) The following activities... Secretary, establish or provide for the establishment of production research, and marketing research and...

  3. Control and Non-Payload Communications (CNPC) Prototype Radio - Generation 2 Security Flight Test Report

    Science.gov (United States)

    Iannicca, Dennis C.; Ishac, Joseph A.; Shalkhauser, Kurt A.

    2015-01-01

    NASA Glenn Research Center (GRC), in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the Federal Aviation Administration (FAA) and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the GRC prototype CNPC architecture as a demonstration platform. The proposed security controls were integrated into the GRC flight test system aboard our S-3B Viking surrogate aircraft and several network tests were conducted during a flight on November 15th, 2014 to determine whether the controls were working properly within the flight environment. The flight test was also the first to integrate Robust Header Compression (ROHC) as a means of reducing the additional overhead introduced by the security controls and Mobile IPv6. The effort demonstrated the complete end-to-end secure CNPC link in a relevant flight environment.

  4. STUK research projects 1998-2000; Saeteilyturvakeskuksen tutkimushankkeet 1998-2000

    Energy Technology Data Exchange (ETDEWEB)

    Salomaa, S; Eloranta, E; Heimbuerger, H; Jokela, K; Jaervinen, H

    1998-07-01

    The primary goal of STUK, the Finnish Radiation and Nuclear Safety Authority, is to prevent and limit the harmful effects of radiation. The research conducted by STUK yields new information related to the use, occurrence and effects of radiation and promotes the supervision of nuclear safety. STUK research projects 1998 - 2000 summarizes STUK`s own research projects and commissioned research designed to promote the supervision of nuclear safety. Information on the research projects and related publications is also available on STUK`s WWW pages at www.stuk.fi. The work done on the safe use of nuclear power and nuclear waste management mainly comprises commissioned research projects which derive from the needs of authorities, and are funded and directed by STUK. This research is conducted by organizations outside STUK, but supervised by STUK experts. In some cases, STUK personnel are also involved. The goal of this research work is to produce the information needed for decision-making, to develop supervisory methods and to ensure that recent developments in science and technology are taken into account in action to promote safe use of nuclear power. STUK`s own research focuses on radiation protection and the health effects of radiation. During 1998 - 2000, the main emphasis will be on projects supporting the Finnish national environmental health action plan, the health risks of radiation, emergency preparedness and cooperation with neighbouring CEE areas. EU directives on radiation protection and medical exposure to radiation also influence the course taken by research carried out at STUK. STUK`s research activities are now more international than ever; the institute is involved in more then 20 research projects funded by EU. Apart from the EU and the Nordic countries, STUK`s main partners are to be found in Russia, Estonia and the USA. (orig.)

  5. Introduction: Situation Awareness, Systems of Systems, and Maritime Safety and Security

    NARCIS (Netherlands)

    Tretmans, G.J.; Laar, P.J.L.J. van de

    2013-01-01

    This book presents and discusses various challenges and solutions for developing systems-of-systems for attaining situation awareness, with applications in the domain of maritime safety and security. This chapter introduces the book, describes the Dutch research project Poseidon from which it

  6. Research Applications for Teaching (RAFT) Project. Final Report.

    Science.gov (United States)

    Thomson, James R., Jr.; Handley, Herbert M.

    A report is given of the development and progress of the Research Applications for Teaching (RAFT) project, developed at Mississippi State University. Based upon research findings relative to effective teaching and effective schooling, five curriculum modules were prepared and implemented in instruction. In the second year of the project the…

  7. Defining and implementing a model for pharmacy resident research projects

    Directory of Open Access Journals (Sweden)

    Dick TB

    2015-09-01

    Full Text Available Objective: To describe a standard approach to provide a support structure for pharmacy resident research that emphasizes self-identification of a residency research project. Methods: A subcommittee of the residency advisory committee was formed at our institution. The committee was initially comprised of 2 clinical pharmacy specialists, 1 drug information pharmacist, and 2 pharmacy administrators. The committee developed research guidelines that are distributed to residents prior to the residency start that detail the research process, important deadlines, and available resources. Instructions for institutional review board (IRB training and deadlines for various assignments and presentations throughout the residency year are clearly defined. Residents conceive their own research project and emphasis is placed on completing assignments early in the residency year. Results: In the 4 years this research process has been in place, 15 of 16 (94% residents successfully identified their own research question. All 15 residents submitted a complete research protocol to the IRB by the August deadline. Four residents have presented the results of their research at multi-disciplinary national professional meetings and 1 has published a manuscript. Feedback from outgoing residents has been positive overall and their perceptions of their research projects and the process are positive. Conclusion: Pharmacy residents selecting their own research projects for their residency year is a feasible alternative to assigning or providing lists of research projects from which to select a project.

  8. Food Security, Fisheries and Aquaculture in the Bolivian Amazon ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Indigenous communities involved in fisheries and aquaculture are among the most food insecure in the Bolivian Amazon. Although fish could be the main source of protein, it is often not part of the local diet. This project - supported by the Canadian International Food Security Research Fund (CIFSRF), a joint program of ...

  9. Advanced Energy Projects: FY 1993, Research summaries

    Energy Technology Data Exchange (ETDEWEB)

    1993-09-01

    AEP has been supporting research on novel materials for energy technology, renewable and biodegradable materials, new uses for scientific discoveries, alternate pathways to energy efficiency, alternative energy sources, innovative approaches to waste treatment and reduction, etc. The summaries are grouped according to projects active in FY 1993, Phase I SBIR projects, and Phase II SBIR projects. Investigator and institutional indexes are included.

  10. Advanced Energy Projects: FY 1993, Research summaries

    International Nuclear Information System (INIS)

    1993-09-01

    AEP has been supporting research on novel materials for energy technology, renewable and biodegradable materials, new uses for scientific discoveries, alternate pathways to energy efficiency, alternative energy sources, innovative approaches to waste treatment and reduction, etc. The summaries are grouped according to projects active in FY 1993, Phase I SBIR projects, and Phase II SBIR projects. Investigator and institutional indexes are included

  11. Research from Afar: Considerations for Conducting an Off-Site Research Project.

    Science.gov (United States)

    Williams, Reg Arthur; Hagerty, Bonnie M.; Hoyle, Kenneth; Yousha, Steven M.; Abdoo, Yvonne; Andersen, Curt; Engler, Dorothy

    1999-01-01

    Critical elements in the success of off-site research projects include the following: negotiation, attention to personnel issues, communication, participation of research subjects, data management, and concern for privacy issues. (SK)

  12. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  13. Data security on the national fusion grid

    Energy Technology Data Exchange (ETDEWEB)

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-06-01

    The National Fusion Collaboratory project is developing and deploying new distributed computing and remote collaboration technologies with the goal of advancing magnetic fusion energy research. This work has led to the development of the US Fusion Grid (FusionGrid), a computational grid composed of collaborative, compute, and data resources from the three large US fusion research facilities and with users both in the US and in Europe. Critical to the development of FusionGrid was the creation and deployment of technologies to ensure security in a heterogeneous environment. These solutions to the problems of authentication, authorization, data transfer, and secure data storage, as well as the lessons learned during the development of these solutions, may be applied outside of FusionGrid and scale to future computing infrastructures such as those for next-generation devices like ITER.

  14. Data security on the national fusion grid

    International Nuclear Information System (INIS)

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    The National Fusion Collaboratory project is developing and deploying new distributed computing and remote collaboration technologies with the goal of advancing magnetic fusion energy research. This work has led to the development of the US Fusion Grid (FusionGrid), a computational grid composed of collaborative, compute, and data resources from the three large US fusion research facilities and with users both in the US and in Europe. Critical to the development of FusionGrid was the creation and deployment of technologies to ensure security in a heterogeneous environment. These solutions to the problems of authentication, authorization, data transfer, and secure data storage, as well as the lessons learned during the development of these solutions, may be applied outside of FusionGrid and scale to future computing infrastructures such as those for next-generation devices like ITER

  15. Advanced energy projects: FY 1987 research summaries

    International Nuclear Information System (INIS)

    1987-09-01

    This report contains brief summaries of all projects active in the Division of Advanced Energy Projects during Fiscal Year 1987 (October 1, 1986-September 30, 1987). The intent of this compilation is to provide a convenient means for quickly acquainting an interested reader with the program in Advanced Energy Projects. More detailed information on research activities in a particular project may be obtained by contacting directly the principal investigator. Some projects will have reached the end of their contract periods by the time this book appears, and will, therefore, no longer be active. Those cases in which work was completed in FY '87 are indicated by the footnote: Project completed. The annual funding level of each project is shown

  16. Dynamics and structure of project performers of the «Federal target program for research and development in priority areas of development of the Russian scientific and technological complex for 2014–2020»

    Directory of Open Access Journals (Sweden)

    I. N. Chernova

    2017-01-01

    Full Text Available The article considers socio-demographic issues of research and development of the «Federal Target Program for Research and Development in Priority Areas of Development of the Russian Scientific and Technological Complex for 2014–2020». Analysis based on project's documents in the Program from 2014 to 2016. We studied the dynamics in both quantitative and qualitative characteristics of project performers – applied research and experimental development, and defined trends of project R&D personnel changes, including sociodemographic characteristics: age, size and composition of performers, the proportion of researchers with academic degree, and the proportion of women-researchers. In the article it is shown that specialists under 40 years of age are the largest part of project performers. The renewal of project personnel in time of projects is 65 percent. In the article it is also shown a strong correlation between project academic personnel and academic personnel of Russia as a whole. We devised proposals for tracking quantitative and qualitative parameters of project performers and for securing growth the skill level of young specialists in projects.

  17. Unobtrusive Multimodal Biometric Authentication: The HUMABIO Project Concept

    Directory of Open Access Journals (Sweden)

    Evangelos Bekiaris

    2008-03-01

    Full Text Available Human Monitoring and Authentication using Biodynamic Indicators and Behavioural Analysis (HUMABIO (2007 is an EU Specific Targeted Research Project (STREP where new types of biometrics are combined with state of the art sensorial technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system which utilizes a biodynamic physiological profile, unique for each individual, and advancements of the state-of-the art in behavioural and other biometrics, such as face, speech, gait recognition, and seat-based anthropometrics. Several shortcomings in biometric authentication will be addressed in the course of HUMABIO which will provide the basis for improving existing sensors, develop new algorithms, and design applications, towards creating new, unobtrusive biometric authentication procedures in security sensitive, controlled environments. This paper presents the concept of this project, describes its unobtrusive authentication demonstrator, and reports some preliminary results.

  18. Cultural differences in Research project management

    Science.gov (United States)

    Barbier, Michele

    2016-04-01

    Scientific Projects today have increased in complexity, requiring multidisciplinarity, and requiring a mix of diverse individuals from different countries who must be integrated into an effective project. Effective team building is one of the prime responsibilities of the project manager. When the project is supported by a funding, the integration and the implication of the different partners are quite easy. Particularly when partners are developing high-performing teams. However, management of research project requires further skills when the budget is not very high and/or when partners are from non-European countries and are not using the same vocabulary. The various cultures, values, beliefs and social usages, particularly with Mediterranean countries cause a special style of communication for an individual or group of individuals. This communication style participates in the success of the project and encompasses a lot of diplomatic skills which will be highlighted.

  19. Research on information security in big data era

    Science.gov (United States)

    Zhou, Linqi; Gu, Weihong; Huang, Cheng; Huang, Aijun; Bai, Yongbin

    2018-05-01

    Big data is becoming another hotspot in the field of information technology after the cloud computing and the Internet of Things. However, the existing information security methods can no longer meet the information security requirements in the era of big data. This paper analyzes the challenges and a cause of data security brought by big data, discusses the development trend of network attacks under the background of big data, and puts forward my own opinions on the development of security defense in technology, strategy and product.

  20. View all projects | Page 2 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    You are looking at projects supported by Canadian International Food Security Research Fund. ... (Cusco and Cajamarca) known for their high biodiversity and active farmers' associations. ... Obesity rates are on the rise in the Caribbean.

  1. Security issues in healthcare applications using wireless medical sensor networks: a survey.

    Science.gov (United States)

    Kumar, Pardeep; Lee, Hoon-Jae

    2012-01-01

    Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs.

  2. Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Hoon-Jae Lee

    2011-12-01

    Full Text Available Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs. Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs.

  3. CERN to offer secure grid, published in itWorldCanada

    CERN Multimedia

    Broersma, Matthew

    2006-01-01

    CERN, the Geneva-based nuclear physics research center, has launched a collaborative effort with some of the biggest name in IT to tighten up security on its landmark Large Hadron Collider (LHC) project, as well as working on platform virtualization and the interoperability of grid software (1 page)

  4. eDOC: A collaboration infrastructure to manage knowledge and information on nuclear projects and research activities

    International Nuclear Information System (INIS)

    Van Craeynest, J.M.; Jacquemet, F.; Chermette, D.; Bonneau, S.

    2004-01-01

    After a brief recall of Knowledge Management issues and of the MKSM knowledge modelling method developed and used by the CEA, this paper focuses on the eDOC web collaboration platform designed to support a large range of cross-collaboration needs and a large spectrum of community types (from small units to large European Networks of Excellence). Online community members have different needs : knowing other members and their roles, accessing to reference information and documents, reviewing, annotating and publishing documents or sending information to all or part of members, being informed of events, scheduling shared jobs and manage tasks, discuss some questions using forums, etc. They also want to develop a common identity and portal look and structure customizations are very useful for that purpose. The Information System Department of the CEA has launched the eDOC project to supply a rapid demand growth for those tools. In the CEA, this demand is due to the growing importance and number of internal and external cross-collaborations and alliances with industrial and research partners. After a systematic evaluation campaign of both proprietary and open-source solutions, and after having defined the most pragmatic deployment strategy, we have chosen the Collaborative Portal Server (CPS) edited by Nuxeo. CPS is based on the Zope open-source object-oriented application server. Then we invested to improve functionalities and performances of CPS but also to design and implement a security policy adapted to different types of security requirements and information privacy levels. The eDOC web collaboration infrastructure is now used by 50 projects and this number keeps increasing. The main uses are internal documents repositories (to simplify classical 'Intranet' building and maintaining process) and information repositories (including documents but also events, news, calendar, conferences, etc.) for external collaborations. The 6th European research framework program

  5. Cross-disciplinary, authentic student research projects

    NARCIS (Netherlands)

    Heck, A.; Uylings, P.; Kędzierska, E.; Ellermeijer, T.

    2010-01-01

    In the Dutch secondary education system, students must carry out at the end of their school career a rather large research or design project to demonstrate their ability to apply acquired knowledge and skills while pursuing a research question or design goal in some depth. They are encouraged to

  6. Cloud Security: Issues and Research Directions

    Science.gov (United States)

    2014-11-18

    4. Cloud Computing Security: What Changes with Software - Defined Networking ? Maur´ıcio Tsugawa, Andr´ea Matsunaga, and Jos´e A. B. Fortes 5...machine’s memory from an untrusted or malicious hypervisor. In Chapter 4, Tsugawa et al. discuss the security issues introduced when Software - Defined ... Networking ( SDN ) is deployed within and across clouds. Chapters 5-9 are focused on the protection of data stored in the cloud. In Chapter 5, Wang et

  7. Research projects in family medicine funded by the European Union.

    Science.gov (United States)

    Pavličević, Ivančica; Barać, Lana

    2014-01-01

    This study aimed at synthesizing funding opportunities in the field of family medicine by determining the number of family medicine projects, as well as number of project leaderships and/ or participations by each country. This was done in order to encourage inclusion of physicians in countries with underdeveloped research networks in successful research networks or to encourage them to form new ones. We searched the Community Research and Development Information Service project database in February 2013. Study covered the period from years 1992 - 2012, selecting the projects within the field of general/family medicine. The search was conducted in February 2013. First search conducted in the CORDIS database came up with a total of 466 projects. After excluding 241 projects with insufficient data, we analysed 225 remaining projects; out of those, 22 (9.8%) were in the field of family medicine and 203 (90.2%) were from other fields of medicine. Sorted by the number of projects per country, Dutch institutions had the highest involvement in family medicine projects and were partners or coordinators in 18 out of 22 selected projects (81.8%), followed by British institutions with 15 (68.8%), and Spanish with 10 projects (45.5%). Croatia was a partner in a single FP7 Health project. Research projects in family medicine funded by the European Union show significant differences between countries. Constant and high-quality international cooperation in family medicine is the prerequisite for improvement and development of scientific research and the profession. Copyright © 2014 by Academy of Sciences and Arts of Bosnia and Herzegovina.

  8. Development and verification of remote research environment based on 'Fusion research grid'

    International Nuclear Information System (INIS)

    Iba, Katsuyuki; Ozeki, Takahisa; Totsuka, Toshiyuki; Suzuki, Yoshio; Oshima, Takayuki; Sakata, Shinya; Sato, Minoru; Suzuki, Mitsuhiro; Hamamatsu, Kiyotaka; Kiyono, Kimihiro

    2008-01-01

    'Fusion research grid' is a concept that unites scientists and let them collaborate effectively against their difference in time zone and location in a nuclear fusion research. Fundamental technologies of 'Fusion research grid' have been developed at JAEA in the VizGrid project under the e-Japan project at the Ministry of Education, Culture, Sports, Science and Technology (MEXT). We are conscious of needs to create new systems that assist researchers with their research activities because remote collaborations have been increasing in international projects. Therefore we have developed prototype remote research environments for experiments, diagnostics, analyses and communications based on 'Fusion research grid'. All users can access these environments from anywhere because 'Fusion research grid' does not require a closed network like Super SINET to maintain security. The prototype systems were verified in experiments at JT-60U and their availability was confirmed

  9. Laboratory technology research: Abstracts of FY 1998 projects

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-11-01

    The Laboratory Technology Research (LTR) program supports high-risk, multidisciplinary research partnerships to investigate challenging scientific problems whose solutions have promising commercial potential. These partnerships capitalize on two great strengths of the country: the world-class basic research capability of the DOE Office of Science (SC) national laboratories and the unparalleled entrepreneurial spirit of American industry. Projects supported by the LTR program in FY 1998 explore the applications of basic research advances relevant to DOE`s mission over a full range of scientific disciplines. The program presently emphasizes three critical areas of mission-related research: advanced materials, intelligent processing and manufacturing research, and environmental and biomedical research. Abstracts for 85 projects are contained in this report.

  10. Synthesized research report in the second mid-term research phase. Mizunami Underground Research Laboratory project, Horonobe Underground Research Laboratory project and geo-stability project

    International Nuclear Information System (INIS)

    Hama, Katsuhiro; Sasao, Eiji; Iwatsuki, Teruki; Saegusa, Hiromitsu; Sato, Toshinori; Umeda, Koji; Yasue, Kenichi; Asamori, Koichi; Osawa, Hideaki; Koide, Kaoru; Nagae, Isako; Natsuyama, Ryoko; Mizuno, Takashi; Fujita, Tomoo; Sasamoto, Hiroshi; Matsuoka, Toshiyuki; Yokota, Hideharu; Ishii, Eiichi; Aoyagi, Kazuhei; Nakayama, Masashi; Ito, Hiroaki; Tsusaka, Kimikazu; Ohyama, Takuya; Senba, Takeshi; Amano, Kenji

    2015-08-01

    We have synthesised the research results from Mizunami/Horonobe URLs and geo-stability projects in the second mid-term research phase. It could be used as technical bases for NUMO/Regulator in each decision point from siting to beginning of disposal (Principal Investigation to Detailed Investigation Phase). High quality construction techniques and field investigation methods have been developed and implemented and these will be directly applicable to the National Disposal Program (along with general assessments of hazardous natural events and processes). It will be crucial to acquire technical knowledge on decisions of partial backfilling and final closure by actual field experiments in Mizunami/Horonobe URLs as main themes for the next phases. (author)

  11. Security Assessment Simulation Toolkit (SAST) Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Meitzler, Wayne D.; Ouderkirk, Steven J.; Hughes, Chad O.

    2009-11-15

    The Department of Defense Technical Support Working Group (DoD TSWG) investment in the Pacific Northwest National Laboratory (PNNL) Security Assessment Simulation Toolkit (SAST) research planted a technology seed that germinated into a suite of follow-on Research and Development (R&D) projects culminating in software that is used by multiple DoD organizations. The DoD TSWG technology transfer goal for SAST is already in progress. The Defense Information Systems Agency (DISA), the Defense-wide Information Assurance Program (DIAP), the Marine Corps, Office Of Naval Research (ONR) National Center For Advanced Secure Systems Research (NCASSR) and Office Of Secretary Of Defense International Exercise Program (OSD NII) are currently investing to take SAST to the next level. PNNL currently distributes the software to over 6 government organizations and 30 DoD users. For the past five DoD wide Bulwark Defender exercises, the adoption of this new technology created an expanding role for SAST. In 2009, SAST was also used in the OSD NII International Exercise and is currently scheduled for use in 2010.

  12. SAGE as a Source for Undergraduate Research Projects

    Science.gov (United States)

    Hutz, Benjamin

    2017-01-01

    This article examines the use of the computer algebra system SAGE for undergraduate student research projects. After reading this article, the reader should understand the benefits of using SAGE as a source of research projects and how to commence working with SAGE. The author proposes a tiered working group model to allow maximum benefit to the…

  13. Outline of criticality safety research project

    International Nuclear Information System (INIS)

    Kobayashi, Iwao; Tachimori, Shoichi; Suzaki, Takenori; Takeshita, Isao; Miyoshi, Yoshinori; Nakajima, Ken; Sakurai, Satoshi; Yanagisawa, Hiroshi

    1987-01-01

    As the power generation capacity of LWRs in Japan increased, the establishment and development of nuclear fuel cycle have become the important subject. Conforming to the safety research project of the nation, the Japan Atomic Energy Research Institute has advanced the project of constructing a new research facility, that is, Nuclear Fuel Cycle Engineering Research Facility (NUCEF). In this facility, it is planned to carry out the research on criticality safety, upgraded reprocessing techniques, and the treatment and disposal of transuranium element wastes. In this paper, the subjects of criticality safety research and the research carried out with a criticality safety experiment facility which is expected to be installed in the NUCEF are briefly reported. The experimental data obtained from the criticality safety handbooks and published literatures in foreign countries are short of the data on the mixture of low enriched uranium and plutonium which is treated in the reprocessing of spent fuel from LWRs. The acquisition of the criticality data for various forms of fuel, the elucidation of the scenario of criticality accidents, and the soundness of the confinement system for gaseous fission products and plutonium are the main subjects. The Static Criticality Safety Facility, Transient Criticality Safety Facility and pulse column system are the main facilities. (Kako, I.)

  14. Research and investigation on medical usage of cyclotrons as a special research project

    International Nuclear Information System (INIS)

    1980-01-01

    In the National Institute of Radiological Sciences, the special research project ''Research and investigation on the medical usage of cyclotrons'' had been carried out in the three years program from fiscal 1976 to 1978. Its purpose was to establish the methods of therapy using particle beam such as fast neutrons and the methods of diagnosis using short-lived radioisotopes and positron-emitting radioisotopes. The works were conducted comprehensively in cooperation of the personnel both in and outside the NIRS. Consequently, the purpose was able to be fulfilled satisfactorily. Following on this project, a new special research project ''Research and investigation on the medical usage of particle accelerators'' was started in fiscal 1979. These results are described on the effects of the therapy, diagnostic utilizations, and the medical usage of heavy ion accelerators. (J.P.N.)

  15. Research on network information security model and system construction

    OpenAIRE

    Wang Haijun

    2016-01-01

    It briefly describes the impact of large data era on China’s network policy, but also brings more opportunities and challenges to the network information security. This paper reviews for the internationally accepted basic model and characteristics of network information security, and analyses the characteristics of network information security and their relationship. On the basis of the NIST security model, this paper describes three security control schemes in safety management model and the...

  16. An Empirical Study of Security Issues Posted in Open Source Projects

    DEFF Research Database (Denmark)

    Zahedi, Mansooreh; Ali Babar, Muhammad; Treude, Christoph

    2018-01-01

    When developers gain thorough understanding and knowledge of software security, they can produce more secure software. This study aims at empirically identifying and understanding the security issues posted on a random sample of GitHub repositories. We tried to understand the presence of security...

  17. US heat pump research and development projects, 1976-1986

    Energy Technology Data Exchange (ETDEWEB)

    Zimmerman, K.H.

    1987-04-01

    This document, which is an updated version of US Heat Pump Research and Development Projects, published in August 1982 by the US Department of Energy, is a compilation of one-page summaries and publication and patent information for 233 individual research and development projects on heat pumps covering the years 1976 through 1986. The majority of the projects refer to heat pumps in space-conditioning applications. The document is intended to include information on all projects in the United States for which results are publicly available. Ten different indexes are included to aid the reader in locating specific projects.

  18. Security issues at the Department of Energy and records management

    International Nuclear Information System (INIS)

    NUSBAUM, ANNA W.

    2000-01-01

    In order to discuss the connection between security issues within the Department of Energy and records management, the author covers a bit of security history and talks about what she calls ''the Amazing Project''. Initiated in late May 1999, it was to be a tri-laboratory (Lawrence Livermore National Laboratory of Livermore, California, Los Alamos National Laboratory of Los Alamos, New Mexico, and Sandia National Laboratories of Albuquerque, New Mexico, and Livermore, California) project. The team that formed was tasked to develop the best set of security solutions that still enabled weapon mission work to get done and the security solutions were to be the same set for everyone. The amazing project was called ''The Integrated Security Management Project'', or ''ISecM' for short. She'll describe why she thinks this project was so amazing and what it accomplished. There's a bit of sad news about the project, but then she'll move onto discuss what was learned at Sandia as a result of the project and what they're currently doing in records management

  19. Cloud Computing Security

    OpenAIRE

    Ngongang, Guy

    2011-01-01

    This project aimed to show how possible it is to use a network intrusion detection system in the cloud. The security in the cloud is a concern nowadays and security professionals are still finding means to make cloud computing more secure. First of all the installation of the ESX4.0, vCenter Server and vCenter lab manager in server hardware was successful in building the platform. This allowed the creation and deployment of many virtual servers. Those servers have operating systems and a...

  20. Towards efficient use of research resources: a nationwide database of ongoing primary care research projects in the Netherlands.

    Science.gov (United States)

    Kortekaas, Marlous F; van de Pol, Alma C; van der Horst, Henriëtte E; Burgers, Jako S; Slort, Willemjan; de Wit, Niek J

    2014-04-01

    PURPOSE. Although in the last decades primary care research has evolved with great success, there is a growing need to prioritize the topics given the limited resources available. Therefore, we constructed a nationwide database of ongoing primary care research projects in the Netherlands, and we assessed if the distribution of research topics matched with primary care practice. We conducted a survey among the main primary care research centres in the Netherlands and gathered details of all ongoing primary care research projects. We classified the projects according to research topic, relation to professional guidelines and knowledge deficits, collaborative partners and funding source. Subsequently, we compared the frequency distribution of clinical topics of research projects to the prevalence of problems in primary care practice. We identified 296 ongoing primary care research projects from 11 research centres. Most projects were designed as randomized controlled trial (35%) or observational cohort (34%), and government funded mostly (60%). Thematically, most research projects addressed chronic diseases, mainly cardiovascular risk management (8%), depressive disorders (8%) and diabetes mellitus (7%). One-fifth of the projects was related to defined knowledge deficits in primary care guidelines. From a clinical primary care perspective, research projects on dermatological problems were significantly underrepresented (P = 0.01). This survey of ongoing projects demonstrates that primary care research has a firm basis in the Netherlands, with a strong focus on chronic disease. The fit with primary care practice can improve, and future research should address knowledge deficits in professional guidelines more.

  1. NASA's Morphing Project Research Summaries in Fiscal Year 2002

    Science.gov (United States)

    McGowan, Anna-Maria R.; Waszak, Martin R.

    2005-01-01

    The Morphing Project at the National Aeronautics and Space Agency s (NASA) Langley Research Center (LaRC) is part of the Breakthrough Vehicle Technologies Project, Vehicle Systems Program that conducts fundamental research on advanced technologies for future flight vehicles. The objectives of the Morphing Project are to develop and assess the advanced technologies and integrated component concepts to enable efficient, multi-point adaptability of flight vehicles; primarily through the application of adaptive structures and adaptive flow control to substantially alter vehicle performance characteristics. This document is a compilation of research summaries and other information on the project for fiscal year 2002. The focus is to provide a brief overview of the project content, technical results and lessons learned. At the time of publication, the Vehicle Systems Program (which includes the Morphing Project) is undergoing a program re-planning and reorganization. Accordingly, the programmatic descriptions of this document pertain only to the program as of fiscal year 2002.

  2. Synthesized research report in the second mid-term research phase. Mizunami Underground Research Laboratory project, Horonobe Underground Research Laboratory project and geo-stability project (Translated document)

    International Nuclear Information System (INIS)

    Hama, Katsuhiro; Sasao, Eiji; Iwatsuki, Teruki; Onoe, Hironori; Sato, Toshinori; Yasue, Kenichi; Asamori, Koichi; Niwa, Masakazu; Osawa, Hideaki; Nagae, Isako; Natsuyama, Ryoko; Fujita, Tomoo; Sasamoto, Hiroshi; Matsuoka, Toshiyuki; Takeda, Masaki; Aoyagi, Kazuhei; Nakayama, Masashi; Miyakawa, Kazuya; Ito, Hiroaki; Ohyama, Takuya; Senba, Takeshi; Amano, Kenji

    2016-08-01

    We have synthesized the research results from the Mizunami/Horonobe Underground Research Laboratories (URLs) and geo-stability projects in the second mid-term research phase. This report can be used as a technical basis for the Nuclear Waste Management Organization of Japan/Regulator at each decision point from siting to beginning of disposal (Principal Investigation to Detailed Investigation Phase). High-quality construction techniques and field investigation methods have been developed and implemented, which will be directly applicable to the National Disposal Program (together with general assessments of hazardous natural events and processes). Acquisition of technical knowledge on decisions of partial backfilling and final closure from actual field experiments in the Mizunami/Horonobe URLs will be crucial as the main theme for the next phases. (author)

  3. Proof of Concept: Iraqi Enrollment via Voice Authentication Project

    National Research Council Canada - National Science Library

    Lee, Samuel K

    2005-01-01

    ...). The IEVAP is an Office of the Secretary of Defense sponsored research project commissioned to study the feasibility of speaker verification technology in support of the Global War on Terrorism security requirements...

  4. Laboratory Technology Research: Abstracts of FY 1996 projects

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-12-31

    The Laboratory Technology Research (LTR) program supports high-risk, multidisciplinary research partnerships to investigate challenging scientific problems whose solutions have promising commercial potential. These partnerships capitalize on two great strengths of this country: the world-class basic research capability of the DOE Energy Research (ER) multi-program national laboratories and the unparalleled entrepreneurial spirit of American industry. Projects supported by the LTR program are conducted by the five ER multi-program laboratories: Argonne, Brookhaven, Lawrence Berkeley, Oak Ridge, and Pacific Northwest National Laboratories. These projects explore the applications of basic research advances relevant to Department of Energy`s (DOE) mission over a full range of scientific disciplines. The program presently emphasizes three critical areas of mission-related research: advanced materials, intelligent processing/manufacturing research, and sustainable environments.

  5. Using electronic health records for clinical research: the case of the EHR4CR project.

    Science.gov (United States)

    De Moor, Georges; Sundgren, Mats; Kalra, Dipak; Schmidt, Andreas; Dugas, Martin; Claerhout, Brecht; Karakoyun, Töresin; Ohmann, Christian; Lastic, Pierre-Yves; Ammour, Nadir; Kush, Rebecca; Dupont, Danielle; Cuggia, Marc; Daniel, Christel; Thienpont, Geert; Coorevits, Pascal

    2015-02-01

    To describe the IMI EHR4CR project which is designing and developing, and aims to demonstrate, a scalable, widely acceptable and efficient approach to interoperability between EHR systems and clinical research systems. The IMI EHR4CR project is combining and extending several previously isolated state-of-the-art technical components through a new approach to develop a platform for reusing EHR data to support medical research. This will be achieved through multiple but unified initiatives across different major disease areas (e.g. cardiovascular, cancer) and clinical research use cases (protocol feasibility, patient identification and recruitment, clinical trial execution and serious adverse event reporting), with various local and national stakeholders across several countries and therefore under various legal frameworks. An initial instance of the platform has been built, providing communication, security and terminology services to the eleven participating hospitals and ten pharmaceutical companies located in seven European countries. Proof-of-concept demonstrators have been built and evaluated for the protocol feasibility and patient recruitment scenarios. The specifications of the clinical trial execution and the adverse event reporting scenarios have been documented and reviewed. Through a combination of a consortium that brings collectively many years of experience from previous relevant EU projects and of the global conduct of clinical trials, of an approach to ethics that engages many important stakeholders across Europe to ensure acceptability, of a robust iterative design methodology for the platform services that is anchored on requirements of an underlying Service Oriented Architecture that has been designed to be scalable and adaptable, EHR4CR could be well placed to deliver a sound, useful and well accepted pan-European solution for the reuse of hospital EHR data to support clinical research studies. Copyright © 2014 Elsevier Inc. All rights reserved.

  6. Djeen (Database for Joomla!'s Extensible Engine): a research information management system for flexible multi-technology project administration.

    Science.gov (United States)

    Stahl, Olivier; Duvergey, Hugo; Guille, Arnaud; Blondin, Fanny; Vecchio, Alexandre Del; Finetti, Pascal; Granjeaud, Samuel; Vigy, Oana; Bidaut, Ghislain

    2013-06-06

    With the advance of post-genomic technologies, the need for tools to manage large scale data in biology becomes more pressing. This involves annotating and storing data securely, as well as granting permissions flexibly with several technologies (all array types, flow cytometry, proteomics) for collaborative work and data sharing. This task is not easily achieved with most systems available today. We developed Djeen (Database for Joomla!'s Extensible Engine), a new Research Information Management System (RIMS) for collaborative projects. Djeen is a user-friendly application, designed to streamline data storage and annotation collaboratively. Its database model, kept simple, is compliant with most technologies and allows storing and managing of heterogeneous data with the same system. Advanced permissions are managed through different roles. Templates allow Minimum Information (MI) compliance. Djeen allows managing project associated with heterogeneous data types while enforcing annotation integrity and minimum information. Projects are managed within a hierarchy and user permissions are finely-grained for each project, user and group.Djeen Component source code (version 1.5.1) and installation documentation are available under CeCILL license from http://sourceforge.net/projects/djeen/files and supplementary material.

  7. Distributed Research Project Scheduling Based on Multi-Agent Methods

    Directory of Open Access Journals (Sweden)

    Constanta Nicoleta Bodea

    2011-01-01

    Full Text Available Different project planning and scheduling approaches have been developed. The Operational Research (OR provides two major planning techniques: CPM (Critical Path Method and PERT (Program Evaluation and Review Technique. Due to projects complexity and difficulty to use classical methods, new approaches were developed. Artificial Intelligence (AI initially promoted the automatic planner concept, but model-based planning and scheduling methods emerged later on. The paper adresses the project scheduling optimization problem, when projects are seen as Complex Adaptive Systems (CAS. Taken into consideration two different approaches for project scheduling optimization: TCPSP (Time- Constrained Project Scheduling and RCPSP (Resource-Constrained Project Scheduling, the paper focuses on a multiagent implementation in MATLAB for TCSP. Using the research project as a case study, the paper includes a comparison between two multi-agent methods: Genetic Algorithm (GA and Ant Colony Algorithm (ACO.

  8. Research oriented projects on design themese

    DEFF Research Database (Denmark)

    Tollestrup, Christian; Eriksen, Kaare; Ovesen, Nis

    2011-01-01

    How can design students do research-oriented projects about design themes? At the 3rd semester at the Industrial Design Master Program at Aalborg University this is done by taking research oriented learning objectives on design theories and methods and combining them with experimental case studie...... and professional self-reflection amongst students are improved....

  9. Introduction to Future Wireless Networks research group's projects/activities (St. Petersburg)

    CSIR Research Space (South Africa)

    Lysko, Albert A

    2017-05-01

    Full Text Available , Peace, Safety and Security  Materials Science and manufacturing  Meraka Institute (Information and Communication Technology)  Modelling and Digital Science  Natural Resources and the Environment  Implementation Unit  National Research Centres... CSIR Units and Centres  Operating Units  Biosciences  Built Environment  Defence, Peace, Safety and Security  Materials Science and manufacturing  Meraka Institute (Information and Communication Technology)  Modelling and Digital...

  10. Catalogue of research projects

    International Nuclear Information System (INIS)

    Skarp, K.

    1993-01-01

    The Centre for Materials Science serves as an umbrella for organizations involved in materials research at the two Universities and at certain branch institutes in the Gothenburg region. The general goal of the Centre is to promote materials research among the member organizations and to provide a link to industry and to the society at large. Members of the Centre work on most aspects of modern materials research, ranging from single-atom manipulation and theoretical simulations to biomaterials and production engineering. In order to give a presentation of the members and their research, the Centre produces an inventory of materials research projects approximately every four years. The 1993 issue is somewhat more extensive than previous editions, detailing e.g. also scientific equipment and listing work published during the past four years. The register covers the following main headings: General materials and surface science; Materials chemistry; Polymers and fibres; Biomaterials; Clusters and fine particles; Electronic and opto-electronic materials; Superconductors and nanometer structures; Ceramics; Metals; Building materials; Production and materials processing

  11. Research project of P3 (Protected Plutonium Production) and global academy for 3S (Safety, Security, Safeguard) for peace and sustainable prosperity

    International Nuclear Information System (INIS)

    Saito, Masaki

    2013-01-01

    Full text:Nuclear engineering education has been initiated in 1957 at the graduate school of Tokyo Institute of Technology. Higher Educational activities have been conducted for more than half century. More than 1000 Master students and 200 Doctoral students graduated from the Department of Nuclear Engineering in Tokyo Institute of Technology. Many of them are working in nuclear industries and institutes. International course of nuclear engineering was initiated in 1994, and 130 students from 20 overseas countries have graduated from Master and Doctoral Programs. In the national research program, Protected Plutonium Production (P 3 ) has been proposed to enhance the proliferation resistance of plutonium by the transmutation of Minor Actinides (MAs). In 2011, Academy for Global Nuclear Safety and Security Agent was initiated with the unique features of a full boarding system and a curriculum that combines education in liberal arts and science/ engineering. Both educational and research programs have been supported by the Ministry of Education, Culture, Sports, Science and Technology in Japan. In the conference, the current nuclear educational and research activities in Tokyo Institute of Technology will be presented. (author)

  12. Research on offense and defense technology for iOS kernel security mechanism

    Science.gov (United States)

    Chu, Sijun; Wu, Hao

    2018-04-01

    iOS is a strong and widely used mobile device system. It's annual profits make up about 90% of the total profits of all mobile phone brands. Though it is famous for its security, there have been many attacks on the iOS operating system, such as the Trident apt attack in 2016. So it is important to research the iOS security mechanism and understand its weaknesses and put forward targeted protection and security check framework. By studying these attacks and previous jailbreak tools, we can see that an attacker could only run a ROP code and gain kernel read and write permissions based on the ROP after exploiting kernel and user layer vulnerabilities. However, the iOS operating system is still protected by the code signing mechanism, the sandbox mechanism, and the not-writable mechanism of the system's disk area. This is far from the steady, long-lasting control that attackers expect. Before iOS 9, breaking these security mechanisms was usually done by modifying the kernel's important data structures and security mechanism code logic. However, after iOS 9, the kernel integrity protection mechanism was added to the 64-bit operating system and none of the previous methods were adapted to the new versions of iOS [1]. But this does not mean that attackers can not break through. Therefore, based on the analysis of the vulnerability of KPP security mechanism, this paper implements two possible breakthrough methods for kernel security mechanism for iOS9 and iOS10. Meanwhile, we propose a defense method based on kernel integrity detection and sensitive API call detection to defense breakthrough method mentioned above. And we make experiments to prove that this method can prevent and detect attack attempts or invaders effectively and timely.

  13. Office of Safeguards and Security - Operational Interface

    International Nuclear Information System (INIS)

    Hammond, G.A.

    1987-01-01

    The mission of the Office of Safeguards and Security (OSS), Department of Energy (DOE) is to: Develop policy and programs to protect DOE facilities, nuclear materials, and classified information; Provide oversight for safeguards and security operations; Direct research and development (RandD) to support the protection program; and Strengthen international safeguards in support of nonproliferation policy. Objectives are to maintain an integrated safeguards and security system that is effective against a wide range of threats, and do so in a manner to minimize impacts on facility operation. Implementation is the responsibility of field offices and contractors operating DOE facilities. The OSS-operational interface is the focus of this discussion with emphasis on RandD to meet user needs. The scope and project selection process will be discussed along with information required for evaluation, and field operational planning and budgeting commitments to permit implementation of successful RandD results

  14. Light water reactor safety research project

    International Nuclear Information System (INIS)

    Markoczy, G.; Aksan, S.N.; Behringer, K.; Prodan, M.; Stierli, F.; Ullrich, G.

    1980-07-01

    The research and development activities for the safety of Light Water Power Reactors carried out 1979 at the Swiss Federal Institute for Reactor Research are described. Considerations concerning the necessity, objectives and size of the Safety Research Project are presented, followed by a detailed discussion of the activities in the five tasks of the program, covering fracture mechanics and nondestructive testing, thermal-hydraulics, reactor noise analysis and pressure vessel steel surveillance. (Auth.)

  15. Annual review of research projects 1984

    International Nuclear Information System (INIS)

    Keam, D.W.

    1986-02-01

    This progress report provides a brief outline of current laboratory research and development projects and their present status. Research fields covered are: uranium, radon and its daughters, radiation effects in solids and gases, x-rays and clinical dosimetry, measurement standards in radiation dosimetry, radiopharmaceuticals and nuclear medicine, non-ionizing electromagnetic radiations, environmental radiochemistry and radiation monitoring

  16. Annual review of research projects 1983

    International Nuclear Information System (INIS)

    1985-08-01

    This progress report provides a brief outline of current laboratory research and development projects and their present status. Research fields covered are: uranium, radon and its daughters, radiation effects in solids and gases, thermoluminescence, x-rays and clinical dosimetry, measurement standards in radiation dosimetry, radiopharmaceuticals and nuclear medicine, radionuclide metrology, non-ionizing electromagnetic radiations, environmental radiochemistry and radiation monitoring

  17. Report on {open_quotes}inspection of human subject research in intelligence and intelligence-related projects{close_quotes}

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-01-16

    Executive Order 12333, {open_quotes}United States Intelligence Activities,{close_quotes} (1) designates the Department`s intelligence element as a member of the Intelligence Community, and (2) states that no agency within the Intelligence community shall sponsor, contract for or conduct research on human subjects except in accordance with guidelines issued by the Department of Health and Human Services. The Federal policy for the Protection of Human Subjects, which was based on Department of Health and Human Services regulations, was promulgated in Title 10 Code of Federal Regulations Part 745 by the Department of Energy. The purpose of this inspection was to review the internal control procedures used by the Office of Nonproliferation and National Security to manage selected intelligence and intelligence-related projects that involve human subject research.

  18. Control and Non-Payload Communications (CNPC) Prototype Radio - Generation 2 Security Architecture Lab Test Report

    Science.gov (United States)

    Iannicca, Dennis C.; McKim, James H.; Stewart, David H.; Thadhani, Suresh K.; Young, Daniel P.

    2015-01-01

    NASA Glenn Research Center, in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the FAA and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the current GRC prototype CNPC architecture as a demonstration platform. The security controls were integrated into a lab test bed mock-up of the Mobile IPv6 architecture currently being used for NASA flight testing, and a series of network tests were conducted to evaluate the security overhead of the controls compared to the baseline CNPC link without any security. The aim of testing was to evaluate the performance impact of the additional security control overhead when added to the Mobile IPv6 architecture in various modes of operation. The statistics collected included packet captures at points along the path to gauge packet size as the sample data traversed the CNPC network, round trip latency, jitter, and throughput. The effort involved a series of tests of the baseline link, a link with Robust Header Compression (ROHC) and without security controls, a link with security controls and without ROHC, and finally a link with both ROHC and security controls enabled. The effort demonstrated that ROHC is both desirable and necessary to offset the additional expected overhead of applying security controls to the CNPC link.

  19. Methodology for evaluation of railroad technology research projects

    Science.gov (United States)

    1981-04-01

    This Project memorandum presents a methodology for evaluating railroad research projects. The methodology includes consideration of industry and societal benefits, with special attention given to technical risks, implementation considerations, and po...

  20. Operating System Security

    CERN Document Server

    Jaeger, Trent

    2008-01-01

    Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to

  1. Security improvements for rail movements of SNM

    International Nuclear Information System (INIS)

    Garcia, M.R.; Gronager, J.E.; Shemigon, N.N.

    1998-01-01

    The US Department of Energy (DOE) and the Russian Special Scientific and Production State Enterprise Eleron have teamed to lead a project to enhance the overall security of Russian Ministry of Atomic Energy (MINATOM) transportation of Special Nuclear Material (SNM) shipments. The effort is called the Railcar Transportation Security Project and is part of the overall DOE Material Protection, Control, and Accounting (MPC and A) program addressing the enhancement of nuclear material control, accounting, and physical protection for Russian SNM. The goal of this MPC and A project is to significantly increase the security of Russian MINATOM highly enriched SNM rail shipments. To accomplish this, the MPC and A Railcar Transportation Security program will provide an enhanced, yet cost effective, railcar transportation security system. The system incorporates a balance between the traditional detection, communications, delay, and response security elements to significantly improve the security of MINATOM SNM shipments. The strategy of this program is to use rapid upgrades to implement mature security technologies as quickly as possible. The rapid upgrades emphasize rapidly deployable delay elements, enhanced radio communications, and intrusion detection and surveillance. Upgraded railcars have begun operation during FY98. Subsequent upgrades will build upon the rapid upgrades and eventually be integrated into a final deployed system configuration. This paper provides an overview of the program, with a summary of performance of the deployed railcars

  2. Experimental plasma research project summaries

    International Nuclear Information System (INIS)

    1992-06-01

    This is the latest in a series of Project Summary books going back to 1976 and is the first after a hiatus of several years. They are published to provide a short description of each project supported by the Experimental Plasma Research Branch of the Division of Applied Plasma Physics in the Office of Fusion Energy. The Experimental Plasma Research Branch seeks to provide a broad range of experimental data, physics understanding, and new experimental techniques that contribute to operation, interpretation, and improvement of high temperature plasma as a source of fusion energy. In pursuit of these objectives, the branch supports research at universities, DOE laboratories, other federal laboratories and industry. About 70 percent of the funds expended are spent at universities and a significant function of this program is the training of students in fusion physics. The branch supports small- and medium-scale experimental studies directly related to specific critical plasma issues of the magnetic fusion program. Plasma physics experiments are conducted on transport of particles and energy within plasma and innovative approaches for operating, controlling, and heating plasma are evaluated for application to the larger confinement devices of the magnetic fusion program. New diagnostic approaches to measuring the properties of high temperature plasmas are developed to the point where they can be applied with confidence on the large-scale confinement experiments. Atomic data necessary for impurity control, interpretation of diagnostic data, development of heating devices, and analysis of cooling by impurity ion radiation are obtained. The project summaries are grouped into these three categories of plasma physics, diagnostic development and atomic physics

  3. Development and Evaluation of an On-Line Educational Module for Volunteer Leaders on Bio-Security in Washington State 4-H Livestock Projects

    Science.gov (United States)

    Stevenson, Jill L.; Moore, Dale A.; Newman, Jerry; Schmidt, Janet L.; Smith, Sarah M.; Smith, Jean; Kerr, Susan; Wallace, Michael; BoyEs, Pat

    2011-01-01

    An on-line module on disease prevention was created for 4-H volunteer leaders who work with livestock projects in Washington to better prepare them to teach youth about bio-security and its importance in 4-H livestock projects. Evaluation of the module and usage statistics since the module's debut were collected and evaluated. The module increases…

  4. The Y-12 National Security Complex Foreign Research Reactor Uranium Supply Production

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, T. [Nuclear Technology and Nonproliferation Programs, B and W Y-12, L.L.C., Y-12 National Security Complex, Oak Ridge, Tennessee (United States); Keller, A.P. [Disposition and Supply Programs, B and W Y-12, L.L.C., Y-12 National Security Complex, Oak Ridge, Tennessee (United States)

    2011-07-01

    The Foreign Research Reactor (FRR) Uranium Supply Program at the Y-12 National Security Complex supports the nonproliferation objectives of the National Nuclear Security Administration (NNSA) HEU Disposition, the Reduced Enrichment Research and Test Reactors (RERTR), and the United States (U.S.) FRR Spent Nuclear Fuel (SNF) Acceptance Programs. The FRR Supply Program supports the important U.S. government nuclear nonproliferation commitment to serve as a reliable and cost-effective uranium supplier for those foreign research reactors that are converting or have converted to Low-Enriched Uranium (LEU) fuel under the RERTR Program. The NNSA Y-12 Site Office maintains the prime contracts with foreign government agencies for the supply of LEU for their research reactors. The LEU is produced by down blending Highly Enriched Uranium (HEU) that has been declared surplus to the U.S. national defense needs. The down blending and sale of the LEU supports the Surplus HEU Disposition Program Record of Decision to make the HEU non-weapons usable and to recover the economic value of the uranium to the extent feasible. In addition to uranium metal feedstock for fuel fabrication, Y-12 can produce LEU in different forms to support new fuel development or target fabrication for medical isotope production. With production improvements and efficient delivery preparations, Y-12 continues to successfully support the global research reactor community. (author)

  5. Diamond High Assurance Security Program: Trusted Computing Exemplar

    Science.gov (United States)

    2002-09-01

    computing component, the Embedded MicroKernel Prototype. A third-party evaluation of the component will be initiated during development (e.g., once...target technologies and larger projects is a topic for future research. Trusted Computing Reference Component – The Embedded MicroKernel Prototype We...Kernel The primary security function of the Embedded MicroKernel will be to enforce process and data-domain separation, while providing primitive

  6. Environmental Assessment for the Air Force Research Laboratory Security Fence Project, Edwards Air Force Base, California

    Science.gov (United States)

    2012-11-26

    Pleistocene/Early-Holocene Prehistory (12,000 to 7,000 BP). The Lake Mojave Period in the southwestern Great Basin comprises a regional manifestation...adaptive patterns with focal exploitation of such habitats (Tetra Tech 2010). Middle-Holocene Prehistory (8,000 to 4,000 BP). Succeeding Lake Mojave in the...Security Fence at Edwards Air Force Base, California Late Holocene Prehistory (4,000 to Contact). With return to more “favorable” environmental

  7. Abstract and research accomplishments of University Coal Research Projects

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-06-01

    The Principal Investigators of the grants supported by the University Coal Research Program were requested to submit abstracts and highlight accomplishments of their respective projects in time for distribution at a conference on June 13--14, 1995 at Tennessee State University in Nashville, Tennessee. This book is a compilation of the material received in response to that request. For convenience, the 70 grants reported in this book are stored into eight technical areas, Coal Science, Coal Surface Science, Reaction Chemistry, Advanced Process Concepts, Engineering Fundamentals and Thermodynamics, Environmental Science, high Temperature Phenomena, and Special topics. Indexes are provided for locating projects by subject, principal investigators, and contracting organizations. Each extended abstract describes project objectives, work accomplished, significance to the Fossil Energy Program, and plans for the next year.

  8. Nevada National Security Site-Directed Research and Development FY 2011 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Howard Bender, comp.

    2012-04-25

    This fiscal year 2011 annual report of the Site-Directed Research and Development program, the 10th anniversary edition, recognizes a full decade of innovative R&D accomplishments in support of the Nevada National Security Site (NNSS). Last year the NNSS itself was renamed to reflect a diversifying mission, and our R&D program has contributed significantly to shape emerging missions that will continue to evolve. New initiatives in stockpile stewardship science, nonproliferation, and treaty verification and monitoring have had substantial successes in FY 2011, and many more accomplishments are expected. SDRD is the cornerstone on which many of these initiatives rest. Historically supporting our main focus areas, SDRD is also building a solid foundation for new, and non-traditional, emerging national security missions. The program continues its charter to advance science and technology for a broad base of agencies including the U.S. Department of Energy (DOE), U.S. Department of Defense (DoD), U.S. Department of Homeland Security (DHS), and many others.

  9. Model Based Cyber Security Analysis for Research Reactor Protection System

    Energy Technology Data Exchange (ETDEWEB)

    Sho, Jinsoo; Rahman, Khalil Ur; Heo, Gyunyoung [Kyung Hee Univ., Yongin (Korea, Republic of); Son, Hanseong [Joongbu Univ., Geumsan (Korea, Republic of)

    2013-07-01

    The study on the qualitative risk due to cyber-attacks into research reactors was performed using bayesian Network (BN). This was motivated to solve the issues of cyber security raised due to digitalization of instrumentation and control (I and C) system. As a demonstrative example, we chose the reactor protection system (RPS) of research reactors. Two scenarios of cyber-attacks on RPS were analyzed to develop mitigation measures against vulnerabilities. The one is the 'insertion of reactor trip' and the other is the 'scram halt'. The six mitigation measures are developed for five vulnerability for these scenarios by getting the risk information from BN.

  10. Model Based Cyber Security Analysis for Research Reactor Protection System

    International Nuclear Information System (INIS)

    Sho, Jinsoo; Rahman, Khalil Ur; Heo, Gyunyoung; Son, Hanseong

    2013-01-01

    The study on the qualitative risk due to cyber-attacks into research reactors was performed using bayesian Network (BN). This was motivated to solve the issues of cyber security raised due to digitalization of instrumentation and control (I and C) system. As a demonstrative example, we chose the reactor protection system (RPS) of research reactors. Two scenarios of cyber-attacks on RPS were analyzed to develop mitigation measures against vulnerabilities. The one is the 'insertion of reactor trip' and the other is the 'scram halt'. The six mitigation measures are developed for five vulnerability for these scenarios by getting the risk information from BN

  11. The research of computer network security and protection strategy

    Science.gov (United States)

    He, Jian

    2017-05-01

    With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.

  12. The Universities and JAERI joint research project. The achievements and prospects

    International Nuclear Information System (INIS)

    Ohashi, Hiroshi; Nakamura, Takashi; Yamaguchi, Sadaei

    1999-01-01

    The universities and JAERI joint research project has been carried out since 13 years ago on an equivalent basis with the universities and JAERI and co-ownership of the results. This paper consists of the history and results of research project and evaluation. The significance, characteristics, themes and problems of the project are arranged. The main results and the future of the project are explained. Two large projects such as the backend chemical project and the high-degree application of radiation project have been studied. The backend chemical project consisted of four themes; the nuclear chemical researches for TRU recycle, the solid chemical research of nuclear fuel and waste, new separation method for reprocessing and waste disposal and the fundamental chemical researches for disposal waste. The high-degree application of radiation project have eight themes; effects of ion beam on organism, slow positron generation and its application to materials, ion irradiation effects on polymer materials, nuclear spectroscopy and nuclear physics of isotope using online isotope separator, shield and behavior of accelerator radiation, materials analysis by ion beam, effects of nuclear transformation product by nuclear fusion reactor radiation damage and biofunction analysis of plant using positron release nuclide. (S.Y.)

  13. Integration of EGA secure data access into Galaxy [version 1; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Youri Hoogstrate

    2016-12-01

    Full Text Available High-throughput molecular profiling techniques are routinely generating vast amounts of data for translational medicine studies. Secure access controlled systems are needed to manage, store, transfer and distribute these data due to its personally identifiable nature. The European Genome-phenome Archive (EGA was created to facilitate access and management to long-term archival of bio-molecular data. Each data provider is responsible for ensuring a Data Access Committee is in place to grant access to data stored in the EGA. Moreover, the transfer of data during upload and download is encrypted. ELIXIR, a European research infrastructure for life-science data, initiated a project (2016 Human Data Implementation Study to understand and document the ELIXIR requirements for secure management of controlled-access data. As part of this project, a full ecosystem was designed to connect archived raw experimental molecular profiling data with interpreted data and the computational workflows, using the CTMM Translational Research IT (CTMM-TraIT infrastructure http://www.ctmm-trait.nl as an example. Here we present the first outcomes of this project, a framework to enable the download of EGA data to a Galaxy server in a secure way. Galaxy provides an intuitive user interface for molecular biologists and bioinformaticians to run and design data analysis workflows. More specifically, we developed a tool -- ega_download_streamer - that can download data securely from EGA into a Galaxy server, which can subsequently be further processed. This tool will allow a user within the browser to run an entire analysis containing sensitive data from EGA, and to make this analysis available for other researchers in a reproducible manner, as shown with a proof of concept study.  The tool ega_download_streamer is available in the Galaxy tool shed: https://toolshed.g2.bx.psu.edu/view/yhoogstrate/ega_download_streamer.

  14. A Pilot Examination of the Methods Used to Counteract Insider Threat Security Risks Associated with the Use of Radioactive Materials in the Research and Clinical Setting.

    Science.gov (United States)

    Tsenov, B G; Emery, R J; Whitehead, L W; Gonzalez, J Reingle; Gemeinhardt, G L

    2018-03-01

    While many organizations maintain multiple layers of security control methodologies to prevent outsiders from gaining unauthorized access, persons such as employees or contractors who have been granted legitimate access can represent an "insider threat" risk. Interestingly, some of the most notable radiological events involving the purposeful contamination or exposure of individuals appear to have been perpetrated by insiders. In the academic and medical settings, radiation safety professionals focus their security efforts on (1) ensuring controls are in place to prevent unauthorized access or removal of sources, and (2) increasing security controls for the unescorted accessing of large sources of radioactivity (known as "quantities of concern"). But these controls may not completely address the threat insiders represent when radioactive materials below these quantities are present. The goal of this research project was to characterize the methodologies currently employed to counteract the insider security threat for the misuse or purposeful divergence of radioactive materials used in the academic and medical settings. A web-based survey was used to assess how practicing radiation safety professionals in academic and medical settings anticipate, evaluate, and control insider threat security risks within their institutions. While all respondents indicated that radioactive sources are being used in amounts below quantities of concern, only 6 % consider insider threat security issues as part of the protocol review for the use of general radioactive materials. The results of this survey identify several opportunities for improvement for institutions to address security gaps.

  15. One health security: an important component of the global health security agenda.

    Science.gov (United States)

    Gronvall, Gigi; Boddie, Crystal; Knutsson, Rickard; Colby, Michelle

    2014-01-01

    The objectives of the Global Health Security Agenda (GHSA) will require not only a "One Health" approach to counter natural disease threats against humans, animals, and the environment, but also a security focus to counter deliberate threats to human, animal, and agricultural health and to nations' economies. We have termed this merged approach "One Health Security." It will require the integration of professionals with expertise in security, law enforcement, and intelligence to join the veterinary, agricultural, environmental, and human health experts essential to One Health and the GHSA. Working across such different professions, which occasionally have conflicting aims and different professional cultures, poses multiple challenges, but a multidisciplinary and multisectoral approach is necessary to prevent disease threats; detect them as early as possible (when responses are likely to be most effective); and, in the case of deliberate threats, find who may be responsible. This article describes 2 project areas that exemplify One Health Security that were presented at a workshop in January 2014: the US government and private industry efforts to reduce vulnerabilities to foreign animal diseases, especially foot-and-mouth disease; and AniBioThreat, an EU project to counter deliberate threats to agriculture by raising awareness and implementing prevention and response policies and practices.

  16. 78 FR 5116 - NASA Information Security Protection

    Science.gov (United States)

    2013-01-24

    ... 2700-AD61 NASA Information Security Protection AGENCY: National Aeronautics and Space Administration..., projects, plans, or protection services relating to the national security; or (h) The development... implement the provisions of Executive Order (E.O.) 13526, Classified National Security Information, and...

  17. Structural requirements of research tissue banks derived from standardized project surveillance.

    Science.gov (United States)

    Herpel, E; Koleganova, N; Schreiber, B; Walter, B; Kalle, C V; Schirmacher, P

    2012-07-01

    Tissue banks constitute decisive and rate-limiting resource and technology platforms for basic and translational biomedical research, notably in the area of cancer. Thus, it is essential to plan and structure tissue banking and allocate resources according to research needs, but essential requirements are still incompletely defined. The tissue bank of the National Center of Tumor Diseases Heidelberg (NCT) was founded with the intention to provide tissues of optimal quality and to prioritize the realization of research projects. We analysed its structure and prospective project management registration as well as tracking records for all projects of the NCT tissue bank as of its start in 2005 in order to obtain information that may be relevant for tissue bank planning. All project proposals submitted to the NCT tissue bank (n = 681) were included in the study. For a detailed evaluation of provided services, only projects that were completed until July 2011 (n = 605) were analysed. For these 605 projects, NCT tissue bank provided 769 specific services. In all projects/services, we recorded project leader, type and amount of material provided, type of research (basic/translational), work load of project and project completion. Furthermore, all completed projects were tracked after 90 days according to a standard protocol to determine principal investigators' (PI) satisfaction and quality of the provided material. Until July 2011, 605 projects had been successfully completed as documented by material transfer agreement. Of the projects, 72.7 % addressed basic research, 22.3 % were translational research projects and 3 % concerned epidemiological research; 91 % (n = 546) concerned a single PI and the NTC tissue bank. For these projects, 769 specific services were provided. Of these services, 288 concerned providing formalin-fixed and paraffin-embedded (FFPE) tissue (extracts, full size sections), 126 providing fresh frozen materials (including fresh frozen

  18. High-Performance Secure Database Access Technologies for HEP Grids

    International Nuclear Information System (INIS)

    Vranicar, Matthew; Weicher, John

    2006-01-01

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist's computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that 'Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications'. There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the secure

  19. The CARE project (Coordinated Accelerator Research in Europe)

    International Nuclear Information System (INIS)

    Napoly, Olivier

    2006-01-01

    CARE, an ambitious and coordinated project of accelerator research and developments oriented towards High Energy Physics projects, has been launched in January 2004 by the main European laboratories and the European Commission with the 6th Framework Programme. This project aims at improving existing infrastructures dedicated to future projects such as linear colliders, upgrades of hadron colliders and high intensity proton drivers An important part of this programme is devoted to advancing the performance of the superconducting technology, both in the fields of RF cavities for electron and proton acceleration and of high field magnets, as well as to developing high intensity electron and proton injectors. We describe the plans of the four main Joint Research Activities and report on the results and progress obtained so far. The CARE project also includes three adjacent Networking Activities whose main goal is to organize a forum of discussions and to provide the strategic plans in the fields of the Linear Collider, intense Neutrino Beams, and future Hadron Colliders

  20. Army Secure Operating System: Information Security for Real Time Systems

    National Research Council Canada - National Science Library

    Anderson, Eric

    1984-01-01

    The Army Secure Operating System (ASOS) project, under the management of the U.S. Army CECOM organization, will provide real time systems software necessary for fielding modern Battlefield Automation Systems...

  1. Beyond grid security

    International Nuclear Information System (INIS)

    Hoeft, B; Epting, U; Koenig, T

    2008-01-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls

  2. The Shaping of Managers' Security Objectives through Information Security Awareness Training

    Science.gov (United States)

    Harris, Mark A.

    2010-01-01

    Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…

  3. Effectiveness of Using a Change Management Approach to Convey the Benefits of an Information Security Implementation to Technology Users

    Science.gov (United States)

    Bennett, Jeannine B.

    2012-01-01

    This study addressed the problems associated with users' understanding, accepting, and complying with requirements of security-oriented solutions. The goal of the research was not to dispute existing theory on IT project implementations, but rather to further the knowledge on the topic of technology user acceptance of security-oriented IT…

  4. Environmental security and sustainable development

    International Nuclear Information System (INIS)

    Kok, M.T.J.

    1996-01-01

    Environmental security has become an important problem area for the social sciences and is becoming a key concept in long-term environmental policy and global environmental change issues. In taking Environmental Security on board, the International Human Dimensions Programme (IHDP) intends to stimulate research on approaches to solve global environmental issues, responses to climate change, food and water security, extreme weather events, etc. Both the Netherlands and Canadian HDP committee have placed environmental security and sustainable development on their national agendas. However, a research agenda for the role of social sciences in environmental security and societal impacts of global change has not been sufficiently elaborated yet, except for economic research on the impacts of climate change. This was the main reason for holding the title workshop. The aims of the workshop were: (1) to define environmental security as a research theme; (2) to explore the research agenda on environmental security for the social sciences; and (3) to establish and reinforce (inter)national research networks in this field. Two papers served as input for the participants of the workshop. First, in the Scoping Report Global Environmental Change and Human Security a brief overview is given of research conducted so far, as well as a working plan for the recently formed ad hoc Working Group on Environmental Security and Global Environmental Change. Secondly, the preliminary results of a programming study on Environmental Security and the societal impacts of climate change are presented. Special attention was given to the involvement of policymakers in the workshop. figs., tabs., 3 appendices, refs

  5. Research on bidding quotation game of international project

    Science.gov (United States)

    Lin, Tao; Xu, Xin

    2017-04-01

    Bidding competition of international projects is more and more fierce currently. However, China started late relatively in the field, it is still lack of experience in the aspect of participation in bidding of international projects, and more effective bidding quotation system is not formed till present. Therefore, China can not win through systemic bidding quotation methods compared with many powerful bidding enterprises in the international field. Research on the field is also focused by many aspects as a result. It is urgent to solve related problems. Game theory is combined for analyzing the effectiveness and operability of bidding quotation models mainly based on current situation of bidding market in China international projects during research process in the paper. The research starts with the perspective of bidders for analyzing their game with tenderers and other bidders. The results have operational value aiming at bidders.

  6. The Two Faces of Security in Hybrid Political Orders: A Framework for Analysis and Research

    Directory of Open Access Journals (Sweden)

    Robin Luckham

    2013-09-01

    authority and capacity to deliver security are weak, disputed or compromised by special interests; and (iii “securitised policy spaces” in which international actors collaborate to ensure peace and fulfil their responsibility to protect vulnerable end-users in unsecured regions. In making these distinctions we argue that similar analytical lenses can be turned upon international actors in securitised policy spaces as well as upon state and non-state security actors. The concluding section argues that such a reframing of the security and development debate demands not just new modes of analysis but also fresh approaches to research designed both to provide insights into the vernacular understandings, coping strategies and potential agency of end-users and to uncover the informal networks, alliances and covert strategies of the multiple actors determining their security in hybrid political orders. This paper builds upon a systematic literature search undertaken by the Justice and Security Research Programme (JSRP at the London School of Economics (LSE funded by the UK’s Department for International Development (DFID. The search itself and its main findings are discussed in Luckham and Kirk (2012 and Luckham and Kirk (2013.

  7. Experiences with project-oriented research in graduate engineering education

    International Nuclear Information System (INIS)

    Miley, G.H.

    1976-01-01

    Two examples of project-oriented research that involve the conceptual design of fusion systems are described. One of these projects involved close collaboration with workers in a national laboratory while the second was formally organized as a cooperative effort with two other laboratories. An important educational aspect of such research is that the students are involved in a design team composed of both students and professionals facing a realistic problem. In retrospect, it appears that both students and faculty profited from the experience. Several students have taken jobs in related areas, and additional research has resulted at the University from new insight gained during the projects

  8. Security-by-design handbook.

    Energy Technology Data Exchange (ETDEWEB)

    Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

    2013-01-01

    This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

  9. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  10. Critical Security Studies in the 21st Century: Any Directions for Lithuanian Security Studies?

    Directory of Open Access Journals (Sweden)

    Jakniūnaitė Dovilė

    2014-12-01

    Full Text Available This article focuses on recent developments and discussions in the field of security studies and aims to suggest new guidelines for the research of Lithuanian security policy. First it covers the main subjects of contemporary security discourse; next it provides evaluation and review of the critical tradition in security studies that frames presuppositions and is the means for analyzing specific security issues as well as that which fosters reflexive thinking about security. The third part deals with three topics of security research (analysis of security through the concepts of risk, exceptionality and media which have become talking-points in recent years and which have provided innovative insights in security studies.

  11. Strategic Environmental Research and Development Project FY 1994: Assessing national remote sensing technologies for use in US Department of Energy Environmental Restoration Activities, Oak Ridge Solid Waste Storage Area 4 case study

    International Nuclear Information System (INIS)

    King, A.L.; Smyre, J.L.; Evers, T.K.

    1995-02-01

    During FY 1994, the Oak Ridge Environmental Restoration (ER) Remote Sensing Program teamed with members of the Oak Ridge National Security Program Office (NSPO), the Environmental Research Institute of Michigan (ERIM) under contract to the National Exploitation Laboratory (NEL), the Oak Ridge Waste Area Group 4 (WAG 4) ER Program, and the US Department of Energy (DOE), Offices of Technology Development, Nonproliferation and National Security, and Environmental Restoration, to conduct a test and demonstration of the uses of national remote sensing technologies at DOE hazardous waste sites located in Oak Ridge, Tennessee. Objectives of the Oak Ridge study were to determine if national remote sensing technologies are useful in conducting prescreening, characterization, and/or monitoring activities to expedite the clean-up process at hazardous waste sites and to cut clean-up costs wherever possible. This project was sponsored by the Strategic Environmental Research and Development Project (SERDP)

  12. United States Crystalline Repository Project - key research areas

    International Nuclear Information System (INIS)

    Patera, E.S.

    1986-01-01

    The Crystalline Repository Project is responsible for siting the second high-level nuclear waste repository in crystalline rock for the US Department of Energy. A methodology is being developed to define data and information needs and a way to evaluate that information. The areas of research the Crystalline Repository Project is involved in include fluid flow in a fractured network, coupled thermal, chemical and flow processes and cooperation in other nations and OECD research programs

  13. Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources

    Directory of Open Access Journals (Sweden)

    Christian Schmitt

    2015-07-01

    Full Text Available This paper presents a model for structuring and reusing security requirements sources. The model serves as blueprint for the development of an organization-specific repository, which provides relevant security requirements sources, such as security information and knowledge sources and relevant compliance obligations, in a structured and reusable form. The resulting repository is intended to be used by development teams during the elicitation and analysis of security requirements with the goal to understand the security problem space, incorporate all relevant requirements sources, and to avoid unnecessary effort for identifying, understanding, and correlating applicable security requirements sources on a project-wise basis. We start with an overview and categorization of important security requirements sources, followed by the description of the generic model. To demonstrate the applicability and benefits of the model, the instantiation approach and details of the resulting repository of security requirements sources are presented.

  14. Djeen (Database for Joomla!’s Extensible Engine): a research information management system for flexible multi-technology project administration

    Science.gov (United States)

    2013-01-01

    Background With the advance of post-genomic technologies, the need for tools to manage large scale data in biology becomes more pressing. This involves annotating and storing data securely, as well as granting permissions flexibly with several technologies (all array types, flow cytometry, proteomics) for collaborative work and data sharing. This task is not easily achieved with most systems available today. Findings We developed Djeen (Database for Joomla!’s Extensible Engine), a new Research Information Management System (RIMS) for collaborative projects. Djeen is a user-friendly application, designed to streamline data storage and annotation collaboratively. Its database model, kept simple, is compliant with most technologies and allows storing and managing of heterogeneous data with the same system. Advanced permissions are managed through different roles. Templates allow Minimum Information (MI) compliance. Conclusion Djeen allows managing project associated with heterogeneous data types while enforcing annotation integrity and minimum information. Projects are managed within a hierarchy and user permissions are finely-grained for each project, user and group. Djeen Component source code (version 1.5.1) and installation documentation are available under CeCILL license from http://sourceforge.net/projects/djeen/files and supplementary material. PMID:23742665

  15. Security in the Baltic region as a Projection of Global Confrontation between Russia and the USA

    Directory of Open Access Journals (Sweden)

    Vadim Volovoj

    2017-03-01

    Full Text Available This article considers the problem of security in the Baltic region, namely, that of Poland and the Baltics. The authors rely on the works of Karl Deutsch, Emanuel Adler, on Michael Barnett’s theory of security communities and Barry Buzan’s re­gional security complex theory, address Steven Mann’s controlled chaos theory and the concept of Intermarium. Their starting assumption is that the situation in the Baltic depends largely on the politics of external powers — Russia and the United States, — being a projection of their global geopolitical confrontation. The US strategy thus becomes a major part of the equation. The authors believe that since the end of the second Iraq war the American elite has been divided along ideological lines into adherents of the chaos theory and traditionalists thinking in terms of sharing control with the other centres of global power. The US strategy in the Baltic region does not seek an open military conflict with Russia. On the contrary, the US strives to preserve the current level of confrontation between Russia and the EU, convincing the latter of the reality of the Russian threat. Countries that traditionally support confrontation with Russia, Poland and the Bal­tics, serve as a conduit for Washington strategy in Europe and a cordon sanitaire. This function is implemented through the Intermarium project meant to separate Russia from the EU. The four countries are rather active in this area, striving to attain the status of the US principal partners in the region and Europe in general. To retaliate, Moscow does everything within its power to ‘separate’ Brussels from Washington, yet the US influence is still very strong in Europe.

  16. Preliminary Study on Management of Agricultural Scientific Research Projects in the New Situation

    Institute of Scientific and Technical Information of China (English)

    Haiyan LUO; Qingqun YAO; Lizhen CHEN; Yu ZHENG

    2015-01-01

    Project management of agricultural scientific research institutions is an important section of agricultural scientific research plan management. It is of great significance for sustainable development of scientific research work of scientific research institutions. According to a series of opinions and notices about scientific and technological system reform issued by the state,and combining current situations of management of scientific research projects in scientific research institutions,this paper made a preliminary study on management of agricultural scientific research projects in the new trend. Finally,on the basis of the current situations of management of agricultural scientific research projects,it came up with pertinent recommendations,including strengthening communication and cooperation and actively declaring projects,strengthening preliminary planning of projects and establishing project information database,reinforcing project process management,ensuring on-time and high quality completion of projects,and strengthening learning and improving quality of management personnel.

  17. All projects related to | Page 520 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Topic: HEALTH SURVEYS, HEALTH STATISTICS, DATA COLLECTING, INFORMATION TECHNOLOGY, COMPUTERS. Region: Bangladesh, India, Viet Nam, Tanzania, Canada. Program: Foundations for Innovation. Total Funding: CA$ 65,200.00. Building Peace and Security Research Capacity in Eastern Africa. Project.

  18. eDOC : A collaboration infrastructure to manage knowledge and information on nuclear projects and research activities

    International Nuclear Information System (INIS)

    Van Craeynest, J.M.; Jacquemet, F.; Chermette, D.; Bonneau, S.

    2004-01-01

    One of EU's strategic goals was launched at Lisbon 2000 European summit: becoming the most competitive knowledge economy by 2010. In the field of nuclear technologies, we know that capitalizing knowledge and acquired experience is vital to preserve nuclear equipment's' safe use in the future. Knowledge Management encompasses various domains of business practices, relating to human resources management, information, information technologies, strategy, and accounting. Facing such complex issues, especially in R and D organizations, knowledge management cannot only stand on a few organizational or technical solutions. All functions must be involved to achieve those strategic objectives: management must find realistic incentives and inscribe Knowledge Management as a core management objective (just as Quality Insurance has been). Human Resources departments and education institutes can benefit from new technologies to improve training methods. Research units have to launch knowledge capitalization projects to retrieve, save and transfer critical knowledge, technical skills and know-how. An a-posteriori knowledge saving 'fireman-type' action must be done in the case of major events but we must promote an on-going capitalization effort as well and embed KM into projects and activities management methods. This effort during the project and afterwards is implemented through a perennial information system. This information system should provide a wide range of services for scientific publications and patents management, corporate or local knowledge bases and document repositories, project management and collaboration, rich media authoring, etc. Implementing virtual workspaces with eDOC Research and engineering activities are more and more cross-organizations funded and netlike organized. Furthermore, it is very difficult for project managers to deal with security constraints as they must share but protect knowledge as well. Before sharing information, teams have to share a

  19. Security Risks of Cloud Computing and Its Emergence as 5th Utility Service

    Science.gov (United States)

    Ahmad, Mushtaq

    Cloud Computing is being projected by the major cloud services provider IT companies such as IBM, Google, Yahoo, Amazon and others as fifth utility where clients will have access for processing those applications and or software projects which need very high processing speed for compute intensive and huge data capacity for scientific, engineering research problems and also e- business and data content network applications. These services for different types of clients are provided under DASM-Direct Access Service Management based on virtualization of hardware, software and very high bandwidth Internet (Web 2.0) communication. The paper reviews these developments for Cloud Computing and Hardware/Software configuration of the cloud paradigm. The paper also examines the vital aspects of security risks projected by IT Industry experts, cloud clients. The paper also highlights the cloud provider's response to cloud security risks.

  20. SecurePhone: a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly

    Science.gov (United States)

    Ricci, R.; Chollet, G.; Crispino, M. V.; Jassim, S.; Koreman, J.; Olivar-Dimas, M.; Garcia-Salicetti, S.; Soria-Rodriguez, P.

    2006-05-01

    This article presents an overview of the SecurePhone project, with an account of the first results obtained. SecurePhone's primary aim is to realise a mobile phone prototype - the 'SecurePhone' - in which biometrical authentication enables users to deal secure, dependable transactions over a mobile network. The SecurePhone is based on a commercial PDA-phone, supplemented with specific software modules and a customised SIM card. It integrates in a single environment a number of advanced features: access to cryptographic keys through strong multimodal biometric authentication; appending and verification of digital signatures; real-time exchange and interactive modification of (esigned) documents and voice recordings. SecurePhone's 'biometric recogniser' is based on original research. A fused combination of three different biometric methods - speaker, face and handwritten signature verification - is exploited, with no need for dedicated hardware components. The adoption of non-intrusive, psychologically neutral biometric techniques is expected to mitigate rejection problems that often inhibit the social use of biometrics, and speed up the spread of e-signature technology. Successful biometric authentication grants access to SecurePhone's built-in esignature services through a user-friendly interface. Special emphasis is accorded to the definition of a trustworthy security chain model covering all aspects of system operation. The SecurePhone is expected to boost m-commerce and open new scenarios for m-business and m-work, by changing the way people interact and by improving trust and confidence in information technologies, often considered intimidating and difficult to use. Exploitation plans will also explore other application domains (physical and logical access control, securised mobile communications).

  1. Dearfield Dream Project: Developing an Interdisciplinary Historical/Cultural Research Network

    Directory of Open Access Journals (Sweden)

    Robert Brunswig

    2013-08-01

    Full Text Available The Dearfield Dream Project is a collaborative research initiative to conduct historical, cultural, archaeological, and environmental studies on the early 20th Century African-American colony site of Dearfield, Colorado, USA. Because the breadth and significance of the Dearfield Project requires an interdisciplinary research team, a network of research collaborators has been assembled. This research network seeks to discover, preserve, and disseminate knowledge of the site and its surrounding farmsteads’ economic, social, political, and environmental history for better understanding and interpretation of its contributions to Colorado and U.S. history. Herein, we detail progress that has been made on this important historical/cultural research project. Further, we outline the future of the Dearfield research network along with our current and anticipated subjects of inquiry.

  2. Laboratory Directed Research and Development FY2008 Annual Report

    International Nuclear Information System (INIS)

    Kammeraad, J.E.; Jackson, K.J.; Sketchley, J.A.; Kotta, P.R.

    2009-01-01

    The Laboratory Directed Research and Development (LDRD) Program, authorized by Congress in 1991 and administered by the Institutional Science and Technology Office at Lawrence Livermore, is our primary means for pursuing innovative, long-term, high-risk, and potentially high-payoff research that supports the full spectrum of national security interests encompassed by the missions of the Laboratory, the Department of Energy, and National Nuclear Security Administration. The accomplishments described in this annual report demonstrate the strong alignment of the LDRD portfolio with these missions and contribute to the Laboratory's success in meeting its goals. The LDRD budget of $91.5 million for fiscal year 2008 sponsored 176 projects. These projects were selected through an extensive peer-review process to ensure the highest scientific quality and mission relevance. Each year, the number of deserving proposals far exceeds the funding available, making the selection a tough one indeed. Our ongoing investments in LDRD have reaped long-term rewards for the Laboratory and the nation. Many Laboratory programs trace their roots to research thrusts that began several years ago under LDRD sponsorship. In addition, many LDRD projects contribute to more than one mission area, leveraging the Laboratory's multidisciplinary team approach to science and technology. Safeguarding the nation from terrorist activity and the proliferation of weapons of mass destruction will be an enduring mission of this Laboratory, for which LDRD will continue to play a vital role. The LDRD Program is a success story. Our projects continue to win national recognition for excellence through prestigious awards, papers published in peer-reviewed journals, and patents granted. With its reputation for sponsoring innovative projects, the LDRD Program is also a major vehicle for attracting and retaining the best and the brightest technical staff and for establishing collaborations with universities

  3. Interdisciplinary physics research in the Japanese Hadron Project

    International Nuclear Information System (INIS)

    Yamazaki, Toshimitsu.

    1990-09-01

    The Japanese Hadron Project (JHP) is a large future plan of interdisciplinary and international scope, aimed at basic physics research by creating and using various secondary unstable particle beams such as mesons, muons, neutrons and accelerated exotic nuclei. It comprises a high-intensity proton linac of 1 GeV, a compressor/stretcher ring and an ISOL/accelerator to deliver beams to MESON, NEUTRON and EXOTIC NUCLEI arena's. In addition, as the present ongoing project, we are pushing KAON arena based on the KEK 12 GeV proton synchrotron. The present paper describes the scientific motivation and technological bases for this future project as well as the presently going pre-JHP research activities. (author)

  4. Social security reform in a dynastic life-cycle model with endogenous fertility

    Czech Academy of Sciences Publication Activity Database

    Boháček, Radim; Belush, Volha

    -, č. 381 (2009), s. 1-51 ISSN 1211-3298 R&D Projects: GA AV ČR IAA700850702 Institutional research plan: CEZ:AV0Z70850503 Keywords : fertility * social security * fiscal policy * public expenditures * taxation Subject RIV: AH - Economics http://www.cerge-ei.cz/pdf/wp/Wp381.pdf

  5. Strengthening global health security capacity--Vietnam demonstration project, 2013.

    Science.gov (United States)

    Tran, Phu Dac; Vu, Long Ngoc; Nguyen, Hien Tran; Phan, Lan Trong; Lowe, Wayne; McConnell, Michelle S; Iademarco, Michael F; Partridge, Jeffrey M; Kile, James C; Do, Trang; Nadol, Patrick J; Bui, Hien; Vu, Diep; Bond, Kyle; Nelson, David B; Anderson, Lauren; Hunt, Kenneth V; Smith, Nicole; Giannone, Paul; Klena, John; Beauvais, Denise; Becknell, Kristi; Tappero, Jordan W; Dowell, Scott F; Rzeszotarski, Peter; Chu, May; Kinkade, Carl

    2014-01-31

    Over the past decade, Vietnam has successfully responded to global health security (GHS) challenges, including domestic elimination of severe acute respiratory syndrome (SARS) and rapid public health responses to human infections with influenza A(H5N1) virus. However, new threats such as Middle East respiratory syndrome coronavirus (MERS-CoV) and influenza A(H7N9) present continued challenges, reinforcing the need to improve the global capacity to prevent, detect, and respond to public health threats. In June 2012, Vietnam, along with many other nations, obtained a 2-year extension for meeting core surveillance and response requirements of the 2005 International Health Regulations (IHR). During March-September 2013, CDC and the Vietnamese Ministry of Health (MoH) collaborated on a GHS demonstration project to improve public health emergency detection and response capacity. The project aimed to demonstrate, in a short period, that enhancements to Vietnam's health system in surveillance and early detection of and response to diseases and outbreaks could contribute to meeting the IHR core capacities, consistent with the Asia Pacific Strategy for Emerging Diseases. Work focused on enhancements to three interrelated priority areas and included achievements in 1) establishing an emergency operations center (EOC) at the General Department of Preventive Medicine with training of personnel for public health emergency management; 2) improving the nationwide laboratory system, including enhanced testing capability for several priority pathogens (i.e., those in Vietnam most likely to contribute to public health emergencies of international concern); and 3) creating an emergency response information systems platform, including a demonstration of real-time reporting capability. Lessons learned included awareness that integrated functions within the health system for GHS require careful planning, stakeholder buy-in, and intradepartmental and interdepartmental coordination and

  6. Wireless Sensor Network Security Enhancement Using Directional Antennas: State of the Art and Research Challenges.

    Science.gov (United States)

    Curiac, Daniel-Ioan

    2016-04-07

    Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to various types of security attacks. A possible solution to reduce the security risks is to use directional antennas instead of omnidirectional ones or in conjunction with them. Due to their increased complexity, higher costs and larger sizes, directional antennas are not traditionally used in wireless sensor networks, but recent technology trends may support this method. This paper surveys existing state of the art approaches in the field, offering a broad perspective of the future use of directional antennas in mitigating security risks, together with new challenges and open research issues.

  7. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  8. CURRENT STATUS OF RESEARCH PROJECT ACTIVITIES IN MEDICAL UNIVERSITIES IN BULGARIA.

    Directory of Open Access Journals (Sweden)

    Svetoslav Garov

    2013-07-01

    Full Text Available Introduction: In Bulgaria there are five medical universities: in the cities of Sofia, Plovdiv, Varna, Pleven and Stara Zagora. Their main mission is training specialists in the fields of medicine and health care, increasing their qualification by means of postgraduate education and performing research activities. One of medical universities’ top priorities is encouraging research activities mainly aimed at preparation and implementation of research projects. Aim: The purpose of our study is to examine the current status of research project activities in Bulgarian medical universities.Material and methods: In order to define the science competitions related to Bulgarian medical universities we have applied a documentary and sociological approach. Results: Research projects that Bulgarian medical universities can apply for are divided into two groups – national and international. The most significant international projects are European ones since Bulgaria is an EU member state and this allows us to participate in such projects. Conclusion: Universities should strive for establishing even better conditions for encouraging application for research projects aimed at developing competent and experienced staff, even though the majority of them may not obtain approval for financing.The changes in the situation regarding Bulgarian science require the implementation and development of more research staff motivated to improve their knowledge and skills in the relevant dynamically changing competition and project field.

  9. The DOE safeguards and security technology development program

    International Nuclear Information System (INIS)

    Cherry, R.C.; Wheelock, A.J.

    1991-01-01

    This paper reports that strategic planning for safeguards and security within the Department of Energy emphasizes the contributions of advanced technologies to the achievement of Departmental protection program goals. The Safeguards and Security Technology Development Program provides state-of-the-art technologies, systems and technical services in support of the policies and programmatic requirements for the protection of Departmental assets. The Program encompasses research and development in physical security, nuclear material control and accountability, information security and personnel security, and the integration of these disciplines in advanced applications. Technology development tasks serve goals that range from the maintenance of an effective technology base to the development, testing and evaluation of applications to meet field needs. A variety of factors, from the evolving threat to reconfiguration of the DOE complex and the technical requirements of new facilities, are expected to influence safeguards and security technology requirements and development efforts. Implementation of the Program is based on the systematic identification, prioritization and alignment of technology development tasks and needs. Initiatives currently underway are aimed at enhancing technology development project management. Increased management attention is also being placed on efforts to promote the benefits of the Program through technology transfer and interagency liaison

  10. Creative and Arts-Based Research Methods in Academic Research. Lessons from a Participatory Research Project in the Netherlands

    Directory of Open Access Journals (Sweden)

    Gwenda van der Vaart

    2018-05-01

    Full Text Available This article contributes to the discussion on the value of creative and arts-based research methods to researchers interested in community resilience. Based on a participatory research project that used a mix of these methods conducted in a Dutch village, we provide more nuanced, concrete insights into their value. We elaborate on the three project stages: walking interviews, group discussions, and a creative workshop that resulted in an exhibition, and on the challenges encountered during our project. We discuss how each project stage contributed to producing multifaceted knowledge. Researchers can benefit from the discussions about the process and implications of creative and arts-based methods such as ours as, to date, there has been relatively little methodological reflection on these methods. Based on our study, we conclude that despite some challenges, creative and arts-based research methods have much to offer researchers interested in community resilience. We found they can: 1. generate deep insight by going beyond rational-cognitive ways of knowing and providing new ways of understanding people's real lived experiences and views; and 2. offer ways to "give back" and contribute to a community, potentially igniting a spark among community members to engage in further action and contribute to their community's resilience. This aligns with the, currently often articulated, aims of researchers to directly benefit those involved and to share their research findings with a broader non-academic audience.

  11. The Security Research of Digital Library Network

    Science.gov (United States)

    Zhang, Xin; Song, Ding-Li; Yan, Shu

    Digital library is a self-development needs for the modern library to meet the development requirements of the times, changing the way services and so on. digital library from the hardware, technology, management and other aspects to objective analysis of the factors of threats to digital library network security. We should face up the problems of digital library network security: digital library network hardware are "not hard", the technology of digital library is relatively lag, digital library management system is imperfect and other problems; the government should take active measures to ensure that the library funding, to enhance the level of network hardware, to upgrade LAN and prevention technology, to improve network control technology, network monitoring technology; to strengthen safety management concepts, to prefect the safety management system; and to improve the level of security management modernization for digital library.

  12. Assessing the impact of agricultural R&D investments on long-term projections of food security

    NARCIS (Netherlands)

    Kristkova, Zuzana Smeets; Dijk, Van Michiel; Meijl, Van Hans

    2017-01-01

    The purpose of this chapter is to analyze the impact of public agricultural Research and Development (R&D) investments on agricultural productivity and long-term food security to derive policy recommendations. The methodological approach is based on the application of the state-of-the art

  13. Research and realization of info-net security controlling system

    Science.gov (United States)

    Xu, Tao; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-03-01

    The thesis introduces some relative concepts about Network Cybernetics, and we design and realize a new info-net security controlling system based on Network Cybernetics. The system can control the endpoints, safely save files, encrypt communication, supervise actions of users and show security conditions, in order to realize full-scale security management. At last, we simulate the functions of the system. The results show, the system can ensure the controllability of users and devices, and supervise them real-time. The system can maximize the security of the network and users.

  14. University-Level Research Projects for High School Students

    Science.gov (United States)

    McConnell, Mark L.

    2000-01-01

    The goal of this project was to provide an opportunity for high school students to participate in university-level research projects. In this case, students from Pinkerton Academy (Derry, New Hampshire) were invited to participate in efforts to catalog data from the COMPTEL experiment on NASA's Compton Gamma-Ray Observatory (CGRO). These activities were part of a senior level honors course at Pinkerton. Although the success of this particular program was rather limited, we feel that the general concept is a sound one. In principle, the concept of partnerships between local schools and university researchers is one that could be especially attractive to soft money researchers. Programs can be carefully designed to benefit both the students and the research program.

  15. Addressing security issues related to virtual institute distributed activities

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2008-03-01

    One issue confounding the development and experimentation of distributed modeling and simulation environments is the inability of the project team to identify and collaborate with resources, both human and technical, from outside the United States. This limitation is especially significant within the human behavior representation area where areas such as cultural effects research and joint command team behavior modeling require the participation of various cultural and national representatives. To address this limitation, as well as other human behavior representation research issues, NATO Research and Technology Organization initiated a project to develop a NATO virtual institute that enables more effective and more collaborative research into human behavior representation. However, in building and operating a virtual institute one of the chief concerns must be the cyber security of the institute. Because the institute "exists" in cyberspace, all of its activities are susceptible to cyberattacks, subterfuge, denial of service and all of the vulnerabilities that networked computers must face. In our opinion, for the concept of virtual institutes to be successful and useful, their operations and services must be protected from the threats in the cyber environment. A key to developing the required protection is the development and promulgation of standards for cyber security. In this paper, we discuss the types of cyber standards that are required, how new internet technologies can be exploited and can benefit the promulgation, development, maintenance, and robustness of the standards. This paper is organized as follows. Section One introduces the concept of the virtual institutes, the expected benefits, and the motivation for our research and for research in this area. Section Two presents background material and a discussion of topics related to VIs, uman behavior and cultural modeling, and network-centric warfare. Section Three contains a discussion of the

  16. Research capacity building integrated into PHIT projects: leveraging research and research funding to build national capacity.

    Science.gov (United States)

    Hedt-Gauthier, Bethany L; Chilengi, Roma; Jackson, Elizabeth; Michel, Cathy; Napua, Manuel; Odhiambo, Jackline; Bawah, Ayaga

    2017-12-21

    Inadequate research capacity impedes the development of evidence-based health programming in sub-Saharan Africa. However, funding for research capacity building (RCB) is often insufficient and restricted, limiting institutions' ability to address current RCB needs. The Doris Duke Charitable Foundation's African Health Initiative (AHI) funded Population Health Implementation and Training (PHIT) partnership projects in five African countries (Ghana, Mozambique, Rwanda, Tanzania and Zambia) to implement health systems strengthening initiatives inclusive of RCB. Using Cooke's framework for RCB, RCB activity leaders from each country reported on RCB priorities, activities, program metrics, ongoing challenges and solutions. These were synthesized by the authorship team, identifying common challenges and lessons learned. For most countries, each of the RCB domains from Cooke's framework was a high priority. In about half of the countries, domain specific activities happened prior to PHIT. During PHIT, specific RCB activities varied across countries. However, all five countries used AHI funding to improve research administrative support and infrastructure, implement research trainings and support mentorship activities and research dissemination. While outcomes data were not systematically collected, countries reported holding 54 research trainings, forming 56 mentor-mentee relationships, training 201 individuals and awarding 22 PhD and Masters-level scholarships. Over the 5 years, 116 manuscripts were developed. Of the 59 manuscripts published in peer-reviewed journals, 29 had national first authors and 18 had national senior authors. Trainees participated in 99 conferences and projects held 37 forums with policy makers to facilitate research translation into policy. All five PHIT projects strongly reported an increase in RCB activities and commended the Doris Duke Charitable Foundation for prioritizing RCB, funding RCB at adequate levels and time frames and for allowing

  17. Laboratory technology research - abstracts of FY 1997 projects

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-11-01

    The Laboratory Technology Research (LTR) program supports high-risk, multidisciplinary research partnerships to investigate challenging scientific problems whose solutions have promising commercial potential. These partnerships capitalize on two great strengths of this country: the world-class basic research capability of the DOE Energy Research (ER) multi-program national laboratories and the unparalleled entrepreneurial spirit of American industry. A distinguishing feature of the ER multi-program national laboratories is their ability to integrate broad areas of science and engineering in support of national research and development goals. The LTR program leverages this strength for the Nation`s benefit by fostering partnerships with US industry. The partners jointly bring technology research to a point where industry or the Department`s technology development programs can pursue final development and commercialization. Projects supported by the LTR program are conducted by the five ER multi-program laboratories. These projects explore the applications of basic research advances relevant to DOE`s mission over a full range of scientific disciplines. The program presently emphasizes three critical areas of mission-related research: advanced materials; intelligent processing/manufacturing research; and sustainable environments.

  18. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  19. All projects related to nepal | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Policy research institutions and the health SDGs: Building momentum in South Asia. Project. This pilot ... Most fast-growing cities in South Asia face increased waterlogging and water contamination from improperly managed solid waste. Region: Bangladesh ... Program: Agriculture and Food Security. Total Funding: CA$ ...

  20. Managing a major security system installation: Practical lessons learned

    International Nuclear Information System (INIS)

    Roehrig, S.C.

    1986-01-01

    Sandia National Laboratories has been heavily involved for over a decade in aiding a number of DOE facilities in defining and implementing upgraded security safeguards systems. Because security system definition, design, and installation is still a relatively new field to the commercial world, effective project management must pay special attention to first understanding and then interpreting the unique aspects of a security system for all concerned parties. Experiences from an actual security system installation are used to illustrate some project management approaches which have been found to be effective

  1. The JAERI and Universities joint project research reports on the 4th joint research project between JAERI and Universities on backend chemistry

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-02-01

    In the Joint Research Project between JAERI and Universities on Backend Chemistry, the 4th-term researches of it were performed on sixteen themes from April of 1999 to March of 2001 under the four categories, i.e. Nuclear-chemistry and physical-chemistry properties of actinides', 'Solid state chemistry and nuclear fuel engineering of actinides', 'Solution chemistry and technologies for separation and analysis of actinides' and Treatment of radioactive waste and environmental chemistry'. The present report compiled the papers contributed to the Joint Research Project. (author)

  2. An adaptive algorithm for performance assessment of construction project management with respect to resilience engineering and job security

    Directory of Open Access Journals (Sweden)

    P. Hashemi

    2018-01-01

    Full Text Available Construction sites are accident-prone locations and therefore safety management plays an im-portant role in these workplaces. This study presents an adaptive algorithm for performance as-sessment of project management with respect to resilience engineering and job security in a large construction site. The required data are collected using questionnaires in a large construction site. The presented algorithm is composed of radial basis function (RBF, artificial neural networks multi-layer perceptron (ANN-MLP, and statistical tests. The results indicate that preparedness, fault-tolerance, and flexibility are the most effective factors on overall efficiency. Moreover, job security and resilience engineering have similar statistical impacts on overall system efficiency. The results are verified and validated by the proposed algorithm.

  3. Teaching Web Security Using Portable Virtual Labs

    Science.gov (United States)

    Chen, Li-Chiou; Tao, Lixin

    2012-01-01

    We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…

  4. Harvard Personal Genome Project: lessons from participatory public research

    Science.gov (United States)

    2014-01-01

    Background Since its initiation in 2005, the Harvard Personal Genome Project has enrolled thousands of volunteers interested in publicly sharing their genome, health and trait data. Because these data are highly identifiable, we use an ‘open consent’ framework that purposefully excludes promises about privacy and requires participants to demonstrate comprehension prior to enrollment. Discussion Our model of non-anonymous, public genomes has led us to a highly participatory model of researcher-participant communication and interaction. The participants, who are highly committed volunteers, self-pursue and donate research-relevant datasets, and are actively engaged in conversations with both our staff and other Personal Genome Project participants. We have quantitatively assessed these communications and donations, and report our experiences with returning research-grade whole genome data to participants. We also observe some of the community growth and discussion that has occurred related to our project. Summary We find that public non-anonymous data is valuable and leads to a participatory research model, which we encourage others to consider. The implementation of this model is greatly facilitated by web-based tools and methods and participant education. Project results are long-term proactive participant involvement and the growth of a community that benefits both researchers and participants. PMID:24713084

  5. Harvard Personal Genome Project: lessons from participatory public research.

    Science.gov (United States)

    Ball, Madeleine P; Bobe, Jason R; Chou, Michael F; Clegg, Tom; Estep, Preston W; Lunshof, Jeantine E; Vandewege, Ward; Zaranek, Alexander; Church, George M

    2014-02-28

    Since its initiation in 2005, the Harvard Personal Genome Project has enrolled thousands of volunteers interested in publicly sharing their genome, health and trait data. Because these data are highly identifiable, we use an 'open consent' framework that purposefully excludes promises about privacy and requires participants to demonstrate comprehension prior to enrollment. Our model of non-anonymous, public genomes has led us to a highly participatory model of researcher-participant communication and interaction. The participants, who are highly committed volunteers, self-pursue and donate research-relevant datasets, and are actively engaged in conversations with both our staff and other Personal Genome Project participants. We have quantitatively assessed these communications and donations, and report our experiences with returning research-grade whole genome data to participants. We also observe some of the community growth and discussion that has occurred related to our project. We find that public non-anonymous data is valuable and leads to a participatory research model, which we encourage others to consider. The implementation of this model is greatly facilitated by web-based tools and methods and participant education. Project results are long-term proactive participant involvement and the growth of a community that benefits both researchers and participants.

  6. Metrics, models and foresight for sustainable food and nutrition security in Europe

    NARCIS (Netherlands)

    Rutten, M.M.; Achterbosch, T.J.; Boer, de I.J.M.; Geleijnse, J.M.; Meijl, van J.C.M.; Veer, van 't P.; Zimmermann, K.L.

    2015-01-01

    This paper defines the research agenda of the SUSFANS project. It aims to contribute to balanced and
    encompassing views on how to strengthen food and nutrition security outcomes in the EU and how to
    improve the performance of the food system in the EU from the perspective of social,

  7. Toolbox for Research, or how to facilitate a central data management in small-scale research projects.

    Science.gov (United States)

    Bialke, Martin; Rau, Henriette; Thamm, Oliver C; Schuldt, Ronny; Penndorf, Peter; Blumentritt, Arne; Gött, Robert; Piegsa, Jens; Bahls, Thomas; Hoffmann, Wolfgang

    2018-01-25

    In most research projects budget, staff and IT infrastructures are limiting resources. Especially for small-scale registries and cohort studies professional IT support and commercial electronic data capture systems are too expensive. Consequently, these projects use simple local approaches (e.g. Excel) for data capture instead of a central data management including web-based data capture and proper research databases. This leads to manual processes to merge, analyze and, if possible, pseudonymize research data of different study sites. To support multi-site data capture, storage and analyses in small-scall research projects, corresponding requirements were analyzed within the MOSAIC project. Based on the identified requirements, the Toolbox for Research was developed as a flexible software solution for various research scenarios. Additionally, the Toolbox facilitates data integration of research data as well as metadata by performing necessary procedures automatically. Also, Toolbox modules allow the integration of device data. Moreover, separation of personally identifiable information and medical data by using only pseudonyms for storing medical data ensures the compliance to data protection regulations. This pseudonymized data can then be exported in SPSS format in order to enable scientists to prepare reports and analyses. The Toolbox for Research was successfully piloted in the German Burn Registry in 2016 facilitating the documentation of 4350 burn cases at 54 study sites. The Toolbox for Research can be downloaded free of charge from the project website and automatically installed due to the use of Docker technology.

  8. Are Project Developers Knights and Researchers Queens?

    DEFF Research Database (Denmark)

    Vinstrup, Anya Bjørn

    2014-01-01

    How do project developers at universities view their customers – the researchers, and how do they see themselves as a profession? Does this view influence their motivation and what challenges does it impose? Taking elements of theory from Public Service Motivation (PSM) and linking it with a small...... empirically based survey among the project developers at a centrally located office at a university in Denmark – these questions are sought to be answered. The focal point being the motivation of the project developer, with special emphasis on their user perception, and the practical implications it has...... for leadership and organisational structures....

  9. Data base on nuclear power plant dose reduction research projects

    Energy Technology Data Exchange (ETDEWEB)

    Khan, T.A.; Dionne, B.J.; Baum, J.W.

    1985-12-01

    This report contains project information on the research and development activities of the nuclear power industry in the area of dose reduction. It is based on a data base of information set up at the ALARA Center of Brookhaven National Laboratory. One purpose of this report is to draw attention to work in progress and to enable researchers and subscribers to obtain further information from the investigators and project managers. Information is provided on 180 projects, divided according to whether they are oriented to Engineering Research or to Health Physics Technology. The report contains indices on main category, project manager, principal investigator, sponsoring organization, contracting organization, and subject. This is an initial report. It is intended that periodic updates be issued whenever sufficient material has been accumulated.

  10. Data base on nuclear power plant dose reduction research projects

    International Nuclear Information System (INIS)

    Khan, T.A.; Dionne, B.J.; Baum, J.W.

    1985-12-01

    This report contains project information on the research and development activities of the nuclear power industry in the area of dose reduction. It is based on a data base of information set up at the ALARA Center of Brookhaven National Laboratory. One purpose of this report is to draw attention to work in progress and to enable researchers and subscribers to obtain further information from the investigators and project managers. Information is provided on 180 projects, divided according to whether they are oriented to Engineering Research or to Health Physics Technology. The report contains indices on main category, project manager, principal investigator, sponsoring organization, contracting organization, and subject. This is an initial report. It is intended that periodic updates be issued whenever sufficient material has been accumulated

  11. Wireless network security theories and applications

    CERN Document Server

    Chen, Lei; Zhang, Zihong

    2013-01-01

    Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth

  12. Evaluation on Electronic Securities Settlements Systems by AHP Methods

    Science.gov (United States)

    Fukaya, Kiyoyuki; Komoda, Norihisa

    Accompanying the spread of Internet and the change of business models, electronic commerce expands buisness areas. Electronic finance commerce becomes popular and especially online security tradings becoome very popular in this area. This online securitiy tradings have some good points such as less mistakes than telephone calls. In order to expand this online security tradings, the transfer of the security paper is one the largest problems to be solved. Because it takes a few days to transfer the security paper from a seller to a buyer. So the dematerialization of security papers is one of the solutions. The demterilization needs the information systems for setteling security. Some countries such as France, German, United Kingdom and U.S.A. have been strating the dematerialization projects. The legacy assesments on these projects focus from the viewpoint of the legal schemes only and there is no assessment from system architectures. This paper focuses on the information system scheme and valuates these dematerlization projects by AHP methods from the viewpoints of “dematerializaion of security papers", “speed of transfer", “usefulness on the system" and “accumulation of risks". This is the first case of valuations on security settlements systems by AHP methods, especially four counties’ systems.

  13. IT Security Support for Spaceport Command and Control System

    Science.gov (United States)

    McLain, Jeffrey

    2013-01-01

    During the fall 2013 semester, I worked at the Kennedy Space Center as an IT Security Intern in support of the Spaceport Command and Control System under the guidance of the IT Security Lead Engineer. Some of my responsibilities included assisting with security plan documentation collection, system hardware and software inventory, and malicious code and malware scanning. Throughout the semester, I had the opportunity to work on a wide range of security related projects. However, there are three projects in particular that stand out. The first project I completed was updating a large interactive spreadsheet that details the SANS Institutes Top 20 Critical Security Controls. My task was to add in all of the new commercial of the shelf (COTS) software listed on the SANS website that can be used to meet their Top 20 controls. In total, there are 153 unique security tools listed by SANS that meet one or more of their 20 controls. My second project was the creation of a database that will allow my mentor to keep track of the work done by the contractors that report to him in a more efficient manner by recording events as they occur throughout the quarter. Lastly, I expanded upon a security assessment of the Linux machines being used on center that I began last semester. To do this, I used a vulnerability and configuration tool that scans hosts remotely through the network and presents the user with an abundance of information detailing each machines configuration. The experience I gained from working on each of these projects has been invaluable, and I look forward to returning in the spring semester to continue working with the IT Security team.

  14. Korea-China optical technology research centre project

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Cheol Jung; Lee, J M; Rhee, Y J. and others

    2001-09-01

    The main objectives of this project are to establish the internatinal collaboration basis of optical technolgies between Korean and China through the combination of the Chinese advanced fundamental technologies with the Korea industrialization and commercialization infrastructures, by ways of exchanging scientist and informations, holding joint seminars, cooperative utilization of research resources. On the ground of this establishment, the optical technologies of Korea are supposed to be leveled up to that of the world-most advanced. At the same time, for the improvement of mutual benefit and financial profit of both of the countries, technical support for the investment on the optical industries in the two countries and establishment of foundation for the venture capitals are also the purpose of this project. Because the state-of-the-arts of the Chinese technologies such as aerospace engineering, military defense technology, applications to medical treatments, laser fusion research, and so on, are known to be far above those of Korean and upto one of the most advanced in the world, it is necessary that the acquisition of these technologies, resulting in the enhancement of the levels of domestic technologies in these fields, implementation of joint research projects for technology development as well as the balanced opportunities for commercial product/sales and cooperation should be actively pursued.

  15. Korea-China Optical Technology Research Centre Project

    International Nuclear Information System (INIS)

    Kim, Cheol Jung; Rhee, Y. J.; Jung, D. Y. and others

    2004-06-01

    The main objectives of this project are to establish the international collaboration basis of optical technologies between Korea and China. The combination of the Chinese advanced fundamental technologies with the Korean industrialization and commercialization infrastructures is realized, by ways of exchanging scientists and informations, holding joint seminars, cooperative utilization of research resources. On the ground of this establishment, the optical technologies of Korea are supposed to be leveled up to those of the world-most advanced. At the same time, for the improvement of mutual benefit and financial profit of both countries, providing technical advice and suggestions to the optical industries in the two countries is an another goal of this project. The state-of-the-arts of the Chinese technologies such as aerospace engineering, military defence technology, medical technology, laser fusion research, and so on, are known to be far above those of Korean and up to one of the most advanced in the world. Thus it is thought to be necessary that the acquisition of these technologies, implementation of joint research projects for technology development as well as the balanced opportunities for commercial product/sales and cooperation should be actively pursued in order to enhance the levels of Korean technologies in these fields

  16. Korea-China optical technology research centre project

    International Nuclear Information System (INIS)

    Kim, Cheol Jung; Lee, J. M.; Rhee, Y. J. and others

    2001-09-01

    The main objectives of this project are to establish the internatinal collaboration basis of optical technolgies between Korean and China through the combination of the Chinese advanced fundamental technologies with the Korea industrialization and commercialization infrastructures, by ways of exchanging scientist and informations, holding joint seminars, cooperative utilization of research resources. On the ground of this establishment, the optical technologies of Korea are supposed to be leveled up to that of the world-most advanced. At the same time, for the improvement of mutual benefit and financial profit of both of the countries, technical support for the investment on the optical industries in the two countries and establishment of foundation for the venture capitals are also the purpose of this project. Because the state-of-the-arts of the Chinese technologies such as aerospace engineering, military defense technology, applications to medical treatments, laser fusion research, and so on, are known to be far above those of Korean and upto one of the most advanced in the world, it is necessary that the acquisition of these technologies, resulting in the enhancement of the levels of domestic technologies in these fields, implementation of joint research projects for technology development as well as the balanced opportunities for commercial product/sales and cooperation should be actively pursued

  17. Korea-China Optical Technology Research Centre Project

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Cheol Jung; Rhee, Y. J.; Jung, D. Y. and others

    2004-06-15

    The main objectives of this project are to establish the international collaboration basis of optical technologies between Korea and China. The combination of the Chinese advanced fundamental technologies with the Korean industrialization and commercialization infrastructures is realized, by ways of exchanging scientists and informations, holding joint seminars, cooperative utilization of research resources. On the ground of this establishment, the optical technologies of Korea are supposed to be leveled up to those of the world-most advanced. At the same time, for the improvement of mutual benefit and financial profit of both countries, providing technical advice and suggestions to the optical industries in the two countries is an another goal of this project. The state-of-the-arts of the Chinese technologies such as aerospace engineering, military defence technology, medical technology, laser fusion research, and so on, are known to be far above those of Korean and up to one of the most advanced in the world. Thus it is thought to be necessary that the acquisition of these technologies, implementation of joint research projects for technology development as well as the balanced opportunities for commercial product/sales and cooperation should be actively pursued in order to enhance the levels of Korean technologies in these fields.

  18. Reading Research Utilization Project: An RIC Project for Teachers and Other Field Personnel.

    Science.gov (United States)

    District of Columbia Public Schools, Washington, DC. Dept. of Research and Evaluation.

    This is the final report of the Reading Research Utilization Project (RUP) which was funded by the U.S. Office of Education from July, 1971 to June, 1973. The purpose of the RUP was to encourage the translation of research, particularly reading research, into practice in 16 target elementary schools in Washington, D.C. RUP was a school information…

  19. Research projects and capacity building | Breen | Water SA

    African Journals Online (AJOL)

    ... by capacity building in the context of research projects. Based on this interpretation, reasonable and unreasonable expectations with respect to the extent to which capacity building can be achieved within a given project duration are discussed. A model is suggested, which would improve understanding and delivery and ...

  20. Security engineering: systems engineering of security through the adaptation and application of risk management

    Science.gov (United States)

    Gilliam, David P.; Feather, Martin S.

    2004-01-01

    Information Technology (IT) Security Risk Management is a critical task in the organization, which must protect its resources and data against the loss of confidentiality, integrity, and availability. As systems become more complex and diverse, and more vulnerabilities are discovered while attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security. This paper describes an approach to address IT security risk through risk management and mitigation in both the institution and in the project life cycle.

  1. Considerations on the selection and prioritization of information security solutions

    Directory of Open Access Journals (Sweden)

    Maria Cristina RĂDULESCU

    2016-05-01

    Full Text Available This paper provides a set of guidelines that can be used for prescribing a methodology or a detailed process for selecting and prioritizing security projects or solutions. It is based on the idea that costs of security solutions should be justified by their contribution to ensuring adequate protection of information resources in the organization which implements them. The article reviews general issues of security risks and costs, arguing the need for explicit consideration of information resources security requirements in order to validate decisions concerning security projects implementation. In such an approach, security requirements of information resources are used as a reference system to quantify the benefits and limitations of security solutions defined as alternative or complementary responses to certain security risks as their implementation faces budget constraints.

  2. Nevada National Security Site. Site-Directed Research and Development FY 2011 Annual Report

    International Nuclear Information System (INIS)

    Bender, Howard

    2012-01-01

    This fiscal year 2011 annual report of the Site-Directed Research and Development program, the 10th anniversary edition, recognizes a full decade of innovative R and D accomplishments in support of the Nevada National Security Site (NNSS). Last year the NNSS itself was renamed to reflect a diversifying mission, and our R and D program has contributed significantly to shape emerging missions that will continue to evolve. New initiatives in stockpile stewardship science, nonproliferation, and treaty verification and monitoring have had substantial successes in FY 2011, and many more accomplishments are expected. SDRD is the cornerstone on which many of these initiatives rest. Historically supporting our main focus areas, SDRD is also building a solid foundation for new, and non-traditional, emerging national security missions. The program continues its charter to advance science and technology for a broad base of agencies including the U.S. Department of Energy (DOE), U.S. Department of Defense (DoD), U.S. Department of Homeland Security (DHS), and many others.

  3. Crowd-sourced Archaeological Research: The MicroPasts Project

    Directory of Open Access Journals (Sweden)

    Chiara Bonacchi

    2014-10-01

    Full Text Available This paper offers a brief introduction to MicroPasts, a web-enabled crowd-sourcing and crowd-funding project whose overall goal is to promote the collection and use of high quality research data via institutional and community collaborations, both on- and off-line. In addition to introducing this initiative, the discussion below is a reflection of its lead author’s core contribution to the project and will dwell in more detail on one particular aspect of MicroPasts: its relevance to research and practice in public archaeology, cultural policy and heritage studies.

  4. On-going research projects at Ankara Nuclear research center in agriculture and animal science

    International Nuclear Information System (INIS)

    Tukenmez, I.

    2004-01-01

    Full text:The research and development activities of Ankara Nuclear Research Center in Agriculture and Animal Science(ANRCAA) are concentrated on the contribution of atomic energy to peace by the use of nuclear and related techniques in food, agriculture and animal science. Nuclear techniques are used in the above fields in two ways: in vitro or in vivo radio tracing the substances and processes of biological importance, and irradiation of biological materials for preservation and quality modification. Research projects are carried out by interdisciplinary studies with well equipped laboratories at the Center. The projects in progress conducted by the Center comprises nuclear-aided researches in soil fertility, plant nutrition, plant protection, improvement of field crops, improvement of horticultural plants and forest trees by mutation breeding, in vitro culture technique with mutagen treatments, use of phosphogypsum in soil amelioration, sterilization of medical supplies, wastewater treatment, animal nutrition, animal health and productivity and accreditation. The on-going projects with the above subjects will be summarized for possible collaborations

  5. On-going research projects at Ankara Nuclear Research Center in Agriculture and Animal Science

    International Nuclear Information System (INIS)

    Tukenmez, I.

    2004-01-01

    Full text: The research and development activities of Ankara Nuclear Research Center in Agriculture and Animal Science(ANRCAA) are concentrated on the contribution of atomic energy to peace by the use of nuclear and related techniques in food, agriculture and animal science. Nuclear techniques are used in the above fields in two ways: in vitro or in vivo radio tracing the substances and processes of biological importance, and irradiation of biological materials for preservation and quality modification. Research projects are carried out by interdisciplinary studies with well equipped laboratories at the Center. The projects in progress conducted by the Center comprises nuclear-aided researches in soil fertility, plant nutrition, plant protection, improvement of field crops, improvement of horticultural plants and forest trees by mutation breeding, in vitro culture technique with mutagen treatments, use of phosphogypsum in soil amelioration, sterilization of medical supplies, wastewater treatment, animal nutrition, animal health and productivity and accreditation. The on-going projects with the above subjects will be summarized for possible collaborations

  6. Water Resources Research Grant Program project descriptions, fiscal year 1987

    Science.gov (United States)

    ,

    1987-01-01

    This report contains information on the 34 new projects funded by the United States Geological Survey 's Water Resources Research Grant Program in fiscal year 1987 and on 3 projects completed during the year. For the new projects, the report gives the grant number, project title, performing organization, principal investigator(s), and a project description that includes: (1) identification of water related problems and problem-solution approach (2) contribution to problem solution, (3) objectives, and (4) approach. The 34 projects include 12 in the area of groundwater quality problems, 12 in the science and technology of water quality management, 1 in climate variability and the hydrologic cycle, 4 in institutional change in water resources management, and 5 in surface water management. For the three completed projects, the report furnishes the grant number; project title; performing organization; principal investor(s); starting data; data of receipt of final report; and an abstract of the final report. Each project description provides the information needed to obtain a copy of the final report. The report contains tables showing: (1) proposals received according to area of research interest, (2) grant awards and funding according to area of research interest, (3) proposals received according to type of submitting organization, and (4) awards and funding according to type of organization. (Author 's abstract)

  7. European research project 'Metrology for radioactive waste management'

    International Nuclear Information System (INIS)

    Suran, J.

    2014-01-01

    The three-year European research project M etrology for Radioactive Waste Management' was launched in October 2011 under the EMRP (European Metrology Research Programme). It involves 13 European national metrology institutes and a total budget exceeds four million Euros. The project is coordinated by the Czech Metrology Institute and is divided into five working groups. This poster presents impact, excellence, relevance to EMPR objectives, and implementation and management of this project.(author)

  8. Lessons learned from setting up the NOWESP research data base: Experiences in an interdisciplinary research project

    Science.gov (United States)

    Radach, Günther; Gekeler, Jens

    1996-09-01

    Research carried out within the framework of the MAST project NOWESP (North-West European Shelf Programme) was based on a multi-parameter data set of existing marine data, relevant for estimating trends, variability and fluxes on the Northwest European Shelf. The data sets were provided by the partners of the project. Additional data sets were obtained from several other institutions. During the project, the data were organized in the NOWESP Research Data Base (NRDB), for which a special data base scheme was defined that was capable of storing different types of marine data. Data products, like time series and interpolated fields, were provided to the partners for analysis (Radach et al. [1997]). After three years of project time, the feasibility of such an approach is discussed. Ways of optimizing data access and evaluation are proposed. A project-oriented Research Data Base is a useful tool because of its flexibility and proximity to the research being carried out. However, several requirements must be met to derive optimum benefits from this type of service unit. Since this task usually is carried out by a limited number of staff, an early start of project data management is recommended. To enable future projects to succeed in an analogous compilation of relevant data for their use, as performed in NOWESP, the task of organizing the data sets for any short-term project should be shared between a research data base group and a national or international data centre whose experience and software could be used. It must be ensured that only quality controlled data sets from the individual data-produ cing projects are delivered to the national data centres. It is recommended that data quality control should be performed by the originators and/or data centres before delivering any data sets to the research data base. Delivery of the (full) data sets should be checked and their quality should be approved by authorized data centres.

  9. Laboratory Directed Research and Development Program FY2011

    Energy Technology Data Exchange (ETDEWEB)

    none, none

    2012-04-27

    Berkeley Lab's research and the Laboratory Directed Research and Development (LDRD) program support DOE's Strategic Themes that are codified in DOE's 2006 Strategic Plan (DOE/CF-0010), with a primary focus on Scientific Discovery and Innovation. For that strategic theme, the Fiscal Year (FY) 2011 LDRD projects support each one of the three goals through multiple strategies described in the plan. In addition, LDRD efforts support the four goals of Energy Security, the two goals of Environmental Responsibility, and Nuclear Security (unclassified fundamental research that supports stockpile safety and nonproliferation programs). Going forward in FY 2012, the LDRD program also supports the Goals codified in the new DOE Strategic Plan of May, 2011. The LDRD program also supports Office of Science strategic plans, including the 20-year Scientific Facilities Plan and the Office of Science Strategic Plan. The research also supports the strategic directions periodically under consideration and review by the Office of Science Program Offices, such as LDRD projects germane to new research facility concepts and new fundamental science directions. Brief summares of projects and accomplishments for the period for each division are included.

  10. Research on information security system of waste terminal disposal process

    Science.gov (United States)

    Zhou, Chao; Wang, Ziying; Guo, Jing; Guo, Yajuan; Huang, Wei

    2017-05-01

    Informatization has penetrated the whole process of production and operation of electric power enterprises. It not only improves the level of lean management and quality service, but also faces severe security risks. The internal network terminal is the outermost layer and the most vulnerable node of the inner network boundary. It has the characteristics of wide distribution, long depth and large quantity. The user and operation and maintenance personnel technical level and security awareness is uneven, which led to the internal network terminal is the weakest link in information security. Through the implementation of security of management, technology and physics, we should establish an internal network terminal security protection system, so as to fully protect the internal network terminal information security.

  11. Development of an Internet Security Policy for health care establishments.

    Science.gov (United States)

    Ilioudis, C; Pangalos, G

    2000-01-01

    The Internet provides unprecedented opportunities for interaction and data sharing among health care providers, patients and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality and integrity of information. This paper defines the basic security requirements that must be addressed in order to use the Internet to safely transmit patient and/or other sensitive Health Care information. It describes a suitable Internet Security Policy for Health Care Establishments and provides the set of technical measures that are needed for its implementation. The proposed security policy and technical approaches have been based on an extensive study of the related recommendations from the security and standard groups both in EU amid USA and our related work and experience. The results have been utilized in the framework of the Intranet Health Clinic project, where the use of the Internet for the transmission of sensitive Health Care information is of vital importance.

  12. Community-researcher liaisons: the Pathways to Resilience Project ...

    African Journals Online (AJOL)

    The Pathways to Resilience Project is an ongoing, community-based participatory research (CBPR) project. Its express focus is the exploration of how at-risk youths use formal services and/or informal, naturally occurring resources to beat the odds that have been stacked against them, with the intent of partnering with ...

  13. ICT security- aspects important for nuclear facilities

    International Nuclear Information System (INIS)

    Thunem, Atoosa P-J.

    2005-09-01

    Rapid application growth of complex Information and Communication Technologies (ICT) in every society and state infrastructure as well as industry has revealed vulnerabilities that eventually have given rise to serious security breaches. These vulnerabilities together with the course of the breaches from cause to consequence are gradually about to convince the field experts that ensuring the security of ICT-driven systems is no longer possible by only relying on the fundaments of computer science, IT, or telecommunications. Appropriating knowledge from other disciplines is not only beneficial, but indeed very necessary. At the same time, it is a common observation today that ICT-driven systems are used everywhere, from the nuclear, aviation, commerce and healthcare domains to camera-equipped web-enabled cellular phones. The increasing interdisciplinary and inter-sectoral aspects of ICT security worldwide have been providing updated and useful information to the nuclear domain, as one of the emerging users of ICT-driven systems. Nevertheless, such aspects have also contributed to new and complicated challenges, as ICT security for the nuclear domain is in a much more delicate manner than for any other domains related to the concept of safety, at least from the public standpoint. This report addresses some important aspects of ICT security that need to be considered at nuclear facilities. It deals with ICT security and the relationship between security and safety from a rather different perspective than usually observed and applied. The report especially highlights the influence on the security of ICT-driven systems by all other dependability factors, and on that basis suggests a framework for ICT security profiling, where several security profiles are assumed to be valid and used in parallel for each ICT-driven system, sub-system or unit at nuclear facilities. The report also covers a related research topic of the Halden Project with focus on cyber threats and

  14. Laboratory Directed Research and Development FY2011 Annual Report

    International Nuclear Information System (INIS)

    Craig, W.; Sketchley, J.; Kotta, P.

    2012-01-01

    A premier applied-science laboratory, Lawrence Livermore National Laboratory (LLNL) has earned the reputation as a leader in providing science and technology solutions to the most pressing national and global security problems. The LDRD Program, established by Congress at all DOE national laboratories in 1991, is LLNL's most important single resource for fostering excellent science and technology for today's needs and tomorrow's challenges. The LDRD internally directed research and development funding at LLNL enables high-risk, potentially high-payoff projects at the forefront of science and technology. The LDRD Program at Livermore serves to: (1) Support the Laboratory's missions, strategic plan, and foundational science; (2) Maintain the Laboratory's science and technology vitality; (3) Promote recruiting and retention; (4) Pursue collaborations; (5) Generate intellectual property; and (6) Strengthen the U.S. economy. Myriad LDRD projects over the years have made important contributions to every facet of the Laboratory's mission and strategic plan, including its commitment to nuclear, global, and energy and environmental security, as well as cutting-edge science and technology and engineering in high-energy-density matter, high-performance computing and simulation, materials and chemistry at the extremes, information systems, measurements and experimental science, and energy manipulation. A summary of each project was submitted by the principal investigator. Project summaries include the scope, motivation, goals, relevance to DOE/NNSA and LLNL mission areas, the technical progress achieved in FY11, and a list of publications that resulted from the research. The projects are: (1) Nuclear Threat Reduction; (2) Biosecurity; (3) High-Performance Computing and Simulation; (4) Intelligence; (5) Cybersecurity; (6) Energy Security; (7) Carbon Capture; (8) Material Properties, Theory, and Design; (9) Radiochemistry; (10) High-Energy-Density Science; (11) Laser Inertial

  15. Improving industrial process control systems security

    CERN Document Server

    Epting, U; CERN. Geneva. TS Department

    2004-01-01

    System providers are today creating process control systems based on remote connectivity using internet technology, effectively exposing these systems to the same threats as corporate computers. It is becoming increasingly difficult and costly to patch/maintain the technical infrastructure monitoring and control systems to remove these vulnerabilities. A strategy including risk assessment, security policy issues, service level agreements between the IT department and the controls engineering groups must be defined. In addition an increased awareness of IT security in the controls system engineering domain is needed. As consequence of these new factors the control system architectures have to take into account security requirements, that often have an impact on both operational aspects as well as on the project and maintenance cost. Manufacturers of industrial control system equipment do however also propose progressively security related solutions that can be used for our active projects. The paper discusses ...

  16. Online tutoring procedure for research project supervision: management, organization and key elements

    Directory of Open Access Journals (Sweden)

    Antònia Darder Mesquida

    2015-07-01

    Full Text Available Research project tutoring appears as a crucial element for teaching; it is a planned action based on the relationship between a tutor and a student. This paper presents the findings of a design and development research which has as its main aim to create an organization system for the tutoring of online research projects. That system seeks to facilitate the tutoring and supervision task with trainee researchers, providing guidance for its management and instruments for its implementation. The main conclusions arising from this research derive from considering the need to offer a solution to the problem of distance research project supervision and has materialized in organization and sequencing through a model about the variables that influence the research project tutoring problem.

  17. Designing Business and Technology Management Work-Packages in Cleantech Research Projects

    DEFF Research Database (Denmark)

    Tambo, Torben; Enevoldsen, Peter

    2014-01-01

    a clearer and more explicit perspective of conversion from research to business in to research project in energy storage. This paper suggests a model view on the conversion capability within cleantech research projects in order to anchor a distinctive and methodological consideration for business...

  18. Student and Faculty Outcomes of Undergraduate Science Research Projects by Geographically Dispersed Students

    Science.gov (United States)

    Shaw, Lawton; Kennepohl, Dietmar

    2013-01-01

    Senior undergraduate research projects are important components of most undergraduate science degrees. The delivery of such projects in a distance education format is challenging. Athabasca University (AU) science project courses allow distance education students to complete research project courses by working with research supervisors in their…

  19. Research on evaluation of enterprise project culture based on Denison model

    Directory of Open Access Journals (Sweden)

    Yucheng Zeng

    2015-05-01

    Full Text Available Purpose: The purpose of this paper is to build enterprise project culture evaluation model and search for the best evaluation method for Chinese enterprise project culture on the basis of studying and drawing lessons from enterprise culture evaluation theory and method at home and abroad. Design/methodology/approach: Referring to the Denison enterprise culture evaluation model, this paper optimizes it according to the difference of enterprise project culture, designs the enterprise project culture evaluation model and proves the practicability of the model through empirical. Finding: This paper finds that it`s more applicable to use the Denison model for enterprise project culture evaluation through the comparative analysis of domestic and foreign enterprise culture evaluation theory and method, the systematic project culture management framework of Chinese enterprises has not yet formed through empirical research, and four factors in enterprise project culture have important influence on project operation performance improvement. Research limitations/implications: The research on evaluation of enterprise project culture based on Denison model is a preliminary attempt, the design of evaluation index system, evaluation model and scale structure also need to be improved, but the thinking of this paper in this field provides a valuable reference for future research. Practical Implications: This paper provides the support of theory and practice for evaluating the present situation of enterprise project culture construction and analyzing the advantages and disadvantages of project culture, which contributes to the "dialectical therapy" of enterprise project management, enterprise management and enterprise project culture construction. Originality/value: The main contribution of this paper is the introduction of Denison enterprise culture model. Combining with the actual situation of enterprises, this paper also builds the evaluation model for

  20. Laboratory Directed Research and Development FY2008 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Kammeraad, J E; Jackson, K J; Sketchley, J A; Kotta, P R

    2009-03-24

    The Laboratory Directed Research and Development (LDRD) Program, authorized by Congress in 1991 and administered by the Institutional Science and Technology Office at Lawrence Livermore, is our primary means for pursuing innovative, long-term, high-risk, and potentially high-payoff research that supports the full spectrum of national security interests encompassed by the missions of the Laboratory, the Department of Energy, and National Nuclear Security Administration. The accomplishments described in this annual report demonstrate the strong alignment of the LDRD portfolio with these missions and contribute to the Laboratory's success in meeting its goals. The LDRD budget of $91.5 million for fiscal year 2008 sponsored 176 projects. These projects were selected through an extensive peer-review process to ensure the highest scientific quality and mission relevance. Each year, the number of deserving proposals far exceeds the funding available, making the selection a tough one indeed. Our ongoing investments in LDRD have reaped long-term rewards for the Laboratory and the nation. Many Laboratory programs trace their roots to research thrusts that began several years ago under LDRD sponsorship. In addition, many LDRD projects contribute to more than one mission area, leveraging the Laboratory's multidisciplinary team approach to science and technology. Safeguarding the nation from terrorist activity and the proliferation of weapons of mass destruction will be an enduring mission of this Laboratory, for which LDRD will continue to play a vital role. The LDRD Program is a success story. Our projects continue to win national recognition for excellence through prestigious awards, papers published in peer-reviewed journals, and patents granted. With its reputation for sponsoring innovative projects, the LDRD Program is also a major vehicle for attracting and retaining the best and the brightest technical staff and for establishing collaborations with

  1. The Privacy and Security Implications of Open Data in Healthcare.

    Science.gov (United States)

    Kobayashi, Shinji; Kane, Thomas B; Paton, Chris

    2018-04-22

     The International Medical Informatics Association (IMIA) Open Source Working Group (OSWG) initiated a group discussion to discuss current privacy and security issues in the open data movement in the healthcare domain from the perspective of the OSWG membership.  Working group members independently reviewed the recent academic and grey literature and sampled a number of current large-scale open data projects to inform the working group discussion.  This paper presents an overview of open data repositories and a series of short case reports to highlight relevant issues present in the recent literature concerning the adoption of open approaches to sharing healthcare datasets. Important themes that emerged included data standardisation, the inter-connected nature of the open source and open data movements, and how publishing open data can impact on the ethics, security, and privacy of informatics projects.  The open data and open source movements in healthcare share many common philosophies and approaches including developing international collaborations across multiple organisations and domains of expertise. Both movements aim to reduce the costs of advancing scientific research and improving healthcare provision for people around the world by adopting open intellectual property licence agreements and codes of practice. Implications of the increased adoption of open data in healthcare include the need to balance the security and privacy challenges of opening data sources with the potential benefits of open data for improving research and healthcare delivery. Georg Thieme Verlag KG Stuttgart.

  2. Open Source Vulnerability Database Project

    Directory of Open Access Journals (Sweden)

    Jake Kouns

    2008-06-01

    Full Text Available This article introduces the Open Source Vulnerability Database (OSVDB project which manages a global collection of computer security vulnerabilities, available for free use by the information security community. This collection contains information on known security weaknesses in operating systems, software products, protocols, hardware devices, and other infrastructure elements of information technology. The OSVDB project is intended to be the centralized global open source vulnerability collection on the Internet.

  3. Computer Security: Introduction to information and computer security (1/4)

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    Sebastian Lopienski is CERN's Deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support services hosted in the CERN Computer Centre; providing Central CVS Service for software projects at CERN; and development of applications for accelerator controls in Java. He graduated from the University of Warsaw (MSc in Computer Science) in 2002, and earned an MBA degree at the Enterprise Administration Institute in Aix-en-Provence and Haute Ecole de Gestion in Geneva in 2010. His professional interests include software and network security, distributed systems, and Web and mobile technologies. With the prevalence of modern information te...

  4. Team research at the biology-mathematics interface: project management perspectives.

    Science.gov (United States)

    Milton, John G; Radunskaya, Ami E; Lee, Arthur H; de Pillis, Lisette G; Bartlett, Diana F

    2010-01-01

    The success of interdisciplinary research teams depends largely upon skills related to team performance. We evaluated student and team performance for undergraduate biology and mathematics students who participated in summer research projects conducted in off-campus laboratories. The student teams were composed of a student with a mathematics background and an experimentally oriented biology student. The team mentors typically ranked the students' performance very good to excellent over a range of attributes that included creativity and ability to conduct independent research. However, the research teams experienced problems meeting prespecified deadlines due to poor time and project management skills. Because time and project management skills can be readily taught and moreover typically reflect good research practices, simple modifications should be made to undergraduate curricula so that the promise of initiatives, such as MATH-BIO 2010, can be implemented.

  5. Leading Edge Aeronautics Research for NASA Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The LEARN Project explores the creation of novel concepts and processes with the potential to create new capabilities in aeronautics research through awards to the...

  6. Finance/security/life.

    OpenAIRE

    Langley, P.

    2017-01-01

    What is the contemporary relation between finance and security? This essay encourages further research into the securitization of finance by developing the notion of ‘finance/security/life’. A focus on the intersections of finance/security/life will be shown to prompt a broadened range of critical, cross-disciplinary concerns with the various ways in which financial markets are positioned as vital to securing wealth, welfare and wellbeing.

  7. Nutrition security under extreme events

    Science.gov (United States)

    Martinez, A.

    2017-12-01

    Nutrition security under extreme events. Zero hunger being one of the Sustainable Development Goal from the United Nations, food security has become a trending research topic. However extreme events impact on global food security is not yet 100% understood and there is a lack of comprehension of the underlying mechanisms of global food trade and nutrition security to improve countries resilience to extreme events. In a globalized world, food is still a highly regulated commodity and a strategic resource. A drought happening in a net food-exporter will have little to no effect on its own population but the repercussion on net food-importers can be extreme. In this project, we propose a methodology to describe and quantify the impact of a local drought to human health at a global scale. For this purpose, nutrition supply and global trade data from FAOSTAT have been used with domestic food production from national agencies and FAOSTAT, global precipitation from the Climate Research Unit and health data from the World Health Organization. A modified Herfindahl-Hirschman Index (HHI) has been developed to measure the level of resilience of one country to a drought happening in another country. This index describes how a country is dependent of importation and how diverse are its importation. Losses of production and exportation due to extreme events have been calculated using yield data and a simple food balance at country scale. Results show that countries the most affected by global droughts are the one with the highest dependency to one exporting country. Changes induced by droughts also disturbed their domestic proteins, fat and calories supply resulting most of the time in a higher intake of calories or fat over proteins.

  8. ORGANIZATIONAL STRUCTURE OF RESEARCH PROJECT ACTIVITIES PERFORMED AT MEDICAL UNIVERSITIES IN BULGARIA.

    Directory of Open Access Journals (Sweden)

    Svetoslav Garov

    2013-07-01

    Full Text Available Introduction: There are five Bulgarian medical universities in the cities of Sofia, Plovdiv, Varna, Pleven and Stara Zagora. A major priority of medical universities is to encourage research activities mainly aimed at preparation and implementation of research projects. Projects are managed by the participating organizations called “beneficiaries”. Beneficiaries develop projects, apply for finances and if approved they implement those projects.Aim: The purpose of our study is to examine the organizational structure of research project activities on the macro level and on the micro level in Bulgarian medical universities.Material and methods: In order to define the separate elements of the organizational structure and to analyze the relations and interaction between them we have applied a documentary and sociological approach. Results: During the last six years there was a significant increase in the number and the overall annual financial value of the projects performed at medical universities in Bulgaria. The reasons for such increase are: managers realizing the advantages of and benefits from the implementation of research projects ensuring high quality modernization of research units’ equipment and facilities; access to innovative technologies; development of interdisciplinary relations, etc. Benefits arising from improved results motivate us to consider as appropriate some additional investments aimed at increasing the number of team members and further optimization of the currently existing structures (research centers in charge of research with the purpose of achieving even better results in this particular field. Conclusion: The role of research project activities in medical universities’ research field is of vital importance for the educational institutions’ success. Taking into consideration the changed conditions, European possibilities and the highly competitive environment, realizing this aspect will be essential for the

  9. Academic Researchers on the Project Market in the Ethos of Knowledge Capitalism

    Science.gov (United States)

    Brunila, Kristiina; Hannukainen, Kristiina

    2017-01-01

    How knowledge capitalism retools the scope of academic research and researchers is an issue which this article ties to the project market in the ethos of knowledge capitalism. In Finland, academic research has been forced to apply for funding in project-based activities reflecting European Union policies. The project market, which in this article…

  10. Gender | Page 179 | IDRC - International Development Research ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... et font connaître des solutions pratiques pour la culture des légumineuses à ... Language French ... Language French ... Language French ... Language French ... A project supported by the Canadian International Food Security Research ...

  11. The Praxis of Social Enterprise and Human Security: An Applied Research Agenda

    Directory of Open Access Journals (Sweden)

    Malcolm David Brown

    2014-01-01

    Full Text Available The growth of social enterprise within development NGO work might lead one to suspect it has been irredeemably corrupted by neo-liberal capitalism. However, using the tools of capitalism is not the same as subscribing to the values of capitalism. This paper is situated at the intersection of five fields: human security, international development, social enterprise, social franchising, and left-wing anti-capitalist thought. It examines the relevance of social en­terprise to human security and to development, the relationship between social enterprise and the anti-capitalist values of the left, and it then focuses on social franchising—a subset of social enterprise that highlights the importance of cooperation—suggesting that it may be a useful methodology for NGOs carrying out educational work in parts of the developing world. It syn­thesises and extends ideas that I have presented elsewhere [1-3], it draws on ethnographic fieldwork on the Thai-Burma border, and it puts forward an agenda for further applied research that is rooted in a sociological analysis of civil society and contributes to the human security paradigm.

  12. The Bitterroot Ecosystem Management Research Project: What we have learned

    Science.gov (United States)

    Helen Y. Smith

    2000-01-01

    The varied topics presented in these symposium proceedings represent the diverse nature of the Bitterroot Ecosystem Management Research Project (BEMRP). Separated into six sections, the papers cover the different themes researched by BEMRP collaborators as well as brief overviews of five other ecosystem management projects. The sections are: Understanding the Ecosystem...

  13. All projects related to | Page 32 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Globally, pulses—legumes such as peas, beans, or lentils—are essential to achieving resilient agricultural systems and healthy diets. End Date: March 31 ... Program: Agriculture and Food Security. Total Funding: CA$ ... Strengthening the research management capacity of Africa's science granting councils. Project. Science ...

  14. Increasing the Value of Research: A Comparison of the Literature on Critical Success Factors for Projects, IT Projects and Enterprise Resource Planning Projects

    Directory of Open Access Journals (Sweden)

    Annie Maddison Warren

    2016-11-01

    Full Text Available Since the beginning of modern project management in the 1960s, academic researchers have sought to identify a definitive list of Critical Success Factors (CSFs, the key things that project managers must get right in order to deliver a successful product. With the advent of Information Technology (IT projects and, more recently, projects to deliver Enterprise Resource Planning (ERP systems, attention has turned to identifying definitive lists of CSFs for these more specific project types. The purpose of this paper is to take stock of this research effort by examining how thinking about each type of project has evolved over time, before producing a consolidated list of CSFs for each as a basis for comparison. This process reveals a high degree of similarity, leading to the conclusion that the goal of identifying a generic list of CSFs for project management has been achieved. Therefore, rather than continuing to describe lists of CSFs, researchers could increase the value of their contribution by taking a step forward and focusing on why, despite this apparent knowledge of how to ensure their success, ERP projects continue to fail.

  15. Managing information technology security risk

    Science.gov (United States)

    Gilliam, David

    2003-01-01

    Information Technology (IT) Security Risk Management is a critical task for the organization to protect against the loss of confidentiality, integrity and availability of IT resources. As systems bgecome more complex and diverse and and attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security risk. This paper describes a two-pronged approach in addressing IT security risk and risk management in the organization: 1) an institutional enterprise appraoch, and 2) a project life cycle approach.

  16. Data management for community research projects: A JGOFS case study

    Science.gov (United States)

    Lowry, Roy K.

    1992-01-01

    Since the mid 1980s, much of the marine science research effort in the United Kingdom has been focused into large scale collaborative projects involving public sector laboratories and university departments, termed Community Research Projects. Two of these, the Biogeochemical Ocean Flux Study (BOFS) and the North Sea Project incorporated large scale data collection to underpin multidisciplinary modeling efforts. The challenge of providing project data sets to support the science was met by a small team within the British Oceanographic Data Centre (BODC) operating as a topical data center. The role of the data center was to both work up the data from the ship's sensors and to combine these data with sample measurements into online databases. The working up of the data was achieved by a unique symbiosis between data center staff and project scientists. The project management, programming and data processing skills of the data center were combined with the oceanographic experience of the project communities to develop a system which has produced quality controlled, calibrated data sets from 49 research cruises in 3.5 years of operation. The data center resources required to achieve this were modest and far outweighed by the time liberated in the scientific community by the removal of the data processing burden. Two online project databases have been assembled containing a very high proportion of the data collected. As these are under the control of BODC their long term availability as part of the UK national data archive is assured. The success of the topical data center model for UK Community Research Project data management has been founded upon the strong working relationships forged between the data center and project scientists. These can only be established by frequent personal contact and hence the relatively small size of the UK has been a critical factor. However, projects covering a larger, even international scale could be successfully supported by a

  17. The COMURHEX 2 project. Investing in UF6 long-term security of supply

    International Nuclear Information System (INIS)

    Bouzon, Pierre; Lacombe, Philippe; Durante, Pierre; Teyssier, Patrick

    2008-01-01

    The front-end nuclear fuel supply chain for LWRs encompasses four major industrial stages that are mining and concentration, conversion, enrichment, and eventually fuel fabrication. The different stages involve uranium in different chemical and physical forms. Enrichment of the 235-U fissile isotope requires gaseous UF6. As the standard output of mine is U3O8, referred to as ''yellow cake'', a purely chemical stage is therefore needed to fluorinate U3O8 and turn it into UFe: this is the conversion stage. U3O8 inventories management is thus performed at the conversion sites.Purification of the mining concentrates is also needed prior to actual conversion into UFe. This step is important because the front-end supply chain facilities have strict specifications concerning impurities. The conversion stage may involve intermediary products, namely UO3 and/or UF4, depending on the industrial scheme implemented. With the Comurhex 2 project, AREVA is not only shaping the future of conversion market and contributing to the security of supply of its customers, but it is also developing innovative techniques and reorganizing the conversion process steps. Providing such guaranteed and valuable conversion supply with a brand new plant is our strong commitment to a sustainable nuclear fuel cycle. And AREVA is the first that has launched such a project, looking further ahead. The three main axes of sustainable development, economical, social, and environmental, are truly taken into account in the development of the new project.

  18. Security option file - After closure (DOS-AF)

    International Nuclear Information System (INIS)

    2016-01-01

    A first volume presents the context and scope of the Cigeo project, and the scope of this document. It proposes a general presentation of Cigeo, the regulatory framework and standards. It describes the different aspects and components of the security strategy: principles, security functions after closure, objectives of protection, global approach. It proposes a security assessment: objectives, consistency with international practices, assessment steps, scenarios, scenario quantitative assessment. The next part addresses security management. The second volume contains a description of the storage system: site characteristics, types of stored parcels, the future of the installation after its closure. The third volume proposes a security assessment. It addresses the management of risks and uncertainties, describes a scenario of normal evolution and also scenarios of altered evolutions, scenarios of unintentional human intrusion, and what-if type scenarios. The fourth volume reports lessons at the current stage of the project, and gives an overview of important activities from storage design to storage closure

  19. Computer Security: Cryptography and authentication (2/4)

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    Remi Mollon studied computer security at University and he first worked on Grids, with the EGEE project, for a French Bioinformatics institute. Information security being crucial in that field, he developed an encrypted file management system on top of Grid middleware, and he contributed in integrating legacy applications with Grids. Then, he was hired by CERN as a Grid Data Management developer, and he joined the Grid Operational Security Coordination Team. Remi has now moved to CERN Computer Security Team. Remi is involved in the daily security operations, in addition to be responsible to design Team's computer infrastructure, and to participate to several projects, like multi-factor authentication at CERN. With the prevalence of modern information technologies and its increasing integration into our daily live, digital systems become more and more playground for evil people. While in the past, attacks were driven by fame& kudos, nowadays money is the motivating factor. Just the recent months have s...

  20. Reputation-Based Internet Protocol Security: A Multilayer Security Framework for Mobile Ad Hoc Networks

    Science.gov (United States)

    2010-09-01

    motivated research in behavior grading systems [56]. Peer-to-peer eCommerce appli- cations such as eBay, Amazon, uBid, and Yahoo have performed research that...Security in Mobile Ad Hoc Networks”. IEEE Security & Privacy , 72–75, 2008. 15. Chakeres, ID and EM Belding-Royer. “AODV Routing Protocol Implementa...Detection System”. Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy , 240–250. 1992. 21. Devore, J.L. and N.R. Farnum