WorldWideScience

Sample records for security sponsored research

  1. Jointly Sponsored Research Program

    Energy Technology Data Exchange (ETDEWEB)

    Everett A. Sondreal; John G. Hendrikson; Thomas A. Erickson

    2009-03-31

    U.S. Department of Energy (DOE) Cooperative Agreement DE-FC26-98FT40321 funded through the Office of Fossil Energy and administered at the National Energy Technology Laboratory (NETL) supported the performance of a Jointly Sponsored Research Program (JSRP) at the Energy & Environmental Research Center (EERC) with a minimum 50% nonfederal cost share to assist industry in commercializing and effectively applying highly efficient, nonpolluting energy systems that meet the nation's requirements for clean fuels, chemicals, and electricity in the 21st century. The EERC in partnership with its nonfederal partners jointly performed 131 JSRP projects for which the total DOE cost share was $22,716,634 (38%) and the nonfederal share was $36,776,573 (62%). Summaries of these projects are presented in this report for six program areas: (1) resource characterization and waste management, (2) air quality assessment and control, (3) advanced power systems, (4) advanced fuel forms, (5) value-added coproducts, and (6) advanced materials. The work performed under this agreement addressed DOE goals for reductions in CO{sub 2} emissions through efficiency, capture, and sequestration; near-zero emissions from highly efficient coal-fired power plants; environmental control capabilities for SO{sub 2}, NO{sub x}, fine respirable particulate (PM{sub 2.5}), and mercury; alternative transportation fuels including liquid synfuels and hydrogen; and synergistic integration of fossil and renewable resources.

  2. Jointly Sponsored Research Program Energy Related Research

    Energy Technology Data Exchange (ETDEWEB)

    Western Research Institute

    2009-03-31

    Cooperative Agreement, DE-FC26-98FT40323, Jointly Sponsored Research (JSR) Program at Western Research Institute (WRI) began in 1998. Over the course of the Program, a total of seventy-seven tasks were proposed utilizing a total of $23,202,579 in USDOE funds. Against this funding, cosponsors committed $26,557,649 in private funds to produce a program valued at $49,760,228. The goal of the Jointly Sponsored Research Program was to develop or assist in the development of innovative technology solutions that will: (1) Increase the production of United States energy resources - coal, natural gas, oil, and renewable energy resources; (2) Enhance the competitiveness of United States energy technologies in international markets and assist in technology transfer; (3) Reduce the nation's dependence on foreign energy supplies and strengthen both the United States and regional economies; and (4) Minimize environmental impacts of energy production and utilization. Under the JSR Program, energy-related tasks emphasized enhanced oil recovery, heavy oil upgrading and characterization, coal beneficiation and upgrading, coal combustion systems development including oxy-combustion, emissions monitoring and abatement, coal gasification technologies including gas clean-up and conditioning, hydrogen and liquid fuels production, coal-bed methane recovery, and the development of technologies for the utilization of renewable energy resources. Environmental-related activities emphasized cleaning contaminated soils and waters, processing of oily wastes, mitigating acid mine drainage, and demonstrating uses for solid waste from clean coal technologies, and other advanced coal-based systems. Technology enhancement activities included resource characterization studies, development of improved methods, monitors and sensors. In general the goals of the tasks proposed were to enhance competitiveness of U.S. technology, increase production of domestic resources, and reduce environmental

  3. Sponsored Research & the Freedom of Publication.

    Science.gov (United States)

    Packham, David

    This paper examines conflicts and collaboration between industry and universities regarding sponsored research and freedom of publication, particularly in the United Kingdom. An opening section notes that the values of the market and the university are in fundamental conflict which presents problems for institutions attempting to work in…

  4. The University Campus: Why Military Sponsored Research.

    Science.gov (United States)

    Messing, Aubrey E.

    Military-sponsored research on the university campus has been a major issue during the past several years. Opposition has come from radicals, who wish to destroy the university itself, to critics, who feel such activities take needed funds and personnel from the more important task of solving our nation's social problems. These viewpoints and the…

  5. DOE-EERC jointly sponsored research program

    Energy Technology Data Exchange (ETDEWEB)

    Hendrikson, J.G.; Sondreal, E.A.

    1999-09-01

    U.S. Department of Energy (DOE) Cooperative Agreement DE-FC21-93MC30098 funded through the Office of Fossil Energy and administered at the Federal Energy Technology Center (FETC) supported the performance of a Jointly Sponsored Research Program (JSRP) at the Energy and Environmental Research Center (EERC) with a minimum 50% nonfederal cost share to assist industry in commercializing and effectively applying efficient, nonpolluting energy technologies that can compete effectively in meeting market demands for clean fuels, chemical feedstocks, and electricity in the 21st century. The objective of the JSRP was to advance the deployment of advanced technologies for improving energy efficiency and environmental performance through jointly sponsored research on topics that would not be adequately addressed by the private sector alone. Examples of such topics include the barriers to hot-gas cleaning impeding the deployment of high-efficiency power systems and the search for practical means for sequestering CO{sub 2} generated by fossil fuel combustion. The selection of particular research projects was guided by a combination of DOE priorities and market needs, as provided by the requirement for joint venture funding approved both by DOE and the private sector sponsor. The research addressed many different energy resource and related environmental problems, with emphasis directed toward the EERC's historic lead mission in low-rank coals (LRCs), which represent approximately half of the U.S. coal resources in the conterminous states, much larger potential resources in Alaska, and a major part of the energy base in the former U.S.S.R., East Central Europe, and the Pacific Rim. The Base and JSRP agreements were tailored to the growing awareness of critical environmental issues, including water supply and quality, air toxics (e.g., mercury), fine respirable particulate matter (PM{sub 2.5}), and the goal of zero net CO{sub 2} emissions.

  6. Report on Department of Homeland Security Sponsored Research Project at Lawrence Livermore National Laboratory on Preparation for an Improvised Nuclear Device Event

    Energy Technology Data Exchange (ETDEWEB)

    A., B

    2008-07-31

    Following the events of September 11th, a litany of imaginable horribles was trotted out before an anxious and concerned public. To date, government agencies and academics are still grappling with how to best respond to such catastrophes, and as Senator Lieberman's quote says above, now is the time to plan and prepare for such events. One of the nation's worst fears is that terrorists might detonate an improvised nuclear device (IND) in an American city. With 9/11 serving as the catalyst, the government and many NGOs have invested money into research and development of response capabilities throughout the country. Yet, there is still much to learn about how to best respond to an IND event. My summer 2008 internship at Lawrence Livermore National Laboratory afforded me the opportunity to look in depth at the preparedness process and the research that has been conducted on this issue. While at the laboratory I was tasked to collect, combine, and process research on how cities and the federal government can best prepare for the horrific prospect of an IND event. Specific projects that I was involved with were meeting reports, research reviews, and a full project report. Working directly with Brooke Buddemeier and his support team at the National Atmospheric Release Advisory Center, I was able to witness first hand, preparation for meetings with response planners to inform them of the challenges that an IND event would pose to the affected communities. In addition, I supported the Homeland Security Institute team (HSI), which was looking at IND preparation and preparing a Congressional report. I participated in meetings at which local responders expressed their concerns and contributed valuable information to the response plan. I specialized in the psycho-social aspects of an IND event and served as a technical advisor to some of the research groups. Alongside attending and supporting these meetings, I worked on an independent research project which collected

  7. Report on Department of Homeland Security Sponsored Research Project at Lawrence Livermore National Laboratory on Preparation for an Improvised Nuclear Device Event

    International Nuclear Information System (INIS)

    Bentz, A.

    2008-01-01

    Following the events of September 11th, a litany of imaginable horribles was trotted out before an anxious and concerned public. To date, government agencies and academics are still grappling with how to best respond to such catastrophes, and as Senator Lieberman's quote says above, now is the time to plan and prepare for such events. One of the nation's worst fears is that terrorists might detonate an improvised nuclear device (IND) in an American city. With 9/11 serving as the catalyst, the government and many NGOs have invested money into research and development of response capabilities throughout the country. Yet, there is still much to learn about how to best respond to an IND event. My summer 2008 internship at Lawrence Livermore National Laboratory afforded me the opportunity to look in depth at the preparedness process and the research that has been conducted on this issue. While at the laboratory I was tasked to collect, combine, and process research on how cities and the federal government can best prepare for the horrific prospect of an IND event. Specific projects that I was involved with were meeting reports, research reviews, and a full project report. Working directly with Brooke Buddemeier and his support team at the National Atmospheric Release Advisory Center, I was able to witness first hand, preparation for meetings with response planners to inform them of the challenges that an IND event would pose to the affected communities. In addition, I supported the Homeland Security Institute team (HSI), which was looking at IND preparation and preparing a Congressional report. I participated in meetings at which local responders expressed their concerns and contributed valuable information to the response plan. I specialized in the psycho-social aspects of an IND event and served as a technical advisor to some of the research groups. Alongside attending and supporting these meetings, I worked on an independent research project which collected

  8. 45 CFR 2552.24 - What are a sponsor's responsibilities for securing community participation?

    Science.gov (United States)

    2010-10-01

    ...? (a) A sponsor shall secure community participation in local project operation by establishing an Advisory Council or a similar organizational structure with a membership that includes people: (1...

  9. 45 CFR 2551.24 - What are a sponsor's responsibilities for securing community participation?

    Science.gov (United States)

    2010-10-01

    ...? (a) A sponsor shall secure community participation in local project operation by establishing an Advisory Council or a similar organizational structure with a membership that includes people: (1...

  10. Safety research programs sponsored by Office of Nuclear Regulatory Research

    International Nuclear Information System (INIS)

    Weiss, A.J.; Azarm, A.; Baum, J.W.

    1989-07-01

    This progress report describes current activities and technical progress in the programs at Brookhaven National Laboratory sponsored by the Division of Regulatory Applications, Division of Engineering, Division of Safety Issue Resolution, and Division of Systems Research of the US Nuclear Regulatory Commission, Office of Nuclear Regulatory Research following the reorganization in July 1988. The previous reports have covered the period October 1, 1976 through September 30, 1988

  11. 45 CFR 2553.24 - What are a sponsor's responsibilities for securing community participation?

    Science.gov (United States)

    2010-10-01

    ... community participation? (a) A sponsor shall secure community participation in local project operation by establishing an Advisory Council or a similar organizational structure with a membership that includes people...

  12. Sponsored research on radioactive waste management

    International Nuclear Information System (INIS)

    1983-01-01

    The report is in chapters entitled: introduction (background, responsibilities, options, structure of the programme); strategy development; disposal of accumulations; disposal of radioactive waste arisings; quality assurance for waste conditioning quality assurance related to radioactive waste disposal (effectiveness of different rock types as natural barriers to the movement of radioactivity, and non-site specific factors in the design of repositories; radiological assessment; environmental studies; research and development to meet requirements specific to UKAEA wastes; long term research (processes for the solidification of highly active liquid wastes); plutonium contamination waste minimisation. (U.K.)

  13. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  14. Asthma: NIH-Sponsored Research and Clinical Trials | NIH MedlinePlus the Magazine

    Science.gov (United States)

    ... of this page please turn Javascript on. Feature: Asthma Asthma: NIH-Sponsored Research and Clinical Trials Past Issues / Fall 2011 Table of Contents NIH-Sponsored Research Asthma in the Inner City: Recognizing that asthma severity ...

  15. USAF Institute for National Security Studies 1998 Research Results Conference

    National Research Council Canada - National Science Library

    1998-01-01

    The USAF Institute for National Security Studies (INSS), in cooperation with HQ USAF Nuclear and Counterproliferation Directorate, sponsored its 6th annual Research Results Conference on 19 - 20 November 1998...

  16. Sponsoring Asia-Pacific Security: PACOM’s Role in Reconciling Bilateral and Multilateral Security Structures

    Science.gov (United States)

    2016-05-13

    regional security order according to realist or liberal-institutionalist international relations theory.3 Realists emphasize the deep-seated...other states has motivated party officials to pursue multilateralism to impress international society with the country’s peaceful rise. 10 The...simultaneous pursuit ofbilateralism and multilateralism within Asia "amounts to outsourcing of great power management ofregional security order in two

  17. Jointly Sponsored Research Program on Energy Related Research

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2013-12-31

    Cooperative Agreements, DE-FC26-08NT43293, DOE-WRI Cooperative Research and Development Program for Fossil Energy-Related Resources began in June 2009. The goal of the Program was to develop, commercialize, and deploy technologies of value to the nation’s fossil and renewable energy industries. To ensure relevancy and early commercialization, the involvement of an industrial partner was encouraged. In that regard, the Program stipulated that a minimum of 20% cost share be achieved in a fiscal year. This allowed WRI to carry a diverse portfolio of technologies and projects at various development technology readiness levels. Depending upon the maturity of the research concept and technology, cost share for a given task ranged from none to as high as 67% (two-thirds). Over the course of the Program, a total of twenty six tasks were proposed for DOE approval. Over the period of performance of the Cooperative agreement, WRI has put in place projects utilizing a total of $7,089,581 in USDOE funds. Against this funding, cosponsors have committed $7,398,476 in private funds to produce a program valued at $14,488,057. Tables 1 and 2 presented at the end of this section is a compilation of the funding for all the tasks conducted under the program. The goal of the Cooperative Research and Development Program for Fossil Energy-Related Resources was to through collaborative research with the industry, develop or assist in the development of innovative technology solutions that will: • Increase the production of United States energy resources – coal, natural gas, oil, and renewable energy resources; • Enhance the competitiveness of United States energy technologies in international markets and assist in technology transfer; • Reduce the nation's dependence on foreign energy supplies and strengthen both the United States and regional economies; and • Minimize environmental impacts of energy production and utilization. Success of the Program can be measured by

  18. A Case Study of Teaching Marketing Research Using Client-Sponsored Projects: Method, Challenges, and Benefits

    Science.gov (United States)

    Bove, Liliana L.; Davies, W. Martin

    2009-01-01

    This case study outlines the use of client-sponsored research projects in a quantitative postgraduate marketing research subject conducted in a 12-week semester in a research-intensive Australian university. The case study attempts to address the dearth of recent literature on client-sponsored research projects in the discipline of marketing.…

  19. Securing Distributed Research

    CERN Multimedia

    CERN. Geneva

    2018-01-01

    Global science calls for global infrastructure. A typical large-scale research group will use a suite of international services and involve hundreds of collaborating institutes and users from around the world. How can these users access those services securely? How can their digital identities be established, verified and maintained? We will explore the motivation for distributed authentication and the ways in which research communities are addressing the challenges. We will discuss security incident response in distributed environments - a particular challenge for the operators of these infrastructures. Through this course you should gain an overview of federated identity technologies and protocols, including x509 certificates, SAML and OIDC.

  20. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  1. Materials and corrosion programs sponsored by the Gas Research Institute

    International Nuclear Information System (INIS)

    Flowers, A.

    1980-01-01

    The paper deals briefly with the Gas Research Institute and its research in materials and corrosion. As a not-for-profit organization, the Gas Research Institute plans, finances, and manages applied and basic research and technological development programs associated with gaseous fuels. These programs are in the general areas of production, transportation, storage, utilization and conservation of natural and manufactured gases and related products. Research results, whether experimental or analytical, are evaluated and publicly disseminated. Materials and corrosion research is concentrated in the SNG from Coal and Non-fossil Hydrogen subprograms

  2. Maritime Cyber Security University Research

    Science.gov (United States)

    2016-05-01

    i Classification | CG-926 RDC | author | audience | month year Maritime Cyber Security University Research Phase I - Final Report...Distribution Statement A: Approved for public release; distribution is unlimited. May 2016 Report No. CG-D-06-16 Maritime Cyber Security...Director United States Coast Guard Research & Development Center 1 Chelsea Street New London, CT 06320 Maritime Cyber Security University

  3. EC-sponsored research activities on innovative passive safety systems

    International Nuclear Information System (INIS)

    Bermejo, J.M.; Goethem, G. van

    2000-01-01

    On April 26th 1994, the European Union (EU) adopted via a Council Decision a EURATOM Multiannual Programme for community activities in the field of Nuclear Fission Safety (NFS) Research for the period 1994 to 1998. An area of work having, as an objective, to 'explore innovative approaches' to improve the safety of future and existing reactors, was introduced in this programme. Most of the projects selected in this area, which have been grouped under a common cluster known as 'INNO', are currently being carried out on a 'cost-shared' basis, i.e. contribution of the European Commission is up to 50% of the total cost. At present, the 'INNO' cluster is composed of 10 projects in which 25 different organisations, representing research centres, universities, regulators, utilities and vendors from 7 EU member states and Switzerland, are involved. These projects are proving to be an efficient means to gain the necessary phenomenological knowledge and to solve the challenging problems, many times of generic nature, posed among others by the characteristically small driving forces of the systems studied and by the lack of really prototypical test facilities. (author)

  4. MAFF sponsored research: detection tests for irradiated food

    International Nuclear Information System (INIS)

    Blackburn, C.M.; Holley, P.A.; Pryke, D.C.

    1993-01-01

    In their 1986 report on the safety and wholesomeness of irradiated food the UK Advisory Committee on Irradiated and Novel Foods (ACINF) recognised that a generally applicable test to determine if a food had been irradiated was not available. The committee considered that, although not a pre-requisite, the existence of a detection test would be a useful supplement to a control system and do much to reassure consumers; with this in mind ACINF recommended that detection methods should be kept under review. As a consequence, in 1987 the Ministry initiated a comprehensive R and D detection test programme. Over fifty papers have been published to date as a result of this programme. MAFF (Ministry Of Agriculture Fisheries and Food) has also been involved in other research associated with irradiation and food safety, some of which is described in this paper. This paper aims to give an overview of recent work funded under the food irradiation programme. Twelve projects have been supported over the last two years, ten of which involved the development of detection tests for irradiated food. A summary of these projects is presented: - Thermoluminescence; - Electron Spin Resonance; - 2-alkylcyclobutanones; -Determination Of Hydrogen; - Differential Scanning Calorimetry; - Limulus Amoebocyte Lysate; - DNA; - Pesticide Breakdown; - Neutron Irradiation; -Future Plans. (orig./vhe)

  5. Biological research work within the Association of the Government-Sponsored Research Institutions (AGF)

    International Nuclear Information System (INIS)

    1991-01-01

    Six of the thirteen government-sponsored research institutions in the Federal Republic of Germany carry out research work for the protection of the population against the harmful effects of ionizing radiation. Their activities in this field concentrate on the following four points of main interest: analysis of radiation-induced processes resulting in biological radiation injury; description and analysis of complex radiation effects on man; medical applications of ionizing radiation for diagnosis and therapy; concepts and methods for radiological protection. The work reported reviews the main problems encountered in the above-mentioned subject fields and presents examples of significant results, with illustrations. The original research papers and their authors are listed separately under the four points of main interest. (orig./MG) [de

  6. NICBR-Sponsored Spring Research Festival Set for May 8 and 9 | Poster

    Science.gov (United States)

    By Ashley DeVine, Staff Writer For the first time, the Spring Research Festival (SRF), scheduled for May 8 and 9, will be sponsored by all of the agencies that are part of the National Interagency Confederation for Biological Research (NICBR).

  7. Undergraduates' Perceptions of Conflict of Interest in Industry-Sponsored Research

    Science.gov (United States)

    Perry, Heather Brodie

    2018-01-01

    The prevalence of industry-sponsored research has led to significant concerns about financial conflicts of interest and the impact on research findings. This case study sought to examine how students considered conflict of interest when establishing the cognitive authority of a journal article. The case study used a mixed methods pretest and…

  8. Development, implementation and critique of a bioethics framework for pharmaceutical sponsors of human biomedical research.

    Science.gov (United States)

    Van Campen, Luann E; Therasse, Donald G; Klopfenstein, Mitchell; Levine, Robert J

    2015-11-01

    Pharmaceutical human biomedical research is a multi-dimensional endeavor that requires collaboration among many parties, including those who sponsor, conduct, participate in, or stand to benefit from the research. Human subjects' protections have been promulgated to ensure that the benefits of such research are accomplished with respect for and minimal risk to individual research participants, and with an overall sense of fairness. Although these protections are foundational to clinical research, most ethics guidance primarily highlights the responsibilities of investigators and ethics review boards. Currently, there is no published resource that comprehensively addresses bioethical responsibilities of industry sponsors; including their responsibilities to parties who are not research participants, but are, nevertheless key stakeholders in the endeavor. To fill this void, in 2010 Eli Lilly and Company instituted a Bioethics Framework for Human Biomedical Research. This paper describes how the framework was developed and implemented and provides a critique based on four years of experience. A companion article provides the actual document used by Eli Lilly and Company to guide ethical decisions regarding all phases of human clinical trials. While many of the concepts presented in this framework are not novel, compiling them in a manner that articulates the ethical responsibilities of a sponsor is novel. By utilizing this type of bioethics framework, we have been able to develop bioethics positions on various topics, provide research ethics consultations, and integrate bioethics into the daily operations of our human biomedical research. We hope that by sharing these companion papers we will stimulate discussion within and outside the biopharmaceutical industry for the benefit of the multiple parties involved in pharmaceutical human biomedical research.

  9. Effects of employer-sponsored health insurance costs on Social Security taxable wages.

    Science.gov (United States)

    Burtless, Gary; Milusheva, Sveta

    2013-01-01

    The increasing cost of employer contributions for employee health insurance reduces the share of compensation subject to the Social Security payroll tax. Rising insurance contributions can also have a more subtle effect on the Social Security tax base because they influence the distribution of money wages above and below the taxable maximum amount. This article uses the Medical Expenditure Panel Survey to analyze trends in employer health insurance contributions and the distribution of those costs up and down the wage distribution. Our analysis shows that employer health insurance contributions increased faster than overall compensation during 1996-2008, but such contributions grew only slightly faster among workers earning less than the taxable maximum than they did among those earning more. Because employer health insurance contributions represent a much higher percentage of compensation below the taxable maximum, health insurance cost trends exerted a disproportionate downward pressure on money wages below the taxable maximum.

  10. Geotechnical aspects of the UK DOE-sponsored radioactive waste disposal research programme

    International Nuclear Information System (INIS)

    Cooling, C.M.; Hudson, J.A.

    1987-01-01

    One of the crucial factors for underground repository design is understanding the engineering properties and behaviour of the host rock. To develop this understanding, the Department of the Environment has sponsored a continuing programme of geotechnical research from 1979 to the present day. The authors describe the structure of the research programme, highlight some of the individual projects, indicate the most important conclusions and provide an overview of both the current state of knowledge and 'the way ahead'. 9 refs.; 9 figs.; 1 table

  11. Physical security at research reactors

    International Nuclear Information System (INIS)

    Clark, R.A.

    1977-01-01

    Of the 84 non-power research facilities licensed under 10 CFR Part 50, 73 are active (two test reactors, 68 research reactors and three critical facilities) and are required by 10 CFR Part 73.40 to provide physical protection against theft of SNM and against industrial sabotage. Each licensee has developed a security plan required by 10 CFR Part 50.34(c) to demonstrate the means of compliance with the applicable requirements of 10 CFR Part 73. In 1974, the Commission provided interim guidance for the organization and content of security plans for (a) test reactors, (b) medium power research and training reactors, and (c) low power research and training reactors. Eleven TRIGA reactors, with power levels greater than 250 kW and all other research and training reactors with power levels greater than 100 kW and less than or equal to 5,000 kW are designated as medium power research and training reactors. Thirteen TRIGA reactors with authorized power levels less than 250 kW are considered to be low power research and training reactors. Additional guidance for complying with the requirements of 73.50 and 73.60, if applicable, is provided in the Commission's Regulatory Guides. The Commission's Office of Inspection and Enforcement inspects each licensed facility to assure that an approved security plan is properly implemented with appropriate procedures and physical protection systems

  12. European perspectives on security research

    CERN Document Server

    2011-01-01

    Europe’s networked societies of today are shaped by a growing interconnection in almost all areas of life. The complexity of our infrastructures and the concurrent accessibility to means of destruction by terrorist groups and individual perpetrators call for innovative security solutions. However, such evolving innovations inevitably raise fundamental questions of concern in our societies. How do we balance the imperatives of securing our citizens and infrastructures on the one hand, and of protecting of our sacredly held civil liberties on the other? The topical network ‘Safety and Security’ of acatech – the German Academy of Science and Engineering – invited experts from the science academies of various European countries to share their perspectives on security research and the aspect of safety during a two-day workshop hosted by the Fraunhofer Institute for High-Speed Dynamics, Ernst-Mach-Institut in March 2010. This publication is a compilation of contributions made during the workshop.

  13. Water System Security and Resilience in Homeland Security Research

    Science.gov (United States)

    EPA's water security research provides tools needed to improve infrastructure security and to recover from an attack or contamination incident involving chemical, biological, or radiological (CBR) agents or weapons.

  14. Safety research programs sponsored by Office of Nuclear Regulatory Research: Progress report, October 1--December 31, 1988

    Energy Technology Data Exchange (ETDEWEB)

    Weiss, A J; Azarm, A; Baum, J W; Boccio, J L; Carew, J; Diamond, D J; Fitzpatrick, R; Ginsberg, T; Greene, G A; Guppy, J G; Haber, S B

    1989-07-01

    This progress report describes current activities and technical progress in the programs at Brookhaven National Laboratory sponsored by the Division of Regulatory Applications, Division of Engineering, Division of Safety Issue Resolution, and Division of Systems Research of the US Nuclear Regulatory Commission, Office of Nuclear Regulatory Research following the reorganization in July 1988. The previous reports have covered the period October 1, 1976 through September 30, 1988.

  15. Safety research programs sponsored by Office of Nuclear Regulatory Research: Progress report, January 1--June 30, 1988

    Energy Technology Data Exchange (ETDEWEB)

    Baum, J W; Boccio, J L; Diamond, D; Fitzpatrick, R; Ginsberg, T; Greene, G A; Guppy, J G; Hall, R E; Higgins, J C; Weiss, A J [comp.

    1988-12-01

    This progress report describes current activities and technical progress in the programs at Brookhaven National Laboratory sponsored by the Division of Regulatory Applications, Division of Engineering, Division of Safety Issue Resolution, and Division of Systems Research of the US Nuclear Regulatory Commission, Office of Nuclear Regulatory Research following the reorganization in July 1988. The previous reports have covered the period October 1, 1976 through December 31, 1987.

  16. Safety research programs sponsored by Office of Nuclear Regulatory Research: Progress report, January 1--June 30, 1988

    International Nuclear Information System (INIS)

    Baum, J.W.; Boccio, J.L.; Diamond, D.

    1988-12-01

    This progress report describes current activities and technical progress in the programs at Brookhaven National Laboratory sponsored by the Division of Regulatory Applications, Division of Engineering, Division of Safety Issue Resolution, and Division of Systems Research of the US Nuclear Regulatory Commission, Office of Nuclear Regulatory Research following the reorganization in July 1988. The previous reports have covered the period October 1, 1976 through December 31, 1987

  17. Reports on research programs in the field of reactor safety sponsored by the Federal Ministry for Research and Technology

    International Nuclear Information System (INIS)

    1986-11-01

    Investigations on the safety of Light Water Reactors (LWR) being performed in the framework of the research program on reactor safety (RS-projects) are sponsored by the Federal Ministry for Research and Technology (BMFT). Objective of this program is to investigate in greater detail the safety margins of nuclear power plants and their systems and the further development of safety technology. Besides the investigations of LWR tasks also projects on the safety of advanced reactors are sponsored by the BMFT. The individual reports are classified according to the research program on the safety of LWRs 1977-1980 of the BMFT. Another table of contents uses the same classification system as applied in the nuclear safety index of the CEC (Commission of the European Communities) and the OECD (Organization for Economic Cooperation and Development). The reports are arranged in the sequence of their project numbers. (orig./HP) [de

  18. Reports of research programs in the field of reactor safety sponsored by the Federal Ministry for Research and Technology

    International Nuclear Information System (INIS)

    1986-06-01

    Investigations on the safety of Light Water Reactors (LWR) being performed in the framework of his research program on reactor safety (RS-projects) are sponsored by the Federal Ministry for Research and Technology (BMFT). Objective of this program is to investigate in greater detail the safety margins of nuclear power plants and their systems and the further development of safety technology. Besides the investigations of LWR tasks also projects on the safety of advanced reactors are sponsored by the BMFT. The individual reports are classified according to the research program on the safety of LWRs 1977-1980 of the BMFT. Another table of contents uses the same classification system as applied in the nuclear safety index of the CEC (Commission of the European Communities) and the OECD (Organization for Economic Cooperation and Development). The reports are arranged in the sequence of their project numbers. (orig./HP) [de

  19. Good Publication Practice for Communicating Company-Sponsored Medical Research: GPP3.

    Science.gov (United States)

    Battisti, Wendy P; Wager, Elizabeth; Baltzer, Lise; Bridges, Dan; Cairns, Angela; Carswell, Christopher I; Citrome, Leslie; Gurr, James A; Mooney, LaVerne A; Moore, B Jane; Peña, Teresa; Sanes-Miller, Carol H; Veitch, Keith; Woolley, Karen L; Yarker, Yvonne E

    2015-09-15

    This updated Good Publication Practice (GPP) guideline, known as GPP3, builds on earlier versions and provides recommendations for individuals and organizations that contribute to the publication of research results sponsored or supported by pharmaceutical, medical device, diagnostics, and biotechnology companies. The recommendations are designed to help individuals and organizations maintain ethical and transparent publication practices and comply with legal and regulatory requirements. These recommendations cover publications in peer-reviewed journals and presentations (oral or poster) at scientific congresses. The International Society for Medical Publication Professionals invited more than 3000 professionals worldwide to apply for a position on the steering committee, or as a reviewer, for this guideline. The GPP2 authors reviewed all applications (n = 241) and assembled an 18-member steering committee that represented 7 countries and a diversity of publication professions and institutions. From the 174 selected reviewers, 94 sent comments on the second draft, which steering committee members incorporated after discussion and consensus. The resulting guideline includes new sections (Principles of Good Publication Practice for Company-Sponsored Medical Research, Data Sharing, Studies That Should Be Published, and Plagiarism), expands guidance on the International Committee of Medical Journal Editors' authorship criteria and common authorship issues, improves clarity on appropriate author payment and reimbursement, and expands information on the role of medical writers. By following good publication practices (including GPP3), individuals and organizations will show integrity; accountability; and responsibility for accurate, complete, and transparent reporting in their publications and presentations.

  20. Safety research programs sponsored by Office of Nuclear Regulatory Research: Progress report, July 1--September 30, 1988

    Energy Technology Data Exchange (ETDEWEB)

    Weiss, A J [comp.

    1989-02-01

    This progress report describes current activities and technical progress in the programs at Brookhaven National Laboratory sponsored by the Division of Regulatory Applications, Division of Engineering, Division of Safety Issue Resolution, and Division of Systems of the US Nuclear Regulatory Commission, Office of Nuclear Regulatory Research following the reorganization in July 1988. The previous reports have covered the period October 1, 1976 through June 30, 1988. 71 figs., 24 tabs.

  1. Safety research programs sponsored by Office of Nuclear Regulatory Research: Progress report, July 1--September 30, 1988

    International Nuclear Information System (INIS)

    Weiss, A.J.

    1989-02-01

    This progress report describes current activities and technical progress in the programs at Brookhaven National Laboratory sponsored by the Division of Regulatory Applications, Division of Engineering, Division of Safety Issue Resolution, and Division of Systems of the US Nuclear Regulatory Commission, Office of Nuclear Regulatory Research following the reorganization in July 1988. The previous reports have covered the period October 1, 1976 through June 30, 1988. 71 figs., 24 tabs

  2. Cooperative Research Projects in the Microgravity Combustion Science Programs Sponsored by NASA and NEDO

    Science.gov (United States)

    Ross, Howard (Compiler)

    2000-01-01

    This document contains the results of a collection of selected cooperative research projects between principal investigators in the microgravity combustion science programs, sponsored by NASA and NEDO. Cooperation involved the use of drop towers in Japan and the United States, and the sharing of subsequent research data and findings. The topical areas include: (1) Interacting droplet arrays, (2) high pressure binary fuel sprays, (3) sooting droplet combustion, (4) flammability limits and dynamics of spherical, premixed gaseous flames and, (5) ignition and transition of flame spread across thin solid fuel samples. All of the investigators view this collaboration as a success. Novel flame behaviors were found and later published in archival journals. In some cases the experiments provided verification of the design and behavior in subsequent experiments performed on the Space Shuttle. In other cases, the experiments provided guidance to experiments that are expected to be performed on the International Space Station.

  3. Reactor safety research program. A description of current and planned reactor safety research sponsored by the Nuclear Regulatory Commission's Division of Reactor Safety Research

    International Nuclear Information System (INIS)

    1975-06-01

    The reactor safety research program, sponsored by the Nuclear Regulatory Commission's Division of Reactor Safety Research, is described in terms of its program objectives, current status, and future plans. Elements of safety research work applicable to water reactors, fast reactors, and gas cooled reactors are presented together with brief descriptions of current and planned test facilities. (U.S.)

  4. IT Security Specialist | IDRC - International Development Research ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The IT Security Specialist takes a strategic role in the delivery of Infrastructure ... on IT Security to project managers, business clients and senior management. ... as a team member or a team leader by undertaking research, investigations, ...

  5. Reports on the research projects in the field of nuclear safety sponsored by the Federal Minister for Research and Technology

    International Nuclear Information System (INIS)

    1979-12-01

    Investigations on the safety of Light Water Reactors (LWR) being performed in the framework of the Research Program Reactor Safety (RS - Projects) are sponsored by the BMFT (Federal Minister for Research and Technology), Bundesminister fuer Forschung und Technologie. Objective of this program is to investigate in greater detail the safety margins of nuclear power plants and their systems and the further development of safety technology. Besides the investigations of LWR tasks first projects on the safety of FBR type reactors are sponsored by the BMFT. The CRS (Reactor Safety Association), Gesellschaft fuer Reaktorsicherheit mbH, by order of the BMFT, informs continuously of the status of such investigations by means of quarterly and annually publication of progress reports within the series GRS - F - Fortschrittsberichte (GRS - F - Progress Reports). Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work. The individual reports are arranged according to the amended LWR Safety Research Program of the BMFT in the near future. Another table contents uses the same classification system as applied in the Nuclear Safety Index of the CEC Communities and the OECD.(orig./HP) [de

  6. Reports on research projects in the field of reactor safety sponsored by the Federal Ministry for research and technology

    International Nuclear Information System (INIS)

    1979-09-01

    Investigations on the safety of Light Water Reactors (LWR) being performed in the framework of the Research Program Reactor Safety (RS - Projects) are sponsored by the BMFT (Federal Minister for Research and Technology), Bundesminister fuer Forschung und Technologie. Objective of this program is to investigate in greater detail the safety margins of nuclear power-plants and their systems and the further development of safety technology. Besides the investigations of LWR tasks first projects on the safety of FBR type reactors are sponsored by the BMFT. The GRS (Reactor Safety Association), Gesellschaft fuer Reaktorsicherheit mbH, by order of the BMFT, informs continuously of the status of such investigations by means of quarterly and annually publication of progress reports within the series GRS - F - Fortschrittsberichte (GRS - F - Progress Reports). Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work. The individual reports are arranged according to the amended LWR Safety Research Program of the BMFT in the near future. Another table contents uses the same classification system as applied in the Nuclear Safety Index of the CEC Communities and the OECD. (orig.) [de

  7. Reports on the research projects in the field of nuclear safety sponsored by the Federal Ministry for Research and Technology

    International Nuclear Information System (INIS)

    1980-06-01

    Investigations on the safety of Light Water Reactors (LWR) being performed in the framework of the Research Program Reactor Safety (RS-Projects) are sponsored by the BMFT (Federal Minister for Research and Technology), Bundesminister fuer Forschung und Technologie. Objective of this program is to investigate in greater detail the safety margins of nuclear power plants and their systems and the further development of safety technology. Besides the investigations of LWR tasks first projects on the safety of FBR type reactors are sponsored by the BMFT. The GRS (Reactor Safety Association), Gesellschaft fuer Reaktorsicherheit mbH, by order of the BMFT, informs continuously of the status of such investigations by means of quarterly and annually publication of progress reports within the series GRS-F-Fortschrittsberichte (GRS-F-progress reports). Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work. The individual reports are arranged according to the amended LWR Safety Research Program of the BMFT, which will appear in the near future. Another table contents uses the same classification system as applied in the Nuclear Safety Index of the CEC and the OECD. (orig./HP) [de

  8. Reports on research projects in the field of reactor safety sponsored by the Federal Minister for Research and Technology

    International Nuclear Information System (INIS)

    1978-09-01

    Investigations on the safety of Light Water Reactors (LWR) being performed in the framework of the Research Program Reactor Safety (RS - Projects) are sponsored by the BMFT (Federal Minister for Research and Technology), der Bundesminister fuer Forschung und Technologie. Objective of this program is to investigate in greater detail the safety margins of nuclear power plants and their systems and the further development of safety technology. Besides the investigations of LWR tasks first projects on the safety of FBR type reactors are sponsored by the BMFT. The GRS (Reactor Safety Association), Gesellschaft fuer Reaktorsicherheit mbH, by order of the BMFT, informs continuously of the status of such investigations by means of quarterly and annually publication of progress reports within the series GRS - F Fortschrittsberichte (GRS - F - Progress Reports). Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work. The individual reports are arranged according to the amended LWR Safety Research Program of the BMFT. Another table contents uses the same classification system as applied in the Nuclear Safety Index of the CEC Communities and the OECD. (orig./HP) 891 HP [de

  9. Reports on research projects sponsored by the Federal Minister for Research and Technology in the field of reactor safety

    International Nuclear Information System (INIS)

    1979-03-01

    Investigations on the safety of Light Water Reactors (LWR) being performed in the framework of the Research Program Reactor Safety (RS - Projects) are sponsored by the BMFT (Federal Minister for Research and Technology), Bundesminister fuer Forschung und Technologie. Objective of this program is to investigate in greater detail the safety margins of nuclear power plants and their systems and the further development of safety technology. Besides the investigations of LWR tasks first projects on the safety of FBR type reactors are sponsored by the BMFT. The GRS (Reactor Safety Association), Gesellschaft fuer Reaktorsicherheit mbH, by order of the BMFT, informs continuously of the status of such investigations by means of quarterly and annually publication of progress reports within the series GRS - F - Fortschrittsberichte (GRS - F - Progress Reports). Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work. The individual reports are arranged according to the amended LWR Safety Research Program of the BMFT. Another table contents uses the same classification system as applied in the Nuclear Safety Index of the CEC European Communities and the OECD. (orig./HP) [de

  10. Report on the research projects in the field of reactor safety sponsored by the Federal Minister for Research and Technology

    International Nuclear Information System (INIS)

    1978-09-01

    Investigations on the safety of Light Water Reactors (LWR) being performed in the framework of the Research Program Reactor Safety (RS - Projects) are sponsored by the BMFT (Federal Minister for Research and Technology), Bundesminister fuer Forschung und Technologie. Objective of this program is to investigate in greater detail the safety margins of nuclear power plants and their systems and the further development of safety technology. Besides the investigations of LWR tasks first projects on the safety of FBR type reactors are sponsored by the BMFT. The GRS (Reactor Safety Association), Gesellschaft fuer Reaktorsicherheit mbH, by order of the BMFT, informs continuously of the status of such investigations by means of quarterly and annually publication of progress reports within the series GRS - F -Fortschrittsberichte (GRS - F - Progress Reports). Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work, The individual reports are arranged according to the amended LWR Safety Research Program of the BMFT. Another table contents uses the same classification system as applied in the Nuclear Safety Index of the CEC Communities and the OECD. (orig./HP) 891 HP [de

  11. Australian International Food Security Research Centre | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Australian International Food Security Research Centre. Australian International Food Security Research Centre. http://aciar.gov.au/AIFSC. Cultivate Africa's Future. The Cultivate Africa's Future research partnership is designed to support applied research to combat hunger in sub-Saharan Africa by harnessing the potential ...

  12. NRC sponsored rotating equipment vibration research: a program description and progress report

    International Nuclear Information System (INIS)

    Nitzel, M.E.

    1986-01-01

    The Idaho National Engineering Laboratory (INEL) is currently involved in a research project sponsored by the United States Nuclear Regulatory Commission (NRC) regarding operational vibration in rotating equipment. The object of this program is to assess the nature of vibrational failures and the effect that improved qualification standards may have in reducing the incidence of failure. In order to limit the scope of the initial effort, safety injection (SI) pumps were chosen as the component group for concentrated study. The task has been oriented to addressing the issues of whether certain SI pumps experience more failures than others, examining the dynamic environments in operation, examining the adequacy of current qualification standards, and examining what performance parameters could be used more efficiently to predict degradation or failure. Results of a literature search performed to survey SI pump failures indicate that failures are due to a diversity of causes, many of which may not be influenced by qualification criteria. Cooperative efforts have been undertaken with a limited number of nuclear utilities to describe the variety of possible operating environments and to analyze available data. The results of this analysis as they apply to the research issues are presented and possibilities for the future direction of the program are discussed

  13. Researchers', Regulators', and Sponsors' Views on Pediatric Clinical Trials: A Multinational Study.

    Science.gov (United States)

    Joseph, Pathma D; Craig, Jonathan C; Tong, Allison; Caldwell, Patrina H Y

    2016-10-01

    The last decade has seen dramatic changes in the regulatory landscape to support more trials involving children, but child-specific challenges and inequitable conduct across income regions persist. The goal of this study was to describe the attitudes and opinions of stakeholders toward trials in children, to inform additional strategies to promote more high-quality, relevant pediatric trials across the globe. Key informant semi-structured interviews were conducted with stakeholders (researchers, regulators, and sponsors) who were purposively sampled from low- to middle-income countries and high-income countries. The transcripts were thematically analyzed. Thirty-five stakeholders from 10 countries were interviewed. Five major themes were identified: addressing pervasive inequities (paucity of safety and efficacy data, knowledge disparities, volatile environment, double standards, contextual relevance, market-driven forces, industry sponsorship bias and prohibitive costs); contending with infrastructural barriers (resource constraints, dearth of pediatric trial expertise, and logistical complexities); navigating complex ethical and regulatory frameworks ("draconian" oversight, ambiguous requirements, exploitation, excessive paternalism and precariousness of coercion versus volunteerism); respecting uniqueness of children (pediatric research paradigms, child-appropriate approaches, and family-centered empowerment); and driving evidence-based child health (advocacy, opportunities, treatment access, best practices, and research prioritization). Stakeholders acknowledge that changes in the regulatory environment have encouraged more trials in children, but they contend that inequities and political, regulatory, and resource barriers continue to exist. Embedding trials as part of routine clinical care, addressing the unique needs of children, and streamlining regulatory approvals were suggested. Stakeholders recommended increasing international collaboration

  14. A German Perspective on Security Research

    Science.gov (United States)

    Thoma, Klaus; Hiller, Daniel; Leismann, Tobias; Drees, Birgit

    Prior to 2007, there was no coherent federal approach to conceptualise and fund security research in Germany. This changed with the initiation of the national program for civil security research, managed by the German Ministry for Education and Research (BMBF). Over the course of only four years a continuous build-up of national capacities on civil security was established to better protect German citizens, commodities and infrastructures against terrorism, organised crime and the effects of man-made and natural disasters.

  15. Reports of reactor safety research projects sponsored by the Federal Ministry for Research and Technology (BMFT)

    International Nuclear Information System (INIS)

    1984-04-01

    Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. the individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work and published by he FB (Research Coordination Department), Forschungsbetreuung at the GRS, within the framework of general information of progress in reactor safety research. The individual reports are classified according to the research program on the safety of LWRS 1977-1980 of the BMFT. Another table of contents uses the same classification system as applied in the nuclear safety index of the CEC (Commission of the European Communities) and the OECD (Organization for Economic Cooperation and Development). The reports are arranged in the sequence of their project numbers. (orig.) [de

  16. Federally Sponsored Research at Educational Institutions: A Need for Improved Accountability. Report by the U.S. General Accounting Office.

    Science.gov (United States)

    General Accounting Office, Washington, DC.

    This report discusses federally sponsored research at educational institutions and suggests ways to improve accountability for these funds. The following suggestions are made for minimizing problems presented in this report: (1) development of more definitive cost principles for both the institutions and the Federal auditors to follow; (2) more…

  17. Secure Learning and Learning for Security: Research in the Intersection

    OpenAIRE

    Rubinstein, Benjamin

    2010-01-01

    Statistical Machine Learning is used in many real-world systems, such as web search, network and power management, online advertising, finance and health services, in which adversaries are incentivized to attack the learner, motivating the urgent need for a better understanding of the security vulnerabilities of adaptive systems. Conversely, research in Computer Security stands to reap great benefits by leveraging learning for building adaptive defenses and even designing intelligent attacks ...

  18. Bibliography of publications related to Nevada-sponsored research of the proposed Yucca Mountain high-level radioactive waste repository site through 1994

    International Nuclear Information System (INIS)

    Johnson, M.

    1994-12-01

    Since 1985, the State of Nevada has sponsored academic/private sector research into various health, safety, and environmental issues identified with the Yucca Mountain site. This research has been documented in scientific peer-reviewed literature, conferences, and workshops, as well as numerous state-sponsored University thesis and dissertation programs. This document is a bibliography of the scientific articles, manuscripts, theses, dissertations, conference symposium abstracts, and meeting presentations produced as a result of state-sponsored research

  19. 15 year's summary report on blanket technology and materials of mixed fuel reactor research sponsored by national '863' projects

    International Nuclear Information System (INIS)

    Xu Zengyu; Chen Jiming; Liu Xiang

    2001-01-01

    15 year's achievements of Southwestern Institute of Physics, China, in fusion technology and materials research sponsored by National '863' Engineering Projects are summarized. Many scientific and technical achievements are obtained in the researches on tritium production and recovery, doped carbon basic materials, V-alloys, 316L SS irradiation performance, B 4 C and TiC coatings, etc. Some facilities were built and some were improved for materials research. 108 references are annexed

  20. Canadian International Food Security Research Fund (CIFSRF ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Canadian International Food Security Research Fund (CIFSRF). The Canadian International Food Security Research Fund (CIFS-RF) is a collaborative program of the Canadian International Development Agency (CIDA) and IDRC valued at CA $61 654 707 (CIDA: CA $50 000 000; IDRC: CA $11 654 707). The program ...

  1. Maritime Cyber Security University Research: Phase 1

    Science.gov (United States)

    2016-05-01

    i Classification | CG-926 RDC | author | audience | month year Maritime Cyber Security University Research Phase I - Final Report...Appendices Distribution Statement A: Approved for public release; distribution is unlimited. May 2016 Report No. CG-D-07-16 Maritime ...Macesker Executive Director United States Coast Guard Research & Development Center 1 Chelsea Street New London, CT 06320 Maritime Cyber Security

  2. Canadian International Food Security Research Fund (CIFSRF)

    International Development Research Centre (IDRC) Digital Library (Canada)

    . The Canadian International Food Security Research Fund(CIFSRF) is a program of Canada's International Development Research. Centre (IDRC) undertaken with the financial support of the. Government of Canada provided through Foreign ...

  3. HIV/AIDS research conducted in the developing world and sponsored by the developed world: reporting of research ethics committee review in two countries.

    Science.gov (United States)

    Chin, Lisa Judy; Rifai-Bashjawish, Hoda; Kleinert, Kelly; Saltman, Alexandra; Leu, Cheng-Shiun; Klitzman, Robert

    2011-09-01

    We explored how often journal articles reporting HIV research sponsored by a developed country, but conducted in a developing country, mention research ethics committee (REC) approval from both countries, and what factors are involved. Of all such 2007 articles on Medline conducted in one of four developing countries (N = 154), only 52% mentioned such dual approval. Mention of dual vs. single approval was more likely among articles with ≥ 50% sponsor country authors, and the United States as the sponsor country. Also, dual approval was more likely among articles that mentioned informed consent and funding, had ≥ 50% sponsor country authors, were biomedical (vs. psychosocial), and appeared in journals adopting International Committee Medical Journal Editors (ICMJE) guidelines. Dual approval was thus obtained in only half of the articles and was associated with ethical and logistic issues, indicating the need for clearer and more universally accepted guidelines.

  4. A Research Agenda for Security Engineering

    Directory of Open Access Journals (Sweden)

    Rich Goyette

    2013-08-01

    Full Text Available Despite nearly 30 years of research and application, the practice of information system security engineering has not yet begun to exhibit the traits of a rigorous scientific discipline. As cyberadversaries have become more mature, sophisticated, and disciplined in their tradecraft, the science of security engineering has not kept pace. The evidence of the erosion of our digital security – upon which society is increasingly dependent – appears in the news almost daily. In this article, we outline a research agenda designed to begin addressing this deficit and to move information system security engineering toward a mature engineering discipline. Our experience suggests that there are two key areas in which this movement should begin. First, a threat model that is actionable from the perspectives of risk management and security engineering should be developed. Second, a practical and relevant security-measurement framework should be developed to adequately inform security-engineering and risk-management processes. Advances in these areas will particularly benefit business/government risk assessors as well as security engineers performing security design work, leading to more accurate, meaningful, and quantitative risk analyses and more consistent and coherent security design decisions. Threat modelling and security measurement are challenging activities to get right – especially when they need to be applied in a general context. However, these are decisive starting points because they constitute the foundation of a scientific security-engineering practice. Addressing these challenges will require stronger and more coherent integration between the sub-disciplines of risk assessment and security engineering, including new tools to facilitate that integration. More generally, changes will be required in the way security engineering is both taught and practiced to take into account the holistic approach necessary from a mature, scientific

  5. E-survey with researchers, members of ethics committees and sponsors of clinical research in Brazil: an emerging methodology for scientific research.

    Science.gov (United States)

    Dainesi, Sonia Mansoldo; Goldbaum, Moisés

    2012-12-01

    The growth of Internet users enables epidemiological studies to be conducted electronically, representing a promising methodology for data collection. Members of Ethics Committees, Clinical Researchers and Sponsors were interviewed using questionnaires sent over the Internet. Along with the questionnaire, participants received a message explaining the survey and also the informed consent. Returning the questionnaire meant the consent of the participant was given. No incentive was offered; two reminders were sent. The response rate was 21% (124/599), 20% (58/290) and 45% (24/53) respectively for Ethics Committees, Researchers and Sponsors. The percentage of return before the two reminders was about 62%. Reasons for non-response: participant not found, refusal to participate, lack of experience in clinical research or in the therapeutic field. Characteristics of participants: 45% of Ethics Committee participants, 64% of Researchers and 63% of Sponsors were male; mean age (range), respectively: 47 (28-74), 53 (24-72) and 40 (29-65) years. Among Researchers and Sponsors, all respondents had at least a university degree and, in the Ethics Committees group, only two (1.7%) did not have one. Most of the questionnaires in all groups came from the Southeast Region of Brazil, probably reflecting the highest number of clinical trials and research professionals in this region. Despite the potential limitations of a survey done through the Internet, this study led to a response rate similar to what has been observed with other models, efficiency in obtaining responses (speed and quality), convenience for respondents and low cost.

  6. Canadian International Food Security Research Fund | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Canadian International Food Security Research Fund (CIFSRF) invests in scaling up ... for farming families, and improve nutrition throughout the Global South. ... universities, civil society organizations, governments, and the private sector, ...

  7. Secure coprocessing applications and research issues

    Energy Technology Data Exchange (ETDEWEB)

    Smith, S.W.

    1996-08-01

    The potential of secure coprocessing to address many emerging security challenges and to enable new applications has been a long-standing interest of many members of the Computer Research and Applications Group, including this author. The purpose of this paper is to summarize this thinking, by presenting a taxonomy of some potential applications and by summarizing what we regard as some particularly interesting research questions.

  8. A European Perspective on Security Research

    Science.gov (United States)

    Liem, Khoen; Hiller, Daniel; Castex, Christoph

    Tackling the complexity and interdependence of today's security environment in the globalized world of the 21st century is an everlasting challenge. Whereas the end of the Cold War presented a caesura of global dimension for the political and economic architecture and a realignment of power distribution and international relations between former adversaries, September 11th of 2001 may be seen as another caesura. Since then, specifically among countries of the Western hemisphere, traditional security paradigms and theories have been critically questioned and the different security cultures and perceptions have resulted in diverse security and defence policies as well as in security research efforts of individual countries. Consensus, it seems, exists on the question of what the threats are that our modern interconnected societies are facing. Whether looking at international terrorism, organized crime, climate change, the illegal trafficking of goods and people or naturally caused catastrophes, these phenomena all have in common that they are in most cases of transnational nature. Formerly existing dividing lines between internal and external security continue to fade, presenting an enormous challenge for those in charge of designing security policy and even more so for the various institutions safeguarding European security. That is why dissent often revolves around the question on how to get hold of these complex problems. Geographic location, cultural background, ethical make-up of society as well as relations with neighbouring countries are all important aspects to be considered when assessing the security culture and policy of individual countries.

  9. Research Award: Agriculture and Food Security

    International Development Research Centre (IDRC) Digital Library (Canada)

    Corey Piccioni

    2013-08-07

    Aug 7, 2013 ... research awards providing a unique opportunity to enhance research skills and gain a fresh perspecve on crucial development issues. These one‐year, paid, ... programming through a research acvity focusing on agriculture and food security, specifically on the gender and social (equity) dimensions of ...

  10. Public key infrastructure for DOE security research

    Energy Technology Data Exchange (ETDEWEB)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  11. Bye-laws and partnership agreements of the members of the Association of Government-Sponsored Research Organizations (AGF)

    International Nuclear Information System (INIS)

    1990-01-01

    There are currently thirteen members of the AGF, government-sponsored research organizations who together employ more than 22.000 people and an annual budget of about DM 2.5 billions, thus representing the largest, compact research potential of the Federal Republic of Germany and building one of the most essential elements of the German scientific research system. The research organizations are financed from Federal Government funds and by contributions from the Federal Land the organization is domiciled, each at a ratio of 90 to 10. Influence and control by the Federal Government is exerted by way of Government representatives having a seat and a vote in the executive bodies of the organization, and by way of budgetary powers. Ever since their establishment, the government-sponsored research organizations have to find a balance between the two poles of scientific and legal independence on the one hand, and governmental influence on the other. Their wish for more effectively safeguarding their common interests have induced the research organizations to establish the AGF on January 30, 1970. (orig./HSCH) [de

  12. Report on the projects in the field of reactor safety sponsored by the Federal Ministry for Research and Technology

    International Nuclear Information System (INIS)

    1978-12-01

    Investigations on the safety of Light Water Reactors (LWR) being performed in the framework of the Research Program Reactor Safety (RS - Projects) are sponsored by the BMFT (Federal Minister for Research and Technology), Bundesminister fuer Forschung und Technologie. Objective of this program is to investigate in greater detail the safety margins of nuclear power-plants and their systems and the further development of safety technology. Besides the investigations of LWR tasks first projects on the safety of advanced reactors are sponsored by the BMFT. The GRS (Reactor Safety Association), Gesellschaft fuer Reaktorsicherheit mbH, by order of the BMFT, informs continuously of the status of such investigations by means of quarterly and annually publication of progress reports within the series GRS - F - Fortschrittsberichte (GRS - F - Progress Reports). Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work and published by the FB (Research Coordination Department), Forschungsbetreuung at the GRS, within the framework of general information of the progress in reactor safety research. The individual reports are arranged according to the amended LWR Safety Research Program of the BMFT which will appear in the near future. Another table contents uses the same classification system as applied in the Nuclear Safety Index of the CEC and the OECD. (orig./HP) [de

  13. Research award: Agriculture and Food Security | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Research shows that appropriate food security interventions can improve ... sector within the context of increased productivity and reduction of post-harvest loss, rural ... The successful candidate will allocate 50% of his/her time for a research ... with a focus on agriculture;; Business administration and/or management, with a ...

  14. [Biological research and security institutes].

    Science.gov (United States)

    Darsie, G; Falczuk, A J; Bergmann, I E

    2006-04-01

    The threat of using biological material for ago-bioterrorist ends has risen in recent years, which means that research and diagnostic laboratories, biological agent banks and other institutions authorised to carry out scientific activities have had to implement biosafety and biosecurity measures to counter the threat, while carrying out activities to help prevent and monitor the accidental or intentional introduction of exotic animal diseases. This article briefly sets outthe basic components of biosafety and biosecurity, as well as recommendations on organisational strategies to consider in laboratories that support agro-bioterrorist surveillance and prevention programs.

  15. Safeguards and security research and development: Program status report, February-July 1981

    International Nuclear Information System (INIS)

    Henry, C.N.; Walton, R.B.

    1982-04-01

    This report, one of a series of biannual progress reports, describes the status of research and development in the Safeguards and Security Program at Los Alamos from February-July 1981. Most work covered here is sponsored by the Office of Safeguards and Security of the Department of Energy; however, project activities that are technically closely related to nuclear safeguards and security also are included where appropriate for conveying information useful to the nuclear community. The report comprises four major subject areas: Security Development and Support; Nuclear Materials Measurement and Engineering; Nuclear Facility Safeguards Support; and International Safeguards, Technology Transfer, and Training. Some technical topics included in the subject areas are computer and informational security, chemical and nondestructive analysis of nuclear materials, process modeling and analysis, nuclear materials accounting systems, evaluation of prototype measurement instrumentation and procedures in nuclear facilities, design and consultation for facilities, technical exchange, training courses, and international safeguards

  16. Safeguards and security research and development: Program status report, February-July 1981

    Energy Technology Data Exchange (ETDEWEB)

    Henry, C.N.; Walton, R.B. (comps.)

    1982-04-01

    This report, one of a series of biannual progress reports, describes the status of research and development in the Safeguards and Security Program at Los Alamos from February-July 1981. Most work covered here is sponsored by the Office of Safeguards and Security of the Department of Energy; however, project activities that are technically closely related to nuclear safeguards and security also are included where appropriate for conveying information useful to the nuclear community. The report comprises four major subject areas: Security Development and Support; Nuclear Materials Measurement and Engineering; Nuclear Facility Safeguards Support; and International Safeguards, Technology Transfer, and Training. Some technical topics included in the subject areas are computer and informational security, chemical and nondestructive analysis of nuclear materials, process modeling and analysis, nuclear materials accounting systems, evaluation of prototype measurement instrumentation and procedures in nuclear facilities, design and consultation for facilities, technical exchange, training courses, and international safeguards.

  17. Addendum to Final Audit Report on Contracting Practices for the Use and Operations of DoD-Sponsored Federally Funded Research and Development Centers

    National Research Council Canada - National Science Library

    1995-01-01

    Inspector General, DoD, Report No. 95-048, "Contracting Practices for the Use and Operations of DoD-Sponsored Federally Funded Research and Development Centers," December 2, 1994, was published without management comments...

  18. Safeguards and security research and development progress report, October 1993--September 1994

    Energy Technology Data Exchange (ETDEWEB)

    Smith, D.B.; Jaramillo, G.R. [comp.

    1995-08-01

    This report describes the activities carried out by the Los Alamos Safeguards and Security Research and Development (R&D) program from October 1993 through September 1994. The activities presented in the first part of the report were directed primarily to domestic US safeguards applications and were, for the most part, sponsored by the Department of Energy`s Office of Safeguards and Security (DOE/OSS, NN-50). The activities described in Part 2, International Safeguards, were supported by the International Safeguards Division of the Office of Arms Control and Nonproliferation (DOE/OACN, NN-40). Part 3 describes several safeguards or safeguards-related activities that have other sponsors. The final part of the report lists titles and abstracts of Los Alamos safeguards R&D reports, technical journal articles, and conference papers that were published or presented in 1994.

  19. Safeguards and Security Research and Development progress report, October 1990--September 1991

    International Nuclear Information System (INIS)

    Smith, D.B.; Jaramillo, G.R.

    1992-07-01

    This report describes the activities carried out by the Los Alamos Safeguards and Security Research And Development (R ampersand D) program from October 1990 through September 1991. The activities presented in the first three parts--Science and Technology Base Development, Basic Systems Design, and Onsite Test and Evaluation and Facility Support--were, for the most part, sponsored by the Department of Energy's Office of Safeguards and Security (DOE/OSS). The activities described in Part 4--International Safeguards--were supported by the International Safeguards Division of the Office of Arms Control and Nonproliferation (OACN/IS). Part 5 describes several safeguards or safeguards-related activities that have sponsors other than the DOE/OSS or OACN/IS. The final part of the report lists titles and abstracts of Los Alamos safeguards R ampersand D reports, technical journal articles, and conference papers that were published in 1991

  20. Safeguards and security research and development progress report, October 1993--September 1994

    International Nuclear Information System (INIS)

    Smith, D.B.; Jaramillo, G.R.

    1995-08-01

    This report describes the activities carried out by the Los Alamos Safeguards and Security Research and Development (R ampersand D) program from October 1993 through September 1994. The activities presented in the first part of the report were directed primarily to domestic US safeguards applications and were, for the most part, sponsored by the Department of Energy's Office of Safeguards and Security (DOE/OSS, NN-50). The activities described in Part 2, International Safeguards, were supported by the International Safeguards Division of the Office of Arms Control and Nonproliferation (DOE/OACN, NN-40). Part 3 describes several safeguards or safeguards-related activities that have other sponsors. The final part of the report lists titles and abstracts of Los Alamos safeguards R ampersand D reports, technical journal articles, and conference papers that were published or presented in 1994

  1. 77 FR 9273 - WORKSHOP Sponsored by the Nuclear Regulatory Commission and the Electric Power Research Institute...

    Science.gov (United States)

    2012-02-16

    ... Commission and the Electric Power Research Institute on the Treatment of Probabilistic Risk Assessment.... SUMMARY: The U.S. Nuclear Regulatory Commission (NRC), Office of Nuclear Regulatory Research (RES), in cooperation with the Electric Power Research Institute (EPRI), will hold a joint workshop on the Treatment of...

  2. 78 FR 19713 - Possible Role of Independent Third Parties in Industry-Sponsored Tobacco Product Research...

    Science.gov (United States)

    2013-04-02

    ... tobacco product research could be subject to third-party governance? For example, could it be applied to... governance? For example, should both the design and conduct of research studies be subject to third-party... more key functions, including the design and conduct of research, the oversight of specific studies...

  3. IRM National Reference Series: Japan: An evaluation of government-sponsored energy conservation research and development

    Energy Technology Data Exchange (ETDEWEB)

    Howard, C.D.

    1987-07-01

    Despite the recent drop in world oil prices, the Japanese government is continuing to stress energy conservation, because Japan relies on imports for 85% of its total energy requirements and virtually 100% of its petroleum. Japan stresses long-term developments and sees conservation as an integral part of its 50- to 100-year transition from fossil fuels to nuclear and renewable sources of energy. The Japanese government is targeting new materials, biotechnology, and electronics technologies as the foundation of Japan's economy in the 21st century. Most government research programs in Japan are governed by aggressive timetables and fixed technical goals and are usually guaranteed funding over a 5- to 10-year period. Of the major energy conservation research programs, the best known is the Moonlight Project, administered by the Ministry of International Trade and Industry (MITI), and oriented towards end-use technologies such as Stirling engines and advanced heat pumps. Parts of MITI's Basic Technologies for Future Industries Program involve research in new materials and bioreactors. The Science and Technology Agency's Exploratory Research in Advanced Technologies (ERATO) Program is also investigating these technologies while emphasizing basic research. Other ministries supporting research related to energy conservation are the Ministry of Education, Science, and Culture and the Ministry of Construction. For 1985, government spending for energy conservation research was at least $50 million. Private sector funding of energy conservation research was $500 million in 1984. A brief outline of major programs and key participants is included for several of the most relevant technologies. An overview of Japan's experience in international scientific collaboration is also included.

  4. Nuclear Waste Separation and Transmutation Research with Special Focus on Russian Transmutation Projects Sponsored by ISTC

    International Nuclear Information System (INIS)

    Conde, Henri; Blomgren, Jan; Olsson, Nils

    2003-03-01

    High-level nuclear reactor waste is made up of relatively few long-lived radioactive species, among them plutonium, that contribute to difficulties with its storage and disposal. Separation of these species from larger waste volumes mainly constituting of uranium (about 95 %) coupled with nuclear incineration to fission products of plutonium and the so called minor actinides (Neptunium, Americium, and Curium) and transmutation of some of the long lived fission products to short lived or stable isotopes represents a viable nuclear waste management strategy to drastically reduce the time and space requirements for a bed-rock repository of the remaining waste. A remarkable increase in the international research and development on partitioning and transmutation has occurred during the recent years. The road-map report published in April 2001 by The European Technical Working Group on ADS for the development of a European demonstration facility for nuclear waste transmutation has high-lighted the ongoing European research and pointed out the need for further research. The road-map has given the different research activities a position in the ultimate goal of producing an ADS demonstrator and is guiding research planning on the national as well as on the EU level. The Advanced Accelerator Application (3A) program in the US, with the long term goals to enhance long term public safety, provide benefits for the repository, reduce proliferation risks and improve prospects for nuclear power has focused the research on nuclear waste transmutation. The reports on the 3A program indicates a change of the US former abandonment position towards reprocessing and fast reactors due to a strong incentive to eliminate the reactor plutonium and to lower the amount of high level reactor waste for the Yucca Mountain repository. The SKB's proposed research and development program for the next 3 years (FUD01) was presented by SKB in September 2001. It is proposed that the research program

  5. PWR and BWR anticipated and abnormal plant transient research sponsored by the US Nuclear Regulatory Commission

    International Nuclear Information System (INIS)

    Beckner, W.D.; Sullivan, L.H.

    1984-01-01

    This chapter reviews the regulatory activities of the US NRC since the realization that anticipated transients with multiple failures (including operator actions) are the major contributors to risk from reactor operations and that the low probability design basis accidents (DBA) are relatively small contributors to risk. The Three Mile Island-2 accident demonstrated that anticipated transients, combined with multiple equipment and/or operator failures, can result in significant core damage. Topics considered include research in direct response to Three Mile Island-2, research in response to specific safety issues, and research to improve the overall understanding of transients (experimental facilities, computer codes). It is concluded that the US NRC has made significant progress in improving its ability to analyze and evaluate abnormal and anticipated transients

  6. Summary of ORNL work on NRC-sponsored HTGR safety research, July 1974-September 1980

    International Nuclear Information System (INIS)

    Ball, S.J.; Cleveland, J.C.; Conklin, J.C.; Delene, J.G.; Harrington, R.M.; Hatta, M.; Hedrick, R.A.; Johnson, L.G.; Sanders, J.P.

    1982-03-01

    A summary is presented of the major accomplishments of the Oak Ridge National Laboratory (ORNL) research program on High-Temperature Gas-Cooled Reactor (HTGR) safety. This report is intended to help the nuclear Regulatory Commission establish goals for future research by comparing the status of the work here (as well as at other laboratories) with the perceived safety needs of the large HTGR. The ORNL program includes extensive work on dynamics-related safety code development, use of codes for studying postulated accident sequences, and use of experimental data for code verification. Cooperative efforts with other programs are also described. Suggestions for near-term and long-term research are presented

  7. Reports on the research projects in the field of reactor safety sponsored by the Federal Ministry of Science and Technology

    International Nuclear Information System (INIS)

    1975-12-01

    Investigations on the safety of Light Water Reactors (LWR) being performed in the framework of the safety program 'Reactor Safety' are sponsored by the Bundesminister fuer Forschung und Technologie (BMFT - Secretary of State for Research and Technology). Objective of this program is to continue improving the safety of LWR, in order to minimize the risk for the environment. With grant assistance from the Bundesminister des Innern (BMI - Secretary of State for Home Affairs) research contracts in the field of reactor safety are being performed. Results of these projects should contribute to resolve questions arising nuclear licensing procedures. The Forschungsbetreuung (FB - research supervision department) at the Institute for Reactor Safety (IRS), as consultants to BMFT and BMI, provides information about the progress of investigations. Individual reports will be prepared and put into standard forms by the research contractors. Each report gives information on: 1) the work accomplished, 2) the results obtained, 3) the work planned to be continued. Initial reports of research projects describe in addition the purpose of the work. A BMFT-research program on the safety of Fast Breeders (Schneller Brutreaktor - SBR) is presently under discussion. In order to define several problems, investigations included in the present compilation (RS 139, 140, 143, 162) will be previously performed. (orig.) [de

  8. Reports on the research projects in the field of reactor safety sponsored by the Federal Ministry of Science and Technology

    International Nuclear Information System (INIS)

    1976-12-01

    Investigations on the safety of light water reactors (LWR) being performed in the framework of the safety program 'Reactor Safety' are sponsored by the Bundesminister fuer Forschung und Technologie (BMFT - Secretary of State for Research and Technology). Objective of this program is to continue improving the safety of LWR, in order to minimize the risk for the environment. With grant assistance from the Bundesminister des Innern (BMI - Secretary of State for Home Affairs) research contrcts in the field of reactor safety are being performed. Results of these projects should contribute to resolve questions arising nuclear licensing procedures. The Forschungsbetreuung (FB - research supervision department) at the Institute for Reactor Safety (IRS), as consultants to BMFT and BMI, provides information about the progress of investigations. Individual reports will be prepared and put into standard forms by the research contractors. Each report gives information on: 1) the work accomplished, 2) the results obtained, 3) the work planned to be continued. Initial reports of research projects describe in addition the purpose of the work. A BMFT-research program on the safety of Fast Breeders (Schneller Brutreaktor - SRB) is presently under discussion. In order to define several problems, investigations included in the present compilation (RS 139, 140, 143, 162) will be previously performed. (orig.) [de

  9. Sponsored research on radioactive waste management. Progress report January 1981 - March 1982

    Energy Technology Data Exchange (ETDEWEB)

    1983-01-01

    The report is in chapters entitled: introduction (background, responsibilities, options, structure of the programme); strategy development; disposal of accumulations; disposal of radioactive waste arisings; quality assurance for waste conditioning quality assurance related to radioactive waste disposal (effectiveness of different rock types as natural barriers to the movement of radioactivity, and non-site specific factors in the design of repositories; radiological assessment; environmental studies; research and development to meet requirements specific to UKAEA wastes; long term research (processes for the solidification of highly active liquid wastes); plutonium contamination waste minimisation.

  10. Awareness and enforcement of guidelines for publishing industry-sponsored medical research among publication professionals: the Global Publication Survey.

    Science.gov (United States)

    Wager, Elizabeth; Woolley, Karen; Adshead, Viv; Cairns, Angela; Fullam, Josh; Gonzalez, John; Grant, Tom; Tortell, Stephanie

    2014-04-19

    To gather information about current practices and implementation of publication guidelines among publication professionals working in or for the pharmaceutical industry. Web-based survey publicised via email and social media to members of the International Society for Medical Publication Professionals (ISMPP) and other organisations from November 2012 to February 2013. 469 individuals involved in publishing industry-sponsored research in peer-reviewed journals, mainly working in pharmaceutical or device companies ('industry', n=144), communication agencies ('agency', n=238), contract research organisations (CRO, n=15) or as freelancers (n=34). Most respondents (78%) had worked on medical publications for ≥5 years and 62% had a PhD/MD. Over 90% of industry, agency and CRO respondents routinely refer to Good Publication Practice (GPP2) and the International Committee of Medical Journal Editors' Uniform Requirements. Most respondents (78% industry, 79% agency) received mandatory training on ethical publication practices. Over 90% of respondents' companies had publication guidelines or policies and required medical writing support to be acknowledged in publications (96% industry, 99% agency). Many industry respondents used publication management tools to monitor compliance with company guidelines and about half (46%) stated that their company had formal publication audits. Fewer agencies audited adherence to guidelines but 20% of agency respondents reported audits of employees and 6% audits of freelancers. Of concern, 37% of agency respondents reported requests from authors or sponsors that they believed were unethical, although 93% of these requests were withdrawn after respondents explained the need for compliance with guidelines. Most respondents' departments (63% industry, 58% agency, 60% CRO) had been involved in publishing studies with negative or inconclusive results. Within this sample, most publication professionals working in or for industry were aware of

  11. Awareness and enforcement of guidelines for publishing industry-sponsored medical research among publication professionals: the Global Publication Survey

    Science.gov (United States)

    Wager, Elizabeth; Woolley, Karen; Adshead, Viv; Cairns, Angela; Fullam, Josh; Gonzalez, John; Grant, Tom; Tortell, Stephanie

    2014-01-01

    Objective To gather information about current practices and implementation of publication guidelines among publication professionals working in or for the pharmaceutical industry. Design/setting Web-based survey publicised via email and social media to members of the International Society for Medical Publication Professionals (ISMPP) and other organisations from November 2012 to February 2013. Participants 469 individuals involved in publishing industry-sponsored research in peer-reviewed journals, mainly working in pharmaceutical or device companies (‘industry’, n=144), communication agencies (‘agency’, n=238), contract research organisations (CRO, n=15) or as freelancers (n=34). Most respondents (78%) had worked on medical publications for ≥5 years and 62% had a PhD/MD. Results Over 90% of industry, agency and CRO respondents routinely refer to Good Publication Practice (GPP2) and the International Committee of Medical Journal Editors’ Uniform Requirements. Most respondents (78% industry, 79% agency) received mandatory training on ethical publication practices. Over 90% of respondents’ companies had publication guidelines or policies and required medical writing support to be acknowledged in publications (96% industry, 99% agency). Many industry respondents used publication management tools to monitor compliance with company guidelines and about half (46%) stated that their company had formal publication audits. Fewer agencies audited adherence to guidelines but 20% of agency respondents reported audits of employees and 6% audits of freelancers. Of concern, 37% of agency respondents reported requests from authors or sponsors that they believed were unethical, although 93% of these requests were withdrawn after respondents explained the need for compliance with guidelines. Most respondents’ departments (63% industry, 58% agency, 60% CRO) had been involved in publishing studies with negative or inconclusive results. Conclusions Within this sample

  12. Balancing Academic Teaching, Research, and Service: a Paradigm Emerging from NSF-TUES Sponsored Project Experiences

    Science.gov (United States)

    De Paor, D. G.

    2012-12-01

    As every academic administrator stresses in interviews with new faculty, the role of a professor today involves balancing three areas - teaching, research, and service. Few institutions can afford the old policy of promoting and tenuring faculty based solely on research output and grantsmanship, whilst ignoring poor teaching outcomes. Outreach activities involving parents and the extramural community are increasingly important as expensive universities and four-year colleges seek to demonstrate their relevance in the age of much less expensive community colleges and distance education. Nevertheless, many faculty complain that teaching and outreach duties compete for their valuable research time. Some fields of research have such broad impacts that they merit the dedicated time of our best scientists. However, other research projects constitute little more than publicly funded professorial hobbies. The challenge is to reliably identify and prioritize the research questions that merit investigation. IN ODU's geospatial visualization group, we instituted a policy requiring Ph.D. theses to include a component (at least one chapter) dedicated to the development and testing of learning resources. TAs test visualizations in their lab sections in tandem with their research studies. They must incorporate original geophysical mapping, modeling, and/or analysis in order to justify a degree in the Physics Department (the traditional home of Geophysics at our institution) rather than, say, the College of Education. Geospatial graduate students also train to offer planetarium presentations to the public using digital full-dome projection technology that can be used with a wide range of geoscience and planetary science topics. Thus they tackle the three aspects of academic work from the outset. In contrast, students in other programs frequently serve as TAs in their first and then switch to grant-supported RA work, resulting in a steady stream of new TAs with little or no

  13. The NASA-sponsored Maryland center for hypersonic education and research

    Science.gov (United States)

    Lewis, Mark J.; Gupta, Ashwani K.

    1995-01-01

    The Office of Aeronautics of the National Aeronautics and Space Administration has established a program to support university programs in the field of hypersonic flight. Beginning in the fall of 1993, three universities, including the University of Maryland at College Park, were selected to participate in this activity. The program at the University of Maryland includes faculty in the Department of Aerospace Engineering and Department of Mechanical Engineering, and provides a multidisciplinary environment for graduate and undergraduate students to study and conduct research in the field of hypersonic flight. Ongoing projects cover the range of applications from cruisers through transatmospheric and reentry vehicles. Research activities, focused on propulsion, fluid dynamics, inverse design, and vehicle optimization and integration, are conducted in conjuntion with industrial partners and government laboratories.

  14. Reports on the projects in the field of reactor safety sponsored by the Federal Ministry for Research and Technology

    International Nuclear Information System (INIS)

    1977-11-01

    Investigations on the safety of Light Water Reactors (LWR) being performed in the framework of the Research Program Reactor Safety (RS-projects) are sponsored by the BMFT (Federal Minister for Research and Technology), Bundesminister fuer Forschung und Technologie. Objective of this program is to investigate in greater detail the safety margins of nuclear energy plants and their systems and the further development of safety technology. The GRS (Reactor Safety Association), Gesellschaft fuer Reaktorsicherheit mbH, by order of BMFT, informs continuously of the status of these investigations within the series 'GRS-F-Fortschrittsberichte' (GRS-F-Progress Reports). Each progress report represents a compilation of individual reports about the different projects of the search program. The individual reports are prepared by the contractors themselves as a documentation of their progress in work and published by the GRS-FB (Research Coordination Department), Forschungsbetreuung at the GRS, within the framework of general information of the progress in reactor safety research. Each report describes the work performed, the results and the next steps of the work. The individual reports are attached to the classification system established by the CEC (Commission of the European Communities). The GRS-F-Progress Reports also include a list of the current investigations arranged according to the projects of the BMFT-Research Program Reactor Safety. This compilation, in addition to the LWR-investigations, also contains first contributions on the safety of advanced reactors. (orig.) [de

  15. Reports on the projects in the field of reactor safety sponsored by the Federal Ministry for Research and Technology

    International Nuclear Information System (INIS)

    1977-12-01

    Investigations on the safety of Light Water Reactors (LWR) being performed in the framework of the Research Program Reactor Safety (RS-projects) are sponsored by the BMFT (Federal Minister for Research and Technology), Bundesminister fuer Forschung und Technologie. Objective of this program is to investigate in greater detail the safety margins of nuclear energy plants and their systems and the further development of safety technology. The GRS (Reactor Safety Association), Gesellschaft fuer Reaktorsicherheit mbH, by order of the BMFT, informs continuously of the status of these investigations within the series 'GRS-F-Fortschrittsberichte' (GRS-F-Progress Reports). Each progress report represents a compilation of individual reports about the different projects of the search program. The individual reports are prepared by the contractors themselves as a documentation of their progress in work and published by the GRS-FB (Research Coordination Department), Forschungsbetreuung at the GRS, within the framework of general information of the progress in reactor safety research. Each report describes the work performed, the results and the next steps of the work. The individual reports are attached to the classification system established by the CEC (Commission of the European Communities). The GRS-F-Progress Reports also include a list of the current investigations arranged according to the projects of the BMFT-Research Program Reactor Safety. This compilation, in addition to the LWR-investigations, also contains first contributions on the safety of advanced reactors. (orig.) [de

  16. Reports on the projects in the field of reactor safety sponsored by the Federal Ministry for Research and Technology

    International Nuclear Information System (INIS)

    1977-06-01

    Investigations on the safety of Light Water Reactors (LWR) being performed in the framework of the Research Program Reactor Safety (RS-projects) are sponsored by the BMFT (Federal Minister for Research and Technology), Bundesminister fuer Forschung und Technologie. Objective of this program is to investigate in greater detail the safety margins of nuclear energy plants and their systems and the further development of safety technology. The GRS (Reactor Safety Association), Gesellschaft fuer Reaktorsicherheit mbH, by order of the BMFT, informs continuously of the status of these investigations within the series 'GRS-F-Forschrittsberichte' (GRS-F-Progress Reports). Each progress report represents a compilation of individual reports about the different projects of the search program. The individual reports are prepared by the contractors themselves as a documentation of their progress in work and published by the GRS-FB (Research Coordination Department), Forschungsbetreuung at the GRS, within the framework of general information of the progress in reactor safety research. Each report describes the work performed, the results and the next steps of the work. The individual reports are attached to the classification system established by the CEC (Commission of the European Communities). The GRS-F-Progress Reports also include a list of the current investigations arranged according to the projects of the BMFT-Research Program Reactor Safety. This compilation, in addition to the LWR-investigations, also contains first contributions on the safety of advanced reactors. (orig.) [de

  17. Henry Solomon Wellcome: A philanthropist and a pioneer sponsor of medical research in the Sudan.

    Science.gov (United States)

    Adeel, Ahmed Awad A

    2013-01-01

    Henry Solomon Wellcome, the famous drug manufacturer had a fascinating association with the Sudan. Besides supporting tropical medicine research in this country, he established an extensive project in the Sudan that aimed at combining archeological excavations, philanthropy and social reform. This article is an archives-based account on this side of Wellcome's association with the Sudan. The article starts with Wellcome's early years in the American Midwest and the evolution of his career and his rise as a world-renowned drug manufacturer. After the battle of Omdurman, Wellcome visited Sudan in 1900 - 1901 where he offered to support the establishment of the research laboratories which later came to be known as the Wellcome Tropical Research Laboratories in Khartoum. He then became directly involved in the planning and running of extensive archeological excavations in the central Sudan. This project served as a field in which Wellcome found an outlet for his philanthropy. More than 4000 labourers were employed in Jebel Moya. Professional archeologists and anatomists were recruited by Wellcome to supervise the work, and all the requirements in terms of equipment were catered for. Wellcome devised a Savings Bank System whereby part of the earnings of each labourer were saved to him till the end of the season. He also introduced one of his innovations: aerial photography using box kite which was used for the first time in archeology. Wellcome made it a rule that no applicant should be turned away. The Camp Commandant had to find suitable work for each applicant, including the handicapped who were assigned to appropriate jobs like mending baskets or cutting grass for building huts. Wellcome's welfare work had a significant impact on the local inhabitants of Jebel Moya. Henry Solomon Wellcome, 1906. Oil painting by Hugh Goldwin Riviere. Credit: Wellcome Library.

  18. Availability of driver's license master lists for use in government-sponsored public health research.

    Science.gov (United States)

    Walsh, Matthew C; Trentham-Dietz, Amy; Palta, Mari

    2011-06-15

    Although the percentage of US drivers with valid driver's licenses varies from state to state, it has historically been high enough to constitute a useful sampling frame for many public health purposes. Over the past decade, states have had to restrict access to this information to comply with the Driver's Privacy Protection Act (18 U.S.C. 2721-2725). In 2009 and 2010, the authors conducted a survey of all 50 states on the availability of master lists of licensed drivers to be used to contact citizens of each state for research purposes. A hypothetical situation requiring driver's license data was sent to each state's responsible government agency for review. In addition, the authors collected data on opt-out mechanisms available to drivers, costs to researchers, and additional state privacy policies pertaining to driver's license files. A total of 42 states (84%) responded; 16 (32%) states allowed access to data, 4 (8%) states were unable to respond to the hypothetical situation, and 22 (44%) states denied access to data. A total of 74,697,574 records were available from the 16 states providing driver's license data. Although the Driver's Privacy Protection Act has restricted access to data on licensed drivers, these data are still an available resource in many states.

  19. Uranium recovery research sponsored by the Nuclear Regulatory Commission at Pacific Northwest Laboratory. Annual progress report, May 1982-May 1983

    International Nuclear Information System (INIS)

    Foley, M.G.; Opitz, B.E.; Deutsch, W.J.

    1983-06-01

    Pacific Northwest Laboratory (PNL) is currently conducting research for the US Nuclear Regulatory Commission (NRC) on uranium recovery process wastes for both active and inactive operations. NRC-sponsored uranium recovery research at PNL is focused on NRC regulatory responsibilities for uranium-recovery operations: license active milling and in situ extraction operations; concur on the acceptability of DOE remedial-action plans for inactive sites; and license DOE to maintain inactive sites following remedial actions. PNL's program consists of four coordinated projects comprised of a program management task and nine research tasks that address the critical technical and safety issues for uranium recovery. Specifically, the projects endeavor to find and evaluate methods to: prevent erosion of tailings piles and prevent radon release from tailings piles; evaluate the effectiveness of interim stabilization techniques to prevent wind erosion and transport of dry tailings from active piles; estimate the dewatering and consolidation behavior of slurried tailings to promote early cover placement; design a cover-protection system to prevent erosion of the cover by expected environmental stresses; reduce seepage into ground water and prevent ground-water degradation; control solution movement and reaction with ground water in in-situ extraction operations; evaluate natural and induced restoration of ground water in in-situ extraction operations; and monitor releases to the environment from uranium recovery facilities

  20. Uranium recovery research sponsored by the Nuclear Regulatory Commission at Pacific Northwest Laboratory. Annual progress report, May 1982-May 1983

    Energy Technology Data Exchange (ETDEWEB)

    Foley, M.G.; Opitz, B.E.; Deutsch, W.J.; Peterson, S.R.; Gee, G.W.; Serne, R.J.; Hartley, J.N.; Thomas, V.W.; Kalkwarf, D.R.; Walters, W.H.

    1983-06-01

    Pacific Northwest Laboratory (PNL) is currently conducting research for the US Nuclear Regulatory Commission (NRC) on uranium recovery process wastes for both active and inactive operations. NRC-sponsored uranium recovery research at PNL is focused on NRC regulatory responsibilities for uranium-recovery operations: license active milling and in situ extraction operations; concur on the acceptability of DOE remedial-action plans for inactive sites; and license DOE to maintain inactive sites following remedial actions. PNL's program consists of four coordinated projects comprised of a program management task and nine research tasks that address the critical technical and safety issues for uranium recovery. Specifically, the projects endeavor to find and evaluate methods to: prevent erosion of tailings piles and prevent radon release from tailings piles; evaluate the effectiveness of interim stabilization techniques to prevent wind erosion and transport of dry tailings from active piles; estimate the dewatering and consolidation behavior of slurried tailings to promote early cover placement; design a cover-protection system to prevent erosion of the cover by expected environmental stresses; reduce seepage into ground water and prevent ground-water degradation; control solution movement and reaction with ground water in in-situ extraction operations; evaluate natural and induced restoration of ground water in in-situ extraction operations; and monitor releases to the environment from uranium recovery facilities.

  1. Linguistic and Cultural Challenges in Communication and Translation in US-Sponsored HIV Prevention Research in Emerging Economies.

    Science.gov (United States)

    Hanrahan, Donna; Sexton, Patrina; Hui, Katrina; Teitcher, Jennifer; Sugarman, Jeremy; London, Alex John; Barnes, Mark; Purpura, James; Klitzman, Robert

    2015-01-01

    Linguistic and cultural differences can impede comprehension among potential research participants during the informed consent process, but how researchers and IRBs respond to these challenges in practice is unclear. We conducted in-depth interviews with 15 researchers, research ethics committee (REC) chairs and members from 8 different countries with emerging economies, involved in HIV-related research sponsored by HIV Prevention Trials Network (HPTN), regarding the ethical and regulatory challenges they face in this regard. In the interviews, problems with translating study materials often arose as major concerns. Four sets of challenges were identified concerning linguistic and cultural translations of informed consent documents and other study materials, related to the: (1) context, (2) process, (3) content and (4) translation of these documents. Host country contextual issues included low literacy rates, education (e.g., documents may need to be written below 5th grade reading level), and experiences with research, and different views of written documentation. Certain terms and concepts may not exist in other languages, or have additional connotations that back translations do not always reveal. Challenges arise because of not only the content of word-for-word, literal translation, but the linguistic form of the language, such as tone (e.g., appropriate forms of politeness vs. legalese, seen as harsh), syntax, manner of questions posed, and the concept of the consent); and the contexts of use affect meaning. Problems also emerged in bilateral communications--US IRBs may misunderstand local practices, or communicate insufficiently the reasons for their decisions to foreign RECs. In sum, these data highlight several challenges that have received little, if any, attention in past literature on translation of informed consent and study materials, and have crucial implications for improving practice, education, research and policy, suggesting several strategies

  2. Linguistic and Cultural Challenges in Communication and Translation in US-Sponsored HIV Prevention Research in Emerging Economies

    Science.gov (United States)

    2015-01-01

    Linguistic and cultural differences can impede comprehension among potential research participants during the informed consent process, but how researchers and IRBs respond to these challenges in practice is unclear. We conducted in-depth interviews with 15 researchers, research ethics committee (REC) chairs and members from 8 different countries with emerging economies, involved in HIV-related research sponsored by HIV Prevention Trials Network (HPTN), regarding the ethical and regulatory challenges they face in this regard. In the interviews, problems with translating study materials often arose as major concerns. Four sets of challenges were identified concerning linguistic and cultural translations of informed consent documents and other study materials, related to the: (1) context, (2) process, (3) content and (4) translation of these documents. Host country contextual issues included low literacy rates, education (e.g., documents may need to be written below 5th grade reading level), and experiences with research, and different views of written documentation. Certain terms and concepts may not exist in other languages, or have additional connotations that back translations do not always reveal. Challenges arise because of not only the content of word-for-word, literal translation, but the linguistic form of the language, such as tone (e.g., appropriate forms of politeness vs. legalese, seen as harsh), syntax, manner of questions posed, and the concept of the consent); and the contexts of use affect meaning. Problems also emerged in bilateral communications – US IRBs may misunderstand local practices, or communicate insufficiently the reasons for their decisions to foreign RECs. In sum, these data highlight several challenges that have received little, if any, attention in past literature on translation of informed consent and study materials, and have crucial implications for improving practice, education, research and policy, suggesting several strategies

  3. Linguistic and Cultural Challenges in Communication and Translation in US-Sponsored HIV Prevention Research in Emerging Economies.

    Directory of Open Access Journals (Sweden)

    Donna Hanrahan

    Full Text Available Linguistic and cultural differences can impede comprehension among potential research participants during the informed consent process, but how researchers and IRBs respond to these challenges in practice is unclear. We conducted in-depth interviews with 15 researchers, research ethics committee (REC chairs and members from 8 different countries with emerging economies, involved in HIV-related research sponsored by HIV Prevention Trials Network (HPTN, regarding the ethical and regulatory challenges they face in this regard. In the interviews, problems with translating study materials often arose as major concerns. Four sets of challenges were identified concerning linguistic and cultural translations of informed consent documents and other study materials, related to the: (1 context, (2 process, (3 content and (4 translation of these documents. Host country contextual issues included low literacy rates, education (e.g., documents may need to be written below 5th grade reading level, and experiences with research, and different views of written documentation. Certain terms and concepts may not exist in other languages, or have additional connotations that back translations do not always reveal. Challenges arise because of not only the content of word-for-word, literal translation, but the linguistic form of the language, such as tone (e.g., appropriate forms of politeness vs. legalese, seen as harsh, syntax, manner of questions posed, and the concept of the consent; and the contexts of use affect meaning. Problems also emerged in bilateral communications--US IRBs may misunderstand local practices, or communicate insufficiently the reasons for their decisions to foreign RECs. In sum, these data highlight several challenges that have received little, if any, attention in past literature on translation of informed consent and study materials, and have crucial implications for improving practice, education, research and policy, suggesting several

  4. Academic Information Security Researchers: Hackers or Specialists?

    Science.gov (United States)

    Dadkhah, Mehdi; Lagzian, Mohammad; Borchardt, Glenn

    2018-04-01

    In this opinion piece, we present a synopsis of our findings from the last 2 years concerning cyber-attacks on web-based academia. We also present some of problems that we have faced and try to resolve any misunderstandings about our work. We are academic information security specialists, not hackers. Finally, we present a brief overview of our methods for detecting cyber fraud in an attempt to present general guidelines for researchers who would like to continue our work. We believe that our work is necessary for protecting the integrity of scholarly publishing against emerging cybercrime.

  5. Laboratory research irradiators with enhanced security features

    International Nuclear Information System (INIS)

    Srivastava, Piyush

    2016-01-01

    Over the years BRIT has developed state of art technology for laboratory research irradiators which are suited most for carrying out research and development works in the fields of radiation processing. These equipment which house radioactive sources up to 14 kCi are having a number of features to meet users requirements. They are manufactured as per the national and International standards of safety codes. The paper deals with design, development and application aspects of laboratory research irradiator called Gamma Chamber and also the new security features planned for incorporation in the equipment. Equipment are being regularly manufactured, supplied and installed by BRIT in India and Abroad. There is a number of such equipment in use at different institutions and are found to be very useful. (author)

  6. Laboratory research irradiators with enhanced security features

    International Nuclear Information System (INIS)

    Srivastava, Piyush

    2014-01-01

    Over the years BRIT has developed state of art technology for laboratory research irradiators which are suited most for carrying out research and development works in the fields of radiation processing. These equipment which house radioactive sources up to 14 kCi are having a number of features to meet users requirements. They are manufactured as per the national and International standards of safety codes. The paper deals with design, development and application aspects of laboratory research irradiator called Gamma Chamber and also the new security features planned for incorporation in the equipment. Equipment are being regularly manufactured, supplied and installed by BRIT in India and Abroad. There are a number of such equipment in use at different institutions and are found to be very useful. (author)

  7. Annual report on reactor safety research projects sponsored by the Minister for Research and Technology of the Federal Republic of Germany 1989

    International Nuclear Information System (INIS)

    1990-08-01

    Investigations on the safety of light water reactors (LWR) being performed in the framework of his research program on reactor safety are sponsored by the Bundesminister fuer Forschung und Technologie (BMFT) (Federal Minister for Research and Technology). Objective of this program is to investigate in greater detail the safety margins of nuclear power plants and their systems and the further development of safety technology. Besides the investigations of LWR tasks also projects on the safety of advanced reactors are sponsored by the BMFT. The Gesellschaft fuer Reaktorsicherheit (GRS), (Society for Reactor Safety), by order of the BMFT, informs continuously of the status of such investigations by means of semi-annual and annual publication of progress reports within the series GRS-F-Fortschrittsberichte (GRS-F-Progress Reports). Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work and published by the Forschungsbetreuung at the GRS, (FB) (Research Coordination Department), within the framework of general informations of progress in reactor safety research. The individual reports are classified according to the same classification system as applied in the nuclear index of the CEC (Commission of the European Communities) and the OECD (Organization for Economic Cooperation and Development). The reports are arranged in sequence of their project numbers. (orig./HP)

  8. Nuclear Security Management for Research Reactors and Related Facilities

    International Nuclear Information System (INIS)

    2016-03-01

    This publication provides a single source guidance to assist those responsible for the implementation of nuclear security measures at research reactors and associated facilities in developing and maintaining an effective and comprehensive programme covering all aspects of nuclear security on the site. It is based on national experience and practices as well as on publications in the field of nuclear management and security. The scope includes security operations, security processes, and security forces and their relationship with the State’s nuclear security regime. The guidance is provided for consideration by States, competent authorities and operators

  9. Improving food security and nutrition through research | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Informing policy through agriculture and food security research. Improving the uptake of agricultural and food security research into policy and practice is a central objective of IDRC's Agriculture and Food Security program. To maximize the impact of proven solutions, the program set out to inform and engage both Canadian ...

  10. Risk Based Security Management at Research Reactors

    Energy Technology Data Exchange (ETDEWEB)

    Ek, David R. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)

    2015-09-01

    This presentation provides a background of what led to the international emphasis on nuclear security and describes how nuclear security is effectively implemented so as to preserve the societal benefits of nuclear and radioactive materials.

  11. Eduroam: Secure WiFi roaming for education and research

    CSIR Research Space (South Africa)

    Miteff, S

    2012-10-01

    Full Text Available In this presentation the author introduces the Eduroam initiative, and explains how it combines existing wireless security technologies in a novel way, to enable secure global roaming for end users at university campuses and research institutions....

  12. Bibliography of reports on research sponsored by the NRC Office of Nuclear Regulatory Research, July--December 1976

    Energy Technology Data Exchange (ETDEWEB)

    Buchanan, J.R.

    1977-03-01

    A bibliography of 148 reports published by contractors of the NRC Office of Nuclear Regulatory Research during the period July through December 1976 is presented along with abstracts from the Nuclear Safety Information Center computer file. The bibliography has been sorted into the subject categories used by NRC to organize the research program. Within the subject categories, the reports are sorted by contractor organization and then chronologically. A brief description of the NRC research program precedes the bibliography.

  13. Bibliography of reports on research sponsored by the NRC office of nuclear regulatory research, July--December 1977

    International Nuclear Information System (INIS)

    Buchanan, J.R.

    1978-04-01

    A bibliography of 198 reports published by contractors of the NRC Office of Nuclear Regulatory Research during the period July through December 1977 is presented along with abstracts from the Nuclear Safety Information Center computer file. The bibliography has been sorted into the subject categories used by NRC to organize the research program. Within the subject categories, the reports are arranged first by contractor organization and then chronologically. A brief description of the NRC research program precedes the bibliography

  14. Bibliography of reports on research sponsored by the NRC Office of Nuclear Regulatory Research, July--December 1976

    International Nuclear Information System (INIS)

    Buchanan, J.R.

    1977-01-01

    A bibliography of 148 reports published by contractors of the NRC Office of Nuclear Regulatory Research during the period July through December 1976 is presented along with abstracts from the Nuclear Safety Information Center computer file. The bibliography has been sorted into the subject categories used by NRC to organize the research program. Within the subject categories, the reports are sorted by contractor organization and then chronologically. A brief description of the NRC research program precedes the bibliography

  15. Bibliography of reports on research sponsored by the NRC office of nuclear regulatory research, July--December 1977

    Energy Technology Data Exchange (ETDEWEB)

    Buchanan, J.R.

    1978-04-01

    A bibliography of 198 reports published by contractors of the NRC Office of Nuclear Regulatory Research during the period July through December 1977 is presented along with abstracts from the Nuclear Safety Information Center computer file. The bibliography has been sorted into the subject categories used by NRC to organize the research program. Within the subject categories, the reports are arranged first by contractor organization and then chronologically. A brief description of the NRC research program precedes the bibliography.

  16. Bibliography of reports on research sponsored by the NRC Office of Nuclear Regulatory Research, November 1975--June 1976

    Energy Technology Data Exchange (ETDEWEB)

    Buchanan, J.R.

    1976-09-30

    A bibliography of 152 reports published by contractors of the NRC Office of Nuclear Regulatory Research during the period November 1975 through June 1976 is presented along with abstracts from the Nuclear Safety Information Center computer file. The bibliography has been sorted into the subject categories used by NRC to organize the research program. Within the subject categories, the reports are sorted by contractor organization and then chronologically. A brief description of the NRC research program precedes the bibliography.

  17. Bibliography of reports on research sponsored by the NRC Office of Nuclear Regulatory Research, November 1975--June 1976

    International Nuclear Information System (INIS)

    Buchanan, J.R.

    1976-01-01

    A bibliography of 152 reports published by contractors of the NRC Office of Nuclear Regulatory Research during the period November 1975 through June 1976 is presented along with abstracts from the Nuclear Safety Information Center computer file. The bibliography has been sorted into the subject categories used by NRC to organize the research program. Within the subject categories, the reports are sorted by contractor organization and then chronologically. A brief description of the NRC research program precedes the bibliography

  18. Reflecting on the Postgraduate Experience: Teaching Research Methods and Statistics: Review of the DART-P Sponsored Workshop at PsyPAG 2013

    Science.gov (United States)

    Jackson, Emma J.; Davies, Emma. L.

    2014-01-01

    Following the success of last year's teaching and career development workshop, this year's DART-P sponsored workshop at the Psychology Postgraduate Affairs Group (PsyPAG) Annual Conference held at Lancaster University focused on postgraduate's experiences of teaching research methods. This article provides a review of the invited speakers…

  19. Research in progress: FY 1984. Summaries of projects sponsored by the Office of Health and Environmental Research

    International Nuclear Information System (INIS)

    1983-12-01

    This report provides a compilation of summaries of the research projects supported by the Office of Health and Environmental Research (OHER) during Fiscal Year 1984. OHER is a component of the Office of Energy Research within the US Department of Energy, responsible for developing a comprehensive understanding of the health and environmental effects of energy technology development and use as well as other Departmental operations. The OHER program is broad in scope and diverse in character with substantial commitments to both applied and basic research. The research projects have been organized to reflect the major themes and focus of the OHER program. Each research category is preceeded by a short narrative to provide some perspective of the scope of activities which follow. Within each research category, the summaries are organized by efforts performed in DOE laboratories (onsite laboratories) and those performed elsewhere (offsite contractors) to help characterize their respective role in the program. The compilation of project titles and summaries, despite its volume, is still a relatively superficial source of information. It does not provide a sound basis for considering program quality or even relevance

  20. Seven layers of security to help protect biomedical research facilities.

    Science.gov (United States)

    Mortell, Norman

    2010-04-01

    In addition to risks such as theft and fire that can confront any type of business, the biomedical research community often faces additional concerns over animal rights extremists, infiltrations, data security and intellectual property rights. Given these concerns, it is not surprising that the industry gives a high priority to security. This article identifies security threats faced by biomedical research companies and shows how these threats are ranked in importance by industry stakeholders. The author then goes on to discuss seven key 'layers' of security, from the external environment to the research facility itself, and how these layers all contribute to the creation of a successfully secured facility.

  1. Reports on research programs in the field of reactor safety sponsored by the Federal Ministry for Research and Technology

    International Nuclear Information System (INIS)

    1988-06-01

    Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work and published by the FB Forschungsbetreuung (research coordination department) at the GRS, within the framework of general information of progress in reactor safety research. The individual reports are classified according to the research program on the safety of LWR 1977-1980 of the BMFT. Another table of contents uses the same classification system as applied in the nuclear safety index of the CEC (Commission of the European Communities) and the OECD (Organization for Economic Cooperation and Development). The reports are arranged in the sequence of their project numbers. (orig.) [de

  2. Reports on research programs in the field of reactor safety sponsored by the Federal Ministry of Research and Technology

    International Nuclear Information System (INIS)

    1993-09-01

    Each progress report presents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work and published by the Forschungsbetreuung at the GRS, (FB) (Research Coordination Department), within the framework of general informations of progress in reactor safety research. The individual reports are classified according to the research program of the safety of LWR 1977-1980 of the BMFT. Another table of contents uses the same classification system as applied in the nuclear safety index of the CEC (Commission of the European Communities) and the OECD (Organization for Economic Cooperation and Development). The reports are arranged in the sequence of their project numbers. (orig.) [de

  3. Reports on research programs in the field of reactor safety sponsored by the Federal Ministry for Research and Technology

    International Nuclear Information System (INIS)

    1985-10-01

    Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work and published by the FB (research coordination department), Forschungsbetreuung at the GRS, within the framework of general information of progress in reactor safety research. The individual reports are classified according to the research program on the safety of LWR 1977-1980 of the BMFT. Another table of contents uses the same classification system as applied in the nuclear safety index of the CEC (Commission of the European Communities) and the OECD (Organization for Economic Cooperation and Development). The reports are arranged in the sequence of their project numbers. (orig./PW) [de

  4. Reports on research programs in the field of reactor safety sponsored by the Federal Ministry for Research and Technology

    International Nuclear Information System (INIS)

    1989-06-01

    Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work and published by the FB Forschungsbetreuung (Research Coordination Department) at the GRS, within the framework of general information of progress in reactor safety research. The individual reports are classified according to the research program on the safety of LWR 1977-1980 of the BMFT. Another table of contents uses the same classification system as applied in the nuclear safety index of the CEC (Commission of the European Communities) and the OECD (Organization for Economic Cooperation and Development). The reports are arranged in the sequence of their project numbers. (orig.) [de

  5. Reports on research programs in the field of reactor safety sponsored by the Federal Ministry of Research and Technology

    International Nuclear Information System (INIS)

    1991-12-01

    Each progress report presents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work and published by the Forschungsbetreuung at the GRS, (FB) (Research Coordination Department), within the framework of general informations of progreess in reactor safety research. The individual reports are classified according to the research program of the safety of LWR 1977-1980 of the BMFT. Another table of contents uses the same classification system as applied in the nuclear safety index of the CEC (Commission of the European Communitites) and the OECD (Organization for Economic Cooperation and Development). The reports are arranged in the sequence of their project numbers. (orig./HP) [de

  6. Reports on research programs in the field of reactor safety sponsored by the Federal Ministry for Research and Technology

    International Nuclear Information System (INIS)

    1984-09-01

    Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work and published by the FB (Research Coordination Department), Forschungsbetreuung at the GRS, within the framework of general information of progress in reactor safety research. The individual reports are classified according to the research program on the safety of LWRS 1977-1980 of the BMFT. Another table of contents uses the same classification system as applied in the nuclear safety index of the CEC (Commission of the European Communities) and the OECD (Organization for Economic Cooperation and Development). The reports are arranged in the sequence of their project numbers. (orig./HP) [de

  7. Reports on research programs in the field of reactor safety sponsored by the Federal Ministry for Research and Technology

    International Nuclear Information System (INIS)

    1988-10-01

    Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work and published by the FB Forschungsbetreuung (research coordination department) at the GRS, within the framework of general information of progress in reactor safety research. The individual reports are classified according to the research program on the safety of LWR 1977-1980 of the BMFT. Another table of contents uses the same classification system as applied in the nuclear safety index of the CEC (Commission of the European Communities) and the OECD (Organization for Economic Cooperation and Development). The reports are arranged in the sequence of their project numbers. (orig.) [de

  8. Reports on research programs in the field of reactor safety sponsored by the Federal Ministry for Research and Technology

    International Nuclear Information System (INIS)

    1989-11-01

    Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work and published by the FB Forschungsbetreuung (Research Coordination Department) at the GRS, within the framework of general information of progress in reactor safety research. The individual reports are classified according to the research program on the safety of LWR 1977-1980 of the BMFT. Another table of contents uses the same classification system as applied in the nuclear safety index of the CEC (Commission of the European Communities) and the OECD (Organization for Economic Cooperation and Development). The reports are arranged in the sequence of their project numbers. (orig.) [de

  9. Reports on research programs in the field of reactor safety sponsored by the Federal Ministry of Research and Technology

    International Nuclear Information System (INIS)

    1992-09-01

    Each progress report presents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work and published by the Forschungsbetreuung at the GRS, (FB) (Research Coordination Department), within the framework of general informations of progress in reactor safety research. The individual reports are classified according to the research program of the safety of LWR 1977-1980 of the BMFT. Another table of contents uses the same classification system as applied in the nuclear safety index of the CEC (Commission of the European Communitites) and the OECD (Organization for Economic Cooperation and Development). The reports are arranged in the sequence of their project numbers. (orig.) [de

  10. Reports on research programs in the field of reactor safety sponsored by the Federal Ministry of Research and Technology

    International Nuclear Information System (INIS)

    1993-03-01

    Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work and published by the Forschungsbetreuung at the GRS, (FB) (Research Coordination Department), within the framework of general informations of progress in reactor safety research. The individual reports are classified according to the research program of the safety of LWR 1977-1980 of the BMFT. Another table uses the same classification system as applied in the nuclear safety index of the CEC (Commission of the European Communities) and the OECD (Organization for Economic Cooperation and Development). The reports are arranged in sequence of their project numbers. (orig./HP) [de

  11. Security Research on Engineering Database System

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database management system (EDBMS). Through studying and analyzing the database security, to draw a series of securi ty rules, which reach B1, level security standard. Which includes discretionary access control (DAC), mandatory access control (MAC) and audit. The EDBMS implem ents functions of DAC, ...

  12. Securing medical research: a cybersecurity point of view.

    Science.gov (United States)

    Schneier, Bruce

    2012-06-22

    The problem of securing biological research data is a difficult and complicated one. Our ability to secure data on computers is not robust enough to ensure the security of existing data sets. Lessons from cryptography illustrate that neither secrecy measures, such as deleting technical details, nor national solutions, such as export controls, will work.

  13. Progress report - reports on reactor safety research programs sponsored by the Federal Ministry for Research and Technology

    International Nuclear Information System (INIS)

    1982-09-01

    Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work and published by the GRS, within the framework of general information of progress in reactor safety research. The individual reports are classified according to the research program on the safety of LWRs 1977-1980 of the BMFT. Another table of contents uses the same classification system as applied in the nuclear safety index of the CEC and the OECD. The reports are arranged in the sequence of their project numbers. (orig./HP) [de

  14. Reports on research projects in the field of reactor safety sponsored by the Federal Minister for Research and Technology

    International Nuclear Information System (INIS)

    1981-03-01

    The GRS (Reactor Safety Association), Gesellschaft fuer Reaktorsicherheit mbH, by order of the BMFT, informs continuously of the status of such investigations by means of quarterly and annually publication of progress reports within the series GRS-F-Fortschrittsbericht (GRS-F-Progress Reports). Each progress report represents a compilation of individual reports about objectives, the work performed, the results the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work and published by the FB (Research Coordination Department), Forschungsbetreuung at the GRS, within the framework of general information of progress in reactor safety research. The individual reports are arranged according to the Research Program on the Safety of LWRs 1977-1980 of the BMFT. Another table of contents uses the same classification system as applied in the Nuclear Safety Index of the CEC (Commission of the European Communities) and the OECD (Organization for Economic Cooperation and Development). The reports are marked by current numbers in sequence of their arrangement in this compilation. (orig./HP) [de

  15. Reports on research projects in the field of reactor safety sponsored by the Federal Minister for Research and Technology

    International Nuclear Information System (INIS)

    1981-06-01

    The GRS (Reactor Safety Association), Gesellschaft fuer Reaktorsicherheit mbH, by order of the BMFT, informs continuously of the status of such investigations by means of quarterly and annually publication of progress reports within the series GRS-F-Fortschrittsbericht (GRS-F-Progress Reports). Each progress report represents a compilation of individual reports about objectives, the work performed, the results the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work and published by the FB (Research Coordination Department), Forschungsbetreuung at the GRS, within the framework of general information of progress in reactor safety research. The individual reports are arranged according to the Research Program on the Safety of LWRs 1977-1980 of the BMFT. Another table of contents uses the same classification system as applied in the Nuclear Safety Index of the CEC (Commission of the European Communities) and the OECD (Organization for Economic Cooperation and Development). The reports are marked by current numbers in sequence of their arrangement in this compilation. (orig./HP) [de

  16. The analysis of the public support, results, and the research field structure of the Czech security R

    Directory of Open Access Journals (Sweden)

    Faťun Martin

    2017-07-01

    Full Text Available The article is devoted to an analysis of the public support and results of the security oriented R&D in Czechia in the years 2011–2015. The aim is to provide a knowledge base for active participation of users of results and existing and potential beneficiaries of public support in the development of the system and programs of the security research after 2017. The introductory part of the text describes the national environment of the security R&D, and the methodology of the data analysis of projects and programs and the bibliometric analyses of results of the security research. The analysis is focused in particular upon the distribution of the public funding, and the results obtained in R&D programs financed by the Ministry of the interior (MoI. The existing overlaps between R&D activities sponsored by MoI and by other governmental bodies are also examined.

  17. Reports on research projects in the field of reactor safety sponsored by the Federal Ministry for Education, Science, Research and Technology. Period covered: January 1 - June 30, 1997

    International Nuclear Information System (INIS)

    1997-01-01

    Within the framework of its research programme on reactor safety, the Bundesministerium fuer Bildung, Wissenschaft, Forschung und Technology (BMBF) (Federal Ministry for Education, Science, Research and Technology) sponsors investigations into the safety of nuclear reactors. These investigations that are carried out within the framework of the programme are to provide fundamental knowledge, procedures and methods contributing to realistic safety assessments of nuclear facilities, the further development of safety technology, and the use of the potential of innovative safety-related approaches. Gesellschaft fuer Anlagen- und Reaktorsicherheit (GRS) bmH, by order of the BMBF, continuously issues information on the status of such investigations by publishing semiannual and annual progress reports within the series of GRS-F-Fortschrittsberichte (GRS-F-Progress Reports). Each progress report represents a compilation of individual reports about the objectives, work performed, results, next steps of the work etc. The individual reports are prepared in a standard form by the research organisations themselves as documentation of their progress in work and are published by the Research Management Division of GRS within the framework of general information on the progress in reactor safety research. (orig./SR) [de

  18. Cloud Security: Issues and Research Directions

    Science.gov (United States)

    2014-11-18

    4. Cloud Computing Security: What Changes with Software - Defined Networking ? Maur´ıcio Tsugawa, Andr´ea Matsunaga, and Jos´e A. B. Fortes 5...machine’s memory from an untrusted or malicious hypervisor. In Chapter 4, Tsugawa et al. discuss the security issues introduced when Software - Defined ... Networking ( SDN ) is deployed within and across clouds. Chapters 5-9 are focused on the protection of data stored in the cloud. In Chapter 5, Wang et

  19. The Security Research of Digital Library Network

    Science.gov (United States)

    Zhang, Xin; Song, Ding-Li; Yan, Shu

    Digital library is a self-development needs for the modern library to meet the development requirements of the times, changing the way services and so on. digital library from the hardware, technology, management and other aspects to objective analysis of the factors of threats to digital library network security. We should face up the problems of digital library network security: digital library network hardware are "not hard", the technology of digital library is relatively lag, digital library management system is imperfect and other problems; the government should take active measures to ensure that the library funding, to enhance the level of network hardware, to upgrade LAN and prevention technology, to improve network control technology, network monitoring technology; to strengthen safety management concepts, to prefect the safety management system; and to improve the level of security management modernization for digital library.

  20. SecurityCom: A Multi-Player Game for Researching and Teaching Information Security Teams

    Directory of Open Access Journals (Sweden)

    Douglas P. Twitchell

    2007-12-01

    Full Text Available A major portion of government and business organizations’ attempts to counteract information security threats is teams of security personnel.  These teams often consist of personnel of diverse backgrounds in specific specialties such as network administration, application development, and business administration, resulting in possible conflicts between security, functionality, and availability.  This paper discusses the use of games to teach and research information security teams and outlines research to design and build a simple, team-oriented, configurable, information security game. It will be used to study how information security teams work together to defend against attacks using a multi-player game, and to study the use of games in training security teams.  Studying how information security teams work, especially considering the topic of shared-situational awareness, could lead to better ways of forming, managing, and training teams.  Studying the effectiveness of the game as a training tool could lead to better training for security teams. 

  1. Research on food security makes a difference for African women ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    17 avr. 2014 ... There is ample evidence that addressing gender inequalities and empowering women are vital to meeting the challenges of improving food and nutrition security, and enabling poor rural people to overcome poverty. A central objective of the Canadian International Food Security Research Fund (CIFSRF) is ...

  2. Research on food security makes a difference for African women ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-05-05

    May 5, 2016 ... There is ample evidence that addressing gender inequalities and empowering women are vital to meeting the challenges of improving food and nutrition security, and enabling poor rural people to overcome poverty. A central objective of the Canadian International Food Security Research Fund (CIFSRF) is ...

  3. Information Security Issues in Higher Education and Institutional Research

    Science.gov (United States)

    Custer, William L.

    2010-01-01

    Information security threats to educational institutions and their data assets have worsened significantly over the past few years. The rich data stores of institutional research are especially vulnerable, and threats from security breaches represent no small risk. New genres of threat require new kinds of controls if the institution is to prevent…

  4. Research Awards: Agriculture and Food Security program Deadline ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Jean-Claude Dumais

    2012-09-12

    Sep 12, 2012 ... HEAD OFFICE / SIÈGE : 150 Kent Street / 150, rue Kent PO Box ... to pursue their research goals in a dynamic team environment in ... You should have an interest in agriculture, food security, nutrition, rural livelihoods, and.

  5. Improving food security and nutrition through research | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-10-06

    Oct 6, 2016 ... In Canada, the 2012 federal budget highlighted CIFSRF's success, noting how the ... New animal vaccines could keep more African farmers in business ... Research on food security makes a difference for African women.

  6. An update on research priorities in hydrocephalus: overview of the third National Institutes of Health-sponsored symposium "Opportunities for Hydrocephalus Research: Pathways to Better Outcomes".

    Science.gov (United States)

    McAllister, James P; Williams, Michael A; Walker, Marion L; Kestle, John R W; Relkin, Norman R; Anderson, Amy M; Gross, Paul H; Browd, Samuel R

    2015-12-01

    Building on previous National Institutes of Health-sponsored symposia on hydrocephalus research, "Opportunities for Hydrocephalus Research: Pathways to Better Outcomes" was held in Seattle, Washington, July 9-11, 2012. Plenary sessions were organized into four major themes, each with two subtopics: Causes of Hydrocephalus (Genetics and Pathophysiological Modifications); Diagnosis of Hydrocephalus (Biomarkers and Neuroimaging); Treatment of Hydrocephalus (Bioengineering Advances and Surgical Treatments); and Outcome in Hydrocephalus (Neuropsychological and Neurological). International experts gave plenary talks, and extensive group discussions were held for each of the major themes. The conference emphasized patient-centered care and translational research, with the main objective to arrive at a consensus on priorities in hydrocephalus that have the potential to impact patient care in the next 5 years. The current state of hydrocephalus research and treatment was presented, and the following priorities for research were recommended for each theme. 1) Causes of Hydrocephalus-CSF absorption, production, and related drug therapies; pathogenesis of human hydrocephalus; improved animal and in vitro models of hydrocephalus; developmental and macromolecular transport mechanisms; biomechanical changes in hydrocephalus; and age-dependent mechanisms in the development of hydrocephalus. 2) Diagnosis of Hydrocephalus-implementation of a standardized set of protocols and a shared repository of technical information; prospective studies of multimodal techniques including MRI and CSF biomarkers to test potential pharmacological treatments; and quantitative and cost-effective CSF assessment techniques. 3) Treatment of Hydrocephalus-improved bioengineering efforts to reduce proximal catheter and overall shunt failure; external or implantable diagnostics and support for the biological infrastructure research that informs these efforts; and evidence-based surgical standardization with

  7. Improving Control System Security through the Evaluation of Current Trends in Computer Security Research

    Energy Technology Data Exchange (ETDEWEB)

    Rolston

    2005-03-01

    At present, control system security efforts are primarily technical and reactive in nature. What has been overlooked is the need for proactive efforts, focused on the IT security research community from which new threats might emerge. Evaluating cutting edge IT security research and how it is evolving can provide defenders with valuable information regarding what new threats and tools they can anticipate in the future. Only known attack methodologies can be blocked, and there is a gap between what is known to the general security community and what is being done by cutting edge researchers --both those trying to protect systems and those trying to compromise them. The best security researchers communicate with others in their field; they know what cutting edge research is being done; what software can be penetrated via this research; and what new attack techniques and methodologies are being circulated in the black hat community. Standardization of control system applications, operating systems, and networking protocols is occurring at a rapid rate, following a path similar to the standardization of modern IT networks. Many attack methodologies used on IT systems can be ported over to the control system environment with little difficulty. It is extremely important to take advantage of the lag time between new research, its use on traditional IT networks, and the time it takes to port the research over for use on a control system network. Analyzing nascent trends in IT security and determining their applicability to control system networks provides significant information regarding defense mechanisms needed to secure critical infrastructure more effectively. This work provides the critical infrastructure community with a better understanding of how new attacks might be launched, what layers of defense will be needed to deter them, how the attacks could be detected, and how their impact could be limited.

  8. Organisational Information Security Strategy: Review, Discussion and Future Research

    Directory of Open Access Journals (Sweden)

    Craig A. Horne

    2017-05-01

    Full Text Available Dependence on information, including for some of the world’s largest organisations such as governments and multi-national corporations, has grown rapidly in recent years. However, reports of information security breaches and their associated consequences indicate that attacks are escalating on organisations conducting these information-based activities. Organisations need to formulate strategy to secure their information, however gaps exist in knowledge. Through a thematic review of academic security literature, (1 we analyse the antecedent conditions that motivate the adoption of a comprehensive information security strategy, (2 the conceptual elements of strategy and (3 the benefits that are enjoyed post-adoption. Our contributions include a definition of information security strategy that moves from an internally-focussed protection of information towards a strategic view that considers the organisation, its resources and capabilities, and its external environment. Our findings are then used to suggest future research directions.

  9. Research helps improve food security and nutrition

    International Development Research Centre (IDRC) Digital Library (Canada)

    Corey Piccioni

    agricultural productivity, improving nutrition, and raising incomes of men and women smallholder farmers. IDRC accomplishes this through joint partnerships with Global. Affairs Canada and the Australian Centre for International. Agricultural Research. Our researchers use a variety of approaches to: • Increase productivity of ...

  10. Canadian International Food Security Research Fund (CIFSRF)

    International Development Research Centre (IDRC) Digital Library (Canada)

    The research team will test innovative mechanisms such as elec- tronic vouchers to target vulnerable groups on a large scale. E-voucher discounts delivered by mobile phone to 65,000 lactat- ing mothers will provide a temporary price incentive to help build a market for the product. The scheme will also enable researchers.

  11. The Sponsored Film.

    Science.gov (United States)

    Klein, Walter J.

    For public relations professionals and would-be sponsors of films, this book provides guidelines for understanding the film medium and its potential as a persuasive force in industry, government, organizations, and religious orders. For filmmakers, it brings together practical information needed to survive in the sponsored-film industry and to…

  12. Research Award: Agriculture and Food Security Program

    International Development Research Centre (IDRC) Digital Library (Canada)

    IDRC CRDI

    social) without adverse consequences to societies and the environment. ... research will place particular attention on the interactions of public sector ... Applicants should clearly outline their qualifications for this position, and explain how this ...

  13. Needed Research on Child Socialization. A Special Report of the USOE-Sponsored Grant Study: Critical Appraisal of Research in the Personality-Emotions-Motivation Domain.

    Science.gov (United States)

    Gorsuch, Richard L.; And Others

    The task group report presented in this publication is one of a series prepared by eminent psychologists who have served as consultants in the U.S. Office of Education-sponsored grant study to conduct a Critical Appraisal of the Personality-Emotions-Motivation Domain. In order to achieve the goal of identifying important problems and areas for new…

  14. Research Advances of Social Security Problems in China —Visualization Research based on Bibliometrics

    Institute of Scientific and Technical Information of China (English)

    赵琳

    2016-01-01

    This article summarized the research progress and characteristics of Chinese social security issues from 2000 papers, which record in CNKI. We find that, the topic in the field of social security is board and dispersion. Due to the huge system and complex problem of social security, there is no central theme. Through cluster analysis, multi dimensional scaling analysis and social network analysis, we got the high frequency keywords atlas. Then, we summarized the research topic to six parts. They are rural social security, urban and rural social security co-ordination, vulnerable group social security, social security fund management, the social insurance system, and social security system and government responsibility. It summed up the theme of the module, meanwhile, combined the practice analysis.

  15. Enhancing research ethics capacity in the Middle East: experience and challenges of a Fogarty-sponsored training program.

    Science.gov (United States)

    Silverman, Henry; Edwards, Hillary; Shamoo, Adil; Matar, Amal

    2013-12-01

    We describe the research ethics capacity needs of the countries from the Middle East region. Against this background, we relate the experience of an international training program focused on providing long-term training in research ethics to individuals from low and middle-income countries in the Middle East area. We describe our pedagogical approach to training, program changes to address challenges faced, and accomplishments of trainees. Many former trainees developed research ethics curricula in their home institutions, established or enhanced their institutions' research ethics committees, provided leadership to national research ethics systems, and conducted research in research ethics. Based on our analysis, we make recommendations for how trainees can further address current regional research ethics needs in the Middle East and conduct future research. This paper is part of a collection of papers analyzing the Fogarty International Center's International Research Ethics Education and Curriculum Development program.

  16. Strategic Studies Quarterly. An Air Force-Sponsored Strategic Forum on National and International Security. Winter 2009. Volume 3, Number 4

    Science.gov (United States)

    2009-01-01

    by George Shultz, William Perry, Henry Kissinger, and Sam Nunn. These seasoned policy experts shocked many with their advocacy of a “world free of...NY: Kennikat Press, 1956); Alexander George and Richard Smoke , Deterrence in American Foreign Policy: Theory and Practice (New York: Columbia...practiced abstinence in defense and security policy matters through the end of the 1990s—and why development of ESDP has proceeded only sluggishly since

  17. Electric Power Infrastructure Reliability And Security Research And Development Initiative. Final report

    International Nuclear Information System (INIS)

    Dale, S.; Meeker, R.; Steurer, M.; Li, H.; Pamidi, S.; Rodrigo, H.; Suryanarayanan, S.; Cartes, D.; Ordonez, J.; Domijan, A.; Liu, W.; Cox, D.; McLaren, P.; Hovsapian, R.; Edwards, D.; Simmons, S.; Wilde, N.; Woodruff, S.; Kopriva, D.; Hussaini, Y.; Mohammed, O.; Zheng, J.; Baldwin, T.L.

    2008-01-01

    This is the final scientific/technical report for the Electric Power Infrastructure Reliability and Security R and D Initiative sponsored by the U.S. Department of Energy, Office of Electricity Delivery and Energy Reliability, under award number DE-FG02-05CH11292. This report covers results from the FSU-led, multi-institution effort conducted over the period 8/15/05 to 10/14/2007. Building upon existing infrastructure for power systems research, modeling, and simulation, the Center for Advanced Power Systems (CAPS) at Florida State University (FSU) is developing world-class programs in electric power systems research and education to support future electric power system needs and challenges. With U.S. Department of Energy Support, FSU CAPS has engaged in a multi-faceted effort to conduct basic and applied research towards understanding, developing, and deploying technologies and approaches that can lead to improved reliability and security of the North American electric power generation and delivery infrastructure. This wide-reaching project, through a number of carefully selected thrusts cutting across several research disciplines, set out to address key terrestrial electric utility power system issues and challenges. The challenges and the thrusts to address them were arrived at through analysis of a number of national reports and recommendations combined with input from an experienced multi-disciplined team of power systems research staff and faculty at FSU CAPS. The resulting project effort can be grouped into four major areas: - Power Systems and New Technology Insertion - Controls, Protection, and Security - Simulation Development - High Temperature Superconductivity (HTS)

  18. Privacy and Security in Mobile Health (mHealth) Research.

    Science.gov (United States)

    Arora, Shifali; Yttri, Jennifer; Nilse, Wendy

    2014-01-01

    Research on the use of mobile technologies for alcohol use problems is a developing field. Rapid technological advances in mobile health (or mHealth) research generate both opportunities and challenges, including how to create scalable systems capable of collecting unprecedented amounts of data and conducting interventions-some in real time-while at the same time protecting the privacy and safety of research participants. Although the research literature in this area is sparse, lessons can be borrowed from other communities, such as cybersecurity or Internet security, which offer many techniques to reduce the potential risk of data breaches or tampering in mHealth. More research into measures to minimize risk to privacy and security effectively in mHealth is needed. Even so, progress in mHealth research should not stop while the field waits for perfect solutions.

  19. List of reports in the field of reactor safety research sponsored by BMFT, CEA, EPRI, JSTA and USNRC

    International Nuclear Information System (INIS)

    1987-02-01

    This list reviews reports from the Federal Republic of Germany, from France, from Japan and from the United States of America concerning single problems in the field of reactor safety research. According to the cooperation of the Federal Minister for Research and Technology (BMFT) with the Commissariat a l'Energie Atomique (CEA), the Japan Science and Technology Agency (JSTA), the Electric Power Research Institute (EPRI) and the United States Nuclear Regulatory Commission, these reports are available in the Gesellschaft fuer Reaktorsicherheit (GRS). The list pursues the following order: Country of origin, problem area concerned, according to the Reactor Safety Research Programm of the BMFT, reporting organization. The list of reports appears quarterly. (orig./HP) [de

  20. A critical analysis and discussion of clinical research ethics in the Russian Federation and their implications for Western sponsored trials.

    Science.gov (United States)

    Leintz, Christopher

    2014-06-01

    Globalization, political upheavals, and Western economic struggles have caused a geographical reprioritization in the realm of drug development and human clinical research. Regulatory and cost hurdles as well as a saturation of research sites and subjects in Western countries have forced the pharmaceutical industry to place an unprecedented level of importance on emerging markets, injecting Western corporate initiatives into cultures historically and socially isolated from Western-centric value systems. One of the greatest recipients of this onslaught of Western business and research practices is the Russian Federation. Namely, market forces are dictating a focused research initiative in the traditional emerging markets, but this focus may be at the expense of individual and societal dignity. © 2012 John Wiley & Sons Ltd.

  1. List of reports in the field of reactor safety research sponsored by BMFT, CEA, EPRI, JSTA and USNRC

    International Nuclear Information System (INIS)

    1987-05-01

    This list reviews reports from the Federal Republic of Germany, from France, from Japan and from the United States of America concerning single problems in the field of reactor safety research. According to the cooperation of the Federal Minister for Research and Technology (BMFT) with the Commissariat a l'Energie Atomique (CEA), the Japan Science and Technology Agency (JSTA), the Electric Power Research Institute (EPRI) and the United States Nuclear Regulatory Commission, these reports are available in the Gesellschaft fuer Reaktorsicherheit (GRS). The list pursues the following order: Country of origin, problem area concerned, according to the Reactor Safety Research Programm of the BMFT, reporting organization. The list of reports appears quarterly. (orig./HP) [de

  2. List of reports in the field of reactor safety research sponsored by BMFT, CEA, EPRI, JSTA and USNRC

    International Nuclear Information System (INIS)

    1986-04-01

    This list reviews reports from the Federal Republic of Germany, from France, from Japan and from the United States of America concerning single problems in the field of Reactor Safety Research. The list pursues the following order: Country of origin, problem area concerned, according to the Reactor Safety Research Program of the BMFT, reporting organization. The list of reports appears quarterly. (orig./HP) [de

  3. List of reports in the field of reactor safety research sponsored by BMFT, CEA, EPRI, JSTA and USNRC

    International Nuclear Information System (INIS)

    1986-02-01

    This list reviews reports from the Federal Republic of Germany, from France, from Japan and from the United States of America concerning special problems in the field of reactor safety research. The list pursues the following order: Country of origin, problem area concerned, according to the Reactor Safety Research Programm of the BMFT, reporting organization. The list of reports appears quarterly. (orig./HP) [de

  4. Reports on research programs in the field of reactor safety sponsored by the Federal Ministry for Research and Technology. Reported period: July 1 to December 31, 1986. Progress report

    International Nuclear Information System (INIS)

    1987-05-01

    Investigations on the safety of light water reactors (LWR) being performed in the framework of the research program on reactor safety (RS-projects) are sponsored by the Federal Ministry for Research and Technology (BMFT). Objective of this program is to investigate in greater detail the safety margins of nuclear power plants and their systems and the further development of safety technology. Besides the investigations of LWR tasks also projects on the safety of advanced reactors are sponsored by the BMFT. The individual reports are classified according to the research program on the safety of LWRs 1977-1980 of the BMFT. Another table of contents uses the same classification system as applied in the nuclear safety index of the CEC (Commission of the European Communities) and the OECD (Organization for Economic Cooperation and Development). The reports are arranged in the sequence of their project numbers. (orig.) [de

  5. A Perspective on Research Challenges in Information Security

    Science.gov (United States)

    2011-11-01

    UNCLASSIFIED A Perspective on Research Challenges in Information Security Tamas Abraham, David Adie, Angela Billard, Paul Buckland, Michael Frangos ...Abstract (U) 4. AUTHORS Tamas Abraham, David Adie, Angela Billard, Paul Buckland, Michael Frangos , Ben Long, Mar- tin Lucas, Paul Montague, Dean Philp

  6. CPTC and NIST-sponsored Yeast Reference Material Now Publicly Available | Office of Cancer Clinical Proteomics Research

    Science.gov (United States)

    The yeast protein extract (RM8323) developed by National Institute of Standards and Technology (NIST) under the auspices of NCI's CPTC initiative is currently available to the public at https://www-s.nist.gov/srmors/view_detail.cfm?srm=8323. The yeast proteome offers researchers a unique biological reference material. RM8323 is the most extensively characterized complex biological proteome and the only one associated with several large-scale studies to estimate protein abundance across a wide concentration range.

  7. Paradigma Baru Sponsor sebagai Mitra Penyelenggaraan Event

    Directory of Open Access Journals (Sweden)

    Lidia Evelina

    2011-10-01

    Full Text Available The goals of this article is to know why sponsorship only to be viewed as sources of funding to implement the public relation events or marketing communication events. Method used in this article is qualitative method research to be based on observation, library study and content analysis. The result of this research seems that change happened in role of sponsorship from only fund source to become a partner of cooperation (mutual symbiotism between sponsor and event organizer. This article exploring the change of sponsorship concept from only looking for sponsor as an activity of fund mobilitation to become a partnership cooperation between event organizer and sponsor company. The mean of sponsor itself beside the fund supporter, they are also a side who takes mutual benefit from the cooperation. Conclusion, any close relationship (mutual benefit between two sides who take cooperation in event implementation (sponsor and event organiser. 

  8. Annual report on Reactor Safety Research Projects sponsored by the Ministry of Economics and Technology of the Federal Republic of Germany. Reporting period 1999. Progress report

    International Nuclear Information System (INIS)

    2000-01-01

    Within its competence for energy research, the Bundesministerium fuer Wirtschaft und Technologie (BMWi) (Federal Ministry of Economics and Technology) sponsors investigations into the safety of nuclear power plants. The objective of these investigations is to provide fundamental knowledge, procedures and methods to contribute to realistic safety assessments of nuclear installations, to the further development of safety technology and to make use of the potential of innovative safety-related approaches. The Gesellschaft fuer Anlagen- und Reaktorsicherheit (GRS) mbH, by order of the BMWi, continuously issues information on the status of such investigations by publishing semi-annual and annual progress reports within the series of GRS-F-Fortschrittsberichte (GRS-F-Progress Reports). Each progress report represents a compilation of individual reports about the objectives, work performed, results achieved, next steps of the work etc. The individual reports are prepared in a standard form by the research organisations themselves as documentation of their progress in work and are published by the Research Management Division of GRS within the framework of general information on the progress in reactor safety research. The compilation of the reports is classified according to the classification system ''Joint Safety Research Index'' of the CEC (commission of the European communities). The reports are arranged in sequence of their project numbers. (orig.)

  9. Reports on research projects in the field of reactor safety sponsored by BMFT (Federal Ministry for Science and Technology)

    International Nuclear Information System (INIS)

    1982-03-01

    The GRS (Reactor Safety Association), Gesellschaft fuer Reaktorsicherheit mbH, by order of the BMFT, informs continuously of the status of such investigations by means of semi-annual and annual publication of progress reports within the series GRS-F-Fortschrittsberichte (GRS-F-Progress Reports). Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work and published by the FB (Research Coordination Department), Forschungsbetreuung at the GRS, within the framework of general information of progress in reactor safety research. The individual reports are classified according to the Research Program on the Safety of LWRs 1977-1980 of the BMFT. Another table of contents uses the same classification system as applied in the Nuclear Safety Index of the CEC (Commission of the European Communities) and the OECD (Organization for Economic Cooperation and Development). The reports are arranged in the sequence of their project numbers. (orig.) [de

  10. CARONTE project: Creating an Agenda for Research on Transportation Security

    Energy Technology Data Exchange (ETDEWEB)

    Leon Bello, J.; Gonzalez Viosca, E.

    2016-07-01

    Europe’s prosperity relies on effective transport systems. Any attacks and disturbances to land freight and passenger transport would have significant impact on economic growth, territorial cohesion, social development and the environment. Unfortunately, there are weaknesses in the land transport security.The objective of CARONTE project is define a future research agenda for security in land transport that focuses on core gaps caused by emerging risks while avoiding any doubling-up of research elsewhere. Its research agenda will cover all threats, including cyber-crime, and security aspects across all modes of land transportation. At the same time, it will respect the fundamental human rights and privacy of European citizens. The step-by-step method of CARONTE’s consortium has analyzed the state of the art and emerging risks; has identified gaps, analyses and assessments of potential solutions; and has produced an overall research agenda for the future. CARONTE’s results will answer the following questions among others: Which existing research projects merit a follow up and extension? Where are the combinations or synergy effects to be attended? Which themes and topics should be elaborated in new research projects? Who should be involved and integrated in future research projects (stakeholders, authorities, etc.)? The CARONTE consortium includes universities and research institutes, companies, and end-users providing with experience in research and consultancy in transportation, logistics, infrastructure management, security and communications. ITENE - Instituto Tecnológico del Embalaje, Transporte y Logística-has been one of the Project partners among a total of 11 members from eight different countries in the European Union which have also been supported via a High Level Advisory Board. (Author)

  11. Reports on BMBF-sponsored research projects in the field of reactor safety. Reporting period 1 July - 31 December 1995

    International Nuclear Information System (INIS)

    1996-01-01

    The Gesellschaft fuer Anlagen- und Reaktorsicherheit informs of the status of LWR tasks and projects on the safety of advanced reactors. Each progress report represents a compilation of individual reports about objectives, the work performed, the results, and the next steps of the works. The individual reports of quality assurance, safety of reactor component, emergency core cooling, lors of coolant, meltdown, fission product release, risk and reliability, are classified according to projects to the reactor safety research program. Another table uses the same classification system as applied in the nuclear safety index of the CEC. (DG)

  12. Ethical Guidelines for Computer Security Researchers: "Be Reasonable"

    Science.gov (United States)

    Sassaman, Len

    For most of its existence, the field of computer science has been lucky enough to avoid ethical dilemmas by virtue of its relatively benign nature. The subdisciplines of programming methodology research, microprocessor design, and so forth have little room for the greater questions of human harm. Other, more recently developed sub-disciplines, such as data mining, social network analysis, behavioral profiling, and general computer security, however, open the door to abuse of users by practitioners and researchers. It is therefore the duty of the men and women who chart the course of these fields to set rules for themselves regarding what sorts of actions on their part are to be considered acceptable and what should be avoided or handled with caution out of ethical concerns. This paper deals solely with the issues faced by computer security researchers, be they vulnerability analysts, privacy system designers, malware experts, or reverse engineers.

  13. SPONSORING, BRAND VALUE AND SOCIAL MEDIA

    Directory of Open Access Journals (Sweden)

    Alexander Zauner

    2012-10-01

    Full Text Available The increasing involvement of individuals in social media over the past decade has enabled firms to pursue new avenues in communication and sponsoring activities. Besides general research on either social media or sponsoring, questions regarding the consequences of a joint activity (sponsoring activities in social media remain unexplored. Hence, the present study analyses whether the perceived image of the brand and the celebrity endorser credibility of a top sports team influence the perceived brand value of the sponsoring firm in a social media setting. Moreover, these effects are compared between existing customers and non-customers of the sponsoring firm. Interestingly, perceived celebrity endorser credibility plays no role in forming brand value perceptions in the case of the existing customers. Implications for marketing theory and practice are derived.

  14. Annual report on reactor safety research projects sponsored by the Ministry of Economics and Technology of the Federal Republic of Germany. Reporting period 2007. Progress report

    International Nuclear Information System (INIS)

    2007-01-01

    Within its competence for energy research the Federal Ministry of Economics and Technology (BMWi) sponsors research projects on the safety of nuclear power plants currently in operation. The objective of these projects is to provide fundamental knowledge, procedures and methods to contribute to realistic safety assessments of nuclear installations, to the further development of safety technology and to make use of the potential of innovative safety-related approaches. The Gesellschaft fuer Anlagen- und Reaktorsicherheit (GRS) mbH, by order of the BMWi, continuously issues information on the status of such research projects by publishing semi-annual and annual progress reports within the series of GRS-F-Fortschrittsberichte (GRS-F-Progress Reports). Each progress report represents a compilation of individual reports about the objectives, work performed, results achieved, next steps of the work etc. The individual reports are prepared in a standard form by the research organisations themselves as documentation of their progress in work. The progress reports are published by the Research Management Division of GRS. The reports as of the year 2000 are available in the Internet-based information system on results and data of reactor safety research (http://www.grs-fbw.de). The compilation of the reports is classified according to the classification system 'Joint Safety Research Index (JSRI)'. The reports are arranged in sequence of their project numbers. It has to be pointed out that the authors of the reports are responsible for the contents of this compilation. The BMWi does not take any responsibility for the correctness, exactness and completeness of the information nor for the observance of private claims of third parties. (orig.)

  15. A Dual Perspective on Risks and Security Within Research Assistantships

    Directory of Open Access Journals (Sweden)

    Johannes Petrus Rossouw

    2013-01-01

    Full Text Available Although research assistantships are considered research learning venues in graduate education, there is a scarcity of literature that examines ethical elements attached to the employment of graduate student research assistants or the position of their research supervisors. This article explores the need to implement formal regulations specific to research assistantships in order to increase security and decrease risks for research assistants and research supervisors. Relationships between research assistants and research supervisors have some similarities with regular employment relationships; yet some distinct differences arise due to the educational and developmental nature of research assistantships. The article is written from a dual perspective reflecting the authors’ roles (a research supervisor and a research assistant, respectively and institutional locations (Faculties of Education in South Africa and Canada. The authors draw from existing literature, an analysis of institutional policies and practices at their universities, and their personal and professional experiences to illustrate risks that research assistants and their supervisors may face within research assistantships. They assess the extent to which existing and proposed policies and practices influence working conditions and safeguard experiences within graduate research assistantships. The findings reveal that research assistantships are a unique form of employment focused on educational and professional development that requires specific documentation of expected standards of practice. The authors argue that lack of clear regulations exposes both parties to unnecessary risks and offer recommendations for creating a “Standards of Good Practice” document that will be useful for individuals engaged in research assistantships.

  16. Annual report on reactor safety research projects sponsored by the Ministry of Economics and Technology of the Federal Republic of Germany. Reporting period 2005. Progress report

    International Nuclear Information System (INIS)

    2005-01-01

    Within its competence for energy research, the Bundesministerium fuer Wirtschaft und Technology (BMWi) (Federal Ministry of Economics and Technology) sponsors investigations into the safety of nuclear power plants. The objective of these investigations is to provide fundamental knowledge, procedures and methods to contribute to realistic safety assessments of nuclear installations, to the further development of safety technology and to make use of the potential of innovative safety-related approaches. The Gesellschaft fuer Anlagen- und Reaktorsicherheit (GRS) mbH, by order of the BMWi, continuously issues information on the status of such investigations by publishing semi-annual and annual progress reports within the series of GRS-F-Fortschrittsberichte (GRS-F-Progress Reports). Each progress report represents a compilation of individual reports about the objectives, work performed, results achieved, next steps of the work etc. The individual reports are prepared in a standard form by the research organisations themselves as documentation of their progress in work and are published by the Research Management Division of GRS within the framework of general information on the progress in reactor safety research. The compilation of the reports is classified according to general topics related to reactor safety research. Further, use is made of the classification system 'Joint Safety Research Index' of the CEC (Commission of the European Communities). The reports are arranged in sequence of their project numbers. It has to be pointed out that the authors of the reports are responsible for the contents of this compilation. The BMWi does not take any responsibility for the correctness, exactness and completeness of the information nor for the observance of private claims of third parties. (orig.)

  17. Annual report on reactor safety research projects sponsored by the Ministry of Economics and Labour of the Federal Republic of Germany. Reporting period 2004. Progress report

    International Nuclear Information System (INIS)

    2004-01-01

    Within its competence for energy research, the Bundesministerium fuer Wirtschaft und Technology (BMWi) (Federal Ministry of Economics and Technology) sponsors investigations into the safety of nuclear power plants. The objective of these investigations is to provide fundamental knowledge, procedures and methods to contribute to realistic safety assessments of nuclear installations, to the further development of safety technology and to make use of the potential of innovative safety-related approaches. The Gesellschaft fuer Anlagen- und Reaktorsicherheit (GRS) mbH, by order of the BMWi, continuously issues information on the status of such investigations by publishing semi-annual and annual progress reports within the series of GRS-F-Fortschrittsberichte (GRS-F-Progress Reports). Each progress report represents a compilation of individual reports about the objectives, work performed, results achieved, next steps of the work etc. The individual reports are prepared in a standard form by the research organisations themselves as documentation of their progress in work and are published by the Research Management Division of GRS within the framework of general information on the progress in reactor safety research. The compilation of the reports is classified according to general topics related to reactor safety research. Further, use is made of the classification system 'Joint Safety Research Index' of the CEC (Commission of the European Communities). The reports are arranged in sequence of their project numbers. It has to be pointed out that the authors of the reports are responsible for the contents of this compilation. The BMWi does not take any responsibility for the correctness, exactness and completeness of the information nor for the observance of private claims of third parties. (orig.)

  18. Annual report on reactor safety research projects sponsored by the Ministry of Economics and Labour of the Federal Republic of Germany. Reporting period 2004. Progress report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-07-01

    Within its competence for energy research, the Bundesministerium fuer Wirtschaft und Technology (BMWi) (Federal Ministry of Economics and Technology) sponsors investigations into the safety of nuclear power plants. The objective of these investigations is to provide fundamental knowledge, procedures and methods to contribute to realistic safety assessments of nuclear installations, to the further development of safety technology and to make use of the potential of innovative safety-related approaches. The Gesellschaft fuer Anlagen- und Reaktorsicherheit (GRS) mbH, by order of the BMWi, continuously issues information on the status of such investigations by publishing semi-annual and annual progress reports within the series of GRS-F-Fortschrittsberichte (GRS-F-Progress Reports). Each progress report represents a compilation of individual reports about the objectives, work performed, results achieved, next steps of the work etc. The individual reports are prepared in a standard form by the research organisations themselves as documentation of their progress in work and are published by the Research Management Division of GRS within the framework of general information on the progress in reactor safety research. The compilation of the reports is classified according to general topics related to reactor safety research. Further, use is made of the classification system 'Joint Safety Research Index' of the CEC (Commission of the European Communities). The reports are arranged in sequence of their project numbers. It has to be pointed out that the authors of the reports are responsible for the contents of this compilation. The BMWi does not take any responsibility for the correctness, exactness and completeness of the information nor for the observance of private claims of third parties. (orig.)

  19. Computer science security research and human subjects: emerging considerations for research ethics boards.

    Science.gov (United States)

    Buchanan, Elizabeth; Aycock, John; Dexter, Scott; Dittrich, David; Hvizdak, Erin

    2011-06-01

    This paper explores the growing concerns with computer science research, and in particular, computer security research and its relationship with the committees that review human subjects research. It offers cases that review boards are likely to confront, and provides a context for appropriate consideration of such research, as issues of bots, clouds, and worms enter the discourse of human subjects review.

  20. Frontiers in transport phenomena research and education: Energy systems, biological systems, security, information technology and nanotechnology

    Energy Technology Data Exchange (ETDEWEB)

    Bergman, T.L.; Faghri, A. [Department of Mechanical Engineering, The University of Connecticut, Storrs, CT 06269-3139 (United States); Viskanta, R. [School of Mechanical Engineering, Purdue University, West Lafayette, IN 47907-2088 (United States)

    2008-09-15

    A US National Science Foundation-sponsored workshop entitled ''Frontiers in Transport Phenomena Research and Education: Energy Systems, Biological Systems, Security, Information Technology, and Nanotechnology'' was held in May of 2007 at the University of Connecticut. The workshop provided a venue for researchers, educators and policy-makers to identify frontier challenges and associated opportunities in heat and mass transfer. Approximately 300 invited participants from academia, business and government from the US and abroad attended. Based upon the final recommendations on the topical matter of the workshop, several trends become apparent. A strong interest in sustainable energy is evident. A continued need to understand the coupling between broad length (and time) scales persists, but the emerging need to better understand transport phenomena at the macro/mega scale has evolved. The need to develop new metrology techniques to collect and archive reliable property data persists. Societal sustainability received major attention in two of the reports. Matters involving innovation, entrepreneurship, and globalization of the engineering profession have emerged, and the responsibility to improve the technical literacy of the public-at-large is discussed. Integration of research thrusts and education activities is highlighted throughout. Specific recommendations, made by the panelists with input from the international heat transfer community and directed to the National Science Foundation, are included in several reports. (author)

  1. Model Based Cyber Security Analysis for Research Reactor Protection System

    International Nuclear Information System (INIS)

    Sho, Jinsoo; Rahman, Khalil Ur; Heo, Gyunyoung; Son, Hanseong

    2013-01-01

    The study on the qualitative risk due to cyber-attacks into research reactors was performed using bayesian Network (BN). This was motivated to solve the issues of cyber security raised due to digitalization of instrumentation and control (I and C) system. As a demonstrative example, we chose the reactor protection system (RPS) of research reactors. Two scenarios of cyber-attacks on RPS were analyzed to develop mitigation measures against vulnerabilities. The one is the 'insertion of reactor trip' and the other is the 'scram halt'. The six mitigation measures are developed for five vulnerability for these scenarios by getting the risk information from BN

  2. Securing Cyberspace: Towards an Agenda for Research and Practice

    Directory of Open Access Journals (Sweden)

    Renaud Levesque

    2015-11-01

    Full Text Available In this article, we seek to identify the important challenges preventing security in cyberspace and to identify the key questions that nations should set out to answer to play a leading role in securing cyberspace. An important assertion is that the challenge of securing cyberspace transcends the abilities of any single entity and requires a radical shift in our approach in how: i research is conducted, ii cybersecurity researchers are educated, iii new defendable systems are developed, and iv effective defensive countermeasures are deployed. Our response draws upon extensive source material and our personal experiences as cybersecurity professionals contributing to the establishment of the VENUS Cybersecurity Corporation, a not-for-profit corporation that aims to make Canada a global leader in cybersecurity. We view the challenge to be global and transdisciplinary in nature and this article to be of relevance world-wide to senior decision makers, policy makers, managers, educators, strategists, futurists, scientists, technologists, and others interested in shaping the online world of the future.

  3. The Political Economy of Federally Sponsored Data

    Directory of Open Access Journals (Sweden)

    Bart Ragon

    2013-11-01

    Full Text Available Librarian involvement in the Open Access (OA movement has traditionally focused on access to scholarly publications. Recent actions by the White House have focused attention on access on the data produced from federally sponsored research. Questions have emerged concerning access to the output of federally sponsored research and whether it is a public or private good. Understanding the political battle over access to federally funded research is closely tied to the ownership of the peer review process in higher education and associated revenue streams, and as a result, interest groups seeking to influence government regulation have politicized the issues. As a major funder of research in higher education, policies from the federal government are likely to drive change in research practices at higher education institutions and impact library services. The political economy of federally sponsored research data will shape research enterprises in higher education inspire a number of new services distributed throughout the research life cycle.

  4. An Overview of Computer Network security and Research Technology

    OpenAIRE

    Rathore, Vandana

    2016-01-01

    The rapid development in the field of computer networks and systems brings both convenience and security threats for users. Security threats include network security and data security. Network security refers to the reliability, confidentiality, integrity and availability of the information in the system. The main objective of network security is to maintain the authenticity, integrity, confidentiality, availability of the network. This paper introduces the details of the technologies used in...

  5. Security and health research databases: the stakeholders and questions to be addressed.

    Science.gov (United States)

    Stewart, Sara

    2006-01-01

    Health research database security issues abound. Issues include subject confidentiality, data ownership, data integrity and data accessibility. There are also various stakeholders in database security. Each of these stakeholders has a different set of concerns and responsibilities when dealing with security issues. There is an obvious need for training in security issues, so that these issues may be addressed and health research will move on without added obstacles based on misunderstanding security methods and technologies.

  6. Coordinated and government-sponsored research in the Federal Republic of Germany. The Karlsruhe Nuclear Research Centre: Baking a new cake with the old mixture

    International Nuclear Information System (INIS)

    Mock, W.

    1986-01-01

    This article in the series gives an outline of the main research projects of the Karlsruhe Nuclear Research Centre, reviewing the formerly purely nuclear research tasks and going over to the new projects which increasingly encompass non-nuclear research subjects. Still, about 50% of the KfK research activities will be devoted in future to projects such as the fast breeder reactor, nuclear fuel reprocessing, and thermonuclear fusion. The programme modifications have been made paying due attention to a best possible utilization of existing equipment and manpower. (UA) [de

  7. Coordinated and government-sponsored research in the Federal Republic of Germany. The Karlsruhe Nuclear Research Centre: Baking a new cake with the old mixture

    Energy Technology Data Exchange (ETDEWEB)

    Mock, W.

    1986-12-12

    This article in the series gives an outline of the main research projects of the Karlsruhe Nuclear Research Centre, reviewing the formerly purely nuclear research tasks and going over to the new projects which increasingly encompass non-nuclear research subjects. Still, about 50% of the KfK research activities will be devoted in future to projects such as the fast breeder reactor, nuclear fuel reprocessing, and thermonuclear fusion. The programme modifications have been made paying due attention to a best possible utilization of existing equipment and manpower.

  8. Shipment security update - 2003

    International Nuclear Information System (INIS)

    Patterson, John; Anne, Catherine

    2003-01-01

    At the 2002 RERTR, NAC reported on the interim measures taken by the U.S. Nuclear Regulatory Commission to enhance the security afforded to shipments of spent nuclear fuel. Since that time, there have been a number of additional actions focused on shipment security including training programs sponsored by the U.S. Department of Transportation and the Electric Power Research Council, investigation by the Government Accounting Office, and individual measures taken by shippers and transportation agents. The paper will present a status update regarding this dynamic set of events and provide an objective assessment of the cost, schedule and technical implications of the changing security landscape. (author)

  9. What can Bilfinger teach Olympic sponsors?

    OpenAIRE

    Mark Dodds; Mauro Palmero

    2016-01-01

    Bilfinger SE (Bilfinger) is a leading international engineering and services group (Bilfinger.com, 2015), and was a local sponsor of the 2014 FIFA World Cup. The company is accused of paying bribes through its subsidiary company, Mauell, (dw. com, 2015) to public officials in Brazil for contracts related to the 2014 World Cup (Cassin, 2015). The corruption allegations relate to orders to equip security command centers at twelve host cities during the 2014 World Cup in Brazil (dw.com, 2015). B...

  10. Research on network information security model and system construction

    OpenAIRE

    Wang Haijun

    2016-01-01

    It briefly describes the impact of large data era on China’s network policy, but also brings more opportunities and challenges to the network information security. This paper reviews for the internationally accepted basic model and characteristics of network information security, and analyses the characteristics of network information security and their relationship. On the basis of the NIST security model, this paper describes three security control schemes in safety management model and the...

  11. Model Based Cyber Security Analysis for Research Reactor Protection System

    Energy Technology Data Exchange (ETDEWEB)

    Sho, Jinsoo; Rahman, Khalil Ur; Heo, Gyunyoung [Kyung Hee Univ., Yongin (Korea, Republic of); Son, Hanseong [Joongbu Univ., Geumsan (Korea, Republic of)

    2013-07-01

    The study on the qualitative risk due to cyber-attacks into research reactors was performed using bayesian Network (BN). This was motivated to solve the issues of cyber security raised due to digitalization of instrumentation and control (I and C) system. As a demonstrative example, we chose the reactor protection system (RPS) of research reactors. Two scenarios of cyber-attacks on RPS were analyzed to develop mitigation measures against vulnerabilities. The one is the 'insertion of reactor trip' and the other is the 'scram halt'. The six mitigation measures are developed for five vulnerability for these scenarios by getting the risk information from BN.

  12. A Critical assesment of IS Security Research Between 1990-2004

    DEFF Research Database (Denmark)

    Willison, Robert Andrew; Siponen, Mikko

    This paper reviews the IS security literature for the period 1990-2004. More specifically three security journals and the top twenty IS journals were examined. In total 1280 papers were analysed in terms of theories, research methods and research topics. Our research found that 1043 of the papers...... with fourteen of these topics totaling 71.05% of the articles. This papers offers implications for future research directions on IS security, scholars to publish IS security research, tenure practice, and IS security classification schemas....

  13. Privacy, security, and the public health researcher in the era of electronic health record research.

    Science.gov (United States)

    Goldstein, Neal D; Sarwate, Anand D

    2016-01-01

    Health data derived from electronic health records are increasingly utilized in large-scale population health analyses. Going hand in hand with this increase in data is an increasing number of data breaches. Ensuring privacy and security of these data is a shared responsibility between the public health researcher, collaborators, and their institutions. In this article, we review the requirements of data privacy and security and discuss epidemiologic implications of emerging technologies from the computer science community that can be used for health data. In order to ensure that our needs as researchers are captured in these technologies, we must engage in the dialogue surrounding the development of these tools.

  14. Advanced Scientific Computing Research Exascale Requirements Review. An Office of Science review sponsored by Advanced Scientific Computing Research, September 27-29, 2016, Rockville, Maryland

    Energy Technology Data Exchange (ETDEWEB)

    Almgren, Ann [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); DeMar, Phil [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Vetter, Jeffrey [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Riley, Katherine [Argonne Leadership Computing Facility, Argonne, IL (United States); Antypas, Katie [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Bard, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Coffey, Richard [Argonne National Lab. (ANL), Argonne, IL (United States); Dart, Eli [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Energy Science Network; Dosanjh, Sudip [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Gerber, Richard [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Hack, James [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Monga, Inder [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Energy Science Network; Papka, Michael E. [Argonne National Lab. (ANL), Argonne, IL (United States); Rotman, Lauren [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Energy Science Network; Straatsma, Tjerk [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Wells, Jack [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Bernholdt, David E. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Bethel, Wes [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Bosilca, George [Univ. of Tennessee, Knoxville, TN (United States); Cappello, Frank [Argonne National Lab. (ANL), Argonne, IL (United States); Gamblin, Todd [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Habib, Salman [Argonne National Lab. (ANL), Argonne, IL (United States); Hill, Judy [Oak Ridge Leadership Computing Facility, Oak Ridge, TN (United States); Hollingsworth, Jeffrey K. [Univ. of Maryland, College Park, MD (United States); McInnes, Lois Curfman [Argonne National Lab. (ANL), Argonne, IL (United States); Mohror, Kathryn [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Moore, Shirley [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Moreland, Ken [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Roser, Rob [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Shende, Sameer [Univ. of Oregon, Eugene, OR (United States); Shipman, Galen [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Williams, Samuel [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2017-06-20

    The widespread use of computing in the American economy would not be possible without a thoughtful, exploratory research and development (R&D) community pushing the performance edge of operating systems, computer languages, and software libraries. These are the tools and building blocks — the hammers, chisels, bricks, and mortar — of the smartphone, the cloud, and the computing services on which we rely. Engineers and scientists need ever-more specialized computing tools to discover new material properties for manufacturing, make energy generation safer and more efficient, and provide insight into the fundamentals of the universe, for example. The research division of the U.S. Department of Energy’s (DOE’s) Office of Advanced Scientific Computing and Research (ASCR Research) ensures that these tools and building blocks are being developed and honed to meet the extreme needs of modern science. See also http://exascaleage.org/ascr/ for additional information.

  15. Reports on research programs in the field of reactor safety sponsored by the Federal Ministry of Research and Technology. Reported period: January 1 to June 30, 1993

    International Nuclear Information System (INIS)

    1993-01-01

    Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work and published by the Forschungsbetreuung at the GRS, (FB) (Research Coordination Department), within the framework of general informations of progress in reactor safety research. The individual reports are classified according to the research program of the safety of LWR 1977 - 1980 of the BMFT. Another table of uses the same classification system as applied in the nuclear safety index of the CEC (Commision of the European Communities) and the OECD (Organization for Economic Cooperation and Development). The reports are arranged in sequence of their project numbers. (orig.) [de

  16. Reports on research programs in the field of reactor safety sponsored by the Federal Ministry of Research and Technology. Reported period: January 1 to June 30, 1994

    International Nuclear Information System (INIS)

    1994-01-01

    Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work and published by the Forschungsbetreuung at the GRS, (FB) (Research Coordination Department), within the framework of general informations of progress in reactor safety research. The individual reports are classified according to the research program of the safety of LWR 1977 - 1980 of the BMFT. Another table of uses the same classification system as applied in the nuclear safety index of the CEC (Commission of the European Communities) and the OECD (Organization for Economic Cooperation and Development). The reports are arranged in sequence of their project numbers. (orig.) [de

  17. On Business-Driven IT Security Management and Mismatches between Security Requirements in Firms, Industry Standards and Research Work

    Science.gov (United States)

    Frühwirth, Christian

    Industry managers have long recognized the vital importance of information security for their businesses, but at the same time they perceived security as a technology-driven rather then a business-driven field. Today, this notion is changing and security management is shifting from technology- to business-oriented approaches. Whereas there is evidence of this shift in the literature, this paper argues that security standards and academic work have not yet taken it fully into account. We examine whether this disconnect has lead to a misalignment of IT security requirements in businesses versus industry standards and academic research. We conducted 13 interviews with practitioners from 9 different firms to investigate this question. The results present evidence for a significant gap between security requirements in industry standards and actually reported security vulnerabilities. We further find mismatches between the prioritization of security factors in businesses, standards and real-world threats. We conclude that security in companies serves the business need of protecting information availability to keep the business running at all times.

  18. Committees and sponsors

    Science.gov (United States)

    2011-10-01

    International Advisory Committee Richard F CastenYale, USA Luiz Carlos ChamonSão Paulo, Brazil Osvaldo CivitareseLa Plata, Argentina Jozsef CsehATOMKI, Hungary Jerry P DraayerLSU, USA Alfredo Galindo-UribarriORNL & UT, USA James J KolataNotre Dame, USA Jorge López UTEP, USA Joseph B NatowitzTexas A & M, USA Ma Esther Ortiz IF-UNAM Stuart PittelDelaware, USA Andrés SandovalIF-UNAM Adam SzczepaniakIndiana, USA Piet Van IsackerGANIL, France Michael WiescherNotre Dame, USA Organizing Committee Libertad Barrón-Palos (Chair)IF-UNAM Roelof BijkerICN-UNAM Ruben FossionICN-UNAM David LizcanoININ Sponsors Instituto de Ciencias Nucleares, UNAMInstituto de Física, UNAMInstituto Nacional de Investigaciones NuclearesDivisión de Física Nuclear de la SMFCentro Latinoamericano de Física

  19. Annual report on reactor safety research projects sponsored by the Ministry for Research and Technology of the Federal Republic of Germany. Reporting period 1993. Progress report

    International Nuclear Information System (INIS)

    1994-10-01

    The Gesellschaft fuer Anlagen- und Reaktorsicherheit (GRS) mbH, by order of the BMFT, informs continuously of the status of such investigations by means of semi-annual and annual publication of progress reports within the series GRS-F-Fortschrittsberichte (GRS-F-Progress Reports). Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work and published by the Forschungsbetreuung at the GRS, (FB) (Research Coordination Department), within the framework of general information of progress in reactor safety research. The individual reports are classified according to the same classification system as applied in the nuclear index of the CEC (Commission of the European Communities) and the OECD (Organization for Economic Cooperation and Development). The reports are arranged in sequence of their project numbers. (orig./HP)

  20. A Report on the Activities, Publications, and Pending Research of DHS/DOD Sponsored Post-doctoral Research Associate at Los Alamos National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Stanley, Floyd E. [Los Alamos National Laboratory; Tandon, Lav [Los Alamos National Laboratory

    2012-04-26

    Since beginning at Los Alamos National Laboratory in February of 2012, I have been working as a DHS./DNDO Postdoctoral Research Associate under the mentorship of Lav Tandon and Khalil Spencer (NA-22 and mass spectrometry). The focus of my efforts, in addition to pursuing needed training and qualifications, has been the application of various instrumental approaches (e.g. Thermal Ionization Mass Spectrometry; TIMS) to a range of systems of interest in materials characterization and nuclear forensics. Research to be pursued in the coming months shall include the continued use of such approaches to advance current methods for: modified total evaporation, monitoring critical minor isotope systems, and chronometry. Each of the above points will be discussed.

  1. Annual report on reactor safety research projects sponsored by the Ministry for Research and Technology of the Federal Republic of Germany 1987

    International Nuclear Information System (INIS)

    1988-06-01

    The GRS (Reactor Safety Association), Gesellschaft fuer Reaktorsicherheit mbH, by order of the BMFT, informs continuously of the status of such investigations by means of semi-annual and annual publication of progress reports within the series GRS-F-Fortschrittsberichte (GRS-F-Progress-Reports). Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work and published by the FB (Research Coordination Department), Forschungsbetreuung at the GRS, within the framework of general information of progress in reactor safety research. The individual reports are classified according to the Research Program on the Safety of LWRs of the BMFT. Another table of contents uses the same classification system as applied in the Nuclear Safety Index of the CEC (Commission of the European Communities) and the OECD (Organization for Economic Cooperation and Development). The report are arranged in the sequence of their project numbers. (orig./HP) [de

  2. Security and Health Research Databases: The Stakeholders and Questions to Be Addressed

    OpenAIRE

    Stewart, Sara

    2006-01-01

    Health research database security issues abound. Issues include subject confidentiality, data ownership, data integrity and data accessibility. There are also various stakeholders in database security. Each of these stakeholders has a different set of concerns and responsibilities when dealing with security issues. There is an obvious need for training in security issues, so that these issues may be addressed and health research will move on without added obstacles based on misunderstanding s...

  3. Theory, Demonstration and Methods Research on Social Security of Migrant Workers by Domestic Scholar

    OpenAIRE

    Yang, Zhen; Wang, Weifang

    2011-01-01

    Social security of migrant workers has been significant in dissolving social contradictions and achieving the economic and social development in China during the transitional period. The researches of domestic scholar on social security of migrant workers can be classified into three categories. Firstly, theoretical analysis on social security of migrant workers, including researches on the appeal of social security and misunderstanding of recognition, theory-construction of rural worker soci...

  4. The research of computer network security and protection strategy

    Science.gov (United States)

    He, Jian

    2017-05-01

    With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.

  5. Annual report on reactor safety research projects sponsored by the Ministry for Research and Technology of the Federal Republic of Germany 1988

    International Nuclear Information System (INIS)

    1989-06-01

    The GRS (Society for Reactor Safety), Gesellschaft fuer Reaktorsicherheit mbH, by order of the BMFT, informs continuously of the status of such investigations by means of semi-annual and annual publication of progress reports within the series GRS-F-Fortschrittsberichte (GRS-F-Progress Reports). Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work and published by the FB (Research Coordination Department) Forschungsbetreuung at the GRS, within the framework of general information of progress in the reactor safety research. The individual reports are classified according to the same classification system as applied in the nuclear index of the CEC (Commission of the European Communities) and the OECD (Organization for Economic Cooperation and Development). The reports are arranged in sequence of their project numbers. Besides the progress reports, lists of reports exchanged under international exchange agreements by the BMFT are published within this series. (orig./HP)

  6. Theory, Demonstration and Methods: Research on Social Security of Migrant Workers by Domestic Scholar

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Social security of migrant workers has been significant in dissolving social contradictions and achieving the economic and social development in China during the transitional period. The researches of domestic scholar on social security of migrant workers can be classified into three categories. Firstly, theoretical analysis on social security of migrant workers, including researches on the appeal of social security and misunderstanding of recognition, theory-construction of rural worker social security, policy defects and equity construction in social security system of migrant workers. Secondly, real studies on social security of migrant workers, including researches on sequence of demand and influencing factors of social security of migrant workers as well as intrinsic motivation forming the perspective on social security. Lastly, road exploration of establishing social security system, including researches on the multi-level development of rural worker social security system, comparison of "Double-low method", "Guangdong Method" and "Shanghai Method" of the social security of migrant workers in Zhejiang Province and establishing multi-level social security system according to the hierarchy after the internal differentiation.

  7. Spins, Stalls, and Shutdowns: Pitfalls of Qualitative Policing and Security Research

    Directory of Open Access Journals (Sweden)

    Randy K. Lippert

    2015-11-01

    Full Text Available This article explores key elements of qualitative research on policing and security agencies, including barriers encountered and strategies to prevent them. While it is oft-assumed that policing/security agencies are difficult to access due to their clandestine or bureaucratic nature, this article demonstrates this is not necessarily the case, as access was gained for three distinct qualitative research projects. Yet, access and subsequent research were not without pitfalls, which we term security spins, security stalls, and security shutdowns. We illustrate how each was encountered and argue these pitfalls are akin to researchers falling into risk categories, not unlike those used by policing/security agents in their work. Before concluding we discuss methodological strategies for scholars to avoid these pitfalls and to advance research that critically interrogates the immense policing/security realm. URN: http://nbn-resolving.de/urn:nbn:de:0114-fqs1601108

  8. Research on information security system of waste terminal disposal process

    Science.gov (United States)

    Zhou, Chao; Wang, Ziying; Guo, Jing; Guo, Yajuan; Huang, Wei

    2017-05-01

    Informatization has penetrated the whole process of production and operation of electric power enterprises. It not only improves the level of lean management and quality service, but also faces severe security risks. The internal network terminal is the outermost layer and the most vulnerable node of the inner network boundary. It has the characteristics of wide distribution, long depth and large quantity. The user and operation and maintenance personnel technical level and security awareness is uneven, which led to the internal network terminal is the weakest link in information security. Through the implementation of security of management, technology and physics, we should establish an internal network terminal security protection system, so as to fully protect the internal network terminal information security.

  9. Research and realization of info-net security controlling system

    Science.gov (United States)

    Xu, Tao; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-03-01

    The thesis introduces some relative concepts about Network Cybernetics, and we design and realize a new info-net security controlling system based on Network Cybernetics. The system can control the endpoints, safely save files, encrypt communication, supervise actions of users and show security conditions, in order to realize full-scale security management. At last, we simulate the functions of the system. The results show, the system can ensure the controllability of users and devices, and supervise them real-time. The system can maximize the security of the network and users.

  10. Research on information security in big data era

    Science.gov (United States)

    Zhou, Linqi; Gu, Weihong; Huang, Cheng; Huang, Aijun; Bai, Yongbin

    2018-05-01

    Big data is becoming another hotspot in the field of information technology after the cloud computing and the Internet of Things. However, the existing information security methods can no longer meet the information security requirements in the era of big data. This paper analyzes the challenges and a cause of data security brought by big data, discusses the development trend of network attacks under the background of big data, and puts forward my own opinions on the development of security defense in technology, strategy and product.

  11. Use and Misuse of Industry Sponsored Materials.

    Science.gov (United States)

    DuVall, Charles R.; Krepel, Wayne J.

    A review of educational research reveals that free and inexpensive materials are used today to a much greater extent than they had been in the past. Two studies, sponsored by the American Iron and Steel Institute, are evidence of the producer's interest in determining the strengths and weaknesses of the materials being sent into classrooms and…

  12. The Common Body of Knowledge: A Framework to Promote Relevant Information Security Research

    Directory of Open Access Journals (Sweden)

    Kenneth J. Knapp

    2007-03-01

    Full Text Available This study proposes using an established common body of knowledge (CBK as one means of organizing information security literature.  Consistent with calls for more relevant information systems (IS research, this industry-developed framework can motivate future research towards topics that are important to the security practitioner.  In this review, forty-eight articles from ten IS journals from 1995 to 2004 are selected and cross-referenced to the ten domains of the information security CBK.  Further, we distinguish articles as empirical research, frameworks, or tutorials.  Generally, this study identified a need for additional empirical research in every CBK domain including topics related to legal aspects of information security.  Specifically, this study identified a need for additional IS security research relating to applications development, physical security, operations security, and business continuity.  The CBK framework is inherently practitioner oriented and using it will promote relevancy by steering IS research towards topics important to practitioners.  This is important considering the frequent calls by prominent information systems scholars for more relevant research.  Few research frameworks have emerged from the literature that specifically classify the diversity of security threats and range of problems that businesses today face.  With the recent surge of interest in security, the need for a comprehensive framework that also promotes relevant research can be of great value.

  13. Information security management: a proposal to improve the effectiveness of information security in the scientific research environment

    International Nuclear Information System (INIS)

    Alexandria, Joao Carlos Soares de

    2009-01-01

    The increase of the connectivity in the business environment, combined with the growing dependency of information systems, has become the information security management an important governance tool. Information security has as main goal to protect the business transactions in order to work normally. In this way, It will be safeguarding the business continuity. The threats of information come from hackers' attacks, electronic frauds and spying, as well as fire, electrical energy interruption and humans fault. Information security is made by implementation of a set of controls, including of the others politics, processes, procedures, organizational structures, software and hardware, which require a continuous management and a well established structure to be able to face such challenges. This work tried to search the reasons why the organizations have difficulties to make a practice of information security management. Many of them just limit to adopt points measures, sometimes they are not consistent with their realities. The market counts on enough quantity of standards and regulations related to information security issues, for example, ISO/IEC 27002, American Sarbanes-Oxley act, Basel capital accord, regulations from regulatory agency (such as the Brazilians ones ANATEL, ANVISA and CVM). The market researches have showed that the information security implementation is concentrated on a well-defined group of organization mainly formed by large companies and from specifics sectors of economy, for example, financial and telecommunication. However, information security must be done by all organizations that use information systems to carry out their activities, independently of its size or economic area that it belongs. The situation of information security in the governmental sector of Brazil, and inside its research institutions, is considered worrying by the Brazilian Court of Accounts (TCU). This research work presents an assessment and diagnostic proposal of

  14. Privacy and Security Research Group workshop on network and distributed system security: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    1993-05-01

    This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System. Selected papers were processed separately for inclusion in the Energy Science and Technology Database.

  15. Research Market Gap in Law Enforcement Technology: Lessons from Czech Security Research Funding Programmes

    Directory of Open Access Journals (Sweden)

    Luděk Moravec

    2014-12-01

    Full Text Available While security research funding schemes are nothing new to the EU (Horizon 2020 and FP7, or to several Member States, their priorities and procedures are usually decided administratively or shaped by advisory groups of varying membership. Only recently did the EU shift its focus to the role of end users in security research programmes, seeking their input in order to maximise the utility of funded solutions. Such a hint to limited usefulness of some industrial solutions is not exactly inconspicuous. This paper discusses the gap between the stated needs of law enforcement agencies in terms of R&D funding and the grant project applications in the area of law enforcement. It aims to define and describe the gap, and consequently the market opportunities, between the supply and demand sides represented by industry-driven grant project applications and end-user-formulated calls. The study is based on empirical data from two Czech security research funding programmes that have been running since 2010 and should deliver their results by 2015. It seeks to contribute some preliminary observations about the structure of both end user needs and industry capabilities in such a particular area as law enforcement technology.

  16. Research award: Agriculture and Food Security 2019 | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The AFS program works with organizations to intensify and diversify small‐scale ... and social) without adversely impacting societies and the environment. ... loss, rural economic development, improved food and nutrition security, and the ...

  17. Research uncovers what citizens' think about the security sector in ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2015-07-27

    Jul 27, 2015 ... Here, direct experience with security services leads to more negative opinions, and perceptions of personal and family safety play a critical role in citizens' ... sector and the justice system as perceived by the general public.

  18. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  19. Research on mobile electronic commerce security technology based on WPKI

    Science.gov (United States)

    Zhang, Bo

    2013-07-01

    Through the in-depth study on the existing mobile e-commerce and WAP protocols, this paper presents a security solution of e-commerce system based on WPKI, and describes its implementation process and specific implementation details. This solution uniformly distributes the key used by the various participating entities , to fully ensure the confidentiality, authentication, fairness and integrity of mobile e-commerce payments, therefore has some pract ical value for improving the security of e-commerce system.

  20. International University Research Ventures: Implications for U.S. Economic Competitiveness National Security

    Science.gov (United States)

    2018-03-31

    NTERNATIONAL UNIVERSITY RESEARCH VENTURES: IMPLICATIONS FOR US ECONOMIC COMPETITIVENESS AND NATIONAL SECURITY The views, opinions and/or findings...UNIVERSITY RESEARCH VENTURES: IMPLICATIONS FOR US ECONOMIC COMPETITIVENESS AND NATIONAL SECURITY Report Term: 0-Other Email: mzak@gatech.edu...expected to inform political and economic theories about technology transfer, innovation, economic competitiveness, and democratization/civil

  1. Cyber Security Research Frameworks For Coevolutionary Network Defense

    Energy Technology Data Exchange (ETDEWEB)

    Rush, George D. [Missouri Univ. of Science and Technology, Rolla, MO (United States); Tauritz, Daniel Remy [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-12-03

    Several architectures have been created for developing and testing systems used in network security, but most are meant to provide a platform for running cyber security experiments as opposed to automating experiment processes. In the first paper, we propose a framework termed Distributed Cyber Security Automation Framework for Experiments (DCAFE) that enables experiment automation and control in a distributed environment. Predictive analysis of adversaries is another thorny issue in cyber security. Game theory can be used to mathematically analyze adversary models, but its scalability limitations restrict its use. Computational game theory allows us to scale classical game theory to larger, more complex systems. In the second paper, we propose a framework termed Coevolutionary Agent-based Network Defense Lightweight Event System (CANDLES) that can coevolve attacker and defender agent strategies and capabilities and evaluate potential solutions with a custom network defense simulation. The third paper is a continuation of the CANDLES project in which we rewrote key parts of the framework. Attackers and defenders have been redesigned to evolve pure strategy, and a new network security simulation is devised which specifies network architecture and adds a temporal aspect. We also add a hill climber algorithm to evaluate the search space and justify the use of a coevolutionary algorithm.

  2. Research on the security of nuclear power equipment

    International Nuclear Information System (INIS)

    Zhao Jiong; Wu Jinzong

    2008-06-01

    Recently, the rapidly growing economy in conflict with the lack of power in the whole country become more and more seriously in our country. In other hand, there is also various kind of problems such as greenhouse effect and the oil price rising conditions. It greatly promote our country's development of Nuclear power project. As forecast, the number of Nuclear Power Plant will increase greatly in the future. However, the security of the Nuclear Power Plant is one of the topics that people always pay more attention to. Combining with the practice experience of Nuclear Power Plant in Japanese, the security of Nuclear Power Plant in multi-angles is discussed. It is pointed that the risk assesment and management system of nuclear power plant are effective measure for security of the development of nuclear power. (authors)

  3. Trends in Research on the Security of Medical Information in Korea: Focused on Information Privacy Security in Hospitals.

    Science.gov (United States)

    Kim, Yong-Woon; Cho, Namin; Jang, Hye-Jung

    2018-01-01

    Information technology involves a risk of privacy violation in providing easy access to confidential information,such as personal information and medical information through the Internet. In this study, we investigated medical information security to gain a better understanding of trends in research related to medical information security. We researched papers published on '의료정보' and 'medical information' in various Korean journals during a 10-year period from 2005 to 2015. We also analyzed these journal papers for each fiscal year; these papers were categorized into the areas of literature research and empirical research, and were further subdivided according to themes and subjects. It was confirmed that 48 papers were submitted to 35 academic journals. There were 33 (68.8%) literature review articles, and analysis of secondary data was not carried out at all. In terms of empirical research, 8 (16.7%) surveys and 7 (14.6%) program developments were studied. As a result of analyzing these papers according to the research theme by research method, 17 (35.4%) papers on laws, systems, and policies were the most numerous. It was found that among the literature research papers on medical personnel were the most common, and among the empirical research papers, research on experts in information protection and medical personnel were the most common. We suggest that further research should be done in terms of social perception, human resource development, and technology development to improve risk management in medical information systems.

  4. Canadian International Food Security Research Fund - Phase II ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The fund was designed to finance initiatives to solve global food and ... food security and enhance nutrition in developing countries; -increase food ... In a context of rising food prices, millions of Africans in marginal areas rely on a range of ...

  5. Linking research and food security policies in MENA | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    21 حزيران (يونيو) 2013 ... Hammou Laamrani works for IDRC as a specialist in agriculture, water, and knowledge management. He believes that ... Food security challenges are also related to the low adoption of technologies to optimize food availability and storage, reduce post-harvest losses, and improve food safety. Unless food ...

  6. Researches on the Security of Cluster-based Communication Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yanhong Sun

    2014-08-01

    Full Text Available Along with the in-depth application of sensor networks, the security issues have gradually become the bottleneck of wireless sensor applications. To provide a solution for security scheme is a common concern not only of researchers but also of providers, integrators and users of wireless sensor networks. Based on this demand, this paper focuses on the research of strengthening the security of cluster-based wireless sensor networks. Based on the systematic analysis of the clustering protocol and its security enhancement scheme, the paper introduces the broadcast authentication scheme, and proposes an SA-LEACH network security enhancement protocol. The performance analysis and simulation experiments prove that the protocol consumes less energy with the same security requirements, and when the base station is comparatively far from the network deployment area, it is more advantageous in terms of energy consumption and t more suitable for wireless sensor networks.

  7. Modeling and simulation for cyber-physical system security research, development and applications.

    Energy Technology Data Exchange (ETDEWEB)

    Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.

    2010-02-01

    This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.

  8. Research on Influence of Cloud Environment on Traditional Network Security

    Science.gov (United States)

    Ming, Xiaobo; Guo, Jinhua

    2018-02-01

    Cloud computing is a symbol of the progress of modern information network, cloud computing provides a lot of convenience to the Internet users, but it also brings a lot of risk to the Internet users. Second, one of the main reasons for Internet users to choose cloud computing is that the network security performance is great, it also is the cornerstone of cloud computing applications. This paper briefly explores the impact on cloud environment on traditional cybersecurity, and puts forward corresponding solutions.

  9. Employer-sponsored pension plans

    Directory of Open Access Journals (Sweden)

    Rakonjac-Antić Tatjana N.

    2004-01-01

    Full Text Available Apart from pension plans within social insurance, in developed pension systems there are also available to individuals schemes which may to a large extent ensure a significant part of their total pension. Among them are the following: employer-sponsored pension plans or individual pension plans. The most widely used employer-sponsored pension plan in the USA is 401(k, in which both the employer and the employee contribute to the financing of the pension. These contributions as well as the return to their investment have a preferential tax treatment, i.e. do not enter a tax base. The funds are taxed only when drawn from the account in the form of a pension. This paper aims to present the functioning of 401(k pension plan as the most widely used employer sponsored pension plan in the USA, which is likely, in a modified form, to have an important place within our future reformed pension insurance system.

  10. A Research on Issues Related to RFID Security and Privacy

    Science.gov (United States)

    Kim, Jongki; Yang, Chao; Jeon, Jinhwan

    Radio Frequency Identification (RFID) is a technology for automated identification of objects and people. RFID systems have been gaining more popularity in areas especially in supply chain management and automated identification systems. However, there are many existing and potential problems in the RFID systems which could threat the technology's future. To successfully adopt RFID technology in various applications, we need to develop the solutions to protect the RFID system's data information. This study investigates important issues related to privacy and security of RFID based on the recent literature and suggests solutions to cope with the problem.

  11. Government support for hvdc research

    Energy Technology Data Exchange (ETDEWEB)

    1968-07-12

    To help secure a place for Britain in hvdc export market beyond the next decade, the Ministry of Technology is sponsoring. Research into thyristor converters as a replacement for the mercury arc valves now used in terminal equipment. English Electric has secured from Mintech a risk sharing contract contributing nearly 250,000 pounds towards the cost of a development program.

  12. Using gender research in development: food security in practice

    OpenAIRE

    Quisumbing, Agnes R.; McClafferty, Bonnie

    2006-01-01

    Metadata only record This guide presents research from several countries in IFPRI's research program on gender and intrahousehold relations, using quantitative and qualitative methods. It examines the implications of these issues in the success of development initiatives and suggestions for integrating gender research in projects and policy. The guide is divided into the following sections: the importance of using gender and intrahousehold research to inform projects and policies; gender a...

  13. Research perspectives overview at DBNRRC to maintain sustainable food security

    Science.gov (United States)

    The research issues that the Dale Bumpers National Rice Research Center (DBNRRC) is addressing for the rice industry and research community are 1) changing rice production practices, 2) diminishing irrigation resources, 3) loss of export markets due to poor quality, 4) emerging high value specialty...

  14. Research Award: Governance, Security and Justice (GSJ) Deadline ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Jean-Claude Dumais

    2012-09-12

    Sep 12, 2012 ... IDRC's Research Awards are a unique opportunity for master's and ... proposal should demonstrate an understanding of the principles that inform research ... Women's studies, gender studies; or. • Information and communication technologies. Knowledge of research for development, field experience in a ...

  15. What can Bilfinger teach Olympic sponsors?

    Directory of Open Access Journals (Sweden)

    Mark Dodds

    2016-10-01

    Full Text Available Bilfinger SE (Bilfinger is a leading international engineering and services group (Bilfinger.com, 2015, and was a local sponsor of the 2014 FIFA World Cup. The company is accused of paying bribes through its subsidiary company, Mauell, (dw. com, 2015 to public officials in Brazil for contracts related to the 2014 World Cup (Cassin, 2015. The corruption allegations relate to orders to equip security command centers at twelve host cities during the 2014 World Cup in Brazil (dw.com, 2015. Because Brazil hosted the 2014 FIFA World Cup and will host the 2016 Summer Olympic Games, companies need to consider the risks of many international anti-corruption laws, such as Brazil’s anti-corruption law commonly referred as The Clean Companies Act and other applicable anticorruption law like the United States’ Foreign Corrupt Practices Act (Rogers, et. al, 2014. This paper will analyze the Bilfinger case involving corruption activity at the 2014 FIFA World Cup and offer insights for sponsors of the 2016 Summer Olympic Games.

  16. Report on the research projects into the safety of nuclear power plants in operation sponsored by Federal Ministry of Economics and Labour. Period under report: 1 January - 30 June 2004

    International Nuclear Information System (INIS)

    2004-01-01

    Within its competence for energy research, the Bundesministerium fuer Wirtschaft und Arbeit (BMWA) (Federal Ministry of Economics and Labour) sponsors research projects into the safety of nuclear power plants in operation. The objective of these projects is to provide fundamental knowledge, procedures and methods to contribute to realistic safety assessments of nuclear installations and to the further development of safety technology. The Gesellschaft fuer Anlagen- und Reaktorsicherheit (GRS) mbH, by order of the BMWA, continuously issues information on the status of such research projects by publishing semi-annual and annual progress reports within the series of GRS-F-Fortschrittsberichte (GRS-F-Progress Reports). Each report represents a compilation of individual reports about the objectives, work performed, results achieved, next steps of the work etc. The individual reports are prepared in a standard form by the research organisations themselves as documentation of their progress in work. The reports are published by the Research Management Division of GRS. The compilation of the reports is classified according to general topics related to reactor safety research. Further, use is made of the classification system 'Joint Safety Research Index' of the CEC (Commission of the European Communities). The reports are arranged in sequence of their project numbers. It has to be pointed out that the authors of the reports are responsible for the contents of this compilation. The BMWA does not take any responsibility for the correctness, exactness and completeness of the information nor for the observance of private claims of third parties. (orig.)

  17. List of reports in the field of reactor safety research sponsored by BMFT, CEA, EPRI, JSTA and USNRC. Reported period: April 1 - June 30, 1987

    International Nuclear Information System (INIS)

    1987-08-01

    The list reviews reports from the Federal Republic of Germany, from France, from Japan and from the United States of America concerning single problems in the field of reactor safety research. According to the cooperation of the Federal Minister for Research and Technology (BMFT) with the Commissariat a l'Energie Atomique (CEA), the Japan Science and Technology Agency (JSTA), the Electric Power Research Institute (EPRI) and the United States Nuclear Regulatory Commission, these reports are available in the Gesellschaft fuer Reaktorsicherheit (GRS). The list pursues the following order: Country of origin, problem area concerned, according to the Reactor Safety Research Programme of the BMFT, reporting organization. The list of reports appears quarterly. (orig.) [de

  18. The Nuclear Safeguards and Security Activities under Euratom Research and Training Programme

    International Nuclear Information System (INIS)

    Abousahl, S.; Palajova, Z.; Janssens, W.A.M.; Luetzenkirchen, K.; Goncalves, J.G.M.; Aregbe, Y.; )

    2015-01-01

    Nuclear safeguards and security are absolute priorities for the EU. At technical level, the Joint Research Centre (JRC) as the European Commission's in-house science service plays an important role in the field of nuclear research, training and education that include nuclear safety, safeguards and security. The JRC's nuclear research activities are defined in a Council Regulation on the research and training programme of the European Atomic Energy Community. The JRC works closely with EC safeguards authority, whose mission is to ensure that nuclear material within the EU is not diverted from its intended use according to Euratom treaty. Technologies, methodologies and trainings are developed according to the Euratom Safeguards inspectorate's needs. In the area of nuclear security, the JRC contributes to the development of specific expertise in the field of nuclear forensics and border security detection as well as related training efforts for first front-line responders and national experts. The JRC provides its expert support for the implementation of internal EU action plans mainly in the field of radiological and nuclear security. At an international level, the JRC cooperates with the IAEA mainly through the EC support programme on the control of nuclear materials and facilities in order to avoid proliferation or diversion. Close cooperation with IAEA nuclear security is developed through the recent signature of a dedicated practical arrangement. Key partnerships have also been developed in the field of safeguards and security with the US-DoE, Russia, Japan and China. In addition, JRC contributes significantly to the EU nuclear safeguards and security outreach activities implemented under the Instrument for Nuclear Safety Cooperation and Instrument contributing to Stability and Peace. In this paper we will highlight some of the JRC contributions to the enhancement of nuclear safeguards and security at EU and international levels. (author)

  19. Final report for the protocol extensions for ATM Security Laboratory Directed Research and Development Project

    Energy Technology Data Exchange (ETDEWEB)

    Tarman, T.D.; Pierson, L.G.; Brenkosh, J.P. [and others

    1996-03-01

    This is the summary report for the Protocol Extensions for Asynchronous Transfer Mode project, funded under Sandia`s Laboratory Directed Research and Development program. During this one-year effort, techniques were examined for integrating security enhancements within standard ATM protocols, and mechanisms were developed to validate these techniques and to provide a basic set of ATM security assurances. Based on our experience during this project, recommendations were presented to the ATM Forum (a world-wide consortium of ATM product developers, service providers, and users) to assist with the development of security-related enhancements to their ATM specifications. As a result of this project, Sandia has taken a leading role in the formation of the ATM Forum`s Security Working Group, and has gained valuable alliances and leading-edge experience with emerging ATM security technologies and protocols.

  20. Annual report on reactor safety research projects sponsored by the Ministry of Economics and Labour of the Federal Republic of Germany. Reporting period 2003. Progress report

    International Nuclear Information System (INIS)

    2003-01-01

    The Gesellschaft fuer Anlagen- und Reaktorsicherheit (GRS) mbH, by order of the BMWi, continuously issues information on the status of the investigations into the safety of nuclear power plants by publishing semi-annual and annual progress reports within the series of GRS-F-Fortschrittsberichte (GRS-F-Progress Reports). Each progress report represents a compilation of individual reports about the objectives, work performed, results achieved, next steps of the work etc. The individual reports are prepared in a standard form by the research organisations themselves as documentation of their progress in work and are published by the Research Management Division of GRS within the framework of general information on the progress in reactor safety research. The compilation of the reports is classified according to general topics related to reactor safety research. Further, use is made of the classification system ''Joint Safety Research Index'' of the CEC (commission of the european communities). The reports are arranged in sequence of their project numbers

  1. Enabling nutrient security and sustainability through systems research.

    Science.gov (United States)

    Kaput, Jim; Kussmann, Martin; Mendoza, Yery; Le Coutre, Ronit; Cooper, Karen; Roulin, Anne

    2015-05-01

    Human and companion animal health depends upon nutritional quality of foods. Seed varieties, seasonal and local growing conditions, transportation, food processing, and storage, and local food customs can influence the nutrient content of food. A new and intensive area of investigation is emerging that recognizes many factors in these agri-food systems that influence the maintenance of nutrient quality which is fundamental to ensure nutrient security for world populations. Modeling how these systems function requires data from different sectors including agricultural, environmental, social, and economic, but also must incorporate basic nutrition and other biomedical sciences. Improving the agri-food system through advances in pre- and post-harvest processing methods, biofortification, or fortifying processed foods will aid in targeting nutrition for populations and individuals. The challenge to maintain and improve nutrient quality is magnified by the need to produce food locally and globally in a sustainable and consumer-acceptable manner for current and future populations. An unmet requirement for assessing how to improve nutrient quality, however, is the basic knowledge of how to define health. That is, health cannot be maintained or improved by altering nutrient quality without an adequate definition of what health means for individuals and populations. Defining and measuring health therefore becomes a critical objective for basic nutritional and other biomedical sciences.

  2. A multilayered analysis of energy security research and the energy supply process

    International Nuclear Information System (INIS)

    Kiriyama, Eriko; Kajikawa, Yuya

    2014-01-01

    Highlights: • The analysis reveals that energy security research is highly multidisciplinary. • Diversification is important for ensuring security in the energy supply process. • A multilayered overview of the energy supply process is important for energy risk management. • Consumer lifestyle innovation will be a part of energy security in the future. - Abstract: After the Fukushima nuclear disaster, a reassessment of the energy system is needed in order to include such aspects as human security and resilience. More open and careful discussions are needed concerning the various risks and uncertainties of future energy options, both in Japan and globally. In this paper, we aim to offer a fundamental basis for discourse on energy security by analyzing the status and trends in academic publications on that issue. Our bibliometrics analysis indicates that research has shifted from promoting strategies for ensuring the self-sufficiency of the primary energy to diversification of the secondary energy supply chain by introducing energy networks consisting of an infrastructure established through international coordination. In the literature, the concept of energy security is ambiguous and allows for multiple interpretations. Our results illustrate the existence of highly multidisciplinary topics within energy security, which can be categorized into four perspectives: geopolitical, economic, policy related, and technological

  3. Wireless Sensor Network Security Enhancement Using Directional Antennas: State of the Art and Research Challenges.

    Science.gov (United States)

    Curiac, Daniel-Ioan

    2016-04-07

    Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to various types of security attacks. A possible solution to reduce the security risks is to use directional antennas instead of omnidirectional ones or in conjunction with them. Due to their increased complexity, higher costs and larger sizes, directional antennas are not traditionally used in wireless sensor networks, but recent technology trends may support this method. This paper surveys existing state of the art approaches in the field, offering a broad perspective of the future use of directional antennas in mitigating security risks, together with new challenges and open research issues.

  4. Research of ios operating system security and the abuse of its exploits

    OpenAIRE

    Jucius, Mindaugas

    2017-01-01

    iOS operating system, which is developed by Apple Inc., is claimed to be the most secure product in the market. In the light of worsening human rights conditions, mainly concerning data privacy breaches performed on governmental level, the need to be reassured about the security of software that runs in our pockets is strengthened. This thesis is focused on researching on potential iOS security exploits and their abuse to access private information or perform malicious actions without user’s ...

  5. KBTAC [Knowledge-Based Technology Application Center] - The EPRI [Electric Power Research Institute]-sponsored knowledge-based technology application center

    International Nuclear Information System (INIS)

    Meyer, W.; Wood, R.M.; Scherer, J.

    1990-01-01

    The Electric Power Research Institute (EPRI) has announced the establishment of the Knowledge-Based Technology Application Center (KBTAC), whose goal is to assist member utilities with expert system technology and applications. The center, established November 7, 1989, is located on the campus of Syracuse University, Syracuse, New York, and will be operated jointly by Kaman Sciences Corporation and the university. The mission of the KBTAC is to assist EPRI member utilities to develop, test, and transfer expert systems into nuclear power plant operations, maintenance, and administration

  6. Security in Nano Communication: Challenges and Open Research Issues

    NARCIS (Netherlands)

    Dressler, Falko; Kargl, Frank

    Nano communication is one of the fastest growing emerging research fields. In recent years, much progress has been achieved in developing nano machines supporting our needs in health care and other scenarios. However, experts agree that only the interaction among nano machines allows to address the

  7. Annual Report 2011-2012 (RAND National Security Research Division)

    Science.gov (United States)

    2012-01-01

    Reports & Bookstore Make a charitable contribution Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by...research team included a former CEO of the Australian Defence Science and Technology Organisation , as well as former officials from U .S . subma- rine

  8. The role of research in global food and nutrition security - Discussion paper

    NARCIS (Netherlands)

    Fischler, F.; Wilkinson, D.; Benton, T.; Daniel, H.; Darcy-Vrillon, B.; Hedlund, K.; Heffernan, P.; Kok, E.J.; Saarela, M.; Jakubczyk, E.; Sorlini, C.; Swinnen, J.; Braun, von J.; Ash, K.; Rojas Briales, E.; Buckwell, A.; Frewen, M.; Karlsson, M.

    2015-01-01

    The present discussion document gives an overview of where European research can add the most value in relation to tackling food and nutrition security challenges and points to areas where we can expand our research potential. Moreover, it highlights the need to develop a governance structure that

  9. Securing water quality and quantity: Research and development perspective

    CSIR Research Space (South Africa)

    Pienaar, H

    2012-10-01

    Full Text Available : ? economic growth & development ? human & environmental needs ? meeting international obligations ? energy needs (strategic water users) ? ensuring availability and allocation (all other users) ? CSIR 2012 Slide 3 Background ? SA 30th driest country... and quantity: Research and development perspective 4th Biennial Conference Harrison Pienaar 10 October 2012 Presentation outline ? Introduction and background to water in South Africa ? Transboundary water resource aspects ? Water related challenges...

  10. Should Security Researchers Experiment More and Draw More Inferences?

    Science.gov (United States)

    2011-08-01

    knowledge would be enormous. To obtain a large and representative sample of keystroke-dynamics research papers, we consulted the IEEE Xplore database... IEEE Xplore are similar to those published elsewhere), these confidence intervals estimate the re- gions where those true percentages would lie with 95...of articles and conference pro- ceedings published by the IEEE , to which our university maintains a subscription. We conducted two keyword searches for

  11. Methodological Approach Into Researching Traffic Under Extraordinary Security Circumstances

    Directory of Open Access Journals (Sweden)

    Peter-Anthony Ercegovac

    2008-09-01

    Full Text Available The complexity of researching traffic under extraordinaryconditions in order to implement a more efficient and functionaltraffic management strategy under both normal and irregularconditions- as well as the grey zone of when the changefrom normal into extraordinary traffic conditions actually occur-provides the researcher with numerous methodologicalproblems.Starting from the viewpoint that the field of traffic scienceneeds an increase into the capacity of research into traffic underextraordinary conditions we have chosen to define withinthis article a specific methodological approach that undertakesa study into the exposure, menace, threat and risk faced by trafficsystems under extraordinary conditions through utilisingmethods utilised by the military that allow for the possible resolutionof such problems through compatible testing of both simulatedand real life conditions that such systems may face.In searching for possible applicable solutions to such demandingparametres we believe that the use of concrete informationin real time and real space in order to bring about amore efficient functioning of traffic under extraordinary conditionscan be achieved through the use of the analytical capacityof traffic systems information gathering attained through theusage of Uninhabited Flying Vehicles (UFVs in monitoringroad, rail and maritime traffic and transport.

  12. Observatory Sponsoring Astronomical Image Contest

    Science.gov (United States)

    2005-05-01

    Forget the headphones you saw in the Warner Brothers thriller Contact, as well as the guttural throbs emanating from loudspeakers at the Very Large Array in that 1997 movie. In real life, radio telescopes aren't used for "listening" to anything - just like visible-light telescopes, they are used primarily to make images of astronomical objects. Now, the National Radio Astronomy Observatory (NRAO) wants to encourage astronomers to use radio-telescope data to make truly compelling images, and is offering cash prizes to winners of a new image contest. Radio Galaxy Fornax A Radio Galaxy Fornax A Radio-optical composite image of giant elliptical galaxy NGC 1316, showing the galaxy (center), a smaller companion galaxy being cannibalized by NGC 1316, and the resulting "lobes" (orange) of radio emission caused by jets of particles spewed from the core of the giant galaxy Click on image for more detail and images CREDIT: Fomalont et al., NRAO/AUI/NSF "Astronomy is a very visual science, and our radio telescopes are capable of producing excellent images. We're sponsoring this contest to encourage astronomers to make the extra effort to turn good images into truly spectacular ones," said NRAO Director Fred K.Y. Lo. The contest, offering a grand prize of $1,000, was announced at the American Astronomical Society's meeting in Minneapolis, Minnesota. The image contest is part of a broader NRAO effort to make radio astronomical data and images easily accessible and widely available to scientists, students, teachers, the general public, news media and science-education professionals. That effort includes an expanded image gallery on the observatory's Web site. "We're not only adding new radio-astronomy images to our online gallery, but we're also improving the organization and accessibility of the images," said Mark Adams, head of education and public outreach (EPO) at NRAO. "Our long-term goal is to make the NRAO Image Gallery an international resource for radio astronomy imagery

  13. Quarterly technical progress report on water reactor safety programs sponsored by the Nuclear Regulatory Commission's Division of Reactor Safety Research, October--December 1976

    International Nuclear Information System (INIS)

    Ferguson, J.B.

    1977-04-01

    Light water reactor safety research performed October through December 1976 is discussed. An analysis to determine the effect of emergency core coolant (ECC) injection location and pump speed on system response characteristics was performed. An analysis to evaluate the capability of commonly used critical heat flux (CHF) correlations to calculate the time of the first CHF in the Semiscale core during a loss-of-coolant experiment (LOCE) was performed. A test program and study to determine the effect thermocouples mounted on the outside fuel rod surfaces would have on the departure from nucleate boiling (DNB) phenomena in the LOFT core during steady state operation were completed. A correlation for use in predicting DNB heat fluxes in the LOFT core was developed. Tests of an experimental transit time flowmeter were completed. A nuclear test was performed to obtain fuel rod behavior data from four PWR-type rods during film boiling operation representative of PWR conditions. Preliminary results from the postirradiation examination of Test IE-1 fuel rods are given. Results of Irradiation Effects Tests IE-2 and IE-3 are given. Gap Conductance Test GC 2-1 was performed to evaluate the effects of fuel density, initial gap width, and fill gas composition on the pellet-cladding gap conductance

  14. Nuclear Physics Exascale Requirements Review: An Office of Science review sponsored jointly by Advanced Scientific Computing Research and Nuclear Physics, June 15 - 17, 2016, Gaithersburg, Maryland

    Energy Technology Data Exchange (ETDEWEB)

    Carlson, Joseph [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Savage, Martin J. [Univ. of Washington, Seattle, WA (United States); Gerber, Richard [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Antypas, Katie [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Bard, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Coffey, Richard [Argonne National Lab. (ANL), Argonne, IL (United States); Dart, Eli [Energy Sciences Network (ESnet), Berkeley, CA (United States); Dosanjh, Sudip [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Hack, James [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Monga, Inder [Energy Sciences Network (ESnet), Berkeley, CA (United States); Papka, Michael E. [Argonne National Lab. (ANL), Argonne, IL (United States); Riley, Katherine [Argonne National Lab. (ANL), Argonne, IL (United States). Advanced Photon Source (APS); Rotman, Lauren [Energy Sciences Network (ESnet), Berkeley, CA (United States); Straatsma, Tjerk [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Wells, Jack [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Avakian, Harut [Thomas Jefferson National Accelerator Facility (TJNAF), Newport News, VA (United States); Ayyad, Yassid [Michigan State Univ., East Lansing, MI (United States). Dept. of Physics and Astronomy. National Superconducting Cyclotron Lab.; Bass, Steffen A. [Duke Univ., Durham, NC (United States); Bazin, Daniel [Michigan State Univ., East Lansing, MI (United States). Dept. of Physics and Astronomy. National Superconducting Cyclotron Lab.; Boehnlein, Amber [Thomas Jefferson National Accelerator Facility (TJNAF), Newport News, VA (United States); Bollen, Georg [Michigan State Univ., East Lansing, MI (United States). Facility for Rare Isotope Beams; Broussard, Leah J. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Calder, Alan [Stony Brook Univ., NY (United States); Couch, Sean [Michigan State Univ., East Lansing, MI (United States); Couture, Aaron [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Cromaz, Mario [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Detmold, William [Massachusetts Inst. of Technology (MIT), Cambridge, MA (United States); Detwiler, Jason [Univ. of Washington, Seattle, WA (United States); Duan, Huaiyu [Univ. of New Mexico, Albuquerque, NM (United States); Edwards, Robert [Thomas Jefferson National Accelerator Facility (TJNAF), Newport News, VA (United States); Engel, Jonathan [Univ. of North Carolina, Chapel Hill, NC (United States); Fryer, Chris [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Fuller, George M. [Univ. of California, San Diego, CA (United States); Gandolfi, Stefano [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Gavalian, Gagik [Thomas Jefferson National Accelerator Facility (TJNAF), Newport News, VA (United States); Georgobiani, Dali [Michigan State Univ., East Lansing, MI (United States); Gupta, Rajan [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Gyurjyan, Vardan [Thomas Jefferson National Accelerator Facility (TJNAF), Newport News, VA (United States); Hausmann, Marc [Michigan State Univ., East Lansing, MI (United States); Heyes, Graham [Thomas Jefferson National Accelerator Facility (TJNAF), Newport News, VA (United States); Hix, W. Ralph [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); ito, Mark [Thomas Jefferson National Accelerator Facility (TJNAF), Newport News, VA (United States); Jansen, Gustav [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Jones, Richard [Univ. of Connecticut, Storrs, CT (United States); Joo, Balint [Thomas Jefferson National Accelerator Facility (TJNAF), Newport News, VA (United States); Kaczmarek, Olaf [Bielefeld Univ. (Germany); Kasen, Dan [Univ. of California, Berkeley, CA (United States); Kostin, Mikhail [Michigan State Univ., East Lansing, MI (United States); Kurth, Thorsten [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center; Lauret, Jerome [Brookhaven National Lab. (BNL), Upton, NY (United States); Lawrence, David [Thomas Jefferson National Accelerator Facility (TJNAF), Newport News, VA (United States); Lin, Huey-Wen [Michigan State Univ., East Lansing, MI (United States); Lin, Meifeng [Brookhaven National Lab. (BNL), Upton, NY (United States); Mantica, Paul [Michigan State Univ., East Lansing, MI (United States); Maris, Peter [Iowa State Univ., Ames, IA (United States); Messer, Bronson [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Mittig, Wolfgang [Michigan State Univ., East Lansing, MI (United States); Mosby, Shea [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Mukherjee, Swagato [Brookhaven National Lab. (BNL), Upton, NY (United States); Nam, Hai Ah [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); navratil, Petr [Tri-Univ. Meson Facility (TRIUMF), Vancouver, BC (Canada); Nazarewicz, Witek [Michigan State Univ., East Lansing, MI (United States); Ng, Esmond [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); O' Donnell, Tommy [Virginia Polytechnic Inst. and State Univ. (Virginia Tech), Blacksburg, VA (United States); Orginos, Konstantinos [College of William and Mary, Williamsburg, VA (United States); Pellemoine, Frederique [Michigan State Univ., East Lansing, MI (United States). Facility for Rare Isotope Beams; Petreczky, Peter [Brookhaven National Lab. (BNL), Upton, NY (United States); Pieper, Steven C. [Argonne National Lab. (ANL), Argonne, IL (United States); Pinkenburg, Christopher H. [Brookhaven National Lab. (BNL), Upton, NY (United States); Plaster, Brad [Univ. of Kent,Canterbury (United Kingdom); Porter, R. Jefferson [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Portillo, Mauricio [Michigan State Univ., East Lansing, MI (United States). Facility for Rare Isotope Beams; Pratt, Scott [Michigan State Univ., East Lansing, MI (United States); Purschke, Martin L. [Brookhaven National Lab. (BNL), Upton, NY (United States); Qiang, Ji [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Quaglioni, Sofia [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Richards, David [Thomas Jefferson National Accelerator Facility (TJNAF), Newport News, VA (United States); Roblin, Yves [Thomas Jefferson National Accelerator Facility (TJNAF), Newport News, VA (United States); Schenke, Bjorn [Brookhaven National Lab. (BNL), Upton, NY (United States); Schiavilla, Rocco [Old Dominion Univ., Norfolk, VA (United States); Thomas Jefferson National Accelerator Facility (TJNAF), Newport News, VA (United States); Schlichting, Soren [Brookhaven National Lab. (BNL), Upton, NY (United States); Schunck, Nicolas [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Steinbrecher, Patrick [Brookhaven National Lab. (BNL), Upton, NY (United States); Strickland, Michael [Kent State Univ., Kent, OH (United States); Syritsyn, Sergey [Stony Brook Univ., NY (United States); Terzic, Balsa [Old Dominion Univ., Norfolk, VA (United States); Varner, Robert [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Vary, James [Iowa State Univ., Ames, IA (United States); Wild, Stefan [Argonne National Lab. (ANL), Argonne, IL (United States); Winter, Frank [Thomas Jefferson National Accelerator Facility (TJNAF), Newport News, VA (United States); Zegers, Remco [Michigan State Univ., East Lansing, MI (United States); Zhang, He [Thomas Jefferson National Accelerator Facility (TJNAF), Newport News, VA (United States); Ziegler, Veronique [Thomas Jefferson National Accelerator Facility (TJNAF), Newport News, VA (United States); Zingale, Michael [Stony Brook Univ., NY (United States)

    2017-02-28

    Imagine being able to predict — with unprecedented accuracy and precision — the structure of the proton and neutron, and the forces between them, directly from the dynamics of quarks and gluons, and then using this information in calculations of the structure and reactions of atomic nuclei and of the properties of dense neutron stars (NSs). Also imagine discovering new and exotic states of matter, and new laws of nature, by being able to collect more experimental data than we dream possible today, analyzing it in real time to feed back into an experiment, and curating the data with full tracking capabilities and with fully distributed data mining capabilities. Making this vision a reality would improve basic scientific understanding, enabling us to precisely calculate, for example, the spectrum of gravity waves emitted during NS coalescence, and would have important societal applications in nuclear energy research, stockpile stewardship, and other areas. This review presents the components and characteristics of the exascale computing ecosystems necessary to realize this vision.

  15. Quarterly technical progress report on water reactor safety programs sponsored by the Nuclear Regulatory Commission's Division of Reactor Safety Research, October--December 1976

    Energy Technology Data Exchange (ETDEWEB)

    Ferguson, J. B. [ed.

    1977-04-01

    Light water reactor safety research performed October through December 1976 is discussed. An analysis to determine the effect of emergency core coolant (ECC) injection location and pump speed on system response characteristics was performed. An analysis to evaluate the capability of commonly used critical heat flux (CHF) correlations to calculate the time of the first CHF in the Semiscale core during a loss-of-coolant experiment (LOCE) was performed. A test program and study to determine the effect thermocouples mounted on the outside fuel rod surfaces would have on the departure from nucleate boiling (DNB) phenomena in the LOFT core during steady state operation were completed. A correlation for use in predicting DNB heat fluxes in the LOFT core was developed. Tests of an experimental transit time flowmeter were completed. A nuclear test was performed to obtain fuel rod behavior data from four PWR-type rods during film boiling operation representative of PWR conditions. Preliminary results from the postirradiation examination of Test IE-1 fuel rods are given. Results of Irradiation Effects Tests IE-2 and IE-3 are given. Gap Conductance Test GC 2-1 was performed to evaluate the effects of fuel density, initial gap width, and fill gas composition on the pellet-cladding gap conductance.

  16. Nuclear Physics Exascale Requirements Review: An Office of Science review sponsored jointly by Advanced Scientific Computing Research and Nuclear Physics, June 15 - 17, 2016, Gaithersburg, Maryland

    International Nuclear Information System (INIS)

    Carlson, Joseph; Savage, Martin J.; Gerber, Richard; Antypas, Katie; Bard, Deborah; Coffey, Richard; Dart, Eli; Dosanjh, Sudip; Hack, James; Monga, Inder; Papka, Michael E.; Riley, Katherine; Rotman, Lauren; Straatsma, Tjerk; Wells, Jack; Avakian, Harut; Ayyad, Yassid; Bazin, Daniel; Bollen, Georg; Calder, Alan; Couch, Sean; Couture, Aaron; Cromaz, Mario; Detmold, William; Detwiler, Jason; Duan, Huaiyu; Edwards, Robert; Engel, Jonathan; Fryer, Chris; Fuller, George M.; Gandolfi, Stefano; Gavalian, Gagik; Georgobiani, Dali; Gupta, Rajan; Gyurjyan, Vardan; Hausmann, Marc; Heyes, Graham; Hix, W. Ralph; Ito, Mark; Jansen, Gustav; Jones, Richard; Joo, Balint; Kaczmarek, Olaf; Kasen, Dan; Kostin, Mikhail; Kurth, Thorsten; Lawrence, David; Lin, Huey-Wen; Lin, Meifeng; Mantica, Paul; Maris, Peter; Messer, Bronson; Mittig, Wolfgang; Mosby, Shea; Mukherjee, Swagato; Nam, Hai Ah; Navratil, Petr; Nazarewicz, Witek; Ng, Esmond; O'Donnell, Tommy; Orginos, Konstantinos; Pellemoine, Frederique; Pieper, Steven C.; Pinkenburg, Christopher H.; Plaster, Brad; Porter, R. Jefferson; Portillo, Mauricio; Purschke, Martin L.; Qiang, Ji; Quaglioni, Sofia; Richards, David; Roblin, Yves; Schenke, Bjorn; Schiavilla, Rocco; Schlichting, Soren; Schunck, Nicolas; Steinbrecher, Patrick; Strickland, Michael; Syritsyn, Sergey; Terzic, Balsa; Varner, Robert; Vary, James; Wild, Stefan; Winter, Frank; Zegers, Remco; Zhang, He; Ziegler, Veronique; Zingale, Michael

    2017-01-01

    Imagine being able to predict - with unprecedented accuracy and precision - the structure of the proton and neutron, and the forces between them, directly from the dynamics of quarks and gluons, and then using this information in calculations of the structure and reactions of atomic nuclei and of the properties of dense neutron stars (NSs). Also imagine discovering new and exotic states of matter, and new laws of nature, by being able to collect more experimental data than we dream possible today, analyzing it in real time to feed back into an experiment, and curating the data with full tracking capabilities and with fully distributed data mining capabilities. Making this vision a reality would improve basic scientific understanding, enabling us to precisely calculate, for example, the spectrum of gravity waves emitted during NS coalescence, and would have important societal applications in nuclear energy research, stockpile stewardship, and other areas. This review presents the components and characteristics of the exascale computing ecosystems necessary to realize this vision.

  17. Quarterly technical progress report on water reactor safety programs sponsored by the Nuclear Regulatory Commission's Division of Reactor Safety Research, January--March 1976

    Energy Technology Data Exchange (ETDEWEB)

    Zane, J. O.; Farman, R. F.; Hanson, D. J.; Peterson, A. C.; Ybarrondo, L. J.; Berta, V. T.; Naff, S. A.; Crocker, J. G.; Martinson, Z. R.; Smolik, G. R.; Cawood, G. W.; Quapp, W. J.; Ramsthaler, J. H.; Ransom, V. H.; Scofield, M. P.; Dearien, J. A.; Bohn, M. P.; Burnham, B. W.; James, S. W.; Lee, W. H.; Lime, J. F.; Nalezny, C. L.; MacDonald, P. E.; Thompson, L. B.; Domenico, W. F.; Rice, R. E.; Hendrix, C. E.; Davis, C. B.

    1976-06-01

    Light water reactor sfaety research performed January through March 1976 is summarized. Results of the Semiscale Mod-1 blowdown heat transfer test series relating to those phenomena that influence core fluid and heat transfer effects are analyzed, and preliminary analyses of the recently completed reflood heat transfer test series are summarized for the forced and gravity feed reflood tests. The first nonnuclear LOCE in the LOFT program was successfully completed and preliminary results are presented. Preliminary results are given for the PCM 8-1 RF Test, the PCM-2A Test, and the Irradiation Effects Scoping Test 2 in the Thermal Fuel Behavior Program. Model development and verification efforts reported in the Reactor Behavior Program include checkout of RELAP4/MOD5 Update 1, development of a new hydrodynamic model for two-phase separated flows, development of the RACHET code to assess the assumptions in current fuel behavior codes of uniform stress and strain in the cladding, modifications of the containment code BEACON, analysis of results from the Halden Assembly IFA-429 helium sorption experiment, development of correlations for the thermal conductivity of UO/sub 2/ and (U,Pu)O/sub 2/, and evaluation of RALAP4 through comparison of calculated results with data from the GE Blowdown Heat Transfer and Semiscale experiments.

  18. Comparative Study on Cyber Securities between Power Reactor and Research Reactor with Bayesian Update

    International Nuclear Information System (INIS)

    Shin, Jinsoo; Heo, Gyunyoung; Son, Han Seong

    2016-01-01

    The Stuxnet has shown that nuclear facilities are no more safe from cyber-attack. Due to practical experiences and concerns on increasing of digital system application, cyber security has become the important issue in nuclear industry. Korea Institute of Nuclear Nonproliferation and control (KINAC) published a regulatory standard (KINAC/RS-015) to establish cyber security framework for nuclear facilities. However, it is difficult to research about cyber security. It is hard to quantify cyber-attack which has malicious activity which is different from existing design basis accidents (DBAs). We previously proposed a methodology on development of a cyber security risk model with BBN. However, the methodology had a limitation in which the input data as prior information was solely on expert opinions. In this study, we propose a cyber security risk model for instrumentation and control (I and C) system of nuclear facilities with some equation for quantification by using Bayesian Belief Network (BBN) in order to overcome the limitation of previous research. The proposed model has been used for comparative study on cyber securities between large-sized nuclear power plants (NPPs) and small-sized Research Reactors (RR). In this study, we proposed the cyber security risk evaluation model with BBN. It includes I and C architecture, which is a target system of cyber-attack, malicious activity, which causes cyber-attack from attacker, and mitigation measure, which mitigates the cyber-attack risk. Likelihood and consequence as prior information are evaluated by considering characteristics of I and C architecture and malicious activity. The BBN model provides posterior information with Bayesian update by adding any of assumed cyber-attack scenarios as evidence. Cyber security risk for nuclear facilities is analyzed by comparing between prior information and posterior information of each node. In this study, we conducted comparative study on cyber securities between power reactor

  19. Comparative Study on Cyber Securities between Power Reactor and Research Reactor with Bayesian Update

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Jinsoo; Heo, Gyunyoung [Kyung Hee University, Yongin (Korea, Republic of); Son, Han Seong [Joongbu Univiersity, Geumsan (Korea, Republic of)

    2016-10-15

    The Stuxnet has shown that nuclear facilities are no more safe from cyber-attack. Due to practical experiences and concerns on increasing of digital system application, cyber security has become the important issue in nuclear industry. Korea Institute of Nuclear Nonproliferation and control (KINAC) published a regulatory standard (KINAC/RS-015) to establish cyber security framework for nuclear facilities. However, it is difficult to research about cyber security. It is hard to quantify cyber-attack which has malicious activity which is different from existing design basis accidents (DBAs). We previously proposed a methodology on development of a cyber security risk model with BBN. However, the methodology had a limitation in which the input data as prior information was solely on expert opinions. In this study, we propose a cyber security risk model for instrumentation and control (I and C) system of nuclear facilities with some equation for quantification by using Bayesian Belief Network (BBN) in order to overcome the limitation of previous research. The proposed model has been used for comparative study on cyber securities between large-sized nuclear power plants (NPPs) and small-sized Research Reactors (RR). In this study, we proposed the cyber security risk evaluation model with BBN. It includes I and C architecture, which is a target system of cyber-attack, malicious activity, which causes cyber-attack from attacker, and mitigation measure, which mitigates the cyber-attack risk. Likelihood and consequence as prior information are evaluated by considering characteristics of I and C architecture and malicious activity. The BBN model provides posterior information with Bayesian update by adding any of assumed cyber-attack scenarios as evidence. Cyber security risk for nuclear facilities is analyzed by comparing between prior information and posterior information of each node. In this study, we conducted comparative study on cyber securities between power reactor

  20. Final report for the Integrated and Robust Security Infrastructure (IRSI) laboratory directed research and development project

    Energy Technology Data Exchange (ETDEWEB)

    Hutchinson, R.L.; Hamilton, V.A.; Istrail, G.G.; Espinoza, J.; Murphy, M.D.

    1997-11-01

    This report describes the results of a Sandia-funded laboratory-directed research and development project titled {open_quotes}Integrated and Robust Security Infrastructure{close_quotes} (IRSI). IRSI was to provide a broad range of commercial-grade security services to any software application. IRSI has two primary goals: application transparency and manageable public key infrastructure. IRSI must provide its security services to any application without the need to modify the application to invoke the security services. Public key mechanisms are well suited for a network with many end users and systems. There are many issues that make it difficult to deploy and manage a public key infrastructure. IRSI addressed some of these issues to create a more manageable public key infrastructure.

  1. Security approaches in using tablet computers for primary data collection in clinical research.

    Science.gov (United States)

    Wilcox, Adam B; Gallagher, Kathleen; Bakken, Suzanne

    2013-01-01

    Next-generation tablets (iPads and Android tablets) may potentially improve the collection and management of clinical research data. The widespread adoption of tablets, coupled with decreased software and hardware costs, has led to increased consideration of tablets for primary research data collection. When using tablets for the Washington Heights/Inwood Infrastructure for Comparative Effectiveness Research (WICER) project, we found that the devices give rise to inherent security issues associated with the potential use of cloud-based data storage approaches. This paper identifies and describes major security considerations for primary data collection with tablets; proposes a set of architectural strategies for implementing data collection forms with tablet computers; and discusses the security, cost, and workflow of each strategy. The paper briefly reviews the strategies with respect to their implementation for three primary data collection activities for the WICER project.

  2. Substantial Research Secures the Blue Future for our Blue Plant

    Directory of Open Access Journals (Sweden)

    Moustafa Abdel Maksoud

    2016-06-01

    Full Text Available Earth, the blue planet, is our home, and seas and oceans cover more than 70% of its surface. As the earth’s population rapidly increases and available resources decrease, seas and oceans can play a key role in assuring the long-term survival of humankind. Renewable maritime energy has huge potential to provide a considerable part of the earth’s population with decarbonised electricity generation systems. Renewable maritime energy is very flexible and can be harvested above the water’s free surface by using offshore wind turbines, on the water’s surface by using wave energy converters or below the water’s surface by using current or tidal turbines. The supposed conflict between environmental protection measures and economic interests is neither viable nor reasonable. Renewable maritime energy can be the motor for considerable substantial economic growth for many maritime regions and therefore for society at large. The fastest growing sector of renewable maritime energy is offshore wind. The annual report of the European Wind Energy Association from the year 2015 confirms the growing relevance of the offshore wind industry. In 2015, the total installed and grid-connected capacity of wind power was 12,800 MW in the EU and 6,013.4 MW in Germany. 38% of the 2015 annual installation in Germany was offshore, accounting for a capacity of 2,282.4 MW. However, there are a limited number of available installation sites in shallow water, meaning that there is an urgent need to develop new offshore structures for water depths greater than 50m. The persistent trend towards deeper waters has encouraged the offshore wind industry to look for floating wind turbine structures and larger turbines. Floating wind turbine technologies are at an early stage of development and many technical and economic challenges will still need to be faced. Nonetheless, intensive research activities and the employment of advanced technologies are the key factors in

  3. 45 CFR 1226.12 - Sponsor employees.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Sponsor employees. 1226.12 Section 1226.12 Public Welfare Regulations Relating to Public Welfare (Continued) CORPORATION FOR NATIONAL AND COMMUNITY SERVICE PROHIBITIONS ON ELECTORAL AND LOBBYING ACTIVITIES Sponsor Employee Activities § 1226.12 Sponsor employees...

  4. Securing personnel in nuclear fuel cycle research and development in Japan

    International Nuclear Information System (INIS)

    Sekino, H.

    1993-01-01

    The PNC, a japanese governmental research and development organization, is concerned with research and development into building and operating advanced power reactors and R and D into the whole cycle of the nuclear fuel. PNC promotes international cooperation with the USA and European countries as well as technical cooperation with the private sectors in uranium enrichment, reprocessing and advanced reactor development. This report discusses the current situation and problems in securing PNC personnel, in securing 'loan' staff for PNC, and in personnel exchanges for technical transfer and international cooperation. 5 figs

  5. Security Approaches in Using Tablet Computers for Primary Data Collection in Clinical Research

    OpenAIRE

    Wilcox, Adam B.; Gallagher, Kathleen; Bakken, Suzanne

    2013-01-01

    Next-generation tablets (iPads and Android tablets) may potentially improve the collection and management of clinical research data. The widespread adoption of tablets, coupled with decreased software and hardware costs, has led to increased consideration of tablets for primary research data collection. When using tablets for the Washington Heights/Inwood Infrastructure for Comparative Effectiveness Research (WICER) project, we found that the devices give rise to inherent security issues asso...

  6. Audit and Evaluation of Computer Security. Computer Science and Technology.

    Science.gov (United States)

    Ruthberg, Zella G.

    This is a collection of consensus reports, each produced at a session of an invitational workshop sponsored by the National Bureau of Standards. The purpose of the workshop was to explore the state-of-the-art and define appropriate subjects for future research in the audit and evaluation of computer security. Leading experts in the audit and…

  7. NNSA Laboratory Directed Research and Development Program 2008 Symposium--Focus on Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Kotta, P R; Sketchley, J A

    2008-08-20

    The Laboratory Directed Research and Development (LDRD) Program was authorized by Congress in 1991 to fund leading-edge research and development central to the national laboratories core missions. LDRD anticipates and engages in projects on the forefront of science and engineering at the Department of Energy (DOE) national laboratories, and has a long history of addressing pressing national security needs at the National Nuclear Security Administration (NNSA) laboratories. LDRD has been a scientific success story, where projects continue to win national recognition for excellence through prestigious awards, papers published and cited in peer-reviewed journals, mainstream media coverage, and patents granted. The LDRD Program is also a powerful means to attract and retain top researchers from around the world, to foster collaborations with other prominent scientific and technological institutions, and to leverage some of the world's most technologically advanced assets. This enables the LDRD Program to invest in high-risk and potentially high-payoff research that creates innovative technical solutions for some of our nation's most difficult challenges. Worldwide energy demand is growing at an alarming rate, as developing nations continue to expand their industrial and economic base on the back of limited global resources. The resulting international conflicts and environmental consequences pose serious challenges not only to this nation, but to the international community as well. The NNSA and its national security laboratories have been increasingly called upon to devote their scientific and technological capabilities to help address issues that are not limited solely to the historic nuclear weapons core mission, but are more expansive and encompass a spectrum of national security missions, including energy security. This year's symposium highlights some of the exciting areas of research in alternative fuels and technology, nuclear power, carbon

  8. The Two Faces of Security in Hybrid Political Orders: A Framework for Analysis and Research

    Directory of Open Access Journals (Sweden)

    Robin Luckham

    2013-09-01

    authority and capacity to deliver security are weak, disputed or compromised by special interests; and (iii “securitised policy spaces” in which international actors collaborate to ensure peace and fulfil their responsibility to protect vulnerable end-users in unsecured regions. In making these distinctions we argue that similar analytical lenses can be turned upon international actors in securitised policy spaces as well as upon state and non-state security actors. The concluding section argues that such a reframing of the security and development debate demands not just new modes of analysis but also fresh approaches to research designed both to provide insights into the vernacular understandings, coping strategies and potential agency of end-users and to uncover the informal networks, alliances and covert strategies of the multiple actors determining their security in hybrid political orders. This paper builds upon a systematic literature search undertaken by the Justice and Security Research Programme (JSRP at the London School of Economics (LSE funded by the UK’s Department for International Development (DFID. The search itself and its main findings are discussed in Luckham and Kirk (2012 and Luckham and Kirk (2013.

  9. Crosscut report: Exascale Requirements Reviews, March 9–10, 2017 – Tysons Corner, Virginia. An Office of Science review sponsored by: Advanced Scientific Computing Research, Basic Energy Sciences, Biological and Environmental Research, Fusion Energy Sciences, High Energy Physics, Nuclear Physics

    Energy Technology Data Exchange (ETDEWEB)

    Gerber, Richard [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Hack, James [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States). Oak Ridge Leadership Computing Facility (OLCF); Riley, Katherine [Argonne National Lab., IL (United States). Argonne Leadership Computing Facility (ALCF); Antypas, Katie [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Coffey, Richard [Argonne National Lab. (ANL), Argonne, IL (United States). Argonne Leadership Computing Facility (ALCF); Dart, Eli [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). ESnet; Straatsma, Tjerk [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States). Oak Ridge Leadership Computing Facility (OLCF); Wells, Jack [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States). Oak Ridge Leadership Computing Facility (OLCF); Bard, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Dosanjh, Sudip [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Monga, Inder [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). ESnet; Papka, Michael E. [Argonne National Lab. (ANL), Argonne, IL (United States). Argonne Leadership Computing Facility; Rotman, Lauren [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). ESnet

    2018-01-22

    The mission of the U.S. Department of Energy Office of Science (DOE SC) is the delivery of scientific discoveries and major scientific tools to transform our understanding of nature and to advance the energy, economic, and national security missions of the United States. To achieve these goals in today’s world requires investments in not only the traditional scientific endeavors of theory and experiment, but also in computational science and the facilities that support large-scale simulation and data analysis. The Advanced Scientific Computing Research (ASCR) program addresses these challenges in the Office of Science. ASCR’s mission is to discover, develop, and deploy computational and networking capabilities to analyze, model, simulate, and predict complex phenomena important to DOE. ASCR supports research in computational science, three high-performance computing (HPC) facilities — the National Energy Research Scientific Computing Center (NERSC) at Lawrence Berkeley National Laboratory and Leadership Computing Facilities at Argonne (ALCF) and Oak Ridge (OLCF) National Laboratories — and the Energy Sciences Network (ESnet) at Berkeley Lab. ASCR is guided by science needs as it develops research programs, computers, and networks at the leading edge of technologies. As we approach the era of exascale computing, technology changes are creating challenges for science programs in SC for those who need to use high performance computing and data systems effectively. Numerous significant modifications to today’s tools and techniques will be needed to realize the full potential of emerging computing systems and other novel computing architectures. To assess these needs and challenges, ASCR held a series of Exascale Requirements Reviews in 2015–2017, one with each of the six SC program offices,1 and a subsequent Crosscut Review that sought to integrate the findings from each. Participants at the reviews were drawn from the communities of leading domain

  10. The Meaning of Sponsoring : A study on the motives behind sponsoring a sports team and the following effects on brand awareness.

    OpenAIRE

    Skovshoved, Fredrik; Roshandel, Salar

    2009-01-01

    Background: Sponsoring is a topic that has always been present but in different forms. Recently however, it has become even more popular and companies today invest small fortunes on becoming sponsors of different events, individuals and teams. However, there is still not much research done within this field, hence we find it interesting to investigate further. Purpose: The purpose of this thesis is to investigate, from a strategic marketing perspective, what a sponsoring organization wants to...

  11. Biological and Environmental Research Exascale Requirements Review. An Office of Science review sponsored jointly by Advanced Scientific Computing Research and Biological and Environmental Research, March 28-31, 2016, Rockville, Maryland

    Energy Technology Data Exchange (ETDEWEB)

    Arkin, Adam [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Bader, David C. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Coffey, Richard [Argonne National Lab. (ANL), Argonne, IL (United States); Antypas, Katie [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Bard, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Dart, Eli [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Esnet; Dosanjh, Sudip [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Gerber, Richard [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Hack, James [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Monga, Inder [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Esnet; Papka, Michael E. [Argonne National Lab. (ANL), Argonne, IL (United States); Riley, Katherine [Argonne National Lab. (ANL), Argonne, IL (United States); Rotman, Lauren [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Esnet; Straatsma, Tjerk [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Wells, Jack [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Aluru, Srinivas [Georgia Inst. of Technology, Atlanta, GA (United States); Andersen, Amity [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Aprá, Edoardo [Pacific Northwest National Lab. (PNNL), Richland, WA (United States). EMSL; Azad, Ariful [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Bates, Susan [National Center for Atmospheric Research, Boulder, CO (United States); Blaby, Ian [Brookhaven National Lab. (BNL), Upton, NY (United States); Blaby-Haas, Crysten [Brookhaven National Lab. (BNL), Upton, NY (United States); Bonneau, Rich [New York Univ. (NYU), NY (United States); Bowen, Ben [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Bradford, Mark A. [Yale Univ., New Haven, CT (United States); Brodie, Eoin [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Brown, James (Ben) [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Buluc, Aydin [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Bernholdt, David [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Bylaska, Eric [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Calvin, Kate [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Cannon, Bill [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Chen, Xingyuan [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Cheng, Xiaolin [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Cheung, Margaret [Univ. of Houston, Houston, TX (United States); Chowdhary, Kenny [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Colella, Phillip [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Collins, Bill [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Compo, Gil [National Oceanic and Atmospheric Administration (NOAA), Boulder, CO (United States); Crowley, Mike [National Renewable Energy Lab. (NREL), Golden, CO (United States); Debusschere, Bert [Sandia National Lab. (SNL-CA), Livermore, CA (United States); D’Imperio, Nicholas [Brookhaven National Lab. (BNL), Upton, NY (United States); Dror, Ron [Stanford Univ., Stanford, CA (United States); Egan, Rob [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Evans, Katherine [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Friedberg, Iddo [Iowa State Univ., Ames, IA (United States); Fyke, Jeremy [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Gao, Zheng [Stony Brook Univ., Stony Brook, NY (United States); Georganas, Evangelos [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Giraldo, Frank [Naval Postgraduate School, Monterey, CA (United States); Gnanakaran, Gnana [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Govind, Niri [Pacific Northwest National Lab. (PNNL), Richland, WA (United States). EMSL; Grandy, Stuart [Univ. of New Hampshire, Durham, NH (United States); Gustafson, Bill [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Hammond, Glenn [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hargrove, William [USDA Forest Service, Washington, D.C. (United States); Heroux, Michael [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hoffman, Forrest [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Hofmeyr, Steven [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Hunke, Elizabeth [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Jackson, Charles [Univ. of Texas-Austin, Austin, TX (United States); Jacob, Rob [Argonne National Lab. (ANL), Argonne, IL (United States); Jacobson, Dan [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Jacobson, Matt [Univ. of California, San Francisco, CA (United States); Jain, Chirag [Georgia Inst. of Technology, Atlanta, GA (United States); Johansen, Hans [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Johnson, Jeff [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jones, Andy [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jones, Phil [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Kalyanaraman, Ananth [Washington State Univ., Pullman, WA (United States); Kang, Senghwa [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); King, Eric [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Koanantakool, Penporn [Univ. of California, Berkeley, CA (United States); Kollias, Pavlos [Stony Brook Univ., Stony Brook, NY (United States); Kopera, Michal [Univ. of California, Santa Cruz, CA (United States); Kotamarthi, Rao [Argonne National Lab. (ANL), Argonne, IL (United States); Kowalski, Karol [Pacific Northwest National Lab. (PNNL), Richland, WA (United States). EMSL; Kumar, Jitendra [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Kyrpides, Nikos [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Leung, Ruby [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Li, Xiaolin [Stony Brook Univ., Stony Brook, NY (United States); Lin, Wuyin [Brookhaven National Lab. (BNL), Upton, NY (United States); Link, Robert [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Liu, Yangang [Brookhaven National Lab. (BNL), Upton, NY (United States); Loew, Leslie [Univ. of Connecticut, Storrs, CT (United States); Luke, Edward [Brookhaven National Lab. (BNL), Upton, NY (United States); Ma, Hsi -Yen [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Mahadevan, Radhakrishnan [Univ. of Toronto, Toronto, ON (Canada); Maranas, Costas [Pennsylvania State Univ., University Park, PA (United States); Martin, Daniel [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Maslowski, Wieslaw [Naval Postgraduate School, Monterey, CA (United States); McCue, Lee Ann [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); McInnes, Lois Curfman [Argonne National Lab. (ANL), Argonne, IL (United States); Mills, Richard [Intel Corp., Santa Clara, CA (United States); Molins Rafa, Sergi [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Morozov, Dmitriy [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Mostafavi, Sara [Center for Molecular Medicine and Therapeutics, Vancouver, BC (Canada); Moulton, David J. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Mourao, Zenaida [Univ. of Cambridge (United Kingdom); Najm, Habib [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Ng, Bernard [Center for Molecular Medicine and Therapeutics, Vancouver, BC (Canada); Ng, Esmond [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Norman, Matt [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Oh, Sang -Yun [Univ. of California, Santa Barbara, CA (United States); Oliker, Leonid [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Pan, Chongle [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Pass, Rebecca [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Pau, George S. H. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Petridis, Loukas [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Prakash, Giri [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Price, Stephen [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Randall, David [Colorado State Univ., Fort Collins, CO (United States); Renslow, Ryan [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Riihimaki, Laura [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Ringler, Todd [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Roberts, Andrew [Naval Postgraduate School, Monterey, CA (United States); Rokhsar, Dan [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Ruebel, Oliver [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Salinger, Andrew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Scheibe, Tim [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Schulz, Roland [Intel, Mountain View, CA (United States); Sivaraman, Chitra [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Smith, Jeremy [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Sreepathi, Sarat [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Steefel, Carl [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Talbot, Jenifer [Boston Univ., Boston, MA (United States); Tantillo, D. J. [Univ. of California, Davis, CA (United States); Tartakovsky, Alex [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Taylor, Mark [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Taylor, Ronald [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Trebotich, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Urban, Nathan [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Valiev, Marat [Pacific Northwest National Lab. (PNNL), Richland, WA (United States). EMSL; Wagner, Allon [Univ. of California, Berkeley, CA (United States); Wainwright, Haruko [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Wieder, Will [NCAR/Univ. of Colorado, Boulder, CO (United States); Wiley, Steven [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Williams, Dean [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Worley, Pat [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Xie, Shaocheng [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Yelick, Kathy [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Yoo, Shinjae [Brookhaven National Lab. (BNL), Upton, NY (United States); Yosef, Niri [Univ. of California, Berkeley, CA (United States); Zhang, Minghua [Stony Brook Univ., Stony Brook, NY (United States)

    2016-03-31

    Understanding the fundamentals of genomic systems or the processes governing impactful weather patterns are examples of the types of simulation and modeling performed on the most advanced computing resources in America. High-performance computing and computational science together provide a necessary platform for the mission science conducted by the Biological and Environmental Research (BER) office at the U.S. Department of Energy (DOE). This report reviews BER’s computing needs and their importance for solving some of the toughest problems in BER’s portfolio. BER’s impact on science has been transformative. Mapping the human genome, including the U.S.-supported international Human Genome Project that DOE began in 1987, initiated the era of modern biotechnology and genomics-based systems biology. And since the 1950s, BER has been a core contributor to atmospheric, environmental, and climate science research, beginning with atmospheric circulation studies that were the forerunners of modern Earth system models (ESMs) and by pioneering the implementation of climate codes onto high-performance computers. See http://exascaleage.org/ber/ for more information.

  12. Research on offense and defense technology for iOS kernel security mechanism

    Science.gov (United States)

    Chu, Sijun; Wu, Hao

    2018-04-01

    iOS is a strong and widely used mobile device system. It's annual profits make up about 90% of the total profits of all mobile phone brands. Though it is famous for its security, there have been many attacks on the iOS operating system, such as the Trident apt attack in 2016. So it is important to research the iOS security mechanism and understand its weaknesses and put forward targeted protection and security check framework. By studying these attacks and previous jailbreak tools, we can see that an attacker could only run a ROP code and gain kernel read and write permissions based on the ROP after exploiting kernel and user layer vulnerabilities. However, the iOS operating system is still protected by the code signing mechanism, the sandbox mechanism, and the not-writable mechanism of the system's disk area. This is far from the steady, long-lasting control that attackers expect. Before iOS 9, breaking these security mechanisms was usually done by modifying the kernel's important data structures and security mechanism code logic. However, after iOS 9, the kernel integrity protection mechanism was added to the 64-bit operating system and none of the previous methods were adapted to the new versions of iOS [1]. But this does not mean that attackers can not break through. Therefore, based on the analysis of the vulnerability of KPP security mechanism, this paper implements two possible breakthrough methods for kernel security mechanism for iOS9 and iOS10. Meanwhile, we propose a defense method based on kernel integrity detection and sensitive API call detection to defense breakthrough method mentioned above. And we make experiments to prove that this method can prevent and detect attack attempts or invaders effectively and timely.

  13. Nevada Natonal Security Site-Directed Research and Development FY 2010 Annual Report

    International Nuclear Information System (INIS)

    Bender, Howard

    2011-01-01

    This annual report of the Site-Directed Research and Development (SDRD) program represents the highly significant R and D accomplishments conducted during fiscal year 2010. This year was noteworthy historically, as the Nevada Test Site was renamed to the Nevada National Security Site (NNSS). This change not only recognizes how the site's mission has evolved, but also heralds a future of new challenges and opportunities for the NNSS. In many ways, since its inception in 2002, the SDRD program has helped shape that evolving mission. As we approach 2012, SDRD will also mark a milestone, having completed its first full decade of innovative R and D in support of the site and national security. The program continues to fund advanced science and technology development across traditional Department of Energy (DOE) nuclear security areas such as stockpile stewardship and non-proliferation while also supporting Department of Homeland Security (DHS) needs, and specialized work for government agencies like the Department of Defense (DoD) and others. The NNSS will also contribute technologies in the areas of treaty verification and monitoring, two areas of increasing importance to national security. Keyed to the NNSS's broadened scope, the SDRD program will continue to anticipate and advance R and D projects that will help the NNSS meet forthcoming challenges.

  14. Making the world more secure, one research reactor at a time

    International Nuclear Information System (INIS)

    Mutluer, Adem; Rickwood, Peter

    2015-01-01

    During the night of 29 September 2014, a heavy transport plane took off from an air base in Kazakhstan after an operation to remove fuel and increase the security of a research reactor. In its cargo bay sat four massive containers, provided by the IAEA, that had been filled with a total of 10.2 kilograms of highly enriched uranium (HEU), on its way to be diluted to a safe substance or securely stored at the flight’s destination in Russia. The operation represented the latest achievement in a global programme involving the IAEA, the Russian Federation and the United States to assist several countries, including Kazakhstan, in eliminating the risks associated with HEU, while still maintaining the important scientific research conducted at the reactor. HEU is a security risk, as it is an ingredient that can be used to create a nuclear device intended for malicious use. It is not encouraged to use HEU in a research reactor as safer low enriched uranium (LEU) can be used instead (see box). In the 1960s and 1970s, when many of the world’s research reactors were built, technology using LEU was not yet available, so in order to perform experiments HEU fuel was required. As of next year, less proliferation sensitive LEU will be used to fuel the light water research reactor in Alatau near Almaty, the largest city in Kazakhstan.

  15. Making the world more secure, one research reactor at a time

    International Nuclear Information System (INIS)

    Mutluer, Adem; Rickwood, Peter

    2015-01-01

    During the night of 29 September 2014, a heavy transport plane took off from an air base in Kazakhstan after an operation to remove fuel and increase the security of a research reactor. In its cargo bay sat four massive containers, provided by the IAEA, that had been filled with a total of 10.2 kilograms of highly enriched uranium (HEU), on its way to be diluted to a safe substance or securely stored at the flight’s destination in Russia. The operation represented the latest achievement in a global programme involving the IAEA, the Russian Federation and the United States to assist several countries, including Kazakhstan, in eliminating the risks associated with HEU, while still maintaining the important scientific research conducted at the reactor. HEU is a security risk, as it is an ingredient that can be used to create a nuclear device intended for malicious use. It is not encouraged to use HEU in a research reactor as safer low enriched uranium (LEU) can be used instead (see box). In the 1960s and 1970s, when many of the world’s research reactors were built, technology using LEU was not yet available, so in order to perform experiments HEU fuel was required. As of next year, less proliferation sensitive LEU will be used to fuel the light water research reactor in Alatau near Almaty, the largest city in Kazakhstan. .

  16. E-survey with researchers, members of ethics committees and sponsors of clinical research in Brazil: an emerging methodology for scientific research Inquérito pela Internet com pesquisadores clínicos, membros de comitês de ética e patrocinadores de pesquisa clínica no Brasil: uma metodologia emergente para pesquisa científica

    Directory of Open Access Journals (Sweden)

    Sonia Mansoldo Dainesi

    2012-12-01

    Full Text Available INTRODUCTION: The growth of Internet users enables epidemiological studies to be conducted electronically, representing a promising methodology for data collection. METHODS: Members of Ethics Committees, Clinical Researchers and Sponsors were interviewed using questionnaires sent over the Internet. Along with the questionnaire, participants received a message explaining the survey and also the informed consent. Returning the questionnaire meant the consent of the participant was given. No incentive was offered; two reminders were sent. RESULTS: The response rate was 21% (124/599, 20% (58/290 and 45% (24/53 respectively for Ethics Committees, Researchers and Sponsors. The percentage of return before the two reminders was about 62%. Reasons for non-response: participant not found, refusal to participate, lack of experience in clinical research or in the therapeutic field. Characteristics of participants: 45% of Ethics Committee participants, 64% of Researchers and 63% of Sponsors were male; mean age (range, respectively: 47 (28-74, 53 (24-72 and 40 (29-65 years. Among Researchers and Sponsors, all respondents had at least a university degree and, in the Ethics Committees group, only two (1.7% did not have one. Most of the questionnaires in all groups came from the Southeast Region of Brazil, probably reflecting the highest number of clinical trials and research professionals in this region. CONCLUSION: Despite the potential limitations of a survey done through the Internet, this study led to a response rate similar to what has been observed with other models, efficiency in obtaining responses (speed and quality, convenience for respondents and low cost.INTRODUÇÃO: O crescimento de usuários da Internet possibilita que estudos epidemiológicos sejam conduzidos eletronicamente, representando uma promissora metodologia para coleta de dados. MÉTODOS: Membros de Comitês de Ética, pesquisadores clínicos e patrocinadores foram entrevistados com

  17. Promoting Agricultural Research and Development to Strengthen Food Security in South Asia

    Directory of Open Access Journals (Sweden)

    Ghose Bishwajit

    2014-01-01

    Full Text Available This study aims to highlight the status of agricultural R&D in South Asia and contends that creating an effective agricultural research and innovation systems is a vital element to ensure food security in this region. South Asia is home to around one-fourth of mankind and houses the largest proportion of undernourished people in the world. Despite a period of marked economic growth averaging 6% a year over the past two decades, it remains the world's second poorest region contributing a mere 2.2% in global annual GDP. Agriculture is the mainstay of South Asian economy employing around 60% of the total workforce and generating around 20% of total GDP. South Asia has the recognition of being the second most food-insecure region next only to sub-Saharan Africa. Though there is growing evidence that technological innovation has a key role to play in increasing agricultural production and strengthening food security, agricultural research and development (R&D sector has failed to garner sufficient attention till now. This study also depicts the current situation of food security in South Asia and illustrates how agricultural education and innovation hold the master key to solve the food security issues for the world's most densely populated region.

  18. Managing security and privacy concerns over data storage in healthcare research.

    Science.gov (United States)

    Mackenzie, Isla S; Mantay, Brian J; McDonnell, Patrick G; Wei, Li; MacDonald, Thomas M

    2011-08-01

    Issues surrounding data security and privacy are of great importance when handling sensitive health-related data for research. The emphasis in the past has been on balancing the risks to individuals with the benefit to society of the use of databases for research. However, a new way of looking at such issues is that by optimising procedures and policies regarding security and privacy of data to the extent that there is no appreciable risk to the privacy of individuals, we can create a 'win-win' situation in which everyone benefits, and pharmacoepidemiological research can flourish with public support. We discuss holistic measures, involving both information technology and people, taken to improve the security and privacy of data storage. After an internal review, we commissioned an external audit by an independent consultant with a view to optimising our data storage and handling procedures. Improvements to our policies and procedures were implemented as a result of the audit. By optimising our storage of data, we hope to inspire public confidence and hence cooperation with the use of health care data in research. Copyright © 2011 John Wiley & Sons, Ltd.

  19. 77 FR 26697 - New Animal Drugs; Change of Sponsor; Change of Sponsor Address; Change of Sponsor Name and...

    Science.gov (United States)

    2012-05-07

    ... rights and interest in, abbreviated new animal drug application (ANADA) 200-472 for Fomepizole for... [Docket No. FDA-2012-N-0002] New Animal Drugs; Change of Sponsor; Change of Sponsor Address; Change of.... SUMMARY: The Food and Drug Administration (FDA) is amending the animal drug regulations to reflect a...

  20. Management of the Interface between Nuclear Safety and Security for Research Reactors

    International Nuclear Information System (INIS)

    2016-08-01

    The aim of this publication is to provide technical guidelines and practical information to assist Member States, operating organizations and regulatory bodies, on the basis of international good practices, and to manage the interface between nuclear safety and security at research reactor facilities in an integrated and coordinated manner. The publication was developed based on input from IAEA technical and consultants' meetings held between 2013 and 2015

  1. Undergraduates with Employer-Sponsored Aid: Comparing Group Differences

    Science.gov (United States)

    Faulk, Dagney G.; Wang, Zhenlei

    2014-01-01

    Tuition assistance offered by employers is an understudied area of financial aid research. The purpose of this study is to compare the demographic, socioeconomic, academic and financial aid characteristics of college students who receive employer-sponsored financial aid with students who receive traditional financial aid (institutional, state, or…

  2. The Y-12 National Security Complex Foreign Research Reactor Uranium Supply Production

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, T. [Nuclear Technology and Nonproliferation Programs, B and W Y-12, L.L.C., Y-12 National Security Complex, Oak Ridge, Tennessee (United States); Keller, A.P. [Disposition and Supply Programs, B and W Y-12, L.L.C., Y-12 National Security Complex, Oak Ridge, Tennessee (United States)

    2011-07-01

    The Foreign Research Reactor (FRR) Uranium Supply Program at the Y-12 National Security Complex supports the nonproliferation objectives of the National Nuclear Security Administration (NNSA) HEU Disposition, the Reduced Enrichment Research and Test Reactors (RERTR), and the United States (U.S.) FRR Spent Nuclear Fuel (SNF) Acceptance Programs. The FRR Supply Program supports the important U.S. government nuclear nonproliferation commitment to serve as a reliable and cost-effective uranium supplier for those foreign research reactors that are converting or have converted to Low-Enriched Uranium (LEU) fuel under the RERTR Program. The NNSA Y-12 Site Office maintains the prime contracts with foreign government agencies for the supply of LEU for their research reactors. The LEU is produced by down blending Highly Enriched Uranium (HEU) that has been declared surplus to the U.S. national defense needs. The down blending and sale of the LEU supports the Surplus HEU Disposition Program Record of Decision to make the HEU non-weapons usable and to recover the economic value of the uranium to the extent feasible. In addition to uranium metal feedstock for fuel fabrication, Y-12 can produce LEU in different forms to support new fuel development or target fabrication for medical isotope production. With production improvements and efficient delivery preparations, Y-12 continues to successfully support the global research reactor community. (author)

  3. Enhancing the Safety, Security and Resilience of ICT and Scada Systems Using Action Research

    Science.gov (United States)

    Johnsen, Stig; Skramstad, Torbjorn; Hagen, Janne

    This paper discusses the results of a questionnaire-based survey used to assess the safety, security and resilience of information and communications technology (ICT) and supervisory control and data acquisition (SCADA) systems used in the Norwegian oil and gas industry. The survey identifies several challenges, including the involvement of professionals with different backgrounds and expertise, lack of common risk perceptions, inadequate testing and integration of ICT and SCADA systems, poor information sharing related to undesirable incidents and lack of resilience in the design of technical systems. Action research is proposed as a process for addressing these challenges in a systematic manner and helping enhance the safety, security and resilience of ICT and SCADA systems used in oil and gas operations.

  4. Research on image reconstruction of DR/SSCT security inspection system

    International Nuclear Information System (INIS)

    Li Jian; Cong Peng

    2008-01-01

    On the basis of DR (Digital Radiography)/CT security inspection system, DR/SSCT (single slice spiral CT) security inspection system was developed. This spiral CT system can improve the CT system's drawbacks. The research work includes in replacing the former data acquisition system by a new system which can acquire projection data of multi-slices and devising the SSCT reconstruction algorithms. Simulation experiments and practical experiments were devised to contrast several algorithms. Interpolation technique was operated in detectors data in order to improve the algorithms. In conclusion, the system exploits an algorithm of weighted average of 360 degree LI (Linear Interpolation) and JH-HI (Jiang Hsieh-Half scan Interpolation). (authors)

  5. Nevada National Security Site: Site-Directed Research and Development (SDRD) Fiscal Year 2015 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Bender, Howard A. [National Security Technologies, LLC. (NSTec), Mercury, NV (United States). Site-Directed Research and Development Program

    2016-04-01

    This report presents results of multiple research projects, new and ongoing, funded under the Site-Directed Research and Development Program for the Nevada National Security Site during federal fiscal year 2015. The Site's legacy capabilities in remote sensing combined with new paradigms for emergency response and consequence management help drive the need to develop advanced aerial sensor platforms. Likewise, dynamic materials science is a critical area of scientific research for which basic physics issues are still unresolved. New methods of characterizing materials in extreme states are vitally needed, and these efforts are paving the way with new knowledge. Projects selected in FY 2015 for the Exploratory Research portfolio exhibit a strong balance of NNSS mission relevance. Geoscience, seismology, and techniques for detecting underground nuclear events are still essential focus areas. Many of the project reports in the second major section of this annual report are ongoing continuations in multi-year lifecycles. Diagnostic techniques for stockpile and nuclear security science figured prominently as well, with a few key efforts coming to fruition, such as phase transition detection. In other areas, modeling efforts toward better understanding plasma focus physics has also started to pay dividends for major program needs.

  6. Exclusion of pregnant women from industry-sponsored clinical trials.

    Science.gov (United States)

    Shields, Kristine E; Lyerly, Anne Drapkin

    2013-11-01

    The lack of human data available to inform evidence-based treatment for illness during pregnancy has led to calls for greater inclusion of pregnant women in research, but the extent of their current representation is poorly characterized. Our objective was to measure the current exclusion of pregnant women from industry-sponsored clinical trials as a baseline for future comparison. We compiled data from studies enrolling women of childbearing potential posted on www.ClinicalTrials.gov between 1 October 2011 and 31 January 2012. The review was limited to open United States-based phase IV interventional studies sponsored by the pharmaceutical industry evaluating treatment of conditions that may be experienced by but are not limited to pregnant women and did not involve a medication classified as potentially teratogenic. If there was no mention of pregnancy in the inclusion or exclusion criteria, we contacted a study representative to confirm that pregnant women could be enrolled. Of 558 qualifying industry-sponsored studies, five (1%) were designed specifically for pregnant women. Of 367 phase IV clinical trials with verified inclusion and exclusion criteria, 348 (95%) excluded pregnant women and 19 (5%) did not. We found the exclusion of pregnant women from industry-sponsored clinical trials to be common practice. Moving beyond reflexive exclusion and developing thoughtful criteria for inclusion of pregnant women in clinical research would likely advance the evidence base to inform treatment decisions during pregnancy and lead to better health outcomes for women and children.

  7. Nevada National Security Site. Site-Directed Research and Development FY 2011 Annual Report

    International Nuclear Information System (INIS)

    Bender, Howard

    2012-01-01

    This fiscal year 2011 annual report of the Site-Directed Research and Development program, the 10th anniversary edition, recognizes a full decade of innovative R and D accomplishments in support of the Nevada National Security Site (NNSS). Last year the NNSS itself was renamed to reflect a diversifying mission, and our R and D program has contributed significantly to shape emerging missions that will continue to evolve. New initiatives in stockpile stewardship science, nonproliferation, and treaty verification and monitoring have had substantial successes in FY 2011, and many more accomplishments are expected. SDRD is the cornerstone on which many of these initiatives rest. Historically supporting our main focus areas, SDRD is also building a solid foundation for new, and non-traditional, emerging national security missions. The program continues its charter to advance science and technology for a broad base of agencies including the U.S. Department of Energy (DOE), U.S. Department of Defense (DoD), U.S. Department of Homeland Security (DHS), and many others.

  8. The Praxis of Social Enterprise and Human Security: An Applied Research Agenda

    Directory of Open Access Journals (Sweden)

    Malcolm David Brown

    2014-01-01

    Full Text Available The growth of social enterprise within development NGO work might lead one to suspect it has been irredeemably corrupted by neo-liberal capitalism. However, using the tools of capitalism is not the same as subscribing to the values of capitalism. This paper is situated at the intersection of five fields: human security, international development, social enterprise, social franchising, and left-wing anti-capitalist thought. It examines the relevance of social en­terprise to human security and to development, the relationship between social enterprise and the anti-capitalist values of the left, and it then focuses on social franchising—a subset of social enterprise that highlights the importance of cooperation—suggesting that it may be a useful methodology for NGOs carrying out educational work in parts of the developing world. It syn­thesises and extends ideas that I have presented elsewhere [1-3], it draws on ethnographic fieldwork on the Thai-Burma border, and it puts forward an agenda for further applied research that is rooted in a sociological analysis of civil society and contributes to the human security paradigm.

  9. Nevada National Security Site-Directed Research and Development FY 2011 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Howard Bender, comp.

    2012-04-25

    This fiscal year 2011 annual report of the Site-Directed Research and Development program, the 10th anniversary edition, recognizes a full decade of innovative R&D accomplishments in support of the Nevada National Security Site (NNSS). Last year the NNSS itself was renamed to reflect a diversifying mission, and our R&D program has contributed significantly to shape emerging missions that will continue to evolve. New initiatives in stockpile stewardship science, nonproliferation, and treaty verification and monitoring have had substantial successes in FY 2011, and many more accomplishments are expected. SDRD is the cornerstone on which many of these initiatives rest. Historically supporting our main focus areas, SDRD is also building a solid foundation for new, and non-traditional, emerging national security missions. The program continues its charter to advance science and technology for a broad base of agencies including the U.S. Department of Energy (DOE), U.S. Department of Defense (DoD), U.S. Department of Homeland Security (DHS), and many others.

  10. List of Organizing Committees and Sponsors

    Science.gov (United States)

    2012-03-01

    Organizers DIRECTORS Maria L CalvoPresident of International Commission for Optics, Spain Aram V PapoyanDirector of Institute for Physical Research of NAS, Armenia HEADS OF PROJECT Tigran Dadalyan YSU, Armenia Artsrun MartirosyanIPR, Armenia COORDINATOR Narine GevorgyanIPR, Armenia / ICTP, Italy MANAGERS Paytsar MantashyanIPR, Armenia Karen VardanyanIPR, Armenia INTERNATIONAL ADVISORY COMMITTEE Marcis AuzinshLatvia Roland AvagyanArmenia Tapash ChakrabortyCanada Yuri ChilingaryanArmenia Eduard KazaryanArmenia Albert KirakosyanArmenia Radik KostanyanArmenia Avinash PandeyIndia Marat SoskinUkraine INTERNATIONAL PROGRAM COMMITTEE David Sarkisyan (Chair)Armenia Roman AlaverdyanArmenia Dan ApostolRomania Levon AslanyanArmenia Aranya BhattacherjeeIndia Gagik BuniatyanArmenia Vigen ChaltykyanArmenia Roldao Da RochaBrazil Miltcho DanailovItaly Vladimir GerdtRussia Samvel GevorgyanArmenia Gayane GrigoryanArmenia Rafik HakobyanArmenia Takayuki MiyaderaJapan Levon MouradianArmenia Atom MuradyanArmenia Simon RochesterUSA Hayk SarkisyanArmenia Aleksandr VardanyanArmenia LOCAL ORGANIZING COMMITTEE Narek AghekyanArmenia Anahit GogyanArmenia Melanya GrigoryanArmenia Armen HovhannisyanArmenia Lilit HovhannisyanArmenia Tatevik KhachatryanArmenia Astghik KuzanyanArmenia Satenik KuzanyanArmenia Vladimir LazarevRussia Lilit MantashyanArmenia Hripsime MkrtchyanArmenia Pavel MuzhikyanArmenia Wahi NarsisianArmenia Sahak OrdukhanyanArmenia Anna ReymersArmenia Narine TorosyanArmenia The Symposium was organized by YSU & NAS SPIE Armenian Student Chapter Institute for Physical Research (IPR) of National Academy of Sciences (NAS) Russian-Armenian (Slavonic) University (RAU) LT-PYRKAL cjsc Yerevan State University (YSU) Official Sponsors of the Symposium LT-PYRKAlRussian ArmenianSPIE LT-PYRKAL cjscRussian-Armenian UniversityYSU & NAS SPIE Student Chapter Further sponsors NFSATICTPSCSADevout Generation National Foundation of Science and Advanced TechnologiesThe Abdus Salam International Centre

  11. Programmable Logic Controllers for Research on the Cyber Security of Industrial Power Plants

    Science.gov (United States)

    2017-02-12

    any commercial carriers for shipment of the Goods . WESCO will use its reasonable efforts to comply with Buyer’s requests as to method and route of...and includes a small electrical substation control environment. The lab has already been used to support the research of the PI and his student ...large gToup of gTaduate and undergTadnatc students . The PI is also dcvclopiug a course on control systems security, and t lms wi ll use the lab to

  12. A research on the security of wisdom campus based on geospatial big data

    Science.gov (United States)

    Wang, Haiying

    2018-05-01

    There are some difficulties in wisdom campus, such as geospatial big data sharing, function expansion, data management, analysis and mining geospatial big data for a characteristic, especially the problem of data security can't guarantee cause prominent attention increasingly. In this article we put forward a data-oriented software architecture which is designed by the ideology of orienting data and data as kernel, solve the problem of traditional software architecture broaden the campus space data research, develop the application of wisdom campus.

  13. Reports on research programs in the field of reactor safety sponsored by the Federal Ministry for Research and Technology. Progress report. Reported period: July 1 to December 31, 1984

    International Nuclear Information System (INIS)

    1985-05-01

    Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work and published by the FB (Research Coordination Department), Forschungsbetreuung at the GRS, within the framework of general information of progress in reactor safety research. The individual reports are classified according to the research program on the safety of LWRS 1977-1980 of the BMFT. Another table of contents uses the same classification system as applied in the nuclear safety index of the CEC (Commission of the European Communities) and the OECD (Organization for Economic Cooperation and Development). The reports are arranged in the sequence of their project numbers. (orig./HP) [de

  14. Reports on research programs in the field of reactor safety sponsored by the Federal Ministry for Education, Science, Research and Technology. Reported period: January 1 to June 30, 1995

    International Nuclear Information System (INIS)

    1995-01-01

    Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work and published by the Research Management Division at the GRS within the framework of general informations of progress in reactor safety research. The individual reports are classified according to projects of the reactor safety research program. Another table uses the same classification system as applied in the nuclear safety index of the CEC (Commision of the European Communities), IAEA (International Atomic Energy Agency) and the OECD (Organization for Economic Cooperation and Development). The reports are arranged in sequence of their project numbers. (orig./HP) [de

  15. Research on Issues concerning Social Security for Migrant Workers in Harmonious Society

    OpenAIRE

    Zhang, Hua

    2013-01-01

    This article analyzes the status quo of social security for migrant workers in China, and points out that there are deep system and concept reasons for the lack of labor rights and interests security, social security, equality and the right to development, political participation channels for the current migrant workers. This article then expounds the adverse effects of lack of social security for migrant workers on building a harmonious society: the lack of social security for migrant worker...

  16. Foreign research reactor uranium supply program: The Y-12 national security complex process

    International Nuclear Information System (INIS)

    Nelson, T.; Eddy, B.G.

    2010-01-01

    The Foreign Research Reactor (FRR) Uranium Supply Program at the Y-12 National Security Complex supports the nonproliferation objectives of the HEU Disposition Program, the Reduced Enrichment Research and Test Reactors (RERTR) Program, and the United States FRR Spent Nuclear Fuel (SNF) Acceptance Program. The Y-12 National Nuclear Security Administration (NNSA) Y-12 Site Office maintains the prime contracts with foreign governments for the supply of Low-Enriched Uranium (LEU) for their research reactors. The LEU is produced by down blending Highly Enriched Uranium (HEU) that has been declared surplus to the U.S. national defense needs. The down blending and sale of the LEU supports the Surplus HEU Disposition Program Record of Decision to make the HEU non-weapons usable and to recover the economic value of the uranium to the extent feasible. This program supports the important U.S. government and nuclear nonproliferation commitment to serve as a reliable and cost-effective uranium supplier for those foreign research reactors that are converting or have converted to LEU fuel under the guidance of the NNSA RERTR Program. In conjunction with the FRR SNF Acceptance Program which supports the global nonproliferation efforts to disposition U.S.-origin HEU, the Y-12 FRR Uranium Supply Program can provide the LEU for the replacement fuel fabrication. In addition to feedstock for fuel fabrication, Y-12 supplies LEU for target fabrication for medical isotope production. The Y-12 process uses supply forecasting tools, production improvements and efficient delivery preparations to successfully support the global research reactor community

  17. Inspection methods for physical protection Task III review of other agencies' physical security activities for research reactors

    International Nuclear Information System (INIS)

    In Task I of this project, the current Nuclear Regulatory Commission (NRC) position-on physical security practices and procedures at research reactors were reviewed. In the second task, a sampling of the physical security plans was presented and the three actual reactor sites described in the security plans were visited. The purpose of Task III is to review other agencies' physical security activities for research reactors. During this phase, the actions, procedures and policies of two domestic and two foreign agencies other than the NRC that relate to the research reactor community were examined. The agencies examined were: International Atomic Energy Agency; Canadian Atomic Energy Control Board; Department of Energy; and American Nuclear Insurers

  18. 17 CFR 256.188 - Research, development, or demonstration expenditures.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Research, development, or... COMPANIES, PUBLIC UTILITY HOLDING COMPANY ACT OF 1935 4. Deferred Debits § 256.188 Research, development, or... of all expenditures for research, development or demonstration undertaken by or sponsored through the...

  19. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  20. 45 CFR 2551.25 - What are a sponsor's administrative responsibilities?

    Science.gov (United States)

    2010-10-01

    ... the sponsor organization and/or project service area. (f) Establish risk management policies and... project and carry out its project management responsibilities. (c) Employ a full-time project director to... responsibility for securing maximum and continuing community financial and in-kind support to operate the project...

  1. Research on a Valuation Standard and the Actual Condition About Security Management in PACS

    International Nuclear Information System (INIS)

    Jeong, Jae Ho; Son, Gi Gyeong; Kang, Hee Doo; Dong, Kyung Rae; Kweon, Dae Cheol; Kim, Hyun Soo

    2008-01-01

    This study is to prepare an evaluation standard about personal information protection and security management of a medical institution and to build up a grade standard of evaluation in PACS environment. We built up evaluation index based on 10 detailed items in four big categories (political security, technical security, data management security and physical security) by referring to ISO17799 (BS 7799), HIPPA (Health Insurance and Portability and Accountability Act of 1996) and domestic medical law. We have investigated at the thirty places where medical facility with the extracted security criteria and security evaluation index. Average score of physical security list, one of the big categories, was 18.5/20 (93%) at all medical institutions. Political security score was 18.5/30 (62%), data management security score was 12/20 (60%) and technical security score was 17.5/30 (58%). Therefore, security evaluation score was average 67 in 30 general hospitals, which was 4th level. The results showed that it is necessary to establish evaluation and management standard about personal information protection and security consciousness which are weak in PACS environment.

  2. Budget constraints and optimization in sponsored search auctions

    CERN Document Server

    Yang, Yanwu

    2013-01-01

    The Intelligent Systems Series publishes reference works and handbooks in three core sub-topic areas: Intelligent Automation, Intelligent Transportation Systems, and Intelligent Computing. They include theoretical studies, design methods, and real-world implementations and applications. The series' readership is broad, but focuses on engineering, electronics, and computer science. Budget constraints and optimization in sponsored search auctions takes into account consideration of the entire life cycle of campaigns for researchers and developers working on search systems and ROI maximization

  3. why sponsored posts on facebook and instagram are effective online branding tools

    OpenAIRE

    Eggers, Raphael

    2017-01-01

    This research is motivated by the incongruence of how businesses and contemporary research evaluate paid social media advertisement as online branding tools. Therefore, we examine the possibilities of social media marketing: why sponsored posts on Facebook and Instagram are effective online branding tools. A questionnaire was utilized to approach the research, and answer the hypotheses. Results from 316 participants indicated that sponsored posts were effective for brand awaren...

  4. Research on Lightweight Information Security System of the Internet of Things

    OpenAIRE

    Ying Li; Li Ping Du; JianWei Guo; Xin Zhao

    2013-01-01

    In order to improve the security of information transmitted in the internet of things, this study designs an information security system architecture of internet of things based on a lightweight cryptography. In this security system, an authentication protocol, encryption/decryption protocol and signature verification protocol are proposed and implemented. All these security protocol are used to verify the legality of access device and to protect the confidentiality and integrity of transform...

  5. Research Projects at Chulalongkorn University for the Master Degree Programme in Nuclear Security and Safeguard

    International Nuclear Information System (INIS)

    Nilsuwankosit, S.

    2015-01-01

    The Department of Nuclear Engineering, Faculty of Engineering, Chulalongkorn University, Thailand, began its master degree programme in nuclear security and safeguard in November 2013 with the support from the CBRN-Center of Excellence, European Union. This programme was planned as a way to raise the awareness of various local agencies in ASEAN countries regarding the threat of CBRN events. In the long run, the programme will also serve as the platform to develop the human resource and to provide the professional assistance required to counter such threat in the region. The programme closely follows the guideline as given by the IAEA and employs its materials as the main source of references. The first batch of 20 students came from countries in the ASEAN community. Due to the nature of the program, each student is required to conduct the research and a thesis based on such research is to be submitted as part of the requirement for the graduation. Currently, the research subjects that are readily available to the students can be classified into 5 categories: 1. subjects with neutron generator, 2. subjects with nuclear electronics and instruments, 3. subjects with industrial applications, 4. subjects with computer simulations, and 5. subjects with policy research. (author)

  6. Event seeking for sponsors: Case Helsinki Pride

    OpenAIRE

    Jaakkola, Johanna

    2014-01-01

    This thesis was done for HeSeTa Ry (Helsingin seudun seksuaalinen tasavertaisuus ry) and the goal was to find out how Helsinki Pride could get sponsors more efficiently and how the co-operation could be made more long lasting with the current sponsors. Helsinki Pride is an event organized in Helsinki each year in June. It is also the biggest LGBT event organized in Finland. The biggest event of the week is the Gay Parade and the Party in the Park. In 2014 only these events had over 20 000 par...

  7. Research review of nongovernmental organizations' security policies for humanitarian programs in war, conflict, and postconflict environments.

    Science.gov (United States)

    Rowley, Elizabeth; Burns, Lauren; Burnham, Gilbert

    2013-06-01

    To identify the most and least commonly cited security management messages that nongovernmental organizations (NGOs) are communicating to their field staff, to determine the types of documentation that NGOs most often use to communicate key security messages, and to distinguish the points of commonality and divergence across organizations in the content of key security messages. The authors undertook a systematic review of available security policies, manuals, and training materials from 20 international humanitarian NGOs using the InterAction Minimum Operating Security Standards as the basis for a review framework. The most commonly cited standards include analytical security issues such as threat and risk assessment processes and guidance on acceptance, protection, and deterrence approaches. Among the least commonly cited standards were considering security threats to national staff during staffing decision processes, incorporating security awareness into job descriptions, and ensuring that national staff security issues are addressed in trainings. NGO staff receive security-related messages through multiple document types, but only 12 of the 20 organizations have a distinct security policy document. Points of convergence across organizations in the content of commonly cited standards were found in many areas, but differences in security risk and threat assessment guidance may undermine communication between aid workers about changes in local security environments. Although the humanitarian community has experienced significant progress in the development of practical staff security guidance during the past 10 years, gaps remain that can hinder efforts to garner needed resources, clarify security responsibilities, and ensure that the distinct needs of national staff are recognized and addressed.

  8. The research of network database security technology based on web service

    Science.gov (United States)

    Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin

    2013-03-01

    Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.

  9. Biopharmaceutical industry-sponsored global clinical trials in emerging countries.

    Science.gov (United States)

    Alvarenga, Lenio Souza; Martins, Elisabeth Nogueira

    2010-01-01

    To evaluate biopharmaceutical industry-sponsored clinical trials placed in countries previously described as emerging regions for clinical research, and potential differences for those placed in Brazil. Data regarding recruitment of subjects for clinical trials were retrieved from www.clinicaltrials.gov on February 2nd 2009. Proportions of sites in each country were compared among emerging countries. Multiple logistic regressions were performed to evaluate whether trial placement in Brazil could be predicted by trial location in other countries and/or by trial features. A total of 8,501 trials were then active and 1,170 (13.8%) included sites in emerging countries (i.e., Argentina, Brazil, China, Czech Republic, Hungary, India, Mexico, Poland, Russia, South Korea, and South Africa). South Korea and China presented a significantly higher proportion of sites when compared to other countries (pattractiveness for biopharmaceutical industry-sponsored clinical trials.

  10. Unfulfilled translation opportunities in industry sponsored clinical trials

    DEFF Research Database (Denmark)

    Smed, Marie; Getz, Kenneth A.

    2013-01-01

    in the industry and site representatives are changing. The process of clinical trials has increased in complexity over the years, resulting in additional management layers. Besides an increase in internal management layers, sponsors often also outsource various tasks related to clinical trials to a CRO (Contract...... Research Organization) and thereby adding another link in the relationships between site and sponsor. These changes are intended to optimize the time-consuming and costly trial phases; however, there is a need to study whether valuable knowledge and experience is compromised in the process. Limited......' knowledge gained in clinical trials is utilized by the industry. Responses from 451 global investigative site representatives are included in the study. The analysis of the extensive dataset reveals that the current processes of collaboration between sites and the industry restrict the leverage of valuable...

  11. Securing Canada’s Information-Technology Infrastructure: Context, Principles, and Focus Areas of Cybersecurity Research

    Directory of Open Access Journals (Sweden)

    Dan Craigen

    2013-07-01

    Full Text Available This article addresses the challenges of cybersecurity and ultimately the provision of a stable and resilient information-technology infrastructure for Canada and, more broadly, the world. We describe the context of current cybersecurity challenges by synthesizing key source material whose importance was informed by our own real-world experiences. Furthermore, we present a checklist of guiding principles to a unified response, complete with a set of action-oriented research topics that are linked to known operational limitations. The focus areas are used to drive the formulation of a unified and relevant research and experimental development program, thereby moving us towards a stable and resilient cyberinfrastructure. When cybersecurity is viewed as an inherently interdisciplinary problem of societal concern, we expect that fundamentally new research perspectives will emerge in direct response to domain-specific protection requirements for information-technology infrastructure. Purely technical responses to cybersecurity challenges will be inadequate because human factors are an inherent aspect of the problem. This article will interest managers and entrepreneurs. Senior management teams can assess new technical developments and product releases to fortify their current security solutions, while entrepreneurs can harness new opportunities to commercialize novel technology to solve a high-impact cybersecurity problem..

  12. Safeguards and security deficiencies fulfilled through technology development

    International Nuclear Information System (INIS)

    Smoot, W.

    1996-01-01

    The Office of Safeguards and Security (OSS) sponsors research and development activities based on identified field and headquarters customer requirements. Annually, a formal solicitation of safeguards and security user needs is conducted. Currently, there are over 300 valid safeguards and security deficiencies that have been identified. These user needs serve as the basis for formulating the OSS Technology Development Program (TDP). Due to budget constraints, the TDP can only address approximately 47% of these needs in FY 1996. This paper will discuss, in a general sense, the current deficiencies and how the TDP is responding to each. Specifically, the paper will highlight technologies in the areas of Material Control and Accounting, Physical Security, and Information Security. A brief discussion of unfulfilled user requirements will also be presented as a catalyst for leveraging available or developing technologies from other similar programs or from private industry

  13. Cyber security level assignment for research reactor digital instrumentation and control system architecture using concept of defense in depth

    International Nuclear Information System (INIS)

    Shin, Jin Soo; Heo, Gyun Young; Son, Han Seong; Kim, Young Ki; Park, Jaek Wan

    2012-01-01

    Due to recent aging of the analog instrumentation of many nuclear power plants (NPPs) and research reactors, the system reliability decreases while maintenance and testing costs increase. In addition, it is difficult to find the substitutable analog equipment s due to obsolescence. Therefore, the instrumentation and control (I and C) systems have changed from analog system to digital system due to these facts. With the introduction of digital systems, research reactors are forced to care for the problem of cyber attacks because I and C systems have been digitalized using networks or communication systems. Especially, it is more issued at research reactors due to the accessibility of human resources. In the real world, an IBM researcher has been successful in controlling the software by penetrating a NPPs network in U.S. on July 2008 and acquiring the control right of nuclear facilities after one week. Moreover, the malignant code called 'stuxnet' impaired the nearly 1,000 centrifugal separators in Iran according to an IAEA report. The problem of cyber attacks highlights the important of cyber security, which should be emphasized. Defense.in.depth (DID) is a significant concept for the cyber security to work properly. DID institutes and maintains a hardy program for critical digital asset (CDA) by implementing multiple security boundaries. In this work, we assign cyber security levels to a typical digital I and C system using DID concept. This work is very useful in applying the concept of DID to nuclear industry with respect to cyber security

  14. Cyber security level assignment for research reactor digital instrumentation and control system architecture using concept of defense in depth

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Jin Soo; Heo, Gyun Young [Kyung Hee University, Seoul (Korea, Republic of); Son, Han Seong [Joongbu Univ., Chungnam (Korea, Republic of); Kim, Young Ki; Park, Jaek Wan [KAERI, Daejeon (Korea, Republic of)

    2012-10-15

    Due to recent aging of the analog instrumentation of many nuclear power plants (NPPs) and research reactors, the system reliability decreases while maintenance and testing costs increase. In addition, it is difficult to find the substitutable analog equipment s due to obsolescence. Therefore, the instrumentation and control (I and C) systems have changed from analog system to digital system due to these facts. With the introduction of digital systems, research reactors are forced to care for the problem of cyber attacks because I and C systems have been digitalized using networks or communication systems. Especially, it is more issued at research reactors due to the accessibility of human resources. In the real world, an IBM researcher has been successful in controlling the software by penetrating a NPPs network in U.S. on July 2008 and acquiring the control right of nuclear facilities after one week. Moreover, the malignant code called 'stuxnet' impaired the nearly 1,000 centrifugal separators in Iran according to an IAEA report. The problem of cyber attacks highlights the important of cyber security, which should be emphasized. Defense.in.depth (DID) is a significant concept for the cyber security to work properly. DID institutes and maintains a hardy program for critical digital asset (CDA) by implementing multiple security boundaries. In this work, we assign cyber security levels to a typical digital I and C system using DID concept. This work is very useful in applying the concept of DID to nuclear industry with respect to cyber security.

  15. 22 CFR 62.3 - Sponsor eligibility.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Sponsor eligibility. 62.3 Section 62.3 Foreign Relations DEPARTMENT OF STATE PUBLIC DIPLOMACY AND EXCHANGES EXCHANGE VISITOR PROGRAM General Provisions... visitor program are: (1) United States local, state and federal government agencies; (2) International...

  16. Market Imperfections and Firm-Sponsored Training

    NARCIS (Netherlands)

    Picchio, M.; van Ours, J.C.

    2010-01-01

    Recent human capital theories predict that labor market frictions and product market competition influence firm-sponsored training. Using matched worker-firm data from Dutch manufacturing, our paper empirically assesses the validity of these predictions. We find that a decrease in labor market

  17. CHDS Sponsors Critical Infrastructure Protection Workshop

    OpenAIRE

    Center for Homeland Defense and Security

    2008-01-01

    Center for Homeland Defense and Security, PRESS RELEASES The NPS Center for Homeland Defense and Security in partnership with the U.S. Department of Homeland Security recently hosted its first Critical Infrastructure Protection Workshop. The workshop brought together practitioners and...

  18. Research of Smart Grid Cyber Architecture and Standards Deployment with High Adaptability for Security Monitoring

    DEFF Research Database (Denmark)

    Hu, Rui; Hu, Weihao; Chen, Zhe

    2015-01-01

    Security Monitoring is a critical function for smart grid. As a consequence of strongly relying on communication, cyber security must be guaranteed by the specific system. Otherwise, the DR signals and bidding information can be easily forged or intercepted. Customers’ privacy and safety may suffer...... huge losses. Although OpenADR specificationsprovide continuous, secure and reliable two-way communications in application level defined in ISO model, which is also an open architecture for security is adopted by it and no specific or proprietary technologies is restricted to OpenADR itself....... It is significant to develop a security monitoring system. This paper discussed the cyber architecture of smart grid with high adaptability for security monitoring. An adaptable structure with Demilitarized Zone (DMZ) is proposed. Focusing on this network structure, the rational utilization of standards...

  19. Discursive field of dissertation research on the state of information security of Ukraine

    OpenAIRE

    O. S. Zozulya

    2016-01-01

    The article analyzed the of dissertations for science «Public Administration» on the problems ensuring information security of Ukraine. According to the data system catalog Vernadsky National Library of Ukraine was found that within the limits of science «Public Administration» problems of ensuring information security were devoted only 4 work. In view of the small number of dissertations, which explored the problems of public-management of ensuring information security Ukraine, we have to ad...

  20. Global environmental security: Research and policy strategies for the 1990s

    International Nuclear Information System (INIS)

    Lazaro, M.A.; Wang, Hua.

    1992-01-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions

  1. Global environmental security: Research and policy strategies for the 1990s

    Energy Technology Data Exchange (ETDEWEB)

    Lazaro, M.A.; Wang, Hua

    1992-09-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions.

  2. Global environmental security: Research and policy strategies for the 1990s

    Energy Technology Data Exchange (ETDEWEB)

    Lazaro, M.A.; Wang, Hua.

    1992-01-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions.

  3. Redactions in protocols for drug trials: what industry sponsors concealed.

    Science.gov (United States)

    Marquardsen, Mikkel; Ogden, Michelle; Gøtzsche, Peter C

    2018-04-01

    Objective To describe the redactions in contemporary protocols for industry-sponsored randomised drug trials with patient relevant outcomes and to evaluate whether there was a legitimate rationale for the redactions. Design Cohort study. Under the Freedom of Information Act, we requested access to trial protocols approved by a research ethics committee in Denmark from October 2012 to March 2013. We received 17 consecutive protocols, which had been redacted before we got them, and nine protocols without redactions. In five additional cases, the companies refused to let the committees give us access, and in three other cases, documents were missing. Participants Not applicable. Setting Not applicable. Main outcome measure Amount and nature of redactions in 22 predefined key protocol variables. Results The redactions were most widespread in those sections of the protocol where there is empirical evidence of substantial problems with the trustworthiness of published drug trials: data analysis, handling of missing data, detection and analysis of adverse events, definition of the outcomes, interim analyses and premature termination of the study, sponsor's access to incoming data while the study is running, ownership to the data and investigators' publication rights. The parts of the text that were redacted differed widely, both between companies and within the same company. Conclusions We could not identify any legitimate rationale for the redactions. The current mistrust in industry-sponsored drug trials can only change if the industry offers unconditional access to its trial protocols and other relevant documents and data.

  4. Overlapping values, mutual prejudices. Empirical research into the ethos of police officers and private security guards

    NARCIS (Netherlands)

    van Steden, R.; van der Wal, Z.; Lasthuizen, K.M.

    2015-01-01

    What determines professional motivations and values of security operatives: sector or profession? Our article aims to answer this question through a survey study among police officers (n = 405) and private security guards (n = 329) in the Netherlands. Our results show that both groups closely

  5. A Research Study on Secure Attachment Using the Primary Caregiving Approach

    Science.gov (United States)

    Ebbeck, Marjory; Phoon, Dora Mei Yong; Tan-Chong, Elizabeth Chai Kim; Tan, Marilyn Ai Bee; Goh, Mandy Lian Mui

    2015-01-01

    A child's positive sense of well-being is central to their overall growth and development. With an increasing number of mothers in the workforce, many infants and toddlers spend much time in child care services. Hence it is crucial that caregivers provide a secure base for the child to develop secure attachment with educarers. Given multiple…

  6. The research on information security technology for the industrial control system of special equipment

    International Nuclear Information System (INIS)

    Chen Ligang; Liu Hongye; Zhang Wei; Sun Jianying; Lan Peng; Dai Sidan

    2014-01-01

    With the rapid development of information technology in enterprise application, industrial control network and management network is becoming more and more closely linked. Development and application of special equipment control system from the traditional industrial control system, not considered when designing communication security problem mainly, therefore, the industrial control system opened at the same time, isolation control system and the outside was weakened, the safety problems of industrial control system had become more and more serious. The practical application combined with the special equipment control system, analysis and elaboration in view of security problems for the control network, also, provide appropriate security solutions for professional characteristics of industrial control network, design on process control system specially, provide security partition protection scheme, in order to improve security ability of industrial control system information. (authors)

  7. Research on Quantum Authentication Methods for the Secure Access Control Among Three Elements of Cloud Computing

    Science.gov (United States)

    Dong, Yumin; Xiao, Shufen; Ma, Hongyang; Chen, Libo

    2016-12-01

    Cloud computing and big data have become the developing engine of current information technology (IT) as a result of the rapid development of IT. However, security protection has become increasingly important for cloud computing and big data, and has become a problem that must be solved to develop cloud computing. The theft of identity authentication information remains a serious threat to the security of cloud computing. In this process, attackers intrude into cloud computing services through identity authentication information, thereby threatening the security of data from multiple perspectives. Therefore, this study proposes a model for cloud computing protection and management based on quantum authentication, introduces the principle of quantum authentication, and deduces the quantum authentication process. In theory, quantum authentication technology can be applied in cloud computing for security protection. This technology cannot be cloned; thus, it is more secure and reliable than classical methods.

  8. Design and Research of a New secure Authentication Protocol in GSM networks

    Directory of Open Access Journals (Sweden)

    Qi Ai-qin

    2016-01-01

    Full Text Available As the first line of defense in the security application system, Authentication is an important security service. Its typical scheme is challenge/response mechanism and this scheme which is simple-structured and easy to realize has been used worldwide. But these protocols have many following problems In the GSM networks such as the leakage of user indentity privacy, no security protection between home registers and foreign registers and the vicious intruders’ information stealing and so on. This paper presents an authentication protocol in GSM networks based on maths operation and modular square root technique . The analysis of the security and performance has also been done. The results show that it is more robust and secure compared to the previous agreements.

  9. The Saskatchewan River Basin - a large scale observatory for water security research (Invited)

    Science.gov (United States)

    Wheater, H. S.

    2013-12-01

    The 336,000 km2 Saskatchewan River Basin (SaskRB) in Western Canada illustrates many of the issues of Water Security faced world-wide. It poses globally-important science challenges due to the diversity in its hydro-climate and ecological zones. With one of the world's more extreme climates, it embodies environments of global significance, including the Rocky Mountains (source of the major rivers in Western Canada), the Boreal Forest (representing 30% of Canada's land area) and the Prairies (home to 80% of Canada's agriculture). Management concerns include: provision of water resources to more than three million inhabitants, including indigenous communities; balancing competing needs for water between different uses, such as urban centres, industry, agriculture, hydropower and environmental flows; issues of water allocation between upstream and downstream users in the three prairie provinces; managing the risks of flood and droughts; and assessing water quality impacts of discharges from major cities and intensive agricultural production. Superimposed on these issues is the need to understand and manage uncertain water futures, including effects of economic growth and environmental change, in a highly fragmented water governance environment. Key science questions focus on understanding and predicting the effects of land and water management and environmental change on water quantity and quality. To address the science challenges, observational data are necessary across multiple scales. This requires focussed research at intensively monitored sites and small watersheds to improve process understanding and fine-scale models. To understand large-scale effects on river flows and quality, land-atmosphere feedbacks, and regional climate, integrated monitoring, modelling and analysis is needed at large basin scale. And to support water management, new tools are needed for operational management and scenario-based planning that can be implemented across multiple scales and

  10. NATO Advanced Research Wokshop “Recent Trends in Energy Security: With Special Emphasis on Low-Dimensional Functional Materials”

    CERN Document Server

    Matrasulov, Davron; Rakhimov, Khamdam; Low-Dimensional F unctional Materials

    2013-01-01

    Maintaining and improving energy security is one of the biggest challenges worldwide.  The NATO ARW conference in Tashkent, October 2012, was devoted to discussing visions and concepts that are currently discussed in different research fields. Leading scientists have written concise contributions to introduce the reader to this exciting topic.  The present volume summarizes the discussions at the conference.

  11. Mathematics and computational methods development in U.S. department of energy-sponsored research (nuclear energy research initiative and nuclear engineering education research). 4. Development of an Expert System for Generation of an Effective Mesh Distribution for the SN Method

    International Nuclear Information System (INIS)

    Patchimpattapong, Apisit; Haghighat, Alireza

    2001-01-01

    The discrete ordinates (S N ) method is widely used to obtain numerical solutions of the transport equation. The method calls for discretization of spatial, energy, and angular variables. To generate an 'effective' spatial mesh distribution, one has to consider various factors including particle mean free path (mfp), material and source discontinuities, and problem objectives. This becomes more complicated if we consider the effect of numerics such as differencing schemes, parallel processing strategies, and computation resources. As a result, one may often over/under-mesh depending upon limitations on accuracy, computing resources, and time allotted. To overcome the foregoing issues, we are developing an expert system for input preparation of the discrete ordinates (S N ) method. This project is a part of an ongoing project sponsored by Nuclear Engineering Education Research. Our expert system consists of two parts: (a) an algorithm for generation of a mesh distribution for a serial calculation and (b) an algorithm for extension to parallel computing, which accounts for parallelization parameters including granularity, load balancing, parallel algorithms, and possible architectural issues. Thus far, we have developed a stand-alone algorithm for generation of an 'effective' mesh distribution for a serial calculation. The algorithm has been successfully tested with the Parallel Environment Neutral-Particle Transport (PENTRAN) code system. In this paper, we discuss the structure of our algorithm and present its use for simulating the VENUS-3 experimental facility. To date, we have developed and tested part 1 of this system. This part comprises of four steps: creation of a geometric model and coarse meshes, calculation of un-collided flux, selection of differencing schemes, and generation of fine-mesh distribution. For the un-collided flux calculation, we have developed a parallel code called PENFC. It is capable of calculating un-collided and first-collision fluxes

  12. The Complex Dynamics of Sponsored Search Markets

    Science.gov (United States)

    Robu, Valentin; La Poutré, Han; Bohte, Sander

    This paper provides a comprehensive study of the structure and dynamics of online advertising markets, mostly based on techniques from the emergent discipline of complex systems analysis. First, we look at how the display rank of a URL link influences its click frequency, for both sponsored search and organic search. Second, we study the market structure that emerges from these queries, especially the market share distribution of different advertisers. We show that the sponsored search market is highly concentrated, with less than 5% of all advertisers receiving over 2/3 of the clicks in the market. Furthermore, we show that both the number of ad impressions and the number of clicks follow power law distributions of approximately the same coefficient. However, we find this result does not hold when studying the same distribution of clicks per rank position, which shows considerable variance, most likely due to the way advertisers divide their budget on different keywords. Finally, we turn our attention to how such sponsored search data could be used to provide decision support tools for bidding for combinations of keywords. We provide a method to visualize keywords of interest in graphical form, as well as a method to partition these graphs to obtain desirable subsets of search terms.

  13. 78 FR 6807 - Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait...

    Science.gov (United States)

    2013-01-31

    ... coordinating and sponsoring an executive-led Critical Infrastructure Protection and Cyber Security mission to... on the cyber security, critical infrastructure protection, and emergency management, ports of entry... security, including border protection, civil defense capabilities, and coast guard and maritime...

  14. 78 FR 10211 - Agency Information Collection Activities; Submission for OMB Review; Comment Request; Securities...

    Science.gov (United States)

    2013-02-13

    ... for OMB Review; Comment Request; Securities Lending by Employee Benefit Plans ACTION: Notice. SUMMARY: The Department of Labor (DOL) is submitting the Employee Benefits Security Administration (EBSA) sponsored information collection request (ICR) titled, ``Securities Lending by Employee Benefit Plans,'' to...

  15. The Influence of Sponsor-Event Congruence in Sponsorship of Music Festivals

    Directory of Open Access Journals (Sweden)

    Penny Hutabarat

    2014-04-01

    Full Text Available This paper focuses the research on the Influence of Sponsor-Event Congruence toward Brand Image, Attitudes toward the Brand and Purchase Intention. Having reviewed the literatures and arranged the hypotheses, the data has been gathered by distributing the questionnaire to 155 audiences at the Java Jazz Music Festival, firstly with convenience sampling and then snowballing sampling approach. The analysis of data was executed with Structural Equation Modeling (SEM. The result shows the sponsor-event congruence variable has a positive impact toward brand image and attitudes toward the brand sponsor. Brand Image also has a positive impact toward purchase intention; in contrary attitudes toward the brand do not have a positive purchase intention. With those results, to increase the sponsorship effectiveness, the role of congruency is very significant in the sponsorship event. Congruency is a key influencer to trigger the sponsorship effectiveness. Congruency between the event and the sponsor is able to boost up the brand image and bring out favorable attitudes towards the brand for the success of marketing communication programs, particularly sponsorship. In addition to it, image transfer gets higher due to the congruency existence (fit between sponsor and event and directs the intention creation to buy sponsor brand product/service (purchase intention. In conclusion, sponsor-event congruence has effect on consumer responds toward sponsorship, either on the cognitive level, affective and also behavior.

  16. The Influence of Sponsor-Event Congruence in Sponsorship of Music Festivals

    Directory of Open Access Journals (Sweden)

    Penny Hutabarat

    2014-05-01

    Full Text Available Normal 0 false false false IN X-NONE X-NONE This paper focuses the research on the Influence of Sponsor-Event Congruence toward Brand Image, Attitudes toward the Brand and Purchase Intention. Having reviewed the literatures and arranged the hypotheses, the data has been gathered by distributing the questionnaire to 155 audiences at the Java Jazz Music Festival, firstly with convenience sampling and then snowballing sampling approach. The analysis of data was executed with Structural Equation Modeling (SEM. The result shows the sponsor-event congruence variable has a positive impact toward brand image and attitudes toward the brand sponsor. Brand Image also has a positive impact toward purchase intention; in contrary attitudes toward the brand do not have a positive purchase intention. With those results, to increase the sponsorship effectiveness, the role of congruency is very significant in the sponsorship event. Congruency is a key influencer to trigger the sponsorship effectiveness. Congruency between the event and the sponsor is able to boost up the brand image and bring out favorable attitudes towards the brand for the success of marketing communication programs, particularly sponsorship. In addition to it, image transfer gets higher due to the congruency existence (fit between sponsor and event and directs the intention creation to buy sponsor brand product/service (purchase intention. In conclusion, sponsor-event congruence has effect on consumer responds toward sponsorship, either on the cognitive level, affective and also behavior.

  17. Industry sponsorship and research outcome

    DEFF Research Database (Denmark)

    Lundh, Andreas; Sismondo, Sergio; Lexchin, Joel

    2012-01-01

    Clinical research affecting how doctors practice medicine is increasingly sponsored by companies that make drugs and medical devices. Previous systematic reviews have found that pharmaceutical industry sponsored studies are more often favorable to the sponsor's product compared with studies...

  18. Computer Security for Commercial Nuclear Power Plants - Literature Review for Korea Hydro Nuclear Power Central Research Institute

    Energy Technology Data Exchange (ETDEWEB)

    Duran, Felicia Angelica [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Security Systems Analysis Dept.; Waymire, Russell L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Security Systems Analysis Dept.

    2013-10-01

    Sandia National Laboratories (SNL) is providing training and consultation activities on security planning and design for the Korea Hydro and Nuclear Power Central Research Institute (KHNPCRI). As part of this effort, SNL performed a literature review on computer security requirements, guidance and best practices that are applicable to an advanced nuclear power plant. This report documents the review of reports generated by SNL and other organizations [U.S. Nuclear Regulatory Commission, Nuclear Energy Institute, and International Atomic Energy Agency] related to protection of information technology resources, primarily digital controls and computer resources and their data networks. Copies of the key documents have also been provided to KHNP-CRI.

  19. Current state in the research on electronic monitoring systems for the security and flow of objects and individuals

    Directory of Open Access Journals (Sweden)

    Man Dietrich Marcela

    2017-01-01

    Full Text Available This paper sets forth the current state of security systems in prisons from Romania and around the world, particularly aiming electronic systems of monitoring the flow of people, materials control and perimeter security, focusing on the research results concluded by motion detection tests and devices. The currently used systems were observed in order to put an analysis of the methodology together and implement and perfect these systems in protected areas. The protection of citizens must be performed to the extent that is allowed by the legislation.

  20. Computer Security for Commercial Nuclear Power Plants - Literature Review for Korea Hydro Nuclear Power Central Research Institute

    International Nuclear Information System (INIS)

    Duran, Felicia Angelica; Waymire, Russell L.

    2013-01-01

    Sandia National Laboratories (SNL) is providing training and consultation activities on security planning and design for the Korea Hydro and Nuclear Power Central Research Institute (KHNPCRI). As part of this effort, SNL performed a literature review on computer security requirements, guidance and best practices that are applicable to an advanced nuclear power plant. This report documents the review of reports generated by SNL and other organizations [U.S. Nuclear Regulatory Commission, Nuclear Energy Institute, and International Atomic Energy Agency] related to protection of information technology resources, primarily digital controls and computer resources and their data networks. Copies of the key documents have also been provided to KHNP-CRI.

  1. Outsourcing ethical obligations: should the revised common rule address the responsibilities of investigators and sponsors?

    Science.gov (United States)

    Shah, Seema K

    2013-01-01

    The Common Rule creates a division of moral labor in research. It implies that investigators and sponsors can outsource their ethical obligations to IRBs and participants, thereby fostering a culture of compliance, rather than one of responsibility. The proposed revisions to the Common Rule are likely to exacerbate this problem. To harness the expressive power of the law, I propose the Common Rule be revised to include the ethical responsibilities of investigators and sponsors. © 2013 American Society of Law, Medicine & Ethics, Inc.

  2. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    Directory of Open Access Journals (Sweden)

    Feng Tao

    2017-01-01

    Full Text Available Tor (The Second Onion Router is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was used to prevent the behaviors of attackers from inserting controlled nodes and conspiring to make DDos attacks. The integrated security of Tor system was enhanced in our scheme. In addition we have proved the scheme.

  3. Factors affecting choice of sponsoring institution for residency among medical students in Singapore.

    Science.gov (United States)

    Ng, Chew Lip; Liu, Xuan Dao; Murali Govind, Renuka; Tan, Jonathan Wei Jian; Ooi, Shirley Beng Suat; Archuleta, Sophia

    2018-03-16

    Postgraduate medical education in Singapore underwent major transition recently, from a British-style system and accreditation to a competency-based residency programme modelled after the American system. We aimed to identify the relative importance of factors influencing the choice of residency sponsoring institutions (SIs) among medical students during this transition period. A questionnaire-based cross-sectional study of Singaporean undergraduate medical students across all years of study was performed in 2011. Participants rated 45 factors (including research, academia and education, marketing, reputation of faculty, working conditions, posting experience and influence by peers/seniors) for degree of importance to their choice of SIs on a five-point Likert scale. Differences with respect to gender and seniority were compared. 705 of 1,274 students completed the survey (response rate 55.3%). The top five influencing factors were guidance by mentor (4.48 ± 0.74), reputation for good teaching (4.46 ± 0.76), personal overall experience in SIs (4.41 ± 0.88), quality of mentorship and supervision (4.41 ± 0.75), and quality and quantity of teaching (4.37 ± 0.78). The five lowest-rated factors were social networking (2.91 ± 1.00), SI security (3.01 ± 1.07), open house impact (3.15 ± 0.96), advertising paraphernalia (3.17 ± 0.95) and research publications (3.21 ± 1.00). Female students attributed more importance to security and positive work environment. Preclinical students rated research and marketing aspects more highly while clinical students valued positive work environment more. Quality of education, mentorship, experiences during clerkship and positive working environment were the most important factors influencing the choice of SIs.

  4. Towards Food Security and Livelihoods of Low-income Women in central Uganda: Policy Implications based on action research

    DEFF Research Database (Denmark)

    Nambuanyi, Lekunze Ransom; Midtvåge, Runa; Hiranandani, Vanmala Sunder

    2015-01-01

    Uganda is burdened with rising poverty, malnutrition and food insecurity. While most Ugandans depend on agriculture for their livelihoods, it is important to recognize that access to and control over resources by women and climate factors are central to the question of food security in Uganda....... However, a review of the literature demonstrates that policy options have poorly understood these interlinkages or tended to undermine them, especially the extent that these policies and programs put the necessary attention on the role of women farmers in food security. This paper presents part of a work...... in progress of a research project that seeks to investigate the interrelated effects of agricultural practices, access to and control over resources, as well as climate change on women’s food security in the urban and peri-urban areas of central Uganda. The paper not only considers how to turn...

  5. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    OpenAIRE

    Feng Tao; Zhao Ming-Tao

    2017-01-01

    Tor (The Second Onion Router) is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was use...

  6. E-commerce System Security Assessment based on Bayesian Network Algorithm Research

    OpenAIRE

    Ting Li; Xin Li

    2013-01-01

    Evaluation of e-commerce network security is based on assessment method Bayesian networks, and it first defines the vulnerability status of e-commerce system evaluation index and the vulnerability of the state model of e-commerce systems, and after the principle of the Bayesian network reliability of e-commerce system and the criticality of the vulnerabilities were analyzed, experiments show that the change method is a good evaluation of the security of e-commerce systems.

  7. Testbed diversity as a fundamental principle for effective ICS security research

    OpenAIRE

    Green, Benjamin; Frey, Sylvain Andre Francis; Rashid, Awais; Hutchison, David

    2016-01-01

    The implementation of diversity in testbeds is essential to understanding and improving the security and resilience of Industrial Control Systems (ICS). Employing a wide spec- trum of equipment, diverse networks, and business processes, as deployed in real-life infrastructures, is particularly diffi- cult in experimental conditions. However, this level of di- versity is key from a security perspective, as attackers can exploit system particularities and process intricacies to their advantage....

  8. Virtualization of open-source secure web services to support data exchange in a pediatric critical care research network.

    Science.gov (United States)

    Frey, Lewis J; Sward, Katherine A; Newth, Christopher J L; Khemani, Robinder G; Cryer, Martin E; Thelen, Julie L; Enriquez, Rene; Shaoyu, Su; Pollack, Murray M; Harrison, Rick E; Meert, Kathleen L; Berg, Robert A; Wessel, David L; Shanley, Thomas P; Dalton, Heidi; Carcillo, Joseph; Jenkins, Tammara L; Dean, J Michael

    2015-11-01

    To examine the feasibility of deploying a virtual web service for sharing data within a research network, and to evaluate the impact on data consistency and quality. Virtual machines (VMs) encapsulated an open-source, semantically and syntactically interoperable secure web service infrastructure along with a shadow database. The VMs were deployed to 8 Collaborative Pediatric Critical Care Research Network Clinical Centers. Virtual web services could be deployed in hours. The interoperability of the web services reduced format misalignment from 56% to 1% and demonstrated that 99% of the data consistently transferred using the data dictionary and 1% needed human curation. Use of virtualized open-source secure web service technology could enable direct electronic abstraction of data from hospital databases for research purposes. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  9. 48 CFR 35.017-1 - Sponsoring agreements.

    Science.gov (United States)

    2010-10-01

    ... of the FFRDC's relationship with its sponsor(s). (3) A provision for the identification of retained earnings (reserves) and the development of a plan for their use and disposition. (4) A prohibition against...

  10. 14 CFR 151.121 - Procedures: Offer; sponsor assurances.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Procedures: Offer; sponsor assurances. 151.121 Section 151.121 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF... Engineering Proposals § 151.121 Procedures: Offer; sponsor assurances. Each sponsor must adopt the following...

  11. 45 CFR 233.51 - Eligibility of sponsored aliens.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false Eligibility of sponsored aliens. 233.51 Section... CONDITIONS OF ELIGIBILITY IN FINANCIAL ASSISTANCE PROGRAMS § 233.51 Eligibility of sponsored aliens... affidavit(s) of support or similar agreement on behalf of an alien (who is not the child of the sponsor or...

  12. Modelling Emotional and Attitudinal Evaluations of Major Sponsors

    DEFF Research Database (Denmark)

    Martensen, Anne; Hansen, Flemming

    2004-01-01

    The paper reports findings from a larger study of sponsors and their relationship to sponsoredparties. In the present reporting, the focus is on sponsors. Rather than evaluating suchsponsorships in traditional effect hierarchical terms, a conceptual Sponsor Value Model isspecified as a structural...

  13. Safeguards and Security progress report, January--December 1989

    Energy Technology Data Exchange (ETDEWEB)

    Smith, D.B.; Jaramillo, G.R. (comps.)

    1990-11-01

    From January to December 1989, the Los Alamos Safeguards and Security Research and Development (R D) program carried out the activities described in the first four parts of this report: Science and Technology Base Development, Basic Systems Design, Onsite Test and Evaluation and Facility Support, and International Safeguards. For the most part, these activities were sponsored by the Department of Energy's Office of Safeguards and Security. Part 1 covers development of the basic technology essential to continuing improvements in the practice of safeguards and security. It includes our computer security R D and the activities of the DOE Center for Computer Security, which provides the basis for encouraging and disseminating this important technology. Part 2 treats activities aimed at developing methods for designing and evaluating safeguards systems, with special emphasis on the integration of the several subsystems into a real safeguards system. Part 3 describes efforts of direct assistance to the DOE and its contractors and includes consultation on materials control and accounting problems, development and demonstration of specialized techniques and instruments, and comprehensive participation in the design and demonstration of advanced safeguards systems. Part 3 also reports a series of training courses in various aspects of safeguards that makes the technology more accessible to those who must apply it. Finally, Part 4 covers international safeguards activities, including both support to the International Atomic Energy Agency and bilateral exchanges. Part 5 reports several safeguards-related activities that have sponsors other than the DOE/OSS. 87 refs., 52 figs.

  14. [Research and implementation of the TLS network transport security technology based on DICOM standard].

    Science.gov (United States)

    Lu, Xiaoqi; Wang, Lei; Zhao, Jianfeng

    2012-02-01

    With the development of medical information, Picture Archiving and Communications System (PACS), Hospital Information System/Radiology Information System(HIS/RIS) and other medical information management system become popular and developed, and interoperability between these systems becomes more frequent. So, these enclosed systems will be open and regionalized by means of network, and this is inevitable. If the trend becomes true, the security of information transmission may be the first problem to be solved. Based on the need for network security, we investigated the Digital Imaging and Communications in Medicine (DICOM) Standard and Transport Layer Security (TLS) Protocol, and implemented the TLS transmission of the DICOM medical information with OpenSSL toolkit and DCMTK toolkit.

  15. Research on the information security system in electrical gis system in mobile application

    Science.gov (United States)

    Zhou, Chao; Feng, Renjun; Jiang, Haitao; Huang, Wei; Zhu, Daohua

    2017-05-01

    With the rapid development of social informatization process, the demands of government, enterprise, and individuals for spatial information becomes larger. In addition, the combination of wireless network technology and spatial information technology promotes the generation and development of mobile technologies. In today’s rapidly developed information technology field, network technology and mobile communication have become the two pillar industries by leaps and bounds. They almost absorbed and adopted all the latest information, communication, computer, electronics and so on new technologies. Concomitantly, the network coverage is more and more big, the transmission rate is faster and faster, the volume of user’s terminal is smaller and smaller. What’s more, from LAN to WAN, from wired network to wireless network, from wired access to mobile wireless access, people’s demand for communication technology is increasingly higher. As a result, mobile communication technology is facing unprecedented challenges as well as unprecedented opportunities. When combined with the existing mobile communication network, it led to the development of leaps and bounds. However, due to the inherent dependence of the system on the existing computer communication network, information security problems cannot be ignored. Today’s information security has penetrated into all aspects of life. Information system is a complex computer system, and it’s physical, operational and management vulnerabilities constitute the security vulnerability of the system. Firstly, this paper analyzes the composition of mobile enterprise network and information security threat. Secondly, this paper puts forward the security planning and measures, and constructs the information security structure.

  16. Proceedings of the seventh international food convention: nutritional security through sustainable development research and education for healthy foods - souvenir

    International Nuclear Information System (INIS)

    2013-12-01

    At present, the application of advanced technology during production, processing, storage and distribution of food with an ultimate aim of strengthening the socio-economic status of farmers, entrepreneurs and rural artisan community has paramount importance. The convention made an effort to touch upon the following areas: food and nutritional security and sustainability, food processing and engineering, food safety management systems, food health and nutrition, skill development and entrepreneurship, food science and technology research etc. Papers relevant to INIS are indexed separately

  17. [Analysis of projects of schistosomiasis sponsored by National Science Foundation of China].

    Science.gov (United States)

    Wen-di, Zhou; Liang, Shi; Xue-Dan, Ke; Jie, Wang

    2017-07-27

    To summarize the present development by analysis of projects in schistosomiasis funded by National Science Foundation of China (NSFC). Based on the ISIS database of NFSC, the projects in the studies of schistosomiasis from 2005 to 2016 were analyzed. The distributions of sponsored numbers, amounts, types, agencies, disciplines and changes in research topics by means of network profiles were described. During the study period, 198 projects were funded by NSFC totally with 76.05 million yuan in which the general and youth projects were main types. The main sponsored agencies were research institutes and medical colleges. The top three fields sponsored were medical pathogenic microbes and infection, veterinary and medical immunology. The funding on schistosomiasis researches has a downward trend, but studies are continuing in depth. In this situation, innovative and interdisciplinary researches need to be encouraged to promote the development of schistosomiasis.

  18. The National Criticality Experiments Research Center at the Device Assembly Facility, Nevada National Security Site: Status and Capabilities, Summary Report

    International Nuclear Information System (INIS)

    Bragg-Sitton, S.; Bess, J.; Werner, J.

    2011-01-01

    The National Criticality Experiments Research Center (NCERC) was officially opened on August 29, 2011. Located within the Device Assembly Facility (DAF) at the Nevada National Security Site (NNSS), the NCERC has become a consolidation facility within the United States for critical configuration testing, particularly those involving highly enriched uranium (HEU). The DAF is a Department of Energy (DOE) owned facility that is operated by the National Nuclear Security Agency/Nevada Site Office (NNSA/NSO). User laboratories include the Lawrence Livermore National Laboratory (LLNL) and Los Alamos National Laboratory (LANL). Personnel bring their home lab qualifications and procedures with them to the DAF, such that non-site specific training need not be repeated to conduct work at DAF. The NNSS Management and Operating contractor is National Security Technologies, LLC (NSTec) and the NNSS Safeguards and Security contractor is Wackenhut Services. The complete report provides an overview and status of the available laboratories and test bays at NCERC, available test materials and test support configurations, and test requirements and limitations for performing sub-critical and critical tests. The current summary provides a brief summary of the facility status and the method by which experiments may be introduced to NCERC.

  19. Safeguards and security research and development: Progress report, October 1994--September 1995

    Energy Technology Data Exchange (ETDEWEB)

    Rutherford, D.R.; Henriksen, P.W. [comp.

    1997-03-01

    The primary goal of the Los Alamos Safeguards and Security Technology Development Program, International Safeguards, and other Safeguards and Security Programs is to continue to be the center of excellence in the field of Safeguards and Security. This annual report for 1995 describes those scientific and engineering projects that contribute to all of the aforementioned programs. The authors have presented the information in a different format from previous annual reports. Part I is devoted to Nuclear Material Measurement Systems. Part II contains projects that are specific to Integrated Safeguards Systems. Part III highlights Safeguards Systems Effectiveness Evaluations and Part IV is a compilation of highlights from Information Assurance projects. Finally Part V highlights work on the projects at Los Alamos for International Safeguards. The final part of this annual report lists titles and abstracts of Los Alamos Safeguards and Security Technology Development reports, technical journal articles, and conference papers that were presented and published in 1995. This is the last annual report in this format. The authors wish to thank all of the individuals who have contributed to this annual report and made it so successful over the years.

  20. Safeguards and security research and development: Progress report, October 1994--September 1995

    International Nuclear Information System (INIS)

    Rutherford, D.R.; Henriksen, P.W.

    1997-03-01

    The primary goal of the Los Alamos Safeguards and Security Technology Development Program, International Safeguards, and other Safeguards and Security Programs is to continue to be the center of excellence in the field of Safeguards and Security. This annual report for 1995 describes those scientific and engineering projects that contribute to all of the aforementioned programs. The authors have presented the information in a different format from previous annual reports. Part I is devoted to Nuclear Material Measurement Systems. Part II contains projects that are specific to Integrated Safeguards Systems. Part III highlights Safeguards Systems Effectiveness Evaluations and Part IV is a compilation of highlights from Information Assurance projects. Finally Part V highlights work on the projects at Los Alamos for International Safeguards. The final part of this annual report lists titles and abstracts of Los Alamos Safeguards and Security Technology Development reports, technical journal articles, and conference papers that were presented and published in 1995. This is the last annual report in this format. The authors wish to thank all of the individuals who have contributed to this annual report and made it so successful over the years

  1. Enhancing Research in Networking & System Security, and Forensics, in Puerto Rico

    Science.gov (United States)

    2015-03-03

    Conference 2014 – Seattle, WA – Travel Scholarship awarded by Google. Celedonio was able to meet Mr. Tony Baylis, a recruiter from the Lawrence...Microsoft, Encase, Avaya, McAfee, Cisco , Department of Homeland Security, Department of Defense, ISACA among others. International Conferences in

  2. From food production to food security: developing interdisciplinary, regional-level research

    NARCIS (Netherlands)

    Ingram, J.S.I.

    2011-01-01

    Food security is a condition whereby “all people, at all times, have physical and economic access to sufficient, safe, and nutritious food to meet their dietary needs and food preferences for an active and healthy life” (FAO World Food Summit, 1996). Globally, food production has kept

  3. Beware: this is sponsored! How disclosures of sponsored content affect persuasion knowledge and brand responses

    NARCIS (Netherlands)

    Boerman, S.; van Reijmersdal, E.; Neijens, P.

    2012-01-01

    This study examined how disclosure of sponsored content influences persuasion knowledge and brand responses (i.e., brand memory and brand attitude). Moreover, we tested whether extending disclosure duration increases its effect. We conducted an experiment (N = 116) in which we compared the effects

  4. A Systematic Review of Research Studies Examining Telehealth Privacy and Security Practices Used By Healthcare Providers

    Directory of Open Access Journals (Sweden)

    Valerie J.M. Watzlaf

    2017-11-01

    Full Text Available The objective of this systematic review was to systematically review papers in the United States that examine current practices in privacy and security when telehealth technologies are used by healthcare providers. A literature search was conducted using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses Protocols (PRISMA-P. PubMed, CINAHL and INSPEC from 2003 – 2016 were searched and returned 25,404 papers (after duplications were removed. Inclusion and exclusion criteria were strictly followed to examine title, abstract, and full text for 21 published papers which reported on privacy and security practices used by healthcare providers using telehealth.  Data on confidentiality, integrity, privacy, informed consent, access control, availability, retention, encryption, and authentication were all searched and retrieved from the papers examined. Papers were selected by two independent reviewers, first per inclusion/exclusion criteria and, where there was disagreement, a third reviewer was consulted. The percentage of agreement and Cohen’s kappa was 99.04% and 0.7331 respectively. The papers reviewed ranged from 2004 to 2016 and included several types of telehealth specialties. Sixty-seven percent were policy type studies, and 14 percent were survey/interview studies. There were no randomized controlled trials. Based upon the results, we conclude that it is necessary to have more studies with specific information about the use of privacy and security practices when using telehealth technologies as well as studies that examine patient and provider preferences on how data is kept private and secure during and after telehealth sessions. Keywords: Computer security, Health personnel, Privacy, Systematic review, Telehealth

  5. KOSOVO FORCE (KFOR ORGANIZATION IMAGE: EMPIRICAL RESEARCH ON KOSOVO SECURITY FORCES (KSF

    Directory of Open Access Journals (Sweden)

    Korhan ARUN

    2014-10-01

    Full Text Available ABSTRACT: Comprehensive efforts to rebuild a society’s security and peace-enforcing have become an increasingly frequent activity of the NATO as KFOR (Kosovo Force, which is formed of many countries that its image results from these countries collateral relations. KFOR’s image has come to the fore because it affects the mission success and decisions about its existence in Kosovo. The image has two components, functional and emotional: Military symbols and uniforms of NATO (KFOR are functional and emotional relations of countries with Kosovo Security Forces (KSF members are emotional part. In this research; the main objective is finding out the effects that shape KFOR image. Sublevel objectives are the effects of Kosovo’s “connections”, KSF “personal links” and “perceived mission success” with KFOR member states in KFOR image. To study these effect 3 hypothesis are formed and empirical research is done with KSF members to get a foundation of emotional relationship which affects country image. Evaluating of questionnaires with linear regression, correlation and factor analysis, besides the important effects of ethnocentrism and patriotism, military personnel relations formed by countries military involvement and activities found as predictor factors in KFOR image. As a matter of course these base components of emotions about the image will enlighten future literature about building an organizational image. Keywords: Organizational Image, Country Image, Image, KFOR (Kosovo Force. ÖZ: Birçok ülkenin katkılarıyla oluşan ve imajı da bu ülkelerin tamamlayıcı ilişkileri sonucu ortaya çıkan NATO’nun uluslararası topluma yansıyan yüzü olarak Kosova Gücü (KFOR için toplumun güvenliğini yeniden tesis etmek ve barışı zorlama faaliyetleri gittikçe daha geniş kapsamlı bir çaba haline gelmektedir. KFOR’un imajının öne çıkmasının nedeni görevin başarılmasında ve Kosova’daki varlığıyla ilgili

  6. Anticipatory Cyber Security Research: An Ultimate Technique for the First-Move Advantage

    Directory of Open Access Journals (Sweden)

    Bharat S.Rawal

    2016-02-01

    Full Text Available Across all industry segments, 96 percent of systems could be breached on average. In the game of cyber security, every moment a new player (attacker is entering the game with new skill sets. An attacker only needs to be effective once while defenders of cyberspace have to be successful all of the time. There will be a first-mover advantage in such a chasing game, which means that the first move often wins. In this paper, in order to face the security challenges brought in by attacker’s first move advantage, we analyzed the past ten years of cyber-attacks, studied the immediate attack’s pattern and offer the tools to predict the next move of the cyber attacker.

  7. Golf Tourism: A Research Profile and Security Perceptions in Belek, Antalya, Turkey.

    Directory of Open Access Journals (Sweden)

    Akın Aksu

    2017-01-01

    Full Text Available Our study aim to determine the current profile of sampled golf tourists visiting Belek, Antalya in high season and their perceptions of security using questionnaires to survey golf tourists in the sample were evaluated separately. The sample consisted of a survey profile of 280 golf tourists and their responses regarding security perceptions for Belek, Antalya. Chi-square testing and descriptive statistics were used to analyze the data. Despite some negative developments in Turkey (such as terrorist attacks, the majority of golf tourists still remain satisfied and motivated to recommend the destination to others. The results of the study would be of help for tourism professionals, academicians and decision makers especially in developing future marketing strategies for Belek.

  8. Maritime Defense and Security Research Program: Final Report, 2004-2011

    Science.gov (United States)

    2011-11-01

    Security: airports, military bases, heads of state, Super Bowl Critical Project Management Most recently, CID completed an analysis of the Hawaiian...to link the results, i.e. discovered keywords, back to the original documents for validation. Also the big picture needs to be updated and enhanced...and Network Layers using OPNET,‖ Proc. TTCP TP-9 ASW Systems & Technologies Panel Annual Meeting, Dartmouth, Nova Scotia, Canada, September 21-25

  9. Environmental Assessment for the Air Force Research Laboratory Security Fence Project, Edwards Air Force Base, California

    Science.gov (United States)

    2012-11-26

    Pleistocene/Early-Holocene Prehistory (12,000 to 7,000 BP). The Lake Mojave Period in the southwestern Great Basin comprises a regional manifestation...adaptive patterns with focal exploitation of such habitats (Tetra Tech 2010). Middle-Holocene Prehistory (8,000 to 4,000 BP). Succeeding Lake Mojave in the...Security Fence at Edwards Air Force Base, California Late Holocene Prehistory (4,000 to Contact). With return to more “favorable” environmental

  10. Security of embedded automotive networks: state of the art and a research proposal

    OpenAIRE

    Studnia , Ivan; Nicomette , Vincent; Alata , Eric; Deswarte , Yves; Kaâniche , Mohamed; Laarouchi , Youssef

    2013-01-01

    International audience; Embedded electronic components are nowadays a prominent part of a car's architecture. Moreover, modern cars are now able to communicate with other devices through many wired or wireless interfaces. As a consequence, the security of embedded systems in cars has become a main concern for the manufacturers. This paper aims at 1) presenting a short overview of the current attacks already known and experimented against vehicles as well as the current state of the art of the...

  11. Information Security Monitoring Process Research in Russian Federation Banking System Organization

    Directory of Open Access Journals (Sweden)

    Anton Sergeevich Zaytsev

    2013-09-01

    Full Text Available In this article the author considers documents and scientific articles that should be used to configure monitoring and information security incident management process in an organization of banking system of Russia. Also key principles of monitoring configuration were marked up and a technique of monitoring configuration was proposed. Principles of monitoring system configuration were defined and a set of documents used to legitimate monitoring and information incident management process was considered.

  12. Privacy and security in the era of digital health: what should translational researchers know and do about it?

    Science.gov (United States)

    Filkins, Barbara L; Kim, Ju Young; Roberts, Bruce; Armstrong, Winston; Miller, Mark A; Hultner, Michael L; Castillo, Anthony P; Ducom, Jean-Christophe; Topol, Eric J; Steinhubl, Steven R

    2016-01-01

    The rapid growth in the availability and incorporation of digital technologies in almost every aspect of our lives creates extraordinary opportunities but brings with it unique challenges. This is especially true for the translational researcher, whose work has been markedly enhanced through the capabilities of big data aggregation and analytics, wireless sensors, online study enrollment, mobile engagement, and much more. At the same time each of these tools brings distinctive security and privacy issues that most translational researchers are inadequately prepared to deal with despite accepting overall responsibility for them. For the researcher, the solution for addressing these challenges is both simple and complex. Cyber-situational awareness is no longer a luxury-it is fundamental in combating both the elite and highly organized adversaries on the Internet as well as taking proactive steps to avoid a careless turn down the wrong digital dark alley. The researcher, now responsible for elements that may/may not be beyond his or her direct control, needs an additional level of cyber literacy to understand the responsibilities imposed on them as data owner. Responsibility lies with knowing what you can do about the things you can control and those you can't. The objective of this paper is to describe the data privacy and security concerns that translational researchers need to be aware of, and discuss the tools and techniques available to them to help minimize that risk.

  13. Privacy and security in the era of digital health: what should translational researchers know and do about it?

    Science.gov (United States)

    Filkins, Barbara L; Kim, Ju Young; Roberts, Bruce; Armstrong, Winston; Miller, Mark A; Hultner, Michael L; Castillo, Anthony P; Ducom, Jean-Christophe; Topol, Eric J; Steinhubl, Steven R

    2016-01-01

    The rapid growth in the availability and incorporation of digital technologies in almost every aspect of our lives creates extraordinary opportunities but brings with it unique challenges. This is especially true for the translational researcher, whose work has been markedly enhanced through the capabilities of big data aggregation and analytics, wireless sensors, online study enrollment, mobile engagement, and much more. At the same time each of these tools brings distinctive security and privacy issues that most translational researchers are inadequately prepared to deal with despite accepting overall responsibility for them. For the researcher, the solution for addressing these challenges is both simple and complex. Cyber-situational awareness is no longer a luxury-it is fundamental in combating both the elite and highly organized adversaries on the Internet as well as taking proactive steps to avoid a careless turn down the wrong digital dark alley. The researcher, now responsible for elements that may/may not be beyond his or her direct control, needs an additional level of cyber literacy to understand the responsibilities imposed on them as data owner. Responsibility lies with knowing what you can do about the things you can control and those you can’t. The objective of this paper is to describe the data privacy and security concerns that translational researchers need to be aware of, and discuss the tools and techniques available to them to help minimize that risk. PMID:27186282

  14. Differential Globalization of Industry- and Non-Industry-Sponsored Clinical Trials.

    Science.gov (United States)

    Atal, Ignacio; Trinquart, Ludovic; Porcher, Raphaël; Ravaud, Philippe

    2015-01-01

    Mapping the international landscape of clinical trials may inform global health research governance, but no large-scale data are available. Industry or non-industry sponsorship may have a major influence in this mapping. We aimed to map the global landscape of industry- and non-industry-sponsored clinical trials and its evolution over time. We analyzed clinical trials initiated between 2006 and 2013 and registered in the WHO International Clinical Trials Registry Platform (ICTRP). We mapped single-country and international trials by World Bank's income groups and by sponsorship (industry- vs. non- industry), including its evolution over time from 2006 to 2012. We identified clusters of countries that collaborated significantly more than expected in industry- and non-industry-sponsored international trials. 119,679 clinical trials conducted in 177 countries were analysed. The median number of trials per million inhabitants in high-income countries was 100 times that in low-income countries (116.0 vs. 1.1). Industry sponsors were involved in three times more trials per million inhabitants than non-industry sponsors in high-income countries (75.0 vs. 24.5) and in ten times fewer trials in low- income countries (0.08 vs. 1.08). Among industry- and non-industry-sponsored trials, 30.3% and 3.2% were international, respectively. In the industry-sponsored network of collaboration, Eastern European and South American countries collaborated more than expected; in the non-industry-sponsored network, collaboration among Scandinavian countries was overrepresented. Industry-sponsored international trials became more inter-continental with time between 2006 and 2012 (from 54.8% to 67.3%) as compared with non-industry-sponsored trials (from 42.4% to 37.2%). Based on trials registered in the WHO ICTRP we documented a substantial gap between the globalization of industry- and non-industry-sponsored clinical research. Only 3% of academic trials but 30% of industry trials are

  15. Differential Globalization of Industry- and Non-Industry–Sponsored Clinical Trials

    Science.gov (United States)

    Atal, Ignacio; Trinquart, Ludovic; Porcher, Raphaël; Ravaud, Philippe

    2015-01-01

    Background Mapping the international landscape of clinical trials may inform global health research governance, but no large-scale data are available. Industry or non-industry sponsorship may have a major influence in this mapping. We aimed to map the global landscape of industry- and non-industry–sponsored clinical trials and its evolution over time. Methods We analyzed clinical trials initiated between 2006 and 2013 and registered in the WHO International Clinical Trials Registry Platform (ICTRP). We mapped single-country and international trials by World Bank's income groups and by sponsorship (industry- vs. non- industry), including its evolution over time from 2006 to 2012. We identified clusters of countries that collaborated significantly more than expected in industry- and non-industry–sponsored international trials. Results 119,679 clinical trials conducted in 177 countries were analysed. The median number of trials per million inhabitants in high-income countries was 100 times that in low-income countries (116.0 vs. 1.1). Industry sponsors were involved in three times more trials per million inhabitants than non-industry sponsors in high-income countries (75.0 vs. 24.5) and in ten times fewer trials in low- income countries (0.08 vs. 1.08). Among industry- and non-industry–sponsored trials, 30.3% and 3.2% were international, respectively. In the industry-sponsored network of collaboration, Eastern European and South American countries collaborated more than expected; in the non-industry–sponsored network, collaboration among Scandinavian countries was overrepresented. Industry-sponsored international trials became more inter-continental with time between 2006 and 2012 (from 54.8% to 67.3%) as compared with non-industry–sponsored trials (from 42.4% to 37.2%). Conclusions Based on trials registered in the WHO ICTRP we documented a substantial gap between the globalization of industry- and non-industry–sponsored clinical research. Only 3% of

  16. RESEARCH OF OPEN SYSTEMS INTERCONNECTION MODEL IN TERMS OF INFORMATION SECURITY

    OpenAIRE

    Корнієнко, Б.; Національний авіаційний університет

    2013-01-01

    In this article the OSI model in terms of information security classification of vulnerabilities and security measures at the level of model OSI. In order to build a comprehensive information security systems for information and communication systems and networks offer a model to extend the seven- nine levels — through eight levels — level politician and ninth — level users. Рассмотрены модель OSI с точки зрения информационной безопасности, классификация уязвимостей и мероприятий обеспечен...

  17. Research on the Food Security Condition and Food Supply Capacity of Egypt

    Directory of Open Access Journals (Sweden)

    Jian Deng

    2014-01-01

    Full Text Available Food security is chronically guaranteed in Egypt because of the food subsidy policy of the country. However, the increasing Egyptian population is straining the food supply. To study changes in Egyptian food security and future food supply capacity, we analysed the historical grain production, yield per unit, grain-cultivated area, and per capita grain possession of Egypt. The GM (1,1 model of the grey system was used to predict the future population. Thereafter, the result was combined with scenario analysis to forecast the grain possession and population carrying capacity of Egypt under different scenarios. Results show that the increasing population and limitations in cultivated land will strain Egyptian food security. Only in high cultivated areas and high grain yield scenarios before 2020, or in high cultivated areas and mid grain yield scenarios before 2015, can food supply be basically satisfied (assurance rate ≥ 80% under a standard of 400 kg per capita. Population carrying capacity in 2030 is between 51.45 and 89.35 million. Thus, we propose the use of advanced technologies in agriculture and the adjustment of plant structure and cropping systems to improve land utilization efficiency. Furthermore, urbanization and other uses of cultivated land should be strictly controlled to ensure the planting of grains.

  18. Research on the food security condition and food supply capacity of Egypt.

    Science.gov (United States)

    Deng, Jian; Xiang, Youzhen; Hao, Wenhui; Feng, Yongzhong; Yang, Gaihe; Ren, Guangxin; Han, Xinhui

    2014-01-01

    Food security is chronically guaranteed in Egypt because of the food subsidy policy of the country. However, the increasing Egyptian population is straining the food supply. To study changes in Egyptian food security and future food supply capacity, we analysed the historical grain production, yield per unit, grain-cultivated area, and per capita grain possession of Egypt. The GM (1,1) model of the grey system was used to predict the future population. Thereafter, the result was combined with scenario analysis to forecast the grain possession and population carrying capacity of Egypt under different scenarios. Results show that the increasing population and limitations in cultivated land will strain Egyptian food security. Only in high cultivated areas and high grain yield scenarios before 2020, or in high cultivated areas and mid grain yield scenarios before 2015, can food supply be basically satisfied (assurance rate ≥ 80%) under a standard of 400 kg per capita. Population carrying capacity in 2030 is between 51.45 and 89.35 million. Thus, we propose the use of advanced technologies in agriculture and the adjustment of plant structure and cropping systems to improve land utilization efficiency. Furthermore, urbanization and other uses of cultivated land should be strictly controlled to ensure the planting of grains.

  19. Basic Energy Sciences Exascale Requirements Review. An Office of Science review sponsored jointly by Advanced Scientific Computing Research and Basic Energy Sciences, November 3-5, 2015, Rockville, Maryland

    Energy Technology Data Exchange (ETDEWEB)

    Windus, Theresa [Ames Lab., Ames, IA (United States); Banda, Michael [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Devereaux, Thomas [SLAC National Accelerator Lab., Menlo Park, CA (United States); White, Julia C. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Antypas, Katie [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Coffey, Richard [Argonne National Lab. (ANL), Argonne, IL (United States); Dart, Eli [Energy Sciences Network (ESNet), Berkeley, CA (United States); Dosanjh, Sudip [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Gerber, Richard [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Hack, James [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Monga, Inder [Energy Sciences Network (ESNet), Berkeley, CA (United States); Papka, Michael E. [Argonne National Lab. (ANL), Argonne, IL (United States); Riley, Katherine [Argonne National Lab. (ANL), Argonne, IL (United States); Rotman, Lauren [Energy Sciences Network (ESNet), Berkeley, CA (United States); Straatsma, Tjerk [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Wells, Jack [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Baruah, Tunna [Univ. of Texas, El Paso, TX (United States); Benali, Anouar [Argonne National Lab. (ANL), Argonne, IL (United States); Borland, Michael [Argonne National Lab. (ANL), Argonne, IL (United States); Brabec, Jiri [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Carter, Emily [Princeton Univ., NJ (United States); Ceperley, David [Univ. of Illinois, Urbana-Champaign, IL (United States); Chan, Maria [Argonne National Lab. (ANL), Argonne, IL (United States); Chelikowsky, James [Univ. of Texas, Austin, TX (United States); Chen, Jackie [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Cheng, Hai-Ping [Univ. of Florida, Gainesville, FL (United States); Clark, Aurora [Washington State Univ., Pullman, WA (United States); Darancet, Pierre [Argonne National Lab. (ANL), Argonne, IL (United States); DeJong, Wibe [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Deslippe, Jack [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Dixon, David [Univ. of Alabama, Tuscaloosa, AL (United States); Donatelli, Jeffrey [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Dunning, Thomas [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Fernandez-Serra, Marivi [Stony Brook Univ., NY (United States); Freericks, James [Georgetown Univ., Washington, DC (United States); Gagliardi, Laura [Univ. of Minnesota, Minneapolis, MN (United States); Galli, Giulia [Univ. of Chicago, IL (United States); Garrett, Bruce [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Glezakou, Vassiliki-Alexandra [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Gordon, Mark [Iowa State Univ., Ames, IA (United States); Govind, Niri [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Gray, Stephen [Argonne National Lab. (ANL), Argonne, IL (United States); Gull, Emanuel [Univ. of Michigan, Ann Arbor, MI (United States); Gygi, Francois [Univ. of California, Davis, CA (United States); Hexemer, Alexander [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Isborn, Christine [Univ. of California, Merced, CA (United States); Jarrell, Mark [Louisiana State Univ., Baton Rouge, LA (United States); Kalia, Rajiv K. [Univ. of Southern California, Los Angeles, CA (United States); Kent, Paul [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Klippenstein, Stephen [Argonne National Lab. (ANL), Argonne, IL (United States); Kowalski, Karol [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Krishnamurthy, Hulikal [Indian Inst. of Science, Bangalore (India); Kumar, Dinesh [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lena, Charles [Univ. of Texas, Austin, TX (United States); Li, Xiaosong [Univ. of Washington, Seattle, WA (United States); Maier, Thomas [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Markland, Thomas [Stanford Univ., CA (United States); McNulty, Ian [Argonne National Lab. (ANL), Argonne, IL (United States); Millis, Andrew [Columbia Univ., New York, NY (United States); Mundy, Chris [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Nakano, Aiichiro [Univ. of Southern California, Los Angeles, CA (United States); Niklasson, A.M.N. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Panagiotopoulos, Thanos [Princeton Univ., NJ (United States); Pandolfi, Ron [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Parkinson, Dula [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Pask, John [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Perazzo, Amedeo [SLAC National Accelerator Lab., Menlo Park, CA (United States); Rehr, John [Univ. of Washington, Seattle, WA (United States); Rousseau, Roger [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Sankaranarayanan, Subramanian [Argonne National Lab. (ANL), Argonne, IL (United States); Schenter, Greg [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Selloni, Annabella [Princeton Univ., NJ (United States); Sethian, Jamie [Univ. of California, Berkeley, CA (United States); Siepmann, Ilja [Univ. of Minnesota, Minneapolis, MN (United States); Slipchenko, Lyudmila [Purdue Univ., West Lafayette, IN (United States); Sternberg, Michael [Argonne National Lab. (ANL), Argonne, IL (United States); Stevens, Mark [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Summers, Michael [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Sumpter, Bobby [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Sushko, Peter [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Thayer, Jana [SLAC National Accelerator Lab., Menlo Park, CA (United States); Toby, Brian [Argonne National Lab. (ANL), Argonne, IL (United States); Tull, Craig [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Valeev, Edward [Virginia Polytechnic Inst. and State Univ. (Virginia Tech), Blacksburg, VA (United States); Vashishta, Priya [Univ. of Southern California, Los Angeles, CA (United States); Venkatakrishnan, V. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Yang, C. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Yang, Ping [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Zwart, Peter H. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2017-02-03

    Computers have revolutionized every aspect of our lives. Yet in science, the most tantalizing applications of computing lie just beyond our reach. The current quest to build an exascale computer with one thousand times the capability of today’s fastest machines (and more than a million times that of a laptop) will take researchers over the next horizon. The field of materials, chemical reactions, and compounds is inherently complex. Imagine millions of new materials with new functionalities waiting to be discovered — while researchers also seek to extend those materials that are known to a dizzying number of new forms. We could translate massive amounts of data from high precision experiments into new understanding through data mining and analysis. We could have at our disposal the ability to predict the properties of these materials, to follow their transformations during reactions on an atom-by-atom basis, and to discover completely new chemical pathways or physical states of matter. Extending these predictions from the nanoscale to the mesoscale, from the ultrafast world of reactions to long-time simulations to predict the lifetime performance of materials, and to the discovery of new materials and processes will have a profound impact on energy technology. In addition, discovery of new materials is vital to move computing beyond Moore’s law. To realize this vision, more than hardware is needed. New algorithms to take advantage of the increase in computing power, new programming paradigms, and new ways of mining massive data sets are needed as well. This report summarizes the opportunities and the requisite computing ecosystem needed to realize the potential before us. In addition to pursuing new and more complete physical models and theoretical frameworks, this review found that the following broadly grouped areas relevant to the U.S. Department of Energy (DOE) Office of Advanced Scientific Computing Research (ASCR) would directly affect the Basic Energy

  20. High Energy Physics Exascale Requirements Review. An Office of Science review sponsored jointly by Advanced Scientific Computing Research and High Energy Physics, June 10-12, 2015, Bethesda, Maryland

    Energy Technology Data Exchange (ETDEWEB)

    Habib, Salman [Argonne National Lab. (ANL), Argonne, IL (United States); Roser, Robert [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Gerber, Richard [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Antypas, Katie [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Dart, Eli [Esnet, Berkeley, CA (United States); Dosanjh, Sudip [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Hack, James [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Monga, Inder [Esnet, Berkeley, CA (United States); Papka, Michael E. [Argonne National Lab. (ANL), Argonne, IL (United States); Riley, Katherine [Argonne National Lab. (ANL), Argonne, IL (United States); Rotman, Lauren [Esnet, Berkeley, CA (United States); Straatsma, Tjerk [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Wells, Jack [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Williams, Tim [Argonne National Lab. (ANL), Argonne, IL (United States); Almgren, A. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Amundson, J. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Bailey, Stephen [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Bard, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Bloom, Ken [Univ. of Nebraska, Lincoln, NE (United States); Bockelman, Brian [Univ. of Nebraska, Lincoln, NE (United States); Borgland, Anders [SLAC National Accelerator Lab., Menlo Park, CA (United States); Borrill, Julian [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Boughezal, Radja [Argonne National Lab. (ANL), Argonne, IL (United States); Brower, Richard [Boston Univ., MA (United States); Cowan, Benjamin [SLAC National Accelerator Lab., Menlo Park, CA (United States); Finkel, Hal [Argonne National Lab. (ANL), Argonne, IL (United States); Frontiere, Nicholas [Argonne National Lab. (ANL), Argonne, IL (United States); Fuess, Stuart [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Ge, Lixin [SLAC National Accelerator Lab., Menlo Park, CA (United States); Gnedin, Nick [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Gottlieb, Steven [Indiana Univ., Bloomington, IN (United States); Gutsche, Oliver [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Han, T. [Indiana Univ., Bloomington, IN (United States); Heitmann, Katrin [Argonne National Lab. (ANL), Argonne, IL (United States); Hoeche, Stefan [SLAC National Accelerator Lab., Menlo Park, CA (United States); Ko, Kwok [SLAC National Accelerator Lab., Menlo Park, CA (United States); Kononenko, Oleksiy [SLAC National Accelerator Lab., Menlo Park, CA (United States); LeCompte, Thomas [Argonne National Lab. (ANL), Argonne, IL (United States); Li, Zheng [SLAC National Accelerator Lab., Menlo Park, CA (United States); Lukic, Zarija [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Mori, Warren [Univ. of California, Los Angeles, CA (United States); Ng, Cho-Kuen [SLAC National Accelerator Lab., Menlo Park, CA (United States); Nugent, Peter [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Oleynik, Gene [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); O’Shea, Brian [Michigan State Univ., East Lansing, MI (United States); Padmanabhan, Nikhil [Yale Univ., New Haven, CT (United States); Petravick, Donald [Univ. of Illinois, Urbana, IL (United States). National Center for Supercomputing Applications; Petriello, Frank J. [Argonne National Lab. (ANL), Argonne, IL (United States); Pope, Adrian [Argonne National Lab. (ANL), Argonne, IL (United States); Power, John [Argonne National Lab. (ANL), Argonne, IL (United States); Qiang, Ji [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Reina, Laura [Florida State Univ., Tallahassee, FL (United States); Rizzo, Thomas Gerard [SLAC National Accelerator Lab., Menlo Park, CA (United States); Ryne, Robert [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Schram, Malachi [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Spentzouris, P. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Toussaint, Doug [Univ. of Arizona, Tucson, AZ (United States); Vay, Jean Luc [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Viren, B. [Brookhaven National Lab. (BNL), Upton, NY (United States); Wuerthwein, Frank [Univ. of California, San Diego, CA (United States); Xiao, Liling [SLAC National Accelerator Lab., Menlo Park, CA (United States); Coffey, Richard [Argonne National Lab. (ANL), Argonne, IL (United States)

    2016-11-29

    The U.S. Department of Energy (DOE) Office of Science (SC) Offices of High Energy Physics (HEP) and Advanced Scientific Computing Research (ASCR) convened a programmatic Exascale Requirements Review on June 10–12, 2015, in Bethesda, Maryland. This report summarizes the findings, results, and recommendations derived from that meeting. The high-level findings and observations are as follows. Larger, more capable computing and data facilities are needed to support HEP science goals in all three frontiers: Energy, Intensity, and Cosmic. The expected scale of the demand at the 2025 timescale is at least two orders of magnitude — and in some cases greater — than that available currently. The growth rate of data produced by simulations is overwhelming the current ability of both facilities and researchers to store and analyze it. Additional resources and new techniques for data analysis are urgently needed. Data rates and volumes from experimental facilities are also straining the current HEP infrastructure in its ability to store and analyze large and complex data volumes. Appropriately configured leadership-class facilities can play a transformational role in enabling scientific discovery from these datasets. A close integration of high-performance computing (HPC) simulation and data analysis will greatly aid in interpreting the results of HEP experiments. Such an integration will minimize data movement and facilitate interdependent workflows. Long-range planning between HEP and ASCR will be required to meet HEP’s research needs. To best use ASCR HPC resources, the experimental HEP program needs (1) an established, long-term plan for access to ASCR computational and data resources, (2) the ability to map workflows to HPC resources, (3) the ability for ASCR facilities to accommodate workflows run by collaborations potentially comprising thousands of individual members, (4) to transition codes to the next-generation HPC platforms that will be available at ASCR

  1. Normas para la publicación de investigaciones clínicas patrocinadas por la industria farmacéutica Publication standards for clinical research sponsored by the pharmaceutical industry

    Directory of Open Access Journals (Sweden)

    2003-07-01

    Full Text Available The role played by the private sector, in particular the pharmaceutical industry, in funding research has been growing at an accelerated pace in recent decades. So much so, in fact, that the private sector has become the primary funding source of clinical trials in some countries. As a result, pharmaceutical companies exercise ever-growing control over not only the design of clinical trials but also the publication of their results. The conflicts of interest involved in this kind of situation can lead to ethical breaches (for example, suppression or distortion of results or the intimidation of investigators, and it is crucial to take concrete steps to guard against such breaches. This is exactly what a Working Group made up of members of the pharmaceutical industry itself has done, preparing a series of guidelines for that industry in order to promote good publication practices. These guidelines, which were just recently published in English, represent an important step in efforts to achieve greater transparency and accountability in the presentation of results of research funded by manufacturers of pharmaceutical products. Although the guidelines, now translated into Spanish in this piece, are subject to future revisions, they are a valuable starting point for further discussion of a problem that deserves the urgent attention of the scientific community.

  2. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  3. Training Activities to Maintain Competences in Nuclear Safety and Security: A Case Study of the Belgian Nuclear Research Centre

    International Nuclear Information System (INIS)

    Kesteloot, N.; Clarijs, T.; Coeck, M.; Vermeersch, F.

    2016-01-01

    Full text: The Belgian Nuclear Research Centre, SCK•CEN, is one of the largest research centers in Belgium. More than 700 employees advance research into nuclear energy and ionizing radiation for civilian use, and develop nuclear technologies for socially valuable purposes. Next to independent fundamental and applied research SCK-CEN provides advice, training, services and products. This paper describes the general approach towards the continuous professional development of all SCK-CEN personnel. The objective of these training activities is to maintain and increase the required competences, in order to optimize the output and the wellbeing on the work floor. Given the nature of the SCK-CEN activities, special attention is given to themes like radiation protection, security and industrial safety. A combination of classical face-to-face training, e-learning and on-the-job training is offered during the onboarding and further career path of an SCK-CEN employee. (author

  4. Report on a workshop to examine methods to arrive at risk estimates for radiation-induced cancer in the human based on laboratory data. Jointly sponsored by the Office of Health and Energy Research, Department of Energy, and Columbia University.

    Science.gov (United States)

    1993-09-01

    -rate, and radiation quality effects on their repair; (2) suggesting more biologically realistic models to describe cancer induction; and (3) addressing the problem of individual susceptibility to radiation effects and identifying radiosensitive and/or radioresistant subpopulations. It is appropriate and timely that the DOE develop and fund a research program to target areas where laboratory data are required to supplement the epidemiological cancer risk estimates. Broad-based support will be necessary for research in many fields where efforts are already ongoing, with special focus on two newer areas: attempts to understand individual susceptibility to radiation effects, and the development of model systems to investigate the mechanisms of radiation carcinogenesis.

  5. Provincial Reconstruction Teams (PRTs) Negotiation Skill Requirements in Afghanistan: Afghanistan Security Issues Final Research Paper

    Science.gov (United States)

    2010-01-01

    culture shock” that soldiers experienced as “the anxiety and physical and emotional discomfort that can occur when a person moves to an unfa- miliar...Afghanistan. Don‟t Believe it.” Newsweek, 14 December 2009, 48. Jalali, Ali A. “The Future of Security Institutions.” In Warfare Studies AY10 Coursebook ...62-69. Rubin, Barnett R. “The Transformation of the Afghan State.” In Warfare Studies AY10 Coursebook , edited by Sharon McBride, 351-356. Maxwell

  6. NATO Advanced Research Workshop on Nanodevices and Nanomaterials for Ecological Security

    CERN Document Server

    Kiv, Arnold

    2012-01-01

      This book is devoted to a wide range of problems concerning applications of nanomaterials and nanodevices as effective solutions to modern ecological problems. Leading experts in nanoscience and nanotechnology present the key theoretical, experimental and implementation issues related to the creation and utilization of novel nanoscale devices to help ensure ecological security. The authors discuss appropriate nanotechnologies for minimizing various types of risk: to human life, technogenic risk, or indeed terrorist threats. Particular emphasis is placed on defining and studying the required materials properties, and – in the field – on nanoscale devices for sensors and monitoring.

  7. Investigation of the generation of several long-lived radionuclides of importance in fusion reactor technology: Report on a Coordinated Research Program sponsored by the International Atomic Energy Agency

    International Nuclear Information System (INIS)

    Smith, D.L.; Pashchenko, A.B.

    1994-01-01

    The IAEA initiated a Coordinated Research Program (CRP) in 1988 to obtain reliable information for 16 long-lived activation reactions of special importance to fusion reactor technology: 27 Al (n, 2n) 26 Al, 63 Cu(n,p) 63 Ni, 94 Mo(n,p) 94 Nb, 109 Ag(n,2n) 108m Ag, 179 Hf(n,2n) 178m2 Hf, 182 W(n,n ' a) 178m2 Hf, 151 Eu(n,2n) 150 gEu, 153 Eu(n,2n) 152+m2 Eu, 159 Tb(n, 2n) 158 Tb, 158 Dy(n,p) 158 Tb, 193 Ir(n,2n) 192m2 Ir, 187 Re(n,2n) 186m Re, 62 Ni(nγ) 63 Ni, 98 Mo(n,γ) 99 Mo(β-) 99 Tc, 165 Ho(n,γ) 166m Ho and 191 Ir(n,γ) 192m2 Ir. this paper documents progress achieved from the start of the program through mid- 1993

  8. Fusion Energy Sciences Exascale Requirements Review. An Office of Science review sponsored jointly by Advanced Scientific Computing Research and Fusion Energy Sciences, January 27-29, 2016, Gaithersburg, Maryland

    Energy Technology Data Exchange (ETDEWEB)

    Chang, Choong-Seock [Princeton Plasma Physics Lab. (PPPL), Princeton, NJ (United States); Greenwald, Martin [Massachusetts Inst. of Technology (MIT), Cambridge, MA (United States); Riley, Katherine [Argonne Leadership Computing Facility, Argonne, IL (United States); Antypas, Katie [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Coffey, Richard [Argonne National Lab. (ANL), Argonne, IL (United States); Dart, Eli [Esnet, Berkeley, CA (United States); Dosanjh, Sudip [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Gerber, Richard [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Hack, James [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Monga, Inder [Esnet, Berkeley, CA (United States); Papka, Michael E. [Argonne National Lab. (ANL), Argonne, IL (United States); Rotman, Lauren [Esnet, Berkeley, CA (United States); Straatsma, Tjerk [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Wells, Jack [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Andre, R. [TRANSP Group, Princeton, NJ (United States); Bernholdt, David [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Bhattacharjee, Amitava [Princeton Univ., NJ (United States); Bonoli, Paul [Massachusetts Inst. of Technology (MIT), Cambridge, MA (United States); Boyd, Iain [Univ. of Michigan, Ann Arbor, MI (United States); Bulanov, Stepan [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Cary, John R. [Tech-X Corporation, Boulder, CO (United States); Chen, Yang [Univ. of Colorado, Boulder, CO (United States); Curreli, Davide [Univ. of Illinois at Urbana-Champaign, Urbana, IL (United States); Ernst, Darin R. [Massachusetts Inst. of Technology (MIT), Cambridge, MA (United States); Ethier, Stephane [Princeton Plasma Physics Lab. (PPPL), Princeton, NJ (United States); Green, David [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Hager, Robert [Princeton Plasma Physics Lab. (PPPL), Princeton, NJ (United States); Hakim, Ammar [Princeton Plasma Physics Lab. (PPPL), Princeton, NJ (United States); Hassanein, A. [Purdue Univ., West Lafayette, IN (United States); Hatch, David [Univ. of Texas, Austin, TX (United States); Held, E. D. [Utah State Univ., Logan, UT (United States); Howard, Nathan [Massachusetts Inst. of Technology (MIT), Cambridge, MA (United States); Izzo, Valerie A. [Univ. of California, San Diego, CA (United States); Jardin, Steve [Princeton Plasma Physics Lab. (PPPL), Princeton, NJ (United States); Jenkins, T. G. [Tech-X Corp., Boulder, CO (United States); Jenko, Frank [Univ. of California, Los Angeles, CA (United States); Kemp, Andreas [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); King, Jacob [Tech-X Corp., Boulder, CO (United States); Kritz, Arnold [Lehigh Univ., Bethlehem, PA (United States); Krstic, Predrag [Stony Brook Univ., NY (United States); Kruger, Scott E. [Tech-X Corp., Boulder, CO (United States); Kurtz, Rick [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lin, Zhihong [Univ. of California, Irvine, CA (United States); Loring, Burlen [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Nandipati, Giridhar [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Pankin, A. Y. [Tech-X Corp., Boulder, CO (United States); Parker, Scott [Univ. of Colorado, Boulder, CO (United States); Perez, Danny [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Pigarov, Alex Y. [Univ. of California, San Diego, CA (United States); Poli, Francesca [Princeton Plasma Physics Lab. (PPPL), Princeton, NJ (United States); Pueschel, M. J. [Univ. of Wisconsin, Madison, WI (United States); Rafiq, Tariq [Lehigh Univ., Bethlehem, PA (United States); Rübel, Oliver [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Setyawan, Wahyu [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Sizyuk, Valeryi A. [Purdue Univ., West Lafayette, IN (United States); Smithe, D. N. [Tech-X Corp., Boulder, CO (United States); Sovinec, C. R. [Univ. of Wisconsin, Madison, WI (United States); Turner, Miles [Dublin City University, Leinster (Ireland); Umansky, Maxim [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Vay, Jean-Luc [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Verboncoeur, John [Michigan State Univ., East Lansing, MI (United States); Vincenti, Henri [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Voter, Arthur [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Wang, Weixing [Princeton Plasma Physics Lab. (PPPL), Princeton, NJ (United States); Wirth, Brian [Univ. of Tennessee, Knoxville, TN (United States); Wright, John [Massachusetts Inst. of Technology (MIT), Cambridge, MA (United States); Yuan, X. [TRANSP Group, Princeton, NJ (United States)

    2017-02-01

    The additional computing power offered by the planned exascale facilities could be transformational across the spectrum of plasma and fusion research — provided that the new architectures can be efficiently applied to our problem space. The collaboration that will be required to succeed should be viewed as an opportunity to identify and exploit cross-disciplinary synergies. To assess the opportunities and requirements as part of the development of an overall strategy for computing in the exascale era, the Exascale Requirements Review meeting of the Fusion Energy Sciences (FES) community was convened January 27–29, 2016, with participation from a broad range of fusion and plasma scientists, specialists in applied mathematics and computer science, and representatives from the U.S. Department of Energy (DOE) and its major computing facilities. This report is a summary of that meeting and the preparatory activities for it and includes a wealth of detail to support the findings. Technical opportunities, requirements, and challenges are detailed in this report (and in the recent report on the Workshop on Integrated Simulation). Science applications are described, along with mathematical and computational enabling technologies. Also see http://exascaleage.org/fes/ for more information.

  9. Army Research Office’s ARO in Review 2014.The Annual Historical Record of the Army Research Laboratory’s Army Research Office (ARO) Programs and Funding Activities

    Science.gov (United States)

    2015-07-01

    MINERVA RESEARCH INITIATIVE ( MRI ) The Minerva Research Initiative ( MRI ) is a DoD-sponsored, university-based social science basic research program...Core, MRI , MURI, PECASE, and DURIP. Received Accepted Declined Pending Withdrawn Chemical Sciences 90 39 28 23 0 Computing Sciences 46 35 3 8...mobile devices (PDAs, tablets , and Smartphones) are subject to tampering and compromise. To secure mobile computing and communication, previous

  10. Family conflict, emotional security, and child development: translating research findings into a prevention program for community families.

    Science.gov (United States)

    Cummings, E Mark; Schatz, Julie N

    2012-03-01

    The social problem posed by family conflict to the physical and psychological health and well-being of children, parents, and underlying family relationships is a cause for concern. Inter-parental and parent-child conflict are linked with children's behavioral, emotional, social, academic, and health problems, with children's risk particularly elevated in distressed marriages. Supported by the promise of brief psycho-educational programs (e.g., Halford et al. in Journal of Family Psychology 22:497-505, 2008; Sanders in Journal of Family Psychology 22:506-517, 2008), the present paper presents the development and evaluation of a prevention program for community families with children, concerned with family-wide conflict and relationships, and building on Emotional Security Theory (Davies and Cummings in Psychological Bulletin 116:387-411, 1994). This program uniquely focuses on translating research and theory in this area into brief, engaging programs for community families to improve conflict and emotional security for the sake of the children. Evaluation is based on multi-domain and multi-method assessments of family-wide and child outcomes in the context of a randomized control design. A series of studies are briefly described in the programmatic development of a prevention program for conflict and emotional security for community families, culminating in a program for family-wide conflict and emotional security for families with adolescents. With regard to this ongoing program, evidence is presented at the post-test for improvements in family-wide functioning, consideration of the relative benefits for different groups within the community, and preliminary support for the theoretical bases for program outcomes.

  11. Coping with change: a challenge for sponsors.

    Science.gov (United States)

    McGuire, T P; McGowan, K

    1987-04-01

    In the past 25 years a trend away from lifetime commitment in religious institutes, a rising number of retired religious,, and the Second Vatican Council's call for greater lay involvement in all aspects of ministry have led to many changes in Catholic-sponsored health care facilities. The development process of religious institutes parallels that of individuals as they mature from infancy to late adulthood. After Vatican II, religious institutes underwent an "intimacy versus isolation" stage similar to that experienced by people in their twenties, in which interpersonal relationships became more important. Now institutes are in a stage of "ego integrity versus despair," where they must consider changes--closing facilities, mergers, affiliations,, or divestiture of sponsorship--and how they can keep their mission alive afterward. Religious leaders must be energetic in creating programs that allow laypersons who share the institute's mission, charism, and philosophy to carry out its ministry. But in the midst of these changes, religious members also will experience grief at the loss of their sponsorship or control over their facility. They pass through the same stages people experience after the death of a loved one: denial, anger, bargaining, depression, and acceptance. Only by confronting and accepting their grief can institute members go on to either new ministries or reaffirmed commitment to their current work.

  12. Corporate reporting, security regulation and trading on the Kuwaiti stock exchange (KSE – institutional implications for research

    Directory of Open Access Journals (Sweden)

    Eiman A. Algharaballi

    2012-06-01

    Full Text Available The regulation of equities trading in Kuwait over the period from 1983 to 2011 is documented in this paper. An eclectic approach has resulted in overlapping responsibilities for the three main regulatory and supervisory bodies. Regulation appears to be responsive to market crises. As a result, regulations have tended to change with market conditions. Kuwaiti accounting and auditing requirements are also reviewed. The institutional setting in Kuwait has a number of implications for capital market-based research. Informational inefficiency precludes research that relies on the assumption that security price reflects firm value. Other features (including the profit requirement, lock-up restrictions and the two auditor rule provide opportunities for capital market research in Kuwait.

  13. Information security management: a proposal to improve the effectiveness of information security in the scientific research environment; Gestao da seguranca da informacao: uma proposta para potencializar a efetividade da seguranca da informacao em ambiente de pesquisa cientifica

    Energy Technology Data Exchange (ETDEWEB)

    Alexandria, Joao Carlos Soares de

    2009-07-01

    The increase of the connectivity in the business environment, combined with the growing dependency of information systems, has become the information security management an important governance tool. Information security has as main goal to protect the business transactions in order to work normally. In this way, It will be safeguarding the business continuity. The threats of information come from hackers' attacks, electronic frauds and spying, as well as fire, electrical energy interruption and humans fault. Information security is made by implementation of a set of controls, including of the others politics, processes, procedures, organizational structures, software and hardware, which require a continuous management and a well established structure to be able to face such challenges. This work tried to search the reasons why the organizations have difficulties to make a practice of information security management. Many of them just limit to adopt points measures, sometimes they are not consistent with their realities. The market counts on enough quantity of standards and regulations related to information security issues, for example, ISO/IEC 27002, American Sarbanes-Oxley act, Basel capital accord, regulations from regulatory agency (such as the Brazilians ones ANATEL, ANVISA and CVM). The market researches have showed that the information security implementation is concentrated on a well-defined group of organization mainly formed by large companies and from specifics sectors of economy, for example, financial and telecommunication. However, information security must be done by all organizations that use information systems to carry out their activities, independently of its size or economic area that it belongs. The situation of information security in the governmental sector of Brazil, and inside its research institutions, is considered worrying by the Brazilian Court of Accounts (TCU). This research work presents an assessment and diagnostic proposal

  14. Operations research, engineering, and cyber security trends in applied mathematics and technology

    CERN Document Server

    Rassias, Themistocles

    2017-01-01

    Mathematical methods and theories with interdisciplinary applications are presented in this book. The eighteen contributions presented in this Work have been written by eminent scientists; a few papers are based on talks which took place at the International Conference at the Hellenic Artillery School in May 2015. Each paper evaluates possible solutions to long-standing problems such as the solvability of the direct electromagnetic scattering problem, geometric approaches to cyber security, ellipsoid targeting with overlap, non-equilibrium solutions of dynamic networks, measuring ballistic dispersion, elliptic regularity theory for the numerical solution of variational problems, approximation theory for polynomials on the real line and the unit circle, complementarity and variational inequalities in electronics, new two-slope parameterized achievement scalarizing functions for nonlinear multiobjective optimization, and strong and weak convexity of closed sets in a Hilbert space. Graduate students, scientists,...

  15. Research on fully distributed optical fiber sensing security system localization algorithm

    Science.gov (United States)

    Wu, Xu; Hou, Jiacheng; Liu, Kun; Liu, Tiegen

    2013-12-01

    A new fully distributed optical fiber sensing and location technology based on the Mach-Zehnder interferometers is studied. In this security system, a new climbing point locating algorithm based on short-time average zero-crossing rate is presented. By calculating the zero-crossing rates of the multiple grouped data separately, it not only utilizes the advantages of the frequency analysis method to determine the most effective data group more accurately, but also meets the requirement of the real-time monitoring system. Supplemented with short-term energy calculation group signal, the most effective data group can be quickly picked out. Finally, the accurate location of the climbing point can be effectively achieved through the cross-correlation localization algorithm. The experimental results show that the proposed algorithm can realize the accurate location of the climbing point and meanwhile the outside interference noise of the non-climbing behavior can be effectively filtered out.

  16. Team sponsors in community-based health leadership programs.

    Science.gov (United States)

    Patterson, Tracy Enright; Dinkin, Donna R; Champion, Heather

    2017-05-02

    Purpose The purpose of this article is to share the lessons learned about the role of team sponsors in action-learning teams as part of community-based health leadership development programs. Design/methodology/approach This case study uses program survey results from fellow participants, action learning coaches and team sponsors to understand the value of sponsors to the teams, the roles they most often filled and the challenges they faced as team sponsors. Findings The extent to which the sponsors were perceived as having contributed to the work of the action learning teams varied greatly from team to team. Most sponsors agreed that they were well informed about their role. The roles sponsors most frequently played were to provide the teams with input and support, serve as a liaison to the community and serve as a sounding board, motivator and cheerleader. The most common challenges or barriers team sponsors faced in this role were keeping engaged in the process, adjusting to the role and feeling disconnected from the program. Practical implications This work provides insights for program developers and community foundations who are interested in building the capacity for health leadership by linking community sponsors with emerging leaders engaged in an action learning experience. Originality/value This work begins to fill a gap in the literature. The role of team sponsors has been studied for single organization work teams but there is a void of understanding about the role of sponsors with multi-organizational teams working to improve health while also learning about leadership.

  17. Development of security engineering curricula at US universities

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, M.L.

    1998-06-01

    The Southwest Surety Institute was formed in 1996 to create unique, science-based educational programs in security engineering. The programs will integrate business, technology, and criminal justice elements to educate a new generation of security professionals. Graduates of the programs will better understand basic security system design and evaluation and contribute to strengthening of the body of knowledge in the area of security. A systematic approach incorporating people, procedures, and equipment will be taught that will emphasize basic security principles and establish the science of security engineering. The use of performance measures in the analysis of designed systems will enable effective decisions by an enterprise and provide the rationale for investment in security systems. Along with educational programs, Institute members will conduct original research and development built on existing relationships with sponsors from government and industry in areas such as counterterroism, microelectronics, banking, aviation, and sensor development. Additional information and updates on the Southwest Surety Institute are available via the Institute home page at www.emrtc.nmt.edu/ssi.

  18. The frequency of company-sponsored alcohol brand-related sites on Facebook™-2012.

    Science.gov (United States)

    Nhean, Siphannay; Nyborn, Justin; Hinchey, Danielle; Valerio, Heather; Kinzel, Kathryn; Siegel, Michael; Jernigan, David H

    2014-06-01

    This research provides an estimate of the frequency of company-sponsored alcohol brand-related sites on Facebook™. We conducted a systematic overview of the extent of alcohol brand-related sites on Facebook™ in 2012. We conducted a 2012 Facebook™ search for sites specifically related to 898 alcohol brands across 16 different alcoholic beverage types. Descriptive statistics were produced using Microsoft SQL Server. We identified 1,017 company-sponsored alcohol-brand related sites on Facebook™. Our study advances previous literature by providing a systematic overview of the extent of alcohol brand sites on Facebook™.

  19. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  20. Respondent perceptions of research sponsors in 20 African Countries

    African Journals Online (AJOL)

    beryl

    Abstract - A continuing debate has been the roles and responsibilities of .... by a goal to make an individual achievement, especially by publishing single- ... social and demographic indicators; education, religion, employment, age and gender.

  1. 42 CFR 423.401 - General requirements for PDP sponsors.

    Science.gov (United States)

    2010-10-01

    ... sponsor is organized and licensed under State law as a risk bearing entity eligible to offer health insurance or health benefits coverage in each State in which it offers a prescription drug plan. If not... with State Law and Preemption by Federal Law § 423.401 General requirements for PDP sponsors. (a...

  2. Blauwe ogen schieten tekort. Lessen voor sponsoring van landschap

    NARCIS (Netherlands)

    Overbeek, M.M.M.; Graaff, de R.P.M.

    2010-01-01

    Literatuuronderzoek en gesprekken met (ervarings)deskundigen en vertegenwoordigers van bedrijven in Amstelland en in Het Groene Woud over het proces en de voorwaarden van bedrijven om sponsoring van landschap te realiseren. Sponsoring gebeurt meestal in het kader van mvo, waarbij bedrijven de

  3. 45 CFR 1226.13 - Obligations of sponsors.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Obligations of sponsors. 1226.13 Section 1226.13 Public Welfare Regulations Relating to Public Welfare (Continued) CORPORATION FOR NATIONAL AND COMMUNITY SERVICE PROHIBITIONS ON ELECTORAL AND LOBBYING ACTIVITIES Sponsor Employee Activities § 1226.13...

  4. Sponsors of Nebraska Indochinese Refugees: Meeting the Challenges.

    Science.gov (United States)

    Meredith, William H.; Cramer, Sheran L.

    This report summarizes the response of 80 sponsors of Indochinese refugees in Nebraska to a survey designed to explore their sponsorship experience. Problem solving areas for sponsors and refugees are named as: acculturation, emotional adjustments, communication, health, housing, transportation, employment, and legal, financial and consumer…

  5. [Analysis of projects of infectious disease epidemiology sponsored by National Natural Science Foundation of China].

    Science.gov (United States)

    Jian-Ming, Wang; Yan-Kai, Xia; Hui-Juan, Zhu; Feng, Chen; Hong-Bing, Shen

    2016-05-10

    To analyze the projects on the infectious disease epidemiology sponsored by the National Natural Science Foundation of China (NSFC), explore the hotspot and development trend, and offer a reference for researchers in this field. Based on the NSFC database, the projects on the infectious disease epidemiology (H2609) sponsored from 1987 to 2014 were analyzed. The changes of fund numbers, amounts and research fields were described. During the study period, NSFC sponsored 373 projects, including 228 general projects (61.1%), 78 youth projects (20.9%) and 67 other projects (18.0%). The average amount of the grant was 358.2 thousand Yuan (20 thousand-8 million). The main sponsored research fields were mechanisms of pathogen and immunity (36.2%) and population-based epidemiological studies (33.0%). The top three diseases were hepatitis, HIV/AIDS and tuberculosis. The amount of funding on researches of infectious disease epidemiology has increased continuously, which has played an important role in training scientific talents in the field of prevention and control of infectious diseases.

  6. Ethical considerations in industry-sponsored multiregional clinical trials.

    Science.gov (United States)

    Ibia, Ekopimo; Binkowitz, Bruce; Saillot, Jean-Louis; Talerico, Steven; Koerner, Chin; Ferreira, Irene; Agarwal, Anupam; Metz, Craig; Maman, Marianne

    2010-01-01

    During the last several decades, the scientific and ethics communities have addressed important ethical issues in medical research, resulting in the elaboration and adoption of concepts, guidelines, and codes. Ethical issues in the conduct of Multiregional Clinical Trials have attracted significant attention mainly in the last two decades. With the globalization of clinical research and the rapid expansion to countries with a limited tradition of biomedical research, sponsors must proactively address local ethical issues, the adequacy of oversight as well as the applicability and validity of data, and scientific conclusions drawn from diverse patient populations. This paper highlights some core ethical principles and milestones in medical research, and, from an industry perspective, it discusses ethical issues that the clinical trial team may face when conducting Multiregional Clinical Trials (MRCT, clinical trials conducted at sites located across multiple geographic regions of the world). This paper further highlights the areas of consensus and controversies and proposes points to consider. Copyright © 2010 John Wiley & Sons, Ltd.

  7. Federal Plan for Cyber Security and Information Assurance Research and Development

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — Powerful personal computers, high-bandwidth and wireless networking technologies, and the widespread use of the Internet have transformed stand-alone computing...

  8. Basic research needs to assure a secure energy future. A report from the Basic Energy Sciences Advisory Committee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2003-02-01

    This report has highlighted many of the possible fundamental research areas that will help our country avoid a future energy crisis. The report may not have adequately captured the atmosphere of concern that permeated the discussions at the workshop. The difficulties facing our nation and the world in meeting our energy needs over the next several decades are very challenging. It was generally felt that traditional solutions and approaches will not solve the total energy problem. Knowledge that does not exist must be obtained to address both the quantity of energy needed to increase the standard of living world-wide and the quality of energy generation needed to preserve the environment. In terms of investments, it was clear that there is no single research area that will secure the future energy supply. A diverse range of economic energy sources will be required--and a broad range of fundamental research is needed to enable these. Many of the issues fall into the traditional materials and chemical sciences research areas, but with specific emphasis on understanding mechanisms, energy related phenomena, and pursuing novel directions in, for example, nanoscience and integrated modeling. An important result from the discussions, which is hopefully apparent from the brief presentations above, is that the problems that must be dealt with are truly multidisciplinary. This means that they require the participation of investigators with different skill sets. Basic science skills have to be complemented by awareness of the overall nature of the problem in a national and world context, and with knowledge of the engineering, design, and control issues in any eventual solution. It is necessary to find ways in which this can be done while still preserving the ability to do first-class basic science. The traditional structure of research, with specific disciplinary groupings, will not be sufficient. This presents great challenges and opportunities for the funders of the

  9. A security analysis of version 2 of the Network Time Protocol (NTP): A report to the privacy and security research group

    Science.gov (United States)

    Bishop, Matt

    1991-01-01

    The Network Time Protocol is being used throughout the Internet to provide an accurate time service. The security requirements are examined of such a service, version 2 of the NTP protocol is analyzed to determine how well it meets these requirements, and improvements are suggested where appropriate.

  10. Introduction to Hardware Security

    Directory of Open Access Journals (Sweden)

    Yier Jin

    2015-10-01

    Full Text Available Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain and to help both academia and industry investigate countermeasures and solutions to solve hardware security problems, we will introduce the key concepts of hardware security as well as its relations to related research topics in this survey paper. Emerging hardware security topics will also be clearly depicted through which the future trend will be elaborated, making this survey paper a good reference for the continuing research efforts in this area.

  11. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  12. System Security Authorization Agreement (SSAA) for the WIRE Archive and Research Facility

    Science.gov (United States)

    2002-01-01

    The Wide-Field Infrared Explorer (WIRE) Archive and Research Facility (WARF) is operated and maintained by the Department of Physics, USAF Academy. The lab is located in Fairchild Hall, 2354 Fairchild Dr., Suite 2A103, USAF Academy, CO 80840. The WARF will be used for research and education in support of the NASA Wide Field Infrared Explorer (WIRE) satellite, and for related high-precision photometry missions and activities. The WARF will also contain the WIRE preliminary and final archives prior to their delivery to the National Space Science Data Center (NSSDC). The WARF consists of a suite of equipment purchased under several NASA grants in support of WIRE research. The core system consists of a Red Hat Linux workstation with twin 933 MHz PIII processors, 1 GB of RAM, 133 GB of hard disk space, and DAT and DLT tape drives. The WARF is also supported by several additional networked Linux workstations. Only one of these (an older 450 Mhz PIII computer running Red Hat Linux) is currently running, but the addition of several more is expected over the next year. In addition, a printer will soon be added. The WARF will serve as the primary research facility for the analysis and archiving of data from the WIRE satellite, together with limited quantities of other high-precision astronomical photometry data from both ground- and space-based facilities. However, the archive to be created here will not be the final archive; rather, the archive will be duplicated at the NSSDC and public access to the data will generally take place through that site.

  13. A Pilot Examination of the Methods Used to Counteract Insider Threat Security Risks Associated with the Use of Radioactive Materials in the Research and Clinical Setting.

    Science.gov (United States)

    Tsenov, B G; Emery, R J; Whitehead, L W; Gonzalez, J Reingle; Gemeinhardt, G L

    2018-03-01

    While many organizations maintain multiple layers of security control methodologies to prevent outsiders from gaining unauthorized access, persons such as employees or contractors who have been granted legitimate access can represent an "insider threat" risk. Interestingly, some of the most notable radiological events involving the purposeful contamination or exposure of individuals appear to have been perpetrated by insiders. In the academic and medical settings, radiation safety professionals focus their security efforts on (1) ensuring controls are in place to prevent unauthorized access or removal of sources, and (2) increasing security controls for the unescorted accessing of large sources of radioactivity (known as "quantities of concern"). But these controls may not completely address the threat insiders represent when radioactive materials below these quantities are present. The goal of this research project was to characterize the methodologies currently employed to counteract the insider security threat for the misuse or purposeful divergence of radioactive materials used in the academic and medical settings. A web-based survey was used to assess how practicing radiation safety professionals in academic and medical settings anticipate, evaluate, and control insider threat security risks within their institutions. While all respondents indicated that radioactive sources are being used in amounts below quantities of concern, only 6 % consider insider threat security issues as part of the protocol review for the use of general radioactive materials. The results of this survey identify several opportunities for improvement for institutions to address security gaps.

  14. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  15. Research on Food Quality Security of China’s Food Import and Export

    Directory of Open Access Journals (Sweden)

    Pengling Liu

    2014-04-01

    Full Text Available This article researches quality and safety of food at home and abroad on the basis of present situation, cause and effect, from the point of import and export of food quality and safety in China, by combining with economic theories and empirical analysis, from a macro perspective study of China’s import and export food safety issues impact on economic and social development, and study the experience of other developed countries advanced management experience in the quality and safety of food imports and exports. Finally, after the combination of the analysis, make recommendations to protect China’s import and export food safety measures and provide policy proposals.

  16. The relationship between absenteeism and employer-sponsored ...

    African Journals Online (AJOL)

    Establishing on- site employer-sponsored child-care facilities is an example of such ..... The sample size and characteristics of each of the groups are presented in Table 1. Table 1: ...... 'A qualitative and quantitative review of antecedents.

  17. 7 CFR 226.16 - Sponsoring organization provisions.

    Science.gov (United States)

    2010-01-01

    ... comparison, reviewers must determine whether the meal counts were accurate. If there is a discrepancy between...) Program payments. The sponsoring organization must continue to pay any claims for reimbursement for...

  18. An industry-sponsored, school-focused model for continuing ...

    African Journals Online (AJOL)

    An industry-sponsored, school-focused model for continuing professional ... HEIs and Departments of Education (DoE), could change the traditional concept that CPTD is the responsibility of DoEs into a new model where the business

  19. The Effects of Employer-Sponsored Child Care on Employee Absenteeism, Turnover, Productivity, Recruitment or Job Satisfaction: What Is Claimed and What Is Known.

    Science.gov (United States)

    Miller, Thomas I.

    1984-01-01

    Evaluates the evidence supporting claims that employer-sponsored child care programs improve employee work behaviors and attitudes. Results indicated that assertions that employer-sponsored child care reduces workers' absenteeism or tardiness, or that it increases workers' productivity or job satisfaction are not supported by credible research.…

  20. Empirical research on financial capability evaluation of A-share listed companies in the securities industry based on principal component analysis

    Directory of Open Access Journals (Sweden)

    Xiuping Wang

    2017-11-01

    Full Text Available Based on the relevant financial data indicators of A-share markets of Shanghai and Shenzhen in 2009, with all of 29 listed companies in the securities industry as the research objects, this paper selects 10variables that can fully reflect the financial capability indicators and uses the principal component analysis to carry out the empirical research on the financial capability. The research results show that the comprehensive financial capability of listed companies in A-share securities industry must be focused on the following four capabilities, investment and income, profit, capital composition and debt repayment and cash flow indicators. In addition, the principal component analysis can effectively evaluate the financial capability of listed companies in A-share securities industry, and solve the problems in the previous analysis methods, such as excessive indicators, information overlapping and so on.

  1. A case study of the Secure Anonymous Information Linkage (SAIL) Gateway: A privacy-protecting remote access system for health-related research and evaluation☆

    Science.gov (United States)

    Jones, Kerina H.; Ford, David V.; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J.; Heaven, Martin L.; Thayer, Daniel S.; McNerney, Cynthia L.; Lyons, Ronan A.

    2014-01-01

    With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. PMID:24440148

  2. A case study of the Secure Anonymous Information Linkage (SAIL) Gateway: a privacy-protecting remote access system for health-related research and evaluation.

    Science.gov (United States)

    Jones, Kerina H; Ford, David V; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J; Heaven, Martin L; Thayer, Daniel S; McNerney, Cynthia L; Lyons, Ronan A

    2014-08-01

    With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. Copyright © 2014 The Aurthors. Published by Elsevier Inc. All rights reserved.

  3. The Importance of Hurricane Research to Life, Property, the Economy, and National Security.

    Science.gov (United States)

    Busalacchi, A. J.

    2017-12-01

    The devastating 2017 Atlantic hurricane season has brought into stark relief how much hurricane forecasts have improved - and how important it is to make them even better. Whereas the error in 48-hour track forecasts has been reduced by more than half, according to the National Hurricane Center, intensity forecasts remain challenging, especially with storms such as Harvey that strengthened from a tropical depression to a Category 4 hurricane in less than three days. The unusually active season, with Hurricane Irma sustaining 185-mph winds for a record 36 hours and two Atlantic hurricanes reaching 150-mph winds simultaneously for the first time, also highlighted what we do, and do not, know about how tropical cyclones will change as the climate warms. The extraordinary toll of Hurricanes Harvey, Irma, and Maria - which may ultimately be responsible for hundreds of deaths and an estimated $200 billion or more in damages - underscores why investments into improved forecasting must be a national priority. At NCAR and UCAR, scientists are working with their colleagues at federal agencies, the private sector, and the university community to advance our understanding of these deadly storms. Among their many projects, NCAR researchers are making experimental tropical cyclone forecasts using an innovative Earth system model that allows for variable resolution. We are working with NOAA to issue flooding, inundation, and streamflow forecasts for areas hit by hurricanes, and we have used extremely high-resolution regional models to simulate successfully the rapid hurricane intensification that has proved so difficult to predict. We are assessing ways to better predict the damage potential of tropical cyclones by looking beyond wind speed to consider such important factors as the size and forward motion of the storm. On the important question of climate change, scientists have experimented with running coupled climate models at a high enough resolution to spin up a hurricane

  4. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  5. Refelctions on the security

    Directory of Open Access Journals (Sweden)

    Ladislav Hofreiter

    2013-07-01

    Full Text Available In this paper are presented the author‘s reflections about concept meaning of the security, about his systemic perception and actual scientific access to the security research. The author presented securitology paradigm for valuation security optional reference object.

  6. Security and privacy requirements for a multi-institutional cancer research data grid: an interview-based study.

    Science.gov (United States)

    Manion, Frank J; Robbins, Robert J; Weems, William A; Crowley, Rebecca S

    2009-06-15

    Data protection is important for all information systems that deal with human-subjects data. Grid-based systems--such as the cancer Biomedical Informatics Grid (caBIG)--seek to develop new mechanisms to facilitate real-time federation of cancer-relevant data sources, including sources protected under a variety of regulatory laws, such as HIPAA and 21CFR11. These systems embody new models for data sharing, and hence pose new challenges to the regulatory community, and to those who would develop or adopt them. These challenges must be understood by both systems developers and system adopters. In this paper, we describe our work collecting policy statements, expectations, and requirements from regulatory decision makers at academic cancer centers in the United States. We use these statements to examine fundamental assumptions regarding data sharing using data federations and grid computing. An interview-based study of key stakeholders from a sample of US cancer centers. Interviews were structured, and used an instrument that was developed for the purpose of this study. The instrument included a set of problem scenarios--difficult policy situations that were derived during a full-day discussion of potentially problematic issues by a set of project participants with diverse expertise. Each problem scenario included a set of open-ended questions that were designed to elucidate stakeholder opinions and concerns. Interviews were transcribed verbatim and used for both qualitative and quantitative analysis. For quantitative analysis, data was aggregated at the individual or institutional unit of analysis, depending on the specific interview question. Thirty-one (31) individuals at six cancer centers were contacted to participate. Twenty-four out of thirty-one (24/31) individuals responded to our request- yielding a total response rate of 77%. Respondents included IRB directors and policy-makers, privacy and security officers, directors of offices of research, information

  7. Security and privacy requirements for a multi-institutional cancer research data grid: an interview-based study

    Directory of Open Access Journals (Sweden)

    Weems William A

    2009-06-01

    security officers, directors of offices of research, information security officers and university legal counsel. Nineteen total interviews were conducted over a period of 16 weeks. Respondents provided answers for all four scenarios (a total of 87 questions. Results were grouped by broad themes, including among others: governance, legal and financial issues, partnership agreements, de-identification, institutional technical infrastructure for security and privacy protection, training, risk management, auditing, IRB issues, and patient/subject consent. Conclusion The findings suggest that with additional work, large scale federated sharing of data within a regulated environment is possible. A key challenge is developing suitable models for authentication and authorization practices within a federated environment. Authentication – the recognition and validation of a person's identity – is in fact a global property of such systems, while authorization – the permission to access data or resources – mimics data sharing agreements in being best served at a local level. Nine specific recommendations result from the work and are discussed in detail. These include: (1 the necessity to construct separate legal or corporate entities for governance of federated sharing initiatives on this scale; (2 consensus on the treatment of foreign and commercial partnerships; (3 the development of risk models and risk management processes; (4 development of technical infrastructure to support the credentialing process associated with research including human subjects; (5 exploring the feasibility of developing large-scale, federated honest broker approaches; (6 the development of suitable, federated identity provisioning processes to support federated authentication and authorization; (7 community development of requisite HIPAA and research ethics training modules by federation members; (8 the recognition of the need for central auditing requirements and authority, and; (9 use of two

  8. Security and privacy requirements for a multi-institutional cancer research data grid: an interview-based study

    Science.gov (United States)

    2009-01-01

    offices of research, information security officers and university legal counsel. Nineteen total interviews were conducted over a period of 16 weeks. Respondents provided answers for all four scenarios (a total of 87 questions). Results were grouped by broad themes, including among others: governance, legal and financial issues, partnership agreements, de-identification, institutional technical infrastructure for security and privacy protection, training, risk management, auditing, IRB issues, and patient/subject consent. Conclusion The findings suggest that with additional work, large scale federated sharing of data within a regulated environment is possible. A key challenge is developing suitable models for authentication and authorization practices within a federated environment. Authentication – the recognition and validation of a person's identity – is in fact a global property of such systems, while authorization – the permission to access data or resources – mimics data sharing agreements in being best served at a local level. Nine specific recommendations result from the work and are discussed in detail. These include: (1) the necessity to construct separate legal or corporate entities for governance of federated sharing initiatives on this scale; (2) consensus on the treatment of foreign and commercial partnerships; (3) the development of risk models and risk management processes; (4) development of technical infrastructure to support the credentialing process associated with research including human subjects; (5) exploring the feasibility of developing large-scale, federated honest broker approaches; (6) the development of suitable, federated identity provisioning processes to support federated authentication and authorization; (7) community development of requisite HIPAA and research ethics training modules by federation members; (8) the recognition of the need for central auditing requirements and authority, and; (9) use of two-protocol data exchange

  9. Cloud security mechanisms

    OpenAIRE

    2014-01-01

    Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud...

  10. Finance/security/life.

    OpenAIRE

    Langley, P.

    2017-01-01

    What is the contemporary relation between finance and security? This essay encourages further research into the securitization of finance by developing the notion of ‘finance/security/life’. A focus on the intersections of finance/security/life will be shown to prompt a broadened range of critical, cross-disciplinary concerns with the various ways in which financial markets are positioned as vital to securing wealth, welfare and wellbeing.

  11. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  12. Sponsors' and investigative staffs' perceptions of the current investigational new drug safety reporting process in oncology trials.

    Science.gov (United States)

    Perez, Raymond; Archdeacon, Patrick; Roach, Nancy; Goodwin, Robert; Jarow, Jonathan; Stuccio, Nina; Forrest, Annemarie

    2017-06-01

    The Food and Drug Administration's final rule on investigational new drug application safety reporting, effective from 28 March 2011, clarified the reporting requirements for serious and unexpected suspected adverse reactions occurring in clinical trials. The Clinical Trials Transformation Initiative released recommendations in 2013 to assist implementation of the final rule; however, anecdotal reports and data from a Food and Drug Administration audit indicated that a majority of reports being submitted were still uninformative and did not result in actionable changes. Clinical Trials Transformation Initiative investigated remaining barriers and potential solutions to full implementation of the final rule by polling and interviewing investigators, clinical research staff, and sponsors. In an opinion-gathering effort, two discrete online surveys designed to assess challenges and motivations related to management of expedited (7- to 15-day) investigational new drug safety reporting processes in oncology trials were developed and distributed to two populations: investigators/clinical research staff and sponsors. Data were collected for approximately 1 year. Twenty-hour-long interviews were also conducted with Clinical Trials Transformation Initiative-nominated interview participants who were considered as having extensive knowledge of and experience with the topic. Interviewees included 13 principal investigators/study managers/research team members and 7 directors/vice presidents of pharmacovigilance operations from 5 large global pharmaceutical companies. The investigative site's responses indicate that too many individual reports are still being submitted, which are time-consuming to process and provide little value for patient safety assessments or for informing actionable changes. Fewer but higher quality reports would be more useful, and the investigator and staff would benefit from sponsors'"filtering" of reports and increased sponsor communication. Sponsors

  13. Pressurized thermal shock program sponsored by EPRI

    International Nuclear Information System (INIS)

    Stahlkopf, K.E.

    1983-01-01

    The potential for long term neutron embrittlement of reactor vessels has been recognized for a number of years. Reactor vessel thermal shock is not a new concern, but with a growing number of plants approaching their mid-lives, it is a concern that must be understood and dealt with. Recent attention has focused on the performance of vessels during overcooling transients. This concern was designated as Unresolved Safety Issue A-49 by the Nuclear Regulatory Commission in December 1981. The USNRC staff has identified eight overcooling events of concern in U.S. PWRs. The concern is currently limited to Pressurized Water Reactors. The Electric Power Research Institute (EPRI) has supported research on reactor vessel integrity for a number of years and has supported an extensive effort on reactor vessel pressurized thermal shock (PTS) over the last three years. In addition, EPRI has developed a linked set of computer codes to simulate the pressurized thermal shock transients and assess the integrity of the nuclear reactor vessels for various overcooling transients. This paper focuses on the integrated analysis approach being used by EPRI in performing such analysis. (orig.)

  14. Research on early warning of food security using a system dynamics model: evidence from Jiangsu province in China.

    Science.gov (United States)

    Xu, Jianling; Ding, Yi

    2015-01-01

    Analyzing the early warning of food security, this paper sets the self-sufficiency rate as the principal indicator in a standpoint of supplement. It is common to use the quantitative methods to forecast and warning the insecurity. However, this paper considers more about the probable outcome when the government intervenes. By constructing the causal feedbacks among grain supplement, demand, productive input, and the policy factors to simulate the future food security in Jiangsu province, conclusions can be drawn as the following: (1) The situation of food security is insecure if the self-sufficiency rate is under 68.3% according to the development of system inertia. (2) it is difficult to guarantee the food security in Jiangsu just depending on the increase of grain sown area. (3) The valid solution to ensure the food security in Jiangsu is to improve the productivity. © 2015 Institute of Food Technologists®

  15. Database Security: A Historical Perspective

    OpenAIRE

    Lesov, Paul

    2010-01-01

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 ye...

  16. Global Security Program Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    Bretzke, John C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-03-25

    The Global Security Directorate mission is to protect against proliferant and unconventional nuclear threats –regardless of origin - and emerging new threats. This mission is accomplished as the Los Alamos National Laboratory staff completes projects for our numerous sponsors. The purpose of this Program Management Plan is to establish and clearly describe the GS program management requirements including instructions that are essential for the successful management of projects in accordance with our sponsor requirements. The detailed information provided in this document applies to all LANL staff and their subcontractors that are performing GS portfolio work. GS management is committed to a culture that ensures effective planning, execution, and achievement of measurable results in accordance with the GS mission. Outcomes of such a culture result in better communication, delegated authority, accountability, and increased emphasis on safely and securely achieving GS objectives.

  17. Priming the Secure Attachment Schema Affects the Emotional Face Processing Bias in Attachment Anxiety: An fMRI Research

    Directory of Open Access Journals (Sweden)

    Xu Chen

    2017-04-01

    Full Text Available Our study explored how priming with a secure base schema affects the processing of emotional facial stimuli in individuals with attachment anxiety. We enrolled 42 undergraduate students between 18 and 27 years of age, and divided them into two groups: attachment anxiety and attachment secure. All participants were primed under two conditions, the secure priming using references to the partner, and neutral priming using neutral references. We performed repeated attachment security priming combined with a dual-task paradigm and functional magnetic resonance imaging. Participants’ reaction times in terms of responding to the facial stimuli were also measured. Attachment security priming can facilitate an individual’s processing of positive emotional faces; for instance, the presentation of the partner’s name was associated with stronger activities in a wide range of brain regions and faster reaction times for positive facial expressions in the subjects. The current finding of higher activity in the left-hemisphere regions for secure priming rather than neutral priming is consistent with the prediction that attachment security priming triggers the spread of the activation of a positive emotional state. However, the difference in brain activity during processing of both, positive and negative emotional facial stimuli between the two priming conditions appeared in the attachment anxiety group alone. This study indicates that the effect of attachment secure priming on the processing of emotional facial stimuli could be mediated by chronic attachment anxiety. In addition, it highlights the association between higher-order processes of the attachment system (secure attachment schema priming and early-stage information processing system (attention, given the increased attention toward the effects of secure base schema on the processing of emotion- and attachment-related information among the insecure population. Thus, the following study has

  18. An Exploration of the Legal and Regulatory Environment of Privacy and Security through Active Research, Guided Study, Blog Creation, and Discussion

    Science.gov (United States)

    Peslak, Alan R.

    2010-01-01

    One of the most important topics for today's information technology professional is the study of legal and regulatory issues as they relate to privacy and security of personal and business data and identification. This manuscript describes the topics and approach taken by the instructors that focuses on independent research of source documents and…

  19. Agroecology and sustainable food systems: Participatory research to improve food security among HIV-affected households in northern Malawi.

    Science.gov (United States)

    Nyantakyi-Frimpong, Hanson; Mambulu, Faith Nankasa; Bezner Kerr, Rachel; Luginaah, Isaac; Lupafya, Esther

    2016-09-01

    This article shares results from a long-term participatory agroecological research project in northern Malawi. Drawing upon a political ecology of health conceptual framework, the paper explores whether and how participatory agroecological farming can improve food security and nutrition among HIV-affected households. In-depth interviews were conducted with 27 farmers in HIV-affected households in the area near Ekwendeni Trading Centre in northern Malawi. The results show that participatory agroecological farming has a strong potential to meet the food, dietary, labour and income needs of HIV-affected households, whilst helping them to manage natural resources sustainably. As well, the findings reveal that place-based politics, especially gendered power imbalances, are imperative for understanding the human impacts of the HIV/AIDS epidemic. Overall, the study adds valuable insights into the literature on the human-environment dimensions of health. It demonstrates that the onset of disease can radically transform the social relations governing access to and control over resources (e.g., land, labour, and capital), and that these altered social relations in turn affect sustainable disease management. The conclusion highlights how the promotion of sustainable agroecology could help to partly address the socio-ecological challenges associated with HIV/AIDS. Copyright © 2016 Elsevier Ltd. All rights reserved.

  20. Secure Research at scale

    Directory of Open Access Journals (Sweden)

    Simon Thompson

    2017-04-01

    The demand for UKSeRP has been higher than initially envisaged and the possible use cases are constantly being imagined. We are also introducing an entry level UKSeRP to support individual projects and their requirements.

  1. Threats or threads: from usable security to secure experience

    DEFF Research Database (Denmark)

    Bødker, Susanne; Mathiasen, Niels Raabjerg

    2008-01-01

    While the domain of security dependent technologies brings new challenges to HCI research it seems that the results and breakthroughs of HCI have not been used in design of security dependent technologies. With exceptions, work in the research field of usable security may be criticized for focusing...... mainly on adjusting user behavior to behave securely. With our background in newer HCI perspectives we address secure interaction from the perspective of security technology as experience. We analyze a number of collected user stories to understand what happens when everyday users encounter security...... dependent technologies. We apply McCarthy & Wright's [12] experience framework to the security domain and our collected stories. We point out that there are significant differences between being secure and having a secure experience, and conclude that classical usable security, focus on people's immediate...

  2. [Criminal implication of sponsoring in medicine: legal ramifactions and recommendations].

    Science.gov (United States)

    Mahnken, A H; Theilmann, M; Bolenz, M; Günther, R W

    2005-08-01

    As a consequence of the so-called "Heart-Valve-Affair" in 1994, the German public became aware of the potential criminal significance of industrial sponsoring and third-party financial support in medicine. Since 1997, when the German Anti-Corruption Law came into effect, the penal regulations regarding bribery and benefits for public officers were tightened. Due to the lack of explicit and generally accepted guidelines in combination with regional differences of jurisdiction, there is a lingering uncertainty regarding the criminal aspects of third-party funding and industrial sponsoring. The aim of this review is to summarize the penal and professional implications of third-party funding and sponsoring in medicine including recent aspects of jurisdiction. The currently available recommendations on this issue are introduced.

  3. Criminal implication of sponsoring in medicine: legal ramifactions and recommendations

    International Nuclear Information System (INIS)

    Mahnken, A.H.; Guenther, R.W.; Theilmann, M.; Bolenz, M.

    2005-01-01

    As a consequence of the so-called ''Heart-Valve-Affair'' in 1994, the German public became aware of the potential criminal significance of industrial sponsoring and third-party financial support in medicine. Since 1997, when the German Anti-Corruption Law came into effect, the penal regulations regarding bribery and benefits for public officers were tightened. Due to the lack of explicit and generally accepted guidelines in combination with regional differences of jurisdiction, there is a lingering uncertainty regarding the criminal aspects of third-party funding and industrial sponsoring. The aim of this review is to summarize the penal and professional implications of third-party funding and sponsoring in medicine including recent aspects of jurisdiction. The currently available recommendations on this issue are introduced. (orig.)

  4. Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management Systems

    Directory of Open Access Journals (Sweden)

    Antonio Santos-Olmo

    2016-07-01

    Full Text Available Society is increasingly dependent on Information Security Management Systems (ISMS, and having these kind of systems has become vital for the development of Small and Medium-Sized Enterprises (SMEs. However, these companies require ISMS that have been adapted to their special features and have been optimized as regards the resources needed to deploy and maintain them, with very low costs and short implementation periods. This paper discusses the different cycles carried out using the ‘Action Research (AR’ method, which have allowed the development of a security management methodology for SMEs that is able to automate processes and reduce the implementation time of the ISMS.

  5. Sponsorship investments: do they deliver brand awareness for all sponsors?

    Directory of Open Access Journals (Sweden)

    Mpolokeng Sephapo Catherine

    2017-03-01

    Full Text Available Sponsorship as a marketing communications tool is well adopted in South Africa across various areas such as sports and entertainment. Although world markets have experienced economic turmoil in the last few years, the sponsorship market may be considered to be thriving as companies use this marketing communication tool as a vehicle to create and maintain relationships. The purpose of this study was to explore which sponsors of the South African National Rugby team are sports consumers aware of as a result of the sponsorship. Literature states that awareness also influences the judgments about brands in the consideration set, even without any brand associations in the consumer’s mind. In low involvement decision; where consumers do not need to search extensively for information in order to make a decision; minimal brand awareness levels may be enough to convince the consumer to make their final choice. The study is exploratory in nature however provides a South African perspective on how effective the sponsorship of the Springbok is with regards to creating awareness of the sponsors among sports consumers. The study made use of a qualitative approach whereby primary data was collected by means of focus groups and naïve sketches. Data collected was analyzed by means of content analysis. The findings suggest that participants were predominantly aware of the key sponsors of the Springboks; these were sponsors who had their branding on the Springbok jersey worn during rugby matches. The factors that participants mentioned to contribute to their awareness of the sponsors were the branding on the Springbok playing jersey as well as television adverts along with other promotional tools. This study urges sponsors to not only rely on the sponsorship initiative to create awareness but rather leverage the sponsorship with tools that are relevant to their target audience. This study contributes to sponsorship literature relating to the effectiveness of

  6. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  7. Corporate sponsored education initiatives on board the ISS

    Science.gov (United States)

    Durham, Ian T.; Durham, Alyson S.; Pawelczyk, James A.; Brod, Lawrence B.; Durham, Thomas F.

    1999-01-01

    This paper proposes the creation of a corporate sponsored ``Lecture from Space'' program on board the International Space Station (ISS) with funding coming from a host of new technology and marketing spin-offs. This program would meld existing education initiatives in NASA with new corporate marketing techniques. Astronauts in residence on board the ISS would conduct short ten to fifteen minute live presentations and/or conduct interactive discussions carried out by a teacher in the classroom. This concept is similar to a program already carried out during the Neurolab mission on Shuttle flight STS-90. Building on that concept, the interactive simulcasts would be broadcast over the Internet and linked directly to computers and televisions in classrooms worldwide. In addition to the live broadcasts, educational programs and demonstrations can be recorded in space, and marketed and sold for inclusion in television programs, computer software, and other forms of media. Programs can be distributed directly into classrooms as an additional presentation supplement, as well as over the Internet or through cable and broadcast television, similar to the Canadian Discovery Channel's broadcasts of the Neurolab mission. Successful marketing and advertisement can eventually lead to the creation of an entirely new, privately run cottage industry involving the distribution and sale of educationally related material associated with the ISS that would have the potential to become truly global in scope. By targeting areas of expertise and research interest in microgravity, a large curriculum could be developed using space exploration as a unifying theme. Expansion of this concept could enhance objectives already initiated through the International Space University to include elementary and secondary school students. The ultimate goal would be to stimulate interest in space and space related sciences in today's youth through creative educational marketing initiatives while at the

  8. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  9. Research of Mobile Phone Security Technology%手机的安全防范技术研究

    Institute of Scientific and Technical Information of China (English)

    张海燕

    2012-01-01

    With the popularity of smart phones,mobile phone functions will become increasingly rich,mobile phone platform will be more and more open,mobile phone security issues become increasingly prominent.This paper describes the characteristics of the mobile security,discusses in detail the security issues of mobile terminal,and proposes the mobile phone security strategy with reality.%随着智能手机的普及,手机功能将越来越为丰富,手机平台越来越为开放,手机安全问题越来越突出。本文介绍了手机安全的特性,论述了手机终端的安全问题,结合实际,提出了手机安全防范策略。

  10. 17 CFR 230.138 - Publications or distributions of research reports by brokers or dealers about securities other...

    Science.gov (United States)

    2010-04-01

    ... Section 15(d) of the Securities Exchange Act of 1934 (15 U.S.C. 78m or 78o(d)); or (ii) Is a foreign... history provisions of General Instructions I.A.1. and I.A.2(a) of Form F-3; (B) Either: (1) Satisfies the... Securities Exchange Act of 1934 (§ 240.3a51-1 of this chapter). (b) Rule 144A offerings. If the conditions in...

  11. A Research on the Determination of the Perception Levels of Shipyard Workers Related To Occupational Health and Security: Yalova Case

    Directory of Open Access Journals (Sweden)

    Ersin Kavi

    2011-06-01

    Full Text Available Shipbuilding sector, which has an important employment and export potential, is getting importance in Turkey. In this sector, the number of employees who work directly is 35.000 and the numbers of employees who work indirectly 100.000 are employed. The sector requires obligations and necessary activities in terms of vocational health and security since it includes working risks and has an increasing importance. Because of the lack of the vocational health and security measures, it has been seen many deaths and accidents in Tuzla Shipyards. Especially, the lack of trainings and measures to prevent to the industrial accident is an indication that there is a perception problem towards vocational health and security. Contrary to this, though it is taught on vocational health and security, the perceptions of the workers may not be enough. In this mean, it needs to be studied what to extend and how the workers perceive and apply the vocational health and security trainings or applications, which are taught at the shipyards, in workplace. In this paper, it is going to be studied the knowledge level of the workers related to the vocational health and security, determined training needs and if they satisfied with the trainings and measures by a survey in the Yalova shipyards.

  12. Android security cookbook

    CERN Document Server

    Makan, Keith

    2013-01-01

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from

  13. The Effect of Massachusetts' Health Reform on Employer-Sponsored Insurance Premiums.

    Science.gov (United States)

    Cogan, John F; Hubbard, R Glenn; Kessler, Daniel

    2010-01-01

    In this paper, we use publicly available data from the Medical Expenditure Panel Survey - Insurance Component (MEPS-IC) to investigate the effect of Massachusetts' health reform plan on employer-sponsored insurance premiums. We tabulate premium growth for private-sector employers in Massachusetts and the United States as a whole for 2004 - 2008. We estimate the effect of the plan as the difference in premium growth between Massachusetts and the United States between 2006 and 2008-that is, before versus after the plan-over and above the difference in premium growth for 2004 to 2006. We find that health reform in Massachusetts increased single-coverage employer-sponsored insurance premiums by about 6 percent, or $262. Although our research design has important limitations, it does suggest that policy makers should be concerned about the consequences of health reform for the cost of private insurance.

  14. Computational Equipment for Support of Air Force Sponsored Programs for the Design of Advanced and Miniaturized Explosive and Advanced Propellant Systems

    National Research Council Canada - National Science Library

    Stewart, D. S; Buckmaster, John D; Jackson, Thomas L

    2008-01-01

    This grant funded the acquisition of a 128 node/256 processor cluster computer that now supports the computational needs of the combined, Air Force-sponsored research groups of Prof. D. Scott Stewart (PI...

  15. Evaluating of foreign trade security

    OpenAIRE

    Vasyliev Andriy

    2015-01-01

    A method of evaluating foreign trade security is considered based on horizontally integrated approach to research security issues, taking into account the conditions of management, factors, components and levels of external security. The work was based theories of security, economics, management theory, practice of state regulation of foreign trade.

  16. Validation of the Social Security Death Index (SSDI): An Important Readily-Available Outcomes Database for Researchers.

    Science.gov (United States)

    Quinn, James; Kramer, Nathan; McDermott, Daniel

    2008-01-01

    To determine the accuracy of the online Social Security Death Index (SSDI) for determining death outcomes. We selected 30 patients who were determined to be dead and 90 patients thought to be alive after an ED visit as determined by a web-based searched of the SSDI. For those thought to be dead we requested death certificates. We then had a research coordinator blinded to the results of the SSDI search, complete direct follow-up by contacting the patients, family or primary care physicians to determine vital status. To determine the sensitivity and specificity of the SSDI for death at six months in this cohort, we used direct follow-up as the criterion reference and calculated 95% confidence intervals. Direct follow-up was completed for 90% (108 of 120) of the patients. For those patients 20 were determined to be dead and 88 alive. The dead were more likely to be male (57%) and older [(mean age 83.9 (95% CI 79.1 - 88.7) vs. 60.9 (95% CI 56.4 - 65.4) for those alive]. The sensitivity of the SSDI for those with completed direct follow-up was 100% (95% CI 91 -100%) with specificity of 100% (95% CI 98-100%). Of the 12 patients who were not able to be contacted through direct follow-up, the SSDI indicated that 10 were dead and two were alive. SSDI is an accurate measure of death outcomes and appears to have the advantage of finding deaths among patients lost to follow-up.

  17. 14 CFR 151.51 - Performance of construction work: Sponsor force account.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Performance of construction work: Sponsor... Development Projects § 151.51 Performance of construction work: Sponsor force account. (a) Before undertaking any force account construction work, the sponsor (or any public agency acting as agent for the sponsor...

  18. A Commentary on Literacy Narratives as Sponsors of Literacy

    Science.gov (United States)

    Brandt, Deborah

    2015-01-01

    This brief commentary first clarifies Brandt's concept of sponsors of literacy in light of the way the concept has been taken up in writing studies. Then it treats Brandt's methods for handling accounts of literacy learning in comparison with other ways of analyzing biographical material. Finally it takes up Lawrence's argument about literacy…

  19. Highlight: IDRC sponsors Caribbean symposium on impact of ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    12 mai 2015 ... An IDRC-sponsored symposium exploring the impact of the Internet on economic ... Le symposium commandité par le CRDI, qui a eu lieu à Saint Andrew, ... Une nouvelle recherche fait état d'arguments convaincants pour ...

  20. 14 CFR 152.309 - Availability of sponsor's records.

    Science.gov (United States)

    2010-01-01

    ... (CONTINUED) AIRPORTS AIRPORT AID PROGRAM Accounting and Reporting Requirements § 152.309 Availability of... the purposes of accounting and audit. (b) The sponsor or planning agency shall allow appropriate FAA...-term retention value, the FAA may require transfer of custody of those records to the FAA. ...

  1. 76 FR 2807 - New Animal Drugs; Change of Sponsor

    Science.gov (United States)

    2011-01-18

    .... FDA-2010-N-0002] New Animal Drugs; Change of Sponsor AGENCY: Food and Drug Administration, HHS. ACTION: Final rule. SUMMARY: The Food and Drug Administration (FDA) is amending the animal drug regulations to...., Cambridge, MA 02141 has informed FDA that it has transferred ownership of, and all rights and interest in...

  2. 22 CFR 42.31 - Family-sponsored immigrants.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Family-sponsored immigrants. 42.31 Section 42.31 Foreign Relations DEPARTMENT OF STATE VISAS VISAS: DOCUMENTATION OF IMMIGRANTS UNDER THE IMMIGRATION AND NATIONALITY ACT, AS AMENDED Immigrants Subject to Numerical Limitations § 42.31 Family...

  3. Risk sharing between competing health plans and sponsors

    NARCIS (Netherlands)

    E.M. van Barneveld (Erik); W.P.M.M. van de Ven (Wynand); R.C.J.A. van Vliet (René)

    2001-01-01

    textabstractIn many countries, competing health plans receive capitation payments from a sponsor, whether government or a private employer. All capitation payment methods are far from perfect and have raised concerns about risk selection. Paying health plans partly on the basis

  4. 7 CFR 225.14 - Requirements for sponsor participation.

    Science.gov (United States)

    2010-01-01

    ... 225.14 Agriculture Regulations of the Department of Agriculture (Continued) FOOD AND NUTRITION SERVICE, DEPARTMENT OF AGRICULTURE CHILD NUTRITION PROGRAMS SUMMER FOOD SERVICE PROGRAM Sponsor and Site Provisions... Youth Sports Program; and (5) Private nonprofit organizations as defined in § 225.2. (c) General...

  5. Recycling: Establishing a Citizen-Sponsored Reclamation Center.

    Science.gov (United States)

    Keep America Beautiful, Inc., New York, NY.

    This booklet applies the Clean Community System (CCS) of Keep America Beautiful, Inc. to the development of citizen-sponsored recycling projects. Six initial steps in establishing a reclamation center are given and include information gathering, market analysis, legal requirements, and site location. Suggestions are included for recruiting staff…

  6. Consumer Perceptions of Sponsors of Disease Awareness Advertising

    Science.gov (United States)

    Hall, Danika V.; Jones, Sandra C.; Iverson, Donald C.

    2011-01-01

    Purpose: In many countries there is emerging concern regarding alliances between the pharmaceutical industry and health non-profit organizations (NPOs), and the increase of co-sponsored marketing activities such as disease awareness advertising. The current study aims to explore Australian women's perceptions of disease awareness advertising with…

  7. School-Sponsored Health Insurance: Planning for a New Reality

    Science.gov (United States)

    Liang, Bryan A.

    2010-01-01

    Health care reform efforts in both the Clinton and Obama administrations have attempted to address college and university health. Yet, although the world of health care delivery has almost universally evolved to managed care, school health programs have not. In general, school-sponsored health plans do little to improve access and have adopted…

  8. 76 FR 48714 - New Animal Drugs; Change of Sponsor; Moxidectin

    Science.gov (United States)

    2011-08-09

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Food and Drug Administration 21 CFR Parts 520, 522, and 524 [Docket No. FDA-2011-N-0003] New Animal Drugs; Change of Sponsor; Moxidectin AGENCY: Food and Drug Administration, HHS. ACTION: Final rule. SUMMARY: The Food and Drug Administration (FDA) is amending the animal...

  9. Media exposure and sponsor recall: Cricket World Cup 2003 | Van ...

    African Journals Online (AJOL)

    This paper reports on a study into the relationship between media exposure and sponsor recall relating to an international event, namely the Cricket World Cup 2003 (CWC 2003). The application of sponsorship as a communication construct and recall as a media vehicle effect is investigated. Recall has been widely ...

  10. 20 CFR 422.103 - Social security numbers.

    Science.gov (United States)

    2010-04-01

    ... personal interview with the dependent is not required. Form SS-5 may be obtained at: (i) Any local social... previously assigned social security number(s), if any, of the applicant. A personal interview may be required... sponsoring agency of a refugee, if no personal mailing address is available). (d) Social security number...

  11. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  12. Operating System Security

    CERN Document Server

    Jaeger, Trent

    2008-01-01

    Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to

  13. Why Consumers Misattribute Sponsorships to Non-Sponsor Brands: Differential Roles of Item and Relational Communications.

    Science.gov (United States)

    Weeks, Clinton S; Humphreys, Michael S; Cornwell, T Bettina

    2018-02-01

    Brands engaged in sponsorship of events commonly have objectives that depend on consumer memory for the sponsor-event relationship (e.g., sponsorship awareness). Consumers however, often misattribute sponsorships to nonsponsor competitor brands, indicating erroneous memory for these relationships. The current research uses an item and relational memory framework to reveal sponsor brands may inadvertently foster this misattribution when they communicate relational linkages to events. Effects can be explained via differential roles of communicating item information (information that supports processing item distinctiveness) versus relational information (information that supports processing relationships among items) in contributing to memory outcomes. Experiment 1 uses event-cued brand recall to show that correct memory retrieval is best supported by communicating relational information when sponsorship relationships are not obvious (low congruence). In contrast, correct retrieval is best supported by communicating item information when relationships are obvious (high congruence). Experiment 2 uses brand-cued event recall to show that, against conventional marketing recommendations, relational information increases misattribution, whereas item information guards against misattribution. Results suggest sponsor brands must distinguish between item and relational communications to enhance correct retrieval and limit misattribution. Methodologically, the work shows that choice of cueing direction is critical in differentially revealing patterns of correct and incorrect retrieval with pair relationships. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  14. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  15. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  16. Cyber Security : Home User's Perspective

    OpenAIRE

    Ikonen, Mikko

    2014-01-01

    Cyber security is important to understand for home users. New technology allows for new cyber threats to emerge and new solutions must be considered to counter them. Nearly every device is connected to the Internet and this opens new possibilities and threats to cyber security. This Bachelor's thesis explores the different aspects of cyber security and suggests solutions to different cyber security issues found. The different aspects of cyber security under research here include personal ...

  17. An Analysis of Collaborative Problem-Solving Mechanisms in Sponsored Projects: Applying the 5-Day Sprint Model

    Science.gov (United States)

    Raubenolt, Amy

    2016-01-01

    In May 2016, the office of Finance and Sponsored Projects at The Research Institute at Nationwide Children's Hospital conducted a 5-day design sprint session to re-evaluate and redesign a flawed final reporting process within the department. The department sprint was modeled after the design sprint sessions that occur routinely in software…

  18. Case Study: Applying the Theory of Planned Behavior as Interventions to Increase Sponsored Project Proposal Submissions from Liberal Arts Faculty

    Science.gov (United States)

    Hartmann, Anita

    2011-01-01

    In the current economic climate, many colleges and universities face similar challenges: the need to increase external sponsorship for research activities and the need to benefit from additional indirect cost recovery. Preparing funding proposals for submission to sponsors is a faculty behavior that can be modified by applying behavioral theory to…

  19. The association between paternal sensitivity and infant-father attachment security: a meta-analysis of three decades of research.

    Science.gov (United States)

    Lucassen, Nicole; Tharner, Anne; Van Ijzendoorn, Marinus H; Bakermans-Kranenburg, Marian J; Volling, Brenda L; Verhulst, Frank C; Lambregtse-Van den Berg, Mijke P; Tiemeier, Henning

    2011-12-01

    For almost three decades, the association between paternal sensitivity and infant-father attachment security has been studied. The first wave of studies on the correlates of infant-father attachment showed a weak association between paternal sensitivity and infant-father attachment security (r = .13, p infant-father attachment based on all studies currently available is presented, and the change over time of the association between paternal sensitivity and infant-father attachment is investigated. Studies using an observational measure of paternal interactive behavior with the infant, and the Strange Situation Procedure to observe the attachment relationship were included. Paternal sensitivity is differentiated from paternal sensitivity combined with stimulation in the interaction with the infant. Higher levels of paternal sensitivity were associated with more infant-father attachment security (r = .12, p attachment security than sensitive interactions without stimulation of play. Despite possible changes in paternal role patterns, we did not find stronger associations between paternal sensitivity and infant attachment in more recent years.

  20. Automated security management

    CERN Document Server

    Al-Shaer, Ehab; Xie, Geoffrey

    2013-01-01

    In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Managemen

  1. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  2. On a State-Sponsored Sport System in China.

    Science.gov (United States)

    Cao, Jie; Zhiwei, Pan

    The gold medal success of China in recent Olympic Games can be traced to the advancement of the state-sponsored sport system (SSSS). While the program was developed initially through socialist ideals, it is more than a centralized government system to monopolize resources for glorified sport performance. Participation in competition is an inherent part of the human condition. Success in athletics is associated with national identity and has economic, social, and cultural implications. Because of this, it is essential that the SSSS adjust and improve to keep pace with other facets of China's quickly changing national reform. In association with emerging economic reform, some sports now receive equal or more funds from private investments compared to government allocation. The state-sponsored sport system must continue to adapt to maintain the Chinese tradition of excellence in competition.

  3. A New Typology for State-Sponsored International Terrorism

    Science.gov (United States)

    2011-12-01

    tolerated the stacks of books with “ scary people” on the covers. xiv THIS PAGE INTENTIONALLY LEFT BLANK 1 I. INTRODUCTION State sponsorship of...sponsors of terrorism list in August of 1993.133 The explanation of the State Department’s update to the list stated that despite warnings , “the... warning signs, Qaddafi directed his associates to attempt to re- establish communications with the U.S in 1992. At that point, however, the U.S. was not

  4. Searching for sponsors for four national rugby teams in Finland

    OpenAIRE

    Ylönen, Niina

    2017-01-01

    How to get more sponsors to four national rugby teams in Finland? Finnish Rugby Federation and its four national teams are in the need of new long lasting sponsorship deals to fund the national teams’ tournaments in Finland and abroad. Since rugby is quite unknown sports in Finland it faces challenges in getting new sponsorship deals and also its visibility is currently very low. The purpose of this thesis is to analyse the current situation of rugby, sponsorship contracts Finnish rugby F...

  5. Building Infectious Disease Research Programs to Promote Security and Enhance Collaborations with Countries of the Former Soviet Union.

    Science.gov (United States)

    Bartholomew, James C; Pearson, Andrew D; Stenseth, Nils Chr; LeDuc, James W; Hirschberg, David L; Colwell, Rita R

    2015-01-01

    Addressing the threat of infectious diseases, whether natural, the results of a laboratory accident, or a deliberate act of bioterrorism, requires no corner of the world be ignored. The mobility of infectious agents and their rapid adaptability, whether to climate change or socioeconomic drivers or both, demand the science employed to understand these processes be advanced and tailored to a country or a region, but with a global vision. In many parts of the world, largely because of economic struggles, scientific capacity has not kept pace with the need to accomplish this goal and has left these regions and hence the world vulnerable to infectious disease outbreaks. To build scientific capability in a developing region requires cooperation and participation of experienced international scientists who understand the issues and are committed to educate the next generations of young investigators in the region. These efforts need to be coupled with the understanding and resolve of local governments and international agencies to promote an aggressive science agenda. International collaborative scientific investigation of infectious diseases not only adds significantly to scientific knowledge, but it promotes health security, international trust, and long-term economic benefit to the region involved. This premise is based on the observation that the most powerful human inspiration is that which brings peoples together to work on and solve important global challenges. The republics of the former Soviet Union provide a valuable case study for the need to rebuild scientific capacity as they are located at the crossroads where many of the world's great epidemics began. The scientific infrastructure and disease surveillance capabilities of the region suffered significant decline after the breakup of the Soviet Union. The U.S. Cooperative Threat Reduction (CTR) Program, a part of the U.S. Department of Defense, together with partner countries, have worked diligently to

  6. 75 FR 45153 - National Security Division; Agency Information Collection Activities: Proposed Collection...

    Science.gov (United States)

    2010-08-02

    ... DEPARTMENT OF JUSTICE [OMB Number 1124-0001] National Security Division; Agency Information..., 10th & Constitution Avenue, NW., National Security Division, Counterespionage Section/Registration Unit... Justice sponsoring the collection: Form Number: NSD- 1. National Security Division, U.S. Department of...

  7. Research into radiation protection. 1994 Programme report. Report on radiation departmental research programme on radiation protection, sponsored by the Federal Ministry for the Environment, Nature Conservation and Reactor Safety, and placed under the administrative and subject competence of the Federal Radiation Protection Office

    International Nuclear Information System (INIS)

    Goedde, R.; Schmitt-Hannig, A.; Thieme, M.

    1994-10-01

    On behalf of the Ministery for Environment, Nature Conservation and Nuclear Safety (BMU), the Federal Office for Radiation Protection is placing research and study contracts in the field of radiation protection. The results of these projects are used for developing radiation protection rules and to fulfill the special radiation protection tasks of the BMU, required by law. Planning, expert and administrative management, placing, assistance as well as expert evaluation of the results from these research projects lies within the responsibility of the Federal Office for Radiation Protection. This report provides information on preliminary and final results of radiation protection projects within the BMU Department Research Programme of the year 1994. (orig.) [de

  8. Research into radiation protection. 1995 Programme report. Report on radiation departmental research programme on radiation protection, sponsored by the Federal Ministry for the Environment, Nature Conservation and Reactor Safety, and placed under the administrative and subject competence of the Federal Radiation Protection Office

    International Nuclear Information System (INIS)

    Thieme, M.; Goedde, R.; Schmitt-Hannig, A.

    1996-01-01

    On behalf of the Ministry for Environment, Nature Conservation and Nuclear Safety (BMU), the Federal Office for Radiation Protection is placing research and study contracts in the field of radiation protection. The results of these projects are used for developing radiation protection rules and to fulfill the special radiation protection tasks of the BMU, required by law. Planning, expert and administrative management, placing, assistance as well as expert evaluation of the results from these research projects lies within the responsibility of the Federal Office for Radiation Protection. This report provides information on preliminary and final results of radiation protection projects within the BMU Department Research Programme of the year 1995. (orig.) [de

  9. New directions for African security

    NARCIS (Netherlands)

    Haastrup, Toni; Dijkstra, Hylke

    2017-01-01

    African security, particularly conflict-related political violence, is a key concern in international relations. This forum seeks to advance existing research agendas by addressing four key themes: domestic politics and peacekeeping; security sector reform programs; peace enforcement; and the

  10. National Strategy to Secure Cyberspace

    National Research Council Canada - National Science Library

    Schwalm, Keith T

    2006-01-01

    ... of a national strategy for securing cyberspace. The approach explored the development of cyber technology strategies and programs related to the mission and roles of Homeland Security Advanced Research Projects Agency...

  11. Sustainability and National Security

    Science.gov (United States)

    2012-01-01

    to U.S. overseas campaigns since the early 1900s. Environmental Security Environmental Security is an element under the larger rubric of Human...oldest seedbank, with a network of research facilities, and well over 300,000 ‘accessions’ of plant genetic material (Sinitsyna 2007b; Roslof

  12. 17 CFR 230.139 - Publications or distributions of research reports by brokers or dealers distributing securities.

    Science.gov (United States)

    2010-04-01

    ... Exchange Act of 1934 (15 U.S.C. 78m or 78o(d)); or (B) Is a foreign private issuer that as of the date of... history provisions of General Instructions I.A.1. and I.A.2(a) of Form F-3; (2) Either: (i) Satisfies the... an offering of penny stock as defined in Rule 3a51-1 of the Securities Exchange Act of 1934 (§ 240...

  13. Laser Applications to Chemical, Security, and Environmental Analysis: introduction to the feature issue

    International Nuclear Information System (INIS)

    Dreizler, Andreas; Fried, Alan; Gord, James R.

    2007-01-01

    This Applied Optics feature issue on Laser Applications to Chemical, Security,and Environmental Analysis (LACSEA) highlights papers presented at theLACSEA 2006 Tenth Topical Meeting sponsored by the Optical Society ofAmerica

  14. Laser applications to chemical, security, and environmental analysis: introduction to the feature issue.

    Science.gov (United States)

    Seeger, Thomas; Dreier, Thomas; Chen, Weidong; Kearny, Sean; Kulatilaka, Waruna

    2017-04-10

    This Applied Optics feature issue on laser applications to chemical, security, and environmental analysis (LACSEA) highlights papers presented at the LACSEA 2016 Fifteenth Topical Meeting sponsored by the Optical Society of America.

  15. Detailed Information Security in Cloud Computing

    OpenAIRE

    Pavel Valerievich Ivonin

    2013-01-01

    The object of research in this article is technology of public clouds, structure and security system of clouds. Problems of information security in clouds are considered, elements of security system in public clouds are described.

  16. While Working Around Security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg

    Users of technology encounter various IT security mechanisms in their everyday lives. If these mechanisms fail to support everyday activities, they either get in the way, or the users find a way to work around them. Even though users manage to carry out everyday activities by using substandard...... IT security mechanisms or via workarounds, it will influence their experience of security. If researchers and designers only focus on IT security artifacts and fail to take the user experience into account, incorrect processes or workarounds will occur. Accordingly, to get users to follow the correct process...... may seem to be a criterion of success, even though it may yield a less appropriate experience of security. This dissertation deals with an improved understanding of IT security sensitive IT artifacts and presents three design methods, and a framework for addressing the complexities and contingencies...

  17. While working around security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg; Bødker, Susanne; Petersen, Marianne Graves

    This paper describes our work at two levels. First of all the paper discusses how users of IT deal with issues of IT security in their everyday life. Secondly, we discuss how the kind of understanding of IT security that comes out of careful analyses of use confronts the ways in which usable...... IT security is established in the literature. Recent literature has called for better conceptual models as a starting point for improving IT security. In contrast to such models we propose to dress up designers by helping them better understand the work that goes into everyday security. The result...... is a methodological toolbox that helps address and design for usable and useful IT security. We deploy examples of analyses and design, carried out by ourselves and by others to fine-tune our design perspective; in particular we use examples from three current research projects....

  18. Nuclear Threats and Security

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2012-10-01

    Full Text Available This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legality of nuclear weapons and their use, illicit trade in nuclear materials, the dangers of nuclear terrorism, nuclear- and cyber-security. Papers and video recordings of the major presentations and session summaries can be found here.

  19. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  20. The international space station: An opportunity for industry-sponsored global education

    Science.gov (United States)

    Shields, Cathleen E.

    1999-01-01

    The International Space Station provides an excellent opportunity for industry sponsorship of international space education. As a highly visible worldwide asset, the space station already commands our interest. It has captured the imagination of the world's researchers and connected the world's governments. Once operational, it can also be used to capture the dreams of the world's children and connect the world's industry through education. The space station's global heritage and ownership; its complex engineering, construction, and operation; its flexible research and technology demonstration capability; and its long duration make it the perfect educational platform. These things also make a space station education program attractive to industry. Such a program will give private industry the opportunity to sponsor space-related activities even though a particular industry may not have a research or technology-driven need for space utilization. Sponsors will benefit through public relations and goodwill, educational promotions and advertising, and the sale and marketing of related products. There is money to be made by supporting, fostering, and enabling education in space through the International Space Station. This paper will explore various ISS education program and sponsorship options and benefits, will examine early industry response to such an opportunity, and will make the case for moving forward with an ISS education program as a private sector initiative.